Follow
DR Naveed Khan
Title
Cited by
Cited by
Year
Survey on botnet: Its architecture, detection, prevention and mitigation
I Ullah, N Khan, HA Aboalsamh
2013 10th IEEE International Conference on Networking, Sensing and Control …, 2013
462013
Software risk identification and mitigation in incremental model
B Shahzad, I Ullah, N Khan
2009 International Conference on Information and Multimedia Technology, 366-370, 2009
242009
Optimal parameter exploration for online change-point detection in activity monitoring using genetic algorithms
N Khan, S McClean, S Zhang, C Nugent
Sensors 16 (11), 1784, 2016
212016
Discriminating features-based cost-sensitive approach for software defect prediction
A Ali, N Khan, M Abu-Tair, J Noppen, S McClean, I McChesney
Automated Software Engineering 28, 1-18, 2021
172021
Protection of records and data authentication based on secret shares and watermarking
Z Ali, M Imran, S McClean, N Khan, M Shoaib
Future Generation Computer Systems 98, 331-341, 2019
172019
An LBP based key management for secure wireless body area network (WBAN)
A Alsadhan, N Khan
2013 14th ACIS International Conference on Software Engineering, Artificial …, 2013
162013
Automatic mass detection in mammograms using multiscale spatial weber local descriptor
M Hussain, N Khan
2012 19th International Conference on Systems, Signals and Image Processing …, 2012
162012
Solution of linear and quadratic equations based on triangular linear diophantine fuzzy numbers
N Khan, N Yaqoob, M Shams, YU Gaba, M Riaz
Journal of function spaces 2021, 1-14, 2021
152021
A proposed optimized and efficient intrusion detection system for wireless sensor network
A Alsadhan, N Khan
International Journal of Computer and Information Engineering 7 (12), 1621-1624, 2013
142013
Sensor-based change detection for timely solicitation of user engagement
T Patterson, N Khan, S McClean, C Nugent, S Zhang, I Cleland, Q Ni
IEEE Transactions on Mobile Computing 16 (10), 2889-2900, 2016
132016
Secure & Energy Efficient key Management Scheme for WBAN–A Hybrid Approach
IA AL-Rassan, N Khan
vol 11, 169-172, 2011
112011
Understanding contrail business processes through hierarchical clustering: A multi-stage framework
Z Tariq, N Khan, D Charles, S McClean, I McChesney, P Taylor
Algorithms 13 (10), 244, 2020
102020
An adaptive EWMA control chart based on Hampel function to monitor the process location parameter
B Zaman, SZ Mahfooz, R Mehmood, N Khan, T Imran
Quality and Reliability Engineering International 39 (4), 1277-1298, 2023
82023
Asbestos induced oxidative injury to DNA
N Mahmood, N KHAN, S Ali, M Athar, Q Rahman
The Annals of occupational hygiