Saad Khan

Orcid: 0000-0001-8613-8200

Affiliations:
  • University of Huddersfield, UK


According to our database1, Saad Khan authored at least 25 papers between 2017 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Context-based irregular activity detection in event logs for forensic investigations: An itemset mining approach.
Expert Syst. Appl., December, 2023

Comparison of deep learning classification models for facial image age estimation in digital forensic investigations.
Forensic Sci. Int. Digit. Investig., December, 2023

An empirical analysis of keystroke dynamics in passwords: A longitudinal study.
IET Biom., January, 2023

A Survey on Empirical Security Analysis of Access-control Systems: A Real-world Perspective.
ACM Comput. Surv., 2023

A Survey on the Detection and Impacts of Deepfakes in Visual, Audio, and Textual Formats.
IEEE Access, 2023

Automated Planning to Prioritise Digital Forensics Investigation Cases Containing Indecent Images of Children.
Proceedings of the Thirty-Third International Conference on Automated Planning and Scheduling, 2023

2022
Identifying high-risk over-entitlement in access control policies using fuzzy logic.
Cybersecur., 2022

Multi-Mobile Agent Security by Design Itinerary Planning Approach in Wireless Sensor Network.
Proceedings of the Ubiquitous Security - Second International Conference, 2022

On the Variability in the Application and Measurement of Supervised Machine Learning in Cyber Security.
Proceedings of the Ubiquitous Security - Second International Conference, 2022

2021
OCEAN: A Non-Conventional Parameter Free Clustering Algorithm Using Relative Densities of Categories.
Int. J. Pattern Recognit. Artif. Intell., 2021

Password policy characteristics and keystroke biometric authentication.
IET Biom., 2021

Biometric Systems Utilising Health Data from Wearable Devices: Applications and Future Challenges in Computer Security.
ACM Comput. Surv., 2021

2020
Low-cost fitness and activity trackers for biometric authentication.
J. Cybersecur., 2020

2019
Discovering and utilising expert knowledge from security event logs.
PhD thesis, 2019

Discovering and utilising expert knowledge from security event logs.
J. Inf. Secur. Appl., 2019

<i>Creeper</i>: a tool for detecting permission creep in file system access controls.
Cybersecur., 2019

2018
Automated Planning of Administrative Tasks Using Historic Events: A File System Case Study.
Proceedings of the Guide to Vulnerability Analysis for Computer Networks and Systems, 2018

Review into State of the Art of Vulnerability Assessment using Artificial Intelligence.
Proceedings of the Guide to Vulnerability Analysis for Computer Networks and Systems, 2018

Identifying irregularities in security event logs through an object-based Chi-squared test of independence.
J. Inf. Secur. Appl., 2018

Eliciting and utilising knowledge for security event log analysis: An association rule mining and automated planning approach.
Expert Syst. Appl., 2018

2017
Fog computing security: a review of current applications and security solutions.
J. Cloud Comput., 2017

A Multi-layered Cloud Protection Framework.
Proceedings of the Companion Proceedings of the 10th International Conference on Utility and Cloud Computing, 2017

Causal Connections Mining Within Security Event Logs.
Proceedings of the Knowledge Capture Conference, 2017

Security auditing in the fog.
Proceedings of the Second International Conference on Internet of things and Cloud Computing, 2017

Towards A Multi-Tiered Knowledge-Based System for Autonomous Cloud Security Auditing.
Proceedings of the Workshops of the The Thirty-First AAAI Conference on Artificial Intelligence, 2017


  Loading...