Wilayat Khan
Orcid: 0000-0003-0993-5964
According to our database1,
Wilayat Khan
authored at least 27 papers
between 2014 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Machine learning-based optimal data retrieval and resource allocation scheme for edge mesh coupled information-centric IoT networks and disability support systems.
Internet Things, 2025
Expert Syst. Appl., 2025
The Effect of Driver Behavior on Energy Consumption Using a Microscopic Traffic Model.
IEEE Access, 2025
Energy-Efficient Discrete Cosine Transform Architecture Using Reversible Logic for IoT-Enabled Consumer Electronics.
IEEE Access, 2025
Enhancing Extreme Programming (XP) Adoption Through SAMAM: A Scalable Agile Maturity Assessment Model Based on Industry Best Practices.
IEEE Access, 2025
2024
IEEE Access, 2024
IEEE Access, 2024
2023
Mob. Networks Appl., April, 2023
IEEE Access, 2023
PhishCatcher: Client-Side Defense Against Web Spoofing Attacks Using Machine Learning.
IEEE Access, 2023
2022
2021
Corrections to "Modernizing Legacy Software as Context-Sensitive and Portable Mobile-Enabled Application".
IT Prof., 2021
Modernizing Legacy Software as Context - Sensitive and Portable Mobile-Enabled Application.
IT Prof., 2021
CoCEC: An Automatic Combinational Circuit Equivalence Checker Based on the Interactive Theorem Prover.
Complex., 2021
2020
Wirel. Commun. Mob. Comput., 2020
2019
J. Intell. Fuzzy Syst., 2019
Des. Autom. Embed. Syst., 2019
IEEE Access, 2019
2018
Hum. centric Comput. Inf. Sci., 2018
2017
Neurocomputing, 2017
Proceedings of the A Systems Approach to Cyber Security, 2017
2015
J. Comput. Secur., 2015
2014
Web session security: formal verification, client-side enforcement and experimental analysis.
PhD thesis, 2014
Proceedings of the Information Systems Security - 10th International Conference, 2014
Proceedings of the Engineering Secure Software and Systems - 6th International Symposium, 2014
Proceedings of the IEEE 27th Computer Security Foundations Symposium, 2014