Saad Khan
Orcid: 0000-0001-8613-8200Affiliations:
- University of Huddersfield, UK
 
  According to our database1,
  Saad Khan
  authored at least 34 papers
  between 2017 and 2025.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
- 
    on orcid.org
 
On csauthors.net:
Bibliography
  2025
    Neurocomputing, 2025
    
  
A contextual framework to standardise the communication of machine learning cyber security characteristics.
    
  
    Comput. Stand. Interfaces, 2025
    
  
    IEEE Access, 2025
    
  
  2024
    Cryptogr., September, 2024
    
  
An unsupervised approach for the detection of zero-day distributed denial of service attacks in Internet of Things networks.
    
  
    IET Networks, 2024
    
  
Exploring perceptions of decision-makers and specialists in defensive machine learning cybersecurity applications: The need for a standardised approach.
    
  
    Comput. Secur., 2024
    
  
Cybersecurity Education and Awareness Among Parents and Teachers: A Survey of Bahrain.
    
  
    IEEE Access, 2024
    
  
  2023
Context-based irregular activity detection in event logs for forensic investigations: An itemset mining approach.
    
  
    Expert Syst. Appl., December, 2023
    
  
Comparison of deep learning classification models for facial image age estimation in digital forensic investigations.
    
  
    Forensic Sci. Int. Digit. Investig., December, 2023
    
  
    IET Biom., January, 2023
    
  
A Survey on Empirical Security Analysis of Access-control Systems: A Real-world Perspective.
    
  
    ACM Comput. Surv., 2023
    
  
A Survey on the Detection and Impacts of Deepfakes in Visual, Audio, and Textual Formats.
    
  
    IEEE Access, 2023
    
  
Automated Planning to Prioritise Digital Forensics Investigation Cases Containing Indecent Images of Children.
    
  
    Proceedings of the Thirty-Third International Conference on Automated Planning and Scheduling, 2023
    
  
  2022
    Cybersecur., 2022
    
  
Multi-Mobile Agent Security by Design Itinerary Planning Approach in Wireless Sensor Network.
    
  
    Proceedings of the Ubiquitous Security - Second International Conference, 2022
    
  
On the Variability in the Application and Measurement of Supervised Machine Learning in Cyber Security.
    
  
    Proceedings of the Ubiquitous Security - Second International Conference, 2022
    
  
  2021
OCEAN: A Non-Conventional Parameter Free Clustering Algorithm Using Relative Densities of Categories.
    
  
    Int. J. Pattern Recognit. Artif. Intell., 2021
    
  
    IET Biom., 2021
    
  
Biometric Systems Utilising Health Data from Wearable Devices: Applications and Future Challenges in Computer Security.
    
  
    ACM Comput. Surv., 2021
    
  
  2020
    J. Cybersecur., 2020
    
  
  2019
    PhD thesis, 2019
    
  
    J. Inf. Secur. Appl., 2019
    
  
<i>Creeper</i>: a tool for detecting permission creep in file system access controls.
    
  
    Cybersecur., 2019
    
  
  2018
Automated Planning of Administrative Tasks Using Historic Events: A File System Case Study.
    
  
    Proceedings of the Guide to Vulnerability Analysis for Computer Networks and Systems, 2018
    
  
Review into State of the Art of Vulnerability Assessment using Artificial Intelligence.
    
  
    Proceedings of the Guide to Vulnerability Analysis for Computer Networks and Systems, 2018
    
  
Identifying irregularities in security event logs through an object-based Chi-squared test of independence.
    
  
    J. Inf. Secur. Appl., 2018
    
  
Eliciting and utilising knowledge for security event log analysis: An association rule mining and automated planning approach.
    
  
    Expert Syst. Appl., 2018
    
  
  2017
    J. Cloud Comput., 2017
    
  
    Proceedings of the Companion Proceedings of the 10th International Conference on Utility and Cloud Computing, 2017
    
  
    Proceedings of the Knowledge Capture Conference, 2017
    
  
    Proceedings of the Second International Conference on Internet of things and Cloud Computing, 2017
    
  
Towards A Multi-Tiered Knowledge-Based System for Autonomous Cloud Security Auditing.
    
  
    Proceedings of the Workshops of the The Thirty-First AAAI Conference on Artificial Intelligence, 2017