Muhammad Imran Khan

Affiliations:
  • Insight Centre for Data Analytics, University College Cork, Ireland
  • Saarland University, Department of Computer Science, Germany
  • Petronas University of Technology, Department of Electrical and Electronics Engineering, Teronoh, Malaysia


According to our database1, Muhammad Imran Khan authored at least 14 papers between 2010 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
Privacy Interpretation of Behaviour-based Anomaly Detection Approaches.
Proceedings of the 14th International Conference on Security of Information and Networks, 2021

Database Intrusion Detection Systems (DIDs): Insider Threat Detection via Behaviour-Based Anomaly Detection Systems - A Brief Survey of Concepts and Approaches.
Proceedings of the Emerging Information Security and Applications, 2021

2020
On the detection of privacy and security anomalies.
PhD thesis, 2020

Quantitatively Measuring Privacy in Interactive Query Settings Within RDBMS Framework.
Frontiers Big Data, 2020

Privacy Interpretation of Behavioural-based Anomaly Detection Approaches.
CoRR, 2020

Database Intrusion Detection Systems (DIDs): Insider Threat Detection via Behavioural-based Anomaly Detection Systems - A Brief Survey of Concepts and Approaches.
CoRR, 2020

Towards Privacy-anomaly Detection: Discovering Correlation between Privacy and Security-anomalies.
Proceedings of the 17th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2020) / The 15th International Conference on Future Networks and Communications (FNC-2020) / The 10th International Conference on Sustainable Energy Information Technology, 2020

2019
PriDe: A Quantitative Measure of Privacy-Loss in Interactive Querying Settings.
Proceedings of the 10th IFIP International Conference on New Technologies, 2019

2018
Towards Modelling Insiders Behaviour as Rare Behaviour to Detect Malicious RDBMS Access.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

2017
On database intrusion detection: A Query analytics-based model of normative behavior to detect insider attacks.
Proceedings of the 7th International Conference on Communication and Network Security, 2017

A Semantic Approach to Frequency Based Anomaly Detection of Insider Access in Database Management Systems.
Proceedings of the Risks and Security of Internet and Systems, 2017

2016
Detecting Anomalous Behavior in DBMS Logs.
Proceedings of the Risks and Security of Internet and Systems, 2016

2011
A joint watermarking and encryption scheme for DCT based codecs.
Proceedings of the IEEE 17th Asia-Pacific Conference on Communications, 2011

2010
On Perceptual Encryption: Variants of DCT Block Scrambling Scheme for JPEG Compressed Images.
Proceedings of the Signal Processing and Multimedia, 2010


  Loading...