Follow
Adnan Shahid Khan-PhD, SMIEEE
Adnan Shahid Khan-PhD, SMIEEE
Associate Professor, Faculty of Computer Science and IT, Universiti Malaysia Sarawak (UNIMAS)
Verified email at unimas.my - Homepage
Title
Cited by
Cited by
Year
Network intrusion detection system: A systematic study of machine learning and deep learning approaches
Z Ahmad, A Shahid Khan, C Wai Shiang, J Abdullah, F Ahmad
Transactions on Emerging Telecommunications Technologies 32 (1), e4150, 2021
7382021
Secure trust-based blockchain architecture to prevent attacks in VANET
AS Khan, K Balan, Y Javed, S Tarmizi, J Abdullah
Sensors 19 (22), 4954, 2019
1052019
A review of vehicle to vehicle communication protocols for VANETs in the urban environment
IA Abbasi, A Shahid Khan
future internet 10 (2), 14, 2018
912018
Anomaly detection using deep neural network for IoT architecture
Z Ahmad, A Shahid Khan, K Nisar, I Haider, R Hassan, MR Haque, ...
Applied Sciences 11 (15), 7050, 2021
842021
Defending malicious script attacks using machine learning classifiers
N Khan, J Abdullah, AS Khan
Wireless Communications and Mobile Computing 2017, 2017
822017
A spectrogram image-based network anomaly detection system using deep convolutional neural network
AS Khan, Z Ahmad, J Abdullah, F Ahmad
IEEE access 9, 87079-87093, 2021
682021
Designing of success criteria-based evaluation model for assessing the research collaboration between university and industry
AM Iqbal, AS Khan, S Iqbal, AA Senin
International Journal of Business Research and Management 2 (2), 59-73, 2011
622011
A framework for traceable and transparent supply chain management for agri-food sector in malaysia using blockchain technology
KY Chan, J Abdullah, AS Khan
International Journal of Advanced Computer Science and Applications 10 (11), 2019
572019
Secure Authentication and Key Management Protocols for Mobile Multihop WiMAX Networks
AS Khan, lenando Halikul, NF Johari Abdullah
Jurnal Teknologi 73 (1), 75-81, 2015
372015
Evaluating national innovation system of malaysia based on university-industry research collaboration: A system thinking approach
AM Iqbal, AS Khan, F Bashir, AA Senin
Asian Social Science 11 (13), 45, 2015
352015
A reliable path selection and packet forwarding routing protocol for vehicular ad hoc networks
IA Abbasi, AS Khan, S Ali
EURASIP Journal on Wireless Communications and Networking 2018, 1-19, 2018
342018
Effective way to defend the hypervisor attacks in cloud computing
MS Dildar, N Khan, JB Abdullah, AS Khan
2017 2nd International Conference on Anti-Cyber Crimes (ICACC), 154-159, 2017
332017
Towards vulnerability prevention model for web browser using interceptor approach
N Khan, J Abdullah, AS Khan
2015 9th International Conference on IT in Asia (CITA), 1-5, 2015
322015
A verifiably secure ECC based authentication scheme for securing IoD using FANET
SU Jan, IA Abbasi, F Algarni, AS Khan
IEEE Access 10, 95321-95343, 2022
312022
Evolutionary integrated heuristic with Gudermannian neural networks for second kind of Lane–Emden nonlinear singular models
K Nisar, Z Sabir, MA Zahoor Raja, AA Ag. Ibrahim, JJPC Rodrigues, ...
Applied Sciences 11 (11), 4725, 2021
272021
Dynamic multiple junction selection based routing protocol for VANETs in city environment
IA Abbasi, AS Khan, S Ali
Applied Sciences 8 (5), 687, 2018
262018
Security issues in 5G device to device communication
AS Khan, Y Javed, J Abdullah, JM Nazim, N Khan
IJCSNS 17 (5), 366, 2017
262017
Quantum-elliptic curve cryptography for multihop communication in 5G networks
S Khan, J Abdullah, N Khan, AA Julahi, S Tarmizi
International Journal of Computer Science and Network Security (IJCSNS) 17 …, 2017
222017
Efficient distributed authentication key scheme for multi-hop relay in IEEE 802.16 j network
AS Khan, N Fisal, S Kamilah, M Abbas
International Journal of Engineering Science and Technology (IJEST) 2 (6 …, 2010
222010
Trust-based lightweight security protocol for device to device multihop cellular communication (TLwS)
AS Khan, Y Javed, J Abdullah, K Zen
Journal of Ambient Intelligence and Humanized Computing, 1-18, 2021
212021
The system can't perform the operation now. Try again later.
Articles 1–20