Folgen
Muhammad Mubashir Khan
Muhammad Mubashir Khan
Bestätigte E-Mail-Adresse bei neduet.edu.pk
Titel
Zitiert von
Zitiert von
Jahr
Secure digital voting system based on blockchain technology
KM Khan, J Arshad, MM Khan
International Journal of Electronic Government Research (IJEGR) 14 (1), 53-62, 2018
2362018
Investigating performance constraints for blockchain based secure e-voting system
KM Khan, J Arshad, MM Khan
Future Generation Computer Systems 105, 13-26, 2020
1922020
Scalable blockchains—A systematic review
MH Nasir, J Arshad, MM Khan, M Fatima, K Salah, R Jayaraman
Future Generation Computer Systems, 2021
1432021
High error-rate quantum key distribution for long-distance communication
MM Khan, M Murphy, A Beige
New Journal of Physics 11 (6), 063043, 2009
892009
A blockchain-based decentralized machine learning framework for collaborative intrusion detection within UAVs
AA Khan, MM Khan, KM Khan, J Arshad, F Ahmad
Computer Networks, 108217, 2021
792021
Swarm intelligence inspired intrusion detection systems—a systematic literature review
MH Nasir, SA Khan, MM Khan, M Fatima
Computer Networks 205, 108708, 2022
722022
Simulation of transaction malleability attack for blockchain-based e-Voting
KM Khan, J Arshad, MM Khan
Computers & Electrical Engineering 83, 106583, 2020
642020
PRISED tangle: a privacy-aware framework for smart healthcare data sharing using IOTA tangle
S Abdullah, J Arshad, MM Khan, M Alazab, K Salah
Complex & Intelligent Systems 9 (3), 3023-3041, 2023
582023
Empirical analysis of transaction malleability within blockchain-based e-Voting
KM Khan, J Arshad, MM Khan
Computers & Security 100, 102081, 2021
522021
Analysis of security and privacy challenges for DNA-genomics applications and databases
S Arshad, J Arshad, MM Khan, S Parkinson
Journal of Biomedical Informatics 119, 103815, 2021
382021
Collaborative device-level botnet detection for internet of things
MH Nasir, J Arshad, MM Khan
Computers & Security 129, 103172, 2023
212023
A novel framework for collaborative intrusion detection for m2m networks
J Arshad, MM Abdellatif, MM Khan, MA Azad
2018 9th International Conference on Information and Communication Systems …, 2018
212018
A Layered Approach to Threat Modeling for 5G-Based Systems
MNI Farooqui, J Arshad, MM Khan
Electronics 11 (12), 1819, 2022
172022
An overview of quantum cryptography for wireless networking infrastructure
KH Sheikh, SS Hyder, MM Khan
International Symposium on Collaborative Technologies and Systems (CTS'06 …, 2006
172006
A bibliometric approach to quantitatively assess current research trends in 5G security
MNI Farooqui, J Arshad, MM Khan
Library Hi Tech 39 (4), 1097-1120, 2021
162021
Ransomware prevention using moving target defense based approach
MM Khan, MF Hyder, SM Khan, J Arshad, MM Khan
Concurrency and Computation: Practice and Experience 35 (7), e7592, 2023
152023
Signature-based detection of privilege-escalation attacks on Android
RH Niazi, JA Shamsi, T Waseem, MM Khan
2015 conference on information assurance and cyber security (CIACS), 44-49, 2015
152015
A Quantum key distribution network through single mode optical fiber
MM Khan, S Hyder, MK Pathan, KH Sheikh
International Symposium on Collaborative Technologies and Systems (CTS'06 …, 2006
142006
Anomaly Detection and Enterprise Security using User and Entity Behavior Analytics (UEBA)
MZA Khan, MM Khan, J Arshad
2022 3rd International Conference on Innovations in Computer Science …, 2022
132022
Anomaly detection through keystroke and tap dynamics implemented via machine learning algorithms
H Jawed, Z Ziad, MM Khan, M Asrar
Turkish Journal of Electrical Engineering and Computer Sciences 26 (4), 1698 …, 2018
112018
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20