Zeeshan Shafi Khan

Orcid: 0000-0001-9327-5705

According to our database1, Zeeshan Shafi Khan authored at least 18 papers between 2009 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Advanced Ensemble Model for Solar Radiation Forecasting Using Sine Cosine Algorithm and Newton's Laws.
IEEE Access, 2021

2019
Multivariable based checkpoints to mitigate the long range attack in proof-of-stake based blockchains.
Proceedings of the 3rd International Conference on High Performance Compilation, 2019

2016
Energy efficient communication in body area networks using collaborative communication in Rayleigh fading channel.
Telecommun. Syst., 2016

2014
Attack containment in mobile ad-hoc networks through fair distribution of processing resources.
Telecommun. Syst., 2014

2013
Editorial.
Telecommun. Syst., 2013

Editorial "Secure Multimedia Communication in Vehicular Adhoc Network".
Multim. Tools Appl., 2013

2011
Securing IP-Multimedia Subsystem (IMS) against Anomalous Message Exploits by Using Machine Learning Algorithms.
Proceedings of the Eighth International Conference on Information Technology: New Generations, 2011

Presence Based Secure Instant Messaging Mechanism for IP Multimedia Subsystem.
Proceedings of the Computational Science and Its Applications - ICCSA 2011, 2011

2010
Sensor Based Framework for Secure Multimedia Communication in VANET.
Sensors, 2010

Enhanced Relevance-Based Approach for Network Controls.
Informatica (Slovenia), 2010

Information Sharing in Vehicular AdHoc Network.
Int. J. Comput. Commun. Control, 2010

Realization of Call-Back Authentication (CBA) for secure web to cellular phone SMS communication.
Comput. Math. Appl., 2010

Performance Evaluation of Video Streaming in Vehicular Adhoc Network.
Proceedings of the Information Security and Assurance - 4th International Conference, 2010

Receiver Based Traffic Control Mechanism to Protect Low Capacity Network in Infrastructure Based Wireless Mesh Network.
Proceedings of the Information Security and Assurance - 4th International Conference, 2010

Web 2.0 content extraction.
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010

Secure single packet IP Traceback mechanism to identify the source.
Proceedings of the 5th International Conference for Internet Technology and Secured Transactions, 2010

Issues of Security and Network Load in Presence - A Survey.
Proceedings of the Security Technology, Disaster Recovery and Business Continuity, 2010

2009
A Three-Layer Secure Architecture for IP Multimedia Subsystem-Based Instant Messaging.
Inf. Secur. J. A Glob. Perspect., 2009


  Loading...