fbpx
Top

Faculty Profile

  /  Faculty Profile

Dr Abdul Nasir Khan

Tenured Associate Professor
Area of Interest: Network Security
Email: anasir@cuiatd.edu.pk
Phone: (92)992-383591-5
 
Academics/ Degrees
  • Doctor of Philosophy University of Malaya, Kuala Lumpur, Malaysia Major: Network Security 2014
  • Master of Sciences (CGPA 3.8/4.0) COMSATS Institute of Information Technology, Abbottabad  Major: Computer Science  2008.
  • Master of Computer Science (CGPA 3.1/4.0COMSATS Institute of Information Technology, Abbottabad Major:Computer Science 2005.
  • Master of Sciences (1st Division) University of Peshawar Major: Computer Science 2003.
 
Journal Publications
1. AN Khan,Abid Mehmood,Muhammad Nasir Mumtaz Bhutta,I.A.Khan,Atta ur Rehman Khan An efficient and compromise-resilient image encryption scheme for resource-constrained environments, PLOS ONE, 2024
2. Abid Mehmood,AN Khan,Arslan Shafique,Junaid Shuja,Moatsum Alawida Lightweight Image Encryption Scheme for IoT Environment and Machine Learning-Driven Robust S-box Selection, Telecommunication Systems, 2024
3. Sana Nasim Karam, Junaid Shuja,K.Bilal,AN Khan,Said Jadid Abdulkadir Energy-efficient routing protocol for reliable low-latency Internet of Things in oil and gas pipeline monitoring, PEERJ, 2024
4. ABID MEHMOOD,ARSLAN SHAFIQUE,MOATSUM ALAWIDA ,AN Khan Advances and Vulnerabilities in Modern Cryptographic Techniques: A Comprehensive Survey on Cybersecurity in the Domain of Machine/Deep Learning and Quantum Techniques, IEEE Access, 2024
5. Ibrar Hussain,I.A.Khan,W.Jadoon,RN Jadoon,AN Khan,Muhammad Shafi Touch or click friendly: Towards adaptive user interfaces for complex applications, PLOS ONE, 2024
6. Imtiaz Ali Shah, Abid Mehmood,AN Khan,Mourad Elhadef,Atta ur Rehman Khan HeuCrip: A malware detection approach for internet of battlefield things, Cluster Computing, 2023
7. E. Mustafa,J.Shujah,T. Maqsood,S. Mustafa,F. Rehman,AN Khan,S.K.Zaman,Ali Imran Jehangiri,Sadia Din Joint wireless power transfer and task offloading in mobile edge computing: a survey, Cluster Computing, 2022
8. Arslan Shafique,AN Khan,Abid Mehmood,Moatsum Alawida,Atta Ur Rehman Khan A novel machine learning technique for selecting suitable image encryption algorithms for IoT applications, Wireless Communications and Mobile Computing, 2022
9. Adil Adeel,Dr. Mazhar Ali,F. Rehman,J.Shujah,AN Khan,Tauqeer Khalid,Yaser Jararweh A multi-attack resilient lightweight IoT authenticationscheme, Transactions on Emerging Telecommunications Technologies, 2022
10. AN Khan,F.G Khan A lightweight and compromise‐resilient authentication scheme for IoTs, Transactions on Emerging Telecommunications Technologies, 2022
11. T. Khalid,AN Khan,Mudassar Aslam,Dr. Mazhar Ali,R.Wasim,MAK Abbassi,M Zuraiz,JJPC Rodrigues A survey on privacy and access control schemes in fog computing, International Journal of Communication Systems, 2021
12. Muhammad Amir Khan,I.A.Khan,Ahmad Din,W.Jadoon,R.Jadoon,F.G Khan,AN Khan,Usman Ali Khan Towards a Complete Set of Gym Exercises Detection Using Smartphone Sensors, Scientific Programming, 2020
13. I.A.Khan,J.Shujah,AN Khan Resource-based direct manipulation: a user-centric visual interface for operational customization of future smart appliances, Telecommunication Systems, 2020
14. T. Khalid,AN Khan,Dr. Mazhar Ali,A. Adeel,A. R. Khan,J.Shujah A fog-based security framework for intelligent traffic light control system, Multimedia Tools and Applications, 2019
15. Anum Khurshid,AN Khan,F.G Khan,Dr. Mazhar Ali,J.Shujah,Atta Ur Rehman Khan Secure‐CamFlow: A device‐oriented security model to assist information flow control systems in cloud environments for IoTs, Concurrency and Computation Practice and Experience, 2019
16. Daniyal Sakhawat,AN Khan,Mudassar Aslam,Anthony T Chronopoulos Agent-based ARP Cache Poisoning Detection (AACPD) in Switched LAN Environments, IET Networks Journal, 2018
17. AN Khan,Dr. Mazhar Ali,F.G Khan,I.A.Khan,W.Jadoon A comparative study and workload distribution model for re‐encryption schemes in a mobile cloud computing environment , Journal of Communication Systems, Wiley, 2017, 2017
18. AN Khan,J.Shujah,S. Mustafa Computation offloading Cost Estimation in Mobile Cloud Application Models, Wireless Personal Communication, Springer, 2017, 2017
19. F.G Khan,AN Khan Introducing ToPe-FFT; an OpenCL based FFT Library targeting GPUs, Concurrency and Computation: Practice and Experience by wiley, 2017
20. S.K.Zaman,A. R. Khan,S. R. Malik,AN Khan,T. Maqsood,S. A. Madani Performance analysis and formal verification of task scheduling heuristics for makespan optimization and workflow distribution in Large-scale Computing Systems, Computer Systems Science & Engineering, 2017
21. F.G Khan,AN Khan,W.Jadoon,I.A.Khan An optimized magnetostatic field solver on GPU using open computing language, Concurrency and Computation practice and experience, 2017
22. F.G Khan,AN Khan A Comparison of Proxy Re-Encryption Schemes – A Survey, International Journal of Computer Science and Information Security (IJCSIS), 2016
23. AN Khan,MLM Kiah,Dr. Mazhar Ali,S. Shamshir,A. R. Khan A Cloud-Manager-Based Re-Encryption Scheme for Mobile Users in Cloud Environment: a Hybrid Approach, Journal of Grid Computing, 2015
24. A. R. Khan,Mazliza Othman,AN Khan,S. A. Abid,S.Madani MobiByte: An Application Development Model for Mobile Cloud Computing, Journal of Grid Computing , 2015
25. Feng Xia,AN Khan,Mazliza Othman Context-Aware Mobile Cloud Computing & Its Challenges, IEEE Cloud Computing, 2015
26. Nor Badrul Anuar,M. L. Mat Kiah, Vala Ali Rohania,Dalibor Petkovicb,Sanjay Misrac,AN Khan,Shahaboddin Shamshirband Co-FAIS: Cooperative fuzzy artificial immune system for detecting intrusion in wireless sensor networks, Journal of Network and Computer Applications (Tier 1), 2014
27. AN Khan,M. L. Mat Kiah,Mazhar Ali,S.Madani,Atta ur Rehman Khan,Shahaboddin Shamshirband Incremental Proxy Re-encryption Scheme for Mobile Cloud Computing Environment, Journal of Supercomputing (Tier 2), 2014
28. Dr. Atta UR Rehman,Dr. Mazhar Ali,AN Khan Pirax: framework for application piracy control in mobile cloud environment, Journal of Super Computing, 2014
29. AN Khan,Samee U. Khan, M.L. Mat Kiah,S.Madani Towards secure mobile cloud computing: A survey, Future Generation Computer Systems (Tier 1), 2013
30. AN Khan,S.Khan,Kalim Qureshi An Intelligent Approach of Sniffer Detection, The International Arab Journal of Information Technology (Tier 4), 2012
31. AN Khan,S.Khan,Kalim Qureshi Enhanced Switched Network Sniffer Detection Technique Based on IP Packet Routing, Information Security Journal: A Global Perspective, 2009
 
