Liaqat Ali Khan

According to our database1, Liaqat Ali Khan authored at least 12 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Forensic investigation of Cisco WebEx desktop client, web, and Android smartphone applications.
Ann. des Télécommunications, April, 2023

2021
Effective Model for Real Time End to End Secure Communication Over GSM Voice Channel.
Wirel. Pers. Commun., 2021

Formal approach to thwart against drone discovery attacks: A taxonomy of novel 3D obfuscation mechanisms.
Future Gener. Comput. Syst., 2021

SeFACED: Semantic-Based Forensic Analysis and Classification of E-Mail Data Using Deep Learning.
IEEE Access, 2021

Security Assessment for Zenbo Robot Using Drozer and mobSF Frameworks.
Proceedings of the 11th IFIP International Conference on New Technologies, 2021

WhatsApp Network Forensics: Discovering the IP Addresses of Suspects.
Proceedings of the 11th IFIP International Conference on New Technologies, 2021

Forensic Analysis of the Cisco WebEx Application.
Proceedings of the 5th Cyber Security in Networking Conference, 2021

2018
Leveraging the Internet of Things for Smart Waters: Motivation, Enabling Technologies and Deployment Strategies for Pakistan.
Proceedings of the 2018 IEEE SmartWorld, 2018

2010
Speaker verification from partially encrypted compressed speech for forensic investigation.
Digit. Investig., 2010

Speaker recognition from encrypted VoIP communications.
Digit. Investig., 2010

2008
A Server Based ASR Approach to Automated Cryptanalysis of Two Time Pads in Case of Speech.
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008

2007
Exploiting Silence for Ciphertext Only Cryptanalysis of Stream Ciphered Digitized Voice.
Proceedings of the 2007 International Conference on Security & Management, 2007


  Loading...