Suleman Khan

Orcid: 0000-0003-1190-258X

Affiliations:
  • Northumbria University, Department of Computer and Information Sciences, Newcastle upon Tyne, UK
  • Monash University, School of Information Technology, Bandar Sunway, Malaysia
  • University of Malaya, Department of Computer Science and Technology, Malaysia (PhD 2017)
  • University of Peshawar, Pakistan
  • COMSATS, Institute of Information Technology, Department of Computer Science, Abbottabad, Pakistan


According to our database1, Suleman Khan authored at least 71 papers between 2009 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Harnessing intelligent technologies to curb COVID-19 pandemic: taxonomy and open challenges.
Computing, April, 2023

An integrated approach: using knowledge graph and network analysis for harnessing digital advertisement.
Multim. Tools Appl., March, 2023

Simulative Survey of Flooding Attacks in Intermittently Connected Vehicular Delay Tolerant Networks.
IEEE Access, 2023

FAPMIC: Fake Packet and Selective Packet Drops Attacks Mitigation by Merkle Hash Tree in Intermittently Connected Networks.
IEEE Access, 2023

2022
A Fog-Centric Secure Cloud Storage Scheme.
IEEE Trans. Sustain. Comput., 2022

Dynamic Learning Framework for Smooth-Aided Machine-Learning-Based Backbone Traffic Forecasts.
Sensors, 2022

Cyber-Attack Prediction Based on Network Intrusion Detection Systems for Alert Correlation Techniques: A Survey.
Sensors, 2022

Forest Fire Detection Using New Routing Protocol.
Sensors, 2022

Urdu signboard detection and recognition using deep learning.
Multim. Tools Appl., 2022

Highly Accurate and Reliable Wireless Network Slicing in 5th Generation Networks: A Hybrid Deep Learning Approach.
J. Netw. Syst. Manag., 2022

Fuzzy-Logic-Based Privacy-Aware Dynamic Release of IoT-Enabled Healthcare Data.
IEEE Internet Things J., 2022

Traffic Classification based on Incremental Learning Algorithms for the Software-Defined Networks.
Proceedings of the International Conference on Frontiers of Information Technology, 2022

2021
Detection and Recognition of Vehicle's Headlights Types for Surveillance Using Deep Neural Networks.
Proceedings of the Deep Learning for Unmanned Systems, 2021

Language Modeling and Text Generation Using Hybrid Recurrent Neural Network.
Proceedings of the Deep Learning for Unmanned Systems, 2021

Recent Advances of Deep Learning in Biology.
Proceedings of the Deep Learning for Unmanned Systems, 2021

CLASS: Cloud Log Assuring Soundness and Secrecy Scheme for Cloud Forensics.
IEEE Trans. Sustain. Comput., 2021

A review on optimization strategies integrating renewable energy sources focusing uncertainty factor - Paving path to eco-friendly smart cities.
Sustain. Comput. Informatics Syst., 2021

An online COVID-19 self-assessment framework supported by IoMT technology.
J. Intell. Syst., 2021

A comprehensive survey of load balancing techniques in software-defined network.
J. Netw. Comput. Appl., 2021

A privacy-preserving protocol for continuous and dynamic data collection in IoT enabled mobile app recommendation system (MARS).
J. Netw. Comput. Appl., 2021

Challenges and Limitations of Internet of Things Enabled Healthcare in COVID-19.
IEEE Internet Things Mag., 2021

Autonomous Transportation in Emergency Healthcare Services: Framework, Challenges, and Future Work.
IEEE Internet Things Mag., 2021

Deep learning recognition of diseased and normal cell representation.
Trans. Emerg. Telecommun. Technol., 2021

DPLBAnt: Improved load balancing technique based on detection and rerouting of elephant flows in software-defined networks.
Comput. Commun., 2021

Software-defined networks for resource allocation in cloud computing: A survey.
Comput. Networks, 2021

Detection of impostor and tampered segments in audio by using an intelligent system.
Comput. Electr. Eng., 2021

Detection and Classification of Conflict Flows in SDN Using Machine Learning Algorithms.
IEEE Access, 2021

2020
Cache-Enabled Unmanned Aerial Vehicles for Cooperative Cognitive Radio Networks.
IEEE Wirel. Commun., 2020

Volunteer Computing in Connected Vehicles: Opportunities and Challenges.
IEEE Netw., 2020

An efficient reinforcement learning-based Botnet detection approach.
J. Netw. Comput. Appl., 2020

Bat algorithm-based beamforming for mmWave massive MIMO systems.
Int. J. Commun. Syst., 2020

Systematic Review on Security and Privacy Requirements in Edge Computing: State of the Art and Future Research Opportunities.
IEEE Access, 2020

Edge Computing Intelligence Using Robust Feature Selection for Network Traffic Classification in Internet-of-Things.
IEEE Access, 2020

Flow-Aware Elephant Flow Detection for Software-Defined Networks.
IEEE Access, 2020

Understanding Link Fabrication Attack in Software Defined Network using Formal Methods.
Proceedings of the IEEE International Conference on Informatics, 2020

2019
Indoor human tracking mechanism using integrated onboard smartphones Wi-Fi device and inertial sensors.
Telecommun. Syst., 2019

Trust and reputation for Internet of Things: Fundamentals, taxonomy, and open research challenges.
J. Netw. Comput. Appl., 2019

A Novel Bio-Inspired Hybrid Algorithm (NBIHA) for Efficient Resource Management in Fog Computing.
IEEE Access, 2019

A Security-Enhanced Cluster Size Adjustment Scheme for Cognitive Radio Networks.
IEEE Access, 2019

Delay-Aware Accident Detection and Response System Using Fog Computing.
IEEE Access, 2019

2018
EE-MRP: Energy-Efficient Multistage Routing Protocol for Wireless Sensor Networks.
Wirel. Commun. Mob. Comput., 2018

Real-Time Intersection-Based Segment Aware Routing Algorithm for Urban Vehicular Networks.
IEEE Trans. Intell. Transp. Syst., 2018

Transmission power adaption scheme for improving IoV awareness exploiting: evaluation weighted matrix based on piggybacked information.
Comput. Networks, 2018

Data Collection in Smart Communities Using Sensor Cloud: Recent Advances, Taxonomy, and Future Research Directions.
IEEE Commun. Mag., 2018

Towards Energy Saving in Computational Clouds: Taxonomy, Review, and Open Challenges.
IEEE Access, 2018

An Efficient IDS Using Hybrid Magnetic Swarm Optimization in WANETs.
IEEE Access, 2018

Entropy-based Fuzzy AHP Model for Trustworthy Service Provider Selection in Internet of Things.
Proceedings of the 43rd IEEE Conference on Local Computer Networks, 2018

2017
Towards port-knocking authentication methods for mobile cloud computing.
J. Netw. Comput. Appl., 2017

Topology Discovery in Software Defined Networks: Threats, Taxonomy, and State-of-the-Art.
IEEE Commun. Surv. Tutorials, 2017

On Software-Defined Wireless Network (SDWN) Network Virtualization: Challenges and Open Issues.
Comput. J., 2017

From Intrusion Detection to an Intrusion Response System: Fundamentals, Requirements, and Future Directions.
Algorithms, 2017

Intersection-based Distance and Traffic-Aware Routing (IDTAR) protocol for smart vehicular communication.
Proceedings of the 13th International Wireless Communications and Mobile Computing Conference, 2017

2016
A comparison study on node clustering techniques used in target tracking WSNs for efficient data aggregation.
Wirel. Commun. Mob. Comput., 2016

Service delivery models of cloud computing: security issues and open challenges.
Secur. Commun. Networks, 2016

Software-Defined Network Forensics: Motivation, Potential Locations, Requirements, and Challenges.
IEEE Netw., 2016

WDARS: A Weighted Data Aggregation Routing Strategy with Minimum Link Cost in Event-Driven WSNs.
J. Sensors, 2016

Network forensics: Review, taxonomy, and open challenges.
J. Netw. Comput. Appl., 2016

On cloud security attacks: A taxonomy and intrusion detection and prevention as a service.
J. Netw. Comput. Appl., 2016

Survey on Network Virtualization Using OpenFlow: Taxonomy, Opportunities, and Open Issues.
KSII Trans. Internet Inf. Syst., 2016

Towards knowledge modeling and manipulation technologies: A survey.
Int. J. Inf. Manag., 2016

Evaluation of efficient vehicular ad hoc networks based on a maximum distance routing algorithm.
EURASIP J. Wirel. Commun. Netw., 2016

Chroma key background detection for digital video using statistical correlation of blurring artifact.
Digit. Investig., 2016

Cloud Log Forensics: Foundations, State of the Art, and Future Directions.
ACM Comput. Surv., 2016

Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis.
IEEE Access, 2016

2015
Energy Efficient Computational Offloading Framework for Mobile Cloud Computing.
J. Grid Comput., 2015

SIDNFF: Source identification network forensics framework for cloud computing.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2015

2014
Sierpinski triangle based data center architecture in cloud computing.
J. Supercomput., 2014

A review on interworking and mobility techniques for seamless connectivity in mobile cloud computing.
J. Netw. Comput. Appl., 2014

Passive video forgery detection techniques: A survey.
Proceedings of the 10th International Conference on Information Assurance and Security, 2014

2012
The Median Resource Failure Checkpointing.
Proceedings of the 26th European Conference on Modelling and Simulation, 2012

2009
Contextual advertising using keyword extraction through collocation.
Proceedings of the FIT '09, 2009


  Loading...