1. |
AN Khan,Abid Mehmood,Muhammad Nasir Mumtaz Bhutta,I.A.Khan,Atta ur Rehman Khan An efficient and compromise-resilient image encryption scheme for resource-constrained environments, PLOS ONE, 2024 |
2. |
Abid Mehmood,AN Khan,Arslan Shafique,Junaid Shuja,Moatsum Alawida Lightweight Image Encryption Scheme for IoT Environment and Machine Learning-Driven Robust S-box Selection, Telecommunication Systems, 2024 |
3. |
Sana Nasim Karam, Junaid Shuja,K.Bilal,AN Khan,Said Jadid Abdulkadir Energy-efficient routing protocol for reliable low-latency Internet of Things in oil and gas pipeline monitoring, PEERJ, 2024 |
4. |
ABID MEHMOOD,ARSLAN SHAFIQUE,MOATSUM ALAWIDA ,AN Khan Advances and Vulnerabilities in Modern Cryptographic Techniques: A Comprehensive Survey on Cybersecurity in the Domain of Machine/Deep Learning and Quantum Techniques, IEEE Access, 2024 |
5. |
Ibrar Hussain,I.A.Khan,W.Jadoon,RN Jadoon,AN Khan,Muhammad Shafi Touch or click friendly: Towards adaptive user interfaces for complex applications, PLOS ONE, 2024 |
6. |
Imtiaz Ali Shah, Abid Mehmood,AN Khan,Mourad Elhadef,Atta ur Rehman Khan HeuCrip: A malware detection approach for internet of battlefield things, Cluster Computing, 2023 |
7. |
E. Mustafa,J.Shujah,T. Maqsood,S. Mustafa,F. Rehman,AN Khan,S.K.Zaman,Ali Imran Jehangiri,Sadia Din Joint wireless power transfer and task offloading in mobile edge computing: a survey, Cluster Computing, 2022 |
8. |
Arslan Shafique,AN Khan,Abid Mehmood,Moatsum Alawida,Atta Ur Rehman Khan A novel machine learning technique for selecting suitable image encryption algorithms for IoT applications, Wireless Communications and Mobile Computing, 2022 |
9. |
Adil Adeel,Dr. Mazhar Ali,F. Rehman,J.Shujah,AN Khan,Tauqeer Khalid,Yaser Jararweh A multi-attack resilient lightweight IoT authenticationscheme, Transactions on Emerging Telecommunications Technologies, 2022 |
10. |
AN Khan,F.G Khan A lightweight and compromise‐resilient authentication scheme for IoTs, Transactions on Emerging Telecommunications Technologies, 2022 |
11. |
T. Khalid,AN Khan,Mudassar Aslam,Dr. Mazhar Ali,R.Wasim,MAK Abbassi,M Zuraiz,JJPC Rodrigues A survey on privacy and access control schemes in fog computing, International Journal of Communication Systems, 2021 |
12. |
Muhammad Amir Khan,I.A.Khan,Ahmad Din,W.Jadoon,R.Jadoon,F.G Khan,AN Khan,Usman Ali Khan Towards a Complete Set of Gym Exercises Detection Using Smartphone Sensors, Scientific Programming, 2020 |
13. |
I.A.Khan,J.Shujah,AN Khan Resource-based direct manipulation: a user-centric visual interface for operational customization of future smart appliances, Telecommunication Systems, 2020 |
14. |
T. Khalid,AN Khan,Dr. Mazhar Ali,A. Adeel,A. R. Khan,J.Shujah A fog-based security framework for intelligent traffic light control system, Multimedia Tools and Applications, 2019 |
15. |
Anum Khurshid,AN Khan,F.G Khan,Dr. Mazhar Ali,J.Shujah,Atta Ur Rehman Khan Secure‐CamFlow: A device‐oriented security model to assist information flow control systems in cloud environments for IoTs, Concurrency and Computation Practice and Experience, 2019 |
16. |
Daniyal Sakhawat,AN Khan,Mudassar Aslam,Anthony T Chronopoulos Agent-based ARP Cache Poisoning Detection (AACPD) in Switched LAN Environments, IET Networks Journal, 2018 |
17. |
AN Khan,Dr. Mazhar Ali,F.G Khan,I.A.Khan,W.Jadoon A comparative study and workload distribution model for re‐encryption schemes in a mobile cloud computing environment , Journal of Communication Systems, Wiley, 2017, 2017 |
18. |
AN Khan,J.Shujah,S. Mustafa Computation offloading Cost Estimation in Mobile Cloud Application Models, Wireless Personal Communication, Springer, 2017, 2017 |
19. |
F.G Khan,AN Khan Introducing ToPe-FFT; an OpenCL based FFT Library targeting GPUs, Concurrency and Computation: Practice and Experience by wiley, 2017 |
20. |
S.K.Zaman,A. R. Khan,S. R. Malik,AN Khan,T. Maqsood,S. A. Madani Performance analysis and formal verification of task scheduling heuristics for makespan optimization and workflow distribution in Large-scale Computing Systems, Computer Systems Science & Engineering, 2017 |
21. |
F.G Khan,AN Khan,W.Jadoon,I.A.Khan An optimized magnetostatic field solver on GPU using open computing language, Concurrency and Computation practice and experience, 2017 |
22. |
F.G Khan,AN Khan A Comparison of Proxy Re-Encryption Schemes – A Survey, International Journal of Computer Science and Information Security (IJCSIS), 2016 |
23. |
AN Khan,MLM Kiah,Dr. Mazhar Ali,S. Shamshir,A. R. Khan A Cloud-Manager-Based Re-Encryption Scheme for Mobile Users in Cloud Environment: a Hybrid Approach, Journal of Grid Computing, 2015 |
24. |
A. R. Khan,Mazliza Othman,AN Khan,S. A. Abid,S.Madani MobiByte: An Application Development Model for Mobile Cloud Computing, Journal of Grid Computing , 2015 |
25. |
Feng Xia,AN Khan,Mazliza Othman Context-Aware Mobile Cloud Computing & Its Challenges, IEEE Cloud Computing, 2015 |
26. |
Nor Badrul Anuar,M. L. Mat Kiah, Vala Ali Rohania,Dalibor Petkovicb,Sanjay Misrac,AN Khan,Shahaboddin Shamshirband Co-FAIS: Cooperative fuzzy artificial immune system for detecting intrusion in wireless sensor networks, Journal of Network and Computer Applications (Tier 1), 2014 |
27. |
AN Khan,M. L. Mat Kiah,Mazhar Ali,S.Madani,Atta ur Rehman Khan,Shahaboddin Shamshirband Incremental Proxy Re-encryption Scheme for Mobile Cloud Computing Environment, Journal of Supercomputing (Tier 2), 2014 |
28. |
Dr. Atta UR Rehman,Dr. Mazhar Ali,AN Khan Pirax: framework for application piracy control in mobile cloud environment, Journal of Super Computing, 2014 |
29. |
AN Khan,Samee U. Khan, M.L. Mat Kiah,S.Madani Towards secure mobile cloud computing: A survey, Future Generation Computer Systems (Tier 1), 2013 |
30. |
AN Khan,S.Khan,Kalim Qureshi An Intelligent Approach of Sniffer Detection, The International Arab Journal of Information Technology (Tier 4), 2012 |
31. |
AN Khan,S.Khan,Kalim Qureshi Enhanced Switched Network Sniffer Detection Technique Based on IP Packet Routing, Information Security Journal: A Global Perspective, 2009 |