 
BOOKS AND BOOK CHAPTERS
1. AN Khan,Atta ur Rehman Khan High Performance Computing on Mobile Devices, , 2016
 
Profile/Bio

 

S#

Post

Start Date

End Date

Organization

1

Programmer (Internship)

18 September, 2005

18 December, 2005

Eycon Solution (Software House)

2

Programmer (Internship)

10 May, 2006

31 August, 2006

COMSATS IT Center (Software House)

3

Lecturer (Visiting)

1st Jan, 2007

29 Feb, 2008

Government Post Graduate Collage Mandian, Abbottabad

4

Lecturer (Visiting)

Feb. 2008

Sept. 2008

COMSATS University Islamabad, Abbottabad Campus

5

Lecturer (Permanent)

Oct. 2008

Jun. 2014

COMSATS University Islamabad, Abbottabad Campus

6

Assistant Professor (TTS)

Jul. 2014

April 2022

COMSATS University Islamabad, Abbottabad Campus

7

Tenured Associate Professor

Aril 2022

Till Date

COMSATS University Islamabad, Abbottabad Campus

 
Associations

 
Research Interests
  • Cloud Computing
  • Fog Computing
  • Mobile Cloud Computing
  • IoTs
  • Network Security
 
Awards

Ø  Won the scholarship for MS(CS) from COMSATS, Abbottabad.

Ø  Won the scholarship for Phd from Bright Spark Unit of University of Malaya, Kuala Lumpur, Malaysia.

Ø  Won the Best Paper Award in PGReS, University of Malaya, Kuala Lumpur, Malaysia

 
Students Supervised

#

 Student Name

   Thesis Title

MS/PhD

Supervisor / Co-Supervisor

Status with date:

Registered/Completed

1

Faiza Aurang Zeb

Privacy Aware and Interoperable Patient Data Storage and Searching using Blockchain

MS

Supervisor

Completed

2

Imtiaz Ali Shah

Machine Learning Based Malware Detection in Internet of Battlefield Thing (IoBT)

MS

Supervisor

Completed

3

 

Maham Nasir

Reversible Date Hiding Based on Linear Prediction and Bit-Plane Slicing

MS

Co-Supervisor

Completed

4

Bushra Mohsin

Automated security audit and assessment of fog network

MS

Co-Supervisor

Completed

5

Muhammad Faisal Aziz

Lightweight and Compromise-Resilient Authentication Protocol for IoT

MS

Supervisor

Completed

6

Adil Adeel

Lightweight Authentication Schemes for IoTs

MS

Co-Supervisor

Completed

7

Shad Mohammad

Bots Detection in Social Media

MS

Co-Supervisor

Completed

8

Tauqeer Khalid

A Fog-based Security Framework for Intelligent Traffic Light Control System

MS

Supervisor

Completed

9

Anum Khurshid

Device Oriented Security to Assist Information Flow Control Systems in the Cloud Environment

MS

Supervisor

Completed

10

Muhammad Abrar Khan

A Service Discovery and Forwarding Architecture in Fog computing

MS

Supervisor

Completed