Secure digital voting system based on blockchain technology KM Khan, J Arshad, MM Khan International Journal of Electronic Government Research (IJEGR) 14 (1), 53-62, 2018 | 235 | 2018 |
Investigating performance constraints for blockchain based secure e-voting system KM Khan, J Arshad, MM Khan Future Generation Computer Systems 105, 13-26, 2020 | 197 | 2020 |
Scalable blockchains—A systematic review MH Nasir, J Arshad, MM Khan, M Fatima, K Salah, R Jayaraman Future Generation Computer Systems, 2021 | 146 | 2021 |
High error-rate quantum key distribution for long-distance communication MM Khan, M Murphy, A Beige New Journal of Physics 11 (6), 063043, 2009 | 89 | 2009 |
A blockchain-based decentralized machine learning framework for collaborative intrusion detection within UAVs AA Khan, MM Khan, KM Khan, J Arshad, F Ahmad Computer Networks, 108217, 2021 | 80 | 2021 |
Swarm intelligence inspired intrusion detection systems—a systematic literature review MH Nasir, SA Khan, MM Khan, M Fatima Computer Networks 205, 108708, 2022 | 73 | 2022 |
Simulation of transaction malleability attack for blockchain-based e-Voting KM Khan, J Arshad, MM Khan Computers & Electrical Engineering 83, 106583, 2020 | 65 | 2020 |
PRISED tangle: a privacy-aware framework for smart healthcare data sharing using IOTA tangle S Abdullah, J Arshad, MM Khan, M Alazab, K Salah Complex & Intelligent Systems 9 (3), 3023-3041, 2023 | 58 | 2023 |
Empirical analysis of transaction malleability within blockchain-based e-Voting KM Khan, J Arshad, MM Khan Computers & Security 100, 102081, 2021 | 48 | 2021 |
Analysis of security and privacy challenges for DNA-genomics applications and databases S Arshad, J Arshad, MM Khan, S Parkinson Journal of Biomedical Informatics 119, 103815, 2021 | 37 | 2021 |
A novel framework for collaborative intrusion detection for m2m networks J Arshad, MM Abdellatif, MM Khan, MA Azad 2018 9th International Conference on Information and Communication Systems …, 2018 | 22 | 2018 |
Collaborative device-level botnet detection for internet of things MH Nasir, J Arshad, MM Khan Computers & Security 129, 103172, 2023 | 20 | 2023 |
A Layered Approach to Threat Modeling for 5G-Based Systems MNI Farooqui, J Arshad, MM Khan Electronics 11 (12), 1819, 2022 | 17 | 2022 |
An overview of quantum cryptography for wireless networking infrastructure KH Sheikh, SS Hyder, MM Khan International Symposium on Collaborative Technologies and Systems (CTS'06 …, 2006 | 17 | 2006 |
A bibliometric approach to quantitatively assess current research trends in 5G security MNI Farooqui, J Arshad, MM Khan Library Hi Tech 39 (4), 1097-1120, 2021 | 16 | 2021 |
Ransomware prevention using moving target defense based approach MM Khan, MF Hyder, SM Khan, J Arshad, MM Khan Concurrency and Computation: Practice and Experience 35 (7), e7592, 2023 | 15 | 2023 |
Signature-based detection of privilege-escalation attacks on Android RH Niazi, JA Shamsi, T Waseem, MM Khan 2015 conference on information assurance and cyber security (CIACS), 44-49, 2015 | 15 | 2015 |
A Quantum key distribution network through single mode optical fiber MM Khan, S Hyder, MK Pathan, KH Sheikh International Symposium on Collaborative Technologies and Systems (CTS'06 …, 2006 | 14 | 2006 |
Anomaly Detection and Enterprise Security using User and Entity Behavior Analytics (UEBA) MZA Khan, MM Khan, J Arshad 2022 3rd International Conference on Innovations in Computer Science …, 2022 | 13 | 2022 |
Anomaly detection through keystroke and tap dynamics implemented via machine learning algorithms H Jawed, Z Ziad, MM Khan, M Asrar Turkish Journal of Electrical Engineering and Computer Sciences 26 (4), 1698 …, 2018 | 11 | 2018 |