Follow
Adnan Shahid Khan-PhD, SMIEEE
Adnan Shahid Khan-PhD, SMIEEE
Associate Professor, Faculty of Computer Science and IT, Universiti Malaysia Sarawak (UNIMAS)
Verified email at unimas.my - Homepage
Title
Cited by
Cited by
Year
Network intrusion detection system: A systematic study of machine learning and deep learning approaches
Z Ahmad, A Shahid Khan, C Wai Shiang, J Abdullah, F Ahmad
Transactions on Emerging Telecommunications Technologies 32 (1), e4150, 2021
9112021
Secure trust-based blockchain architecture to prevent attacks in VANET
AS Khan, K Balan, Y Javed, S Tarmizi, J Abdullah
Sensors 19 (22), 4954, 2019
1122019
Anomaly detection using deep neural network for IoT architecture
Z Ahmad, A Shahid Khan, K Nisar, I Haider, R Hassan, MR Haque, ...
Applied Sciences 11 (15), 7050, 2021
1032021
A review of vehicle to vehicle communication protocols for VANETs in the urban environment
IA Abbasi, A Shahid Khan
future internet 10 (2), 14, 2018
952018
Defending malicious script attacks using machine learning classifiers
N Khan, J Abdullah, AS Khan
Wireless Communications and Mobile Computing 2017 (1), 5360472, 2017
852017
A spectrogram image-based network anomaly detection system using deep convolutional neural network
AS Khan, Z Ahmad, J Abdullah, F Ahmad
IEEE access 9, 87079-87093, 2021
822021
Designing of success criteria-based evaluation model for assessing the research collaboration between university and industry
AM Iqbal, AS Khan, S Iqbal, AA Senin
International Journal of Business Research and Management 2 (2), 59-73, 2011
712011
A framework for traceable and transparent supply chain management for agri-food sector in malaysia using blockchain technology
KY Chan, J Abdullah, AS Khan
International Journal of Advanced Computer Science and Applications 10 (11), 2019
692019
A reliable path selection and packet forwarding routing protocol for vehicular ad hoc networks
IA Abbasi, AS Khan, S Ali
EURASIP Journal on Wireless Communications and Networking 2018, 1-19, 2018
422018
Secure Authentication and Key Management Protocols for Mobile Multihop WiMAX Networks
AS Khan, lenando Halikul, NF Johari Abdullah
Jurnal Teknologi 73 (1), 75-81, 2015
422015
A verifiably secure ECC based authentication scheme for securing IoD using FANET
SU Jan, IA Abbasi, F Algarni, AS Khan
IEEE Access 10, 95321-95343, 2022
38*2022
Evaluating national innovation system of malaysia based on university-industry research collaboration: A system thinking approach
AM Iqbal, AS Khan, F Bashir, AA Senin
Asian Social Science 11 (13), 45, 2015
382015
Effective way to defend the hypervisor attacks in cloud computing
MS Dildar, N Khan, JB Abdullah, AS Khan
2017 2nd International Conference on Anti-Cyber Crimes (ICACC), 154-159, 2017
352017
Security issues in 5G device to device communication
AS Khan, Y Javed, J Abdullah, JM Nazim, N Khan
IJCSNS 17 (5), 366, 2017
312017
Towards vulnerability prevention model for web browser using interceptor approach
N Khan, J Abdullah, AS Khan
2015 9th International Conference on IT in Asia (CITA), 1-5, 2015
312015
Evolutionary integrated heuristic with Gudermannian neural networks for second kind of Lane–Emden nonlinear singular models
K Nisar, Z Sabir, MA Zahoor Raja, AA Ag. Ibrahim, JJPC Rodrigues, ...
Applied Sciences 11 (11), 4725, 2021
292021
Dynamic multiple junction selection based routing protocol for VANETs in city environment
IA Abbasi, AS Khan, S Ali
Applied Sciences 8 (5), 687, 2018
282018
Quantum-elliptic curve cryptography for multihop communication in 5G networks
S Khan, J Abdullah, N Khan, AA Julahi, S Tarmizi
International Journal of Computer Science and Network Security (IJCSNS) 17 …, 2017
272017
Trust-based lightweight security protocol for device to device multihop cellular communication (TLwS)
AS Khan, Y Javed, J Abdullah, K Zen
Journal of Ambient Intelligence and Humanized Computing, 1-18, 2021
242021
Analysis and Intellectual Structure of the Multi-Factor Authentication in Information Security.
RM Saqib, AS Khan, Y Javed, S Ahmad, K Nisar, IA Abbasi, MR Haque, ...
Intelligent Automation & Soft Computing 32 (3), 2022
232022
The system can't perform the operation now. Try again later.
Articles 1–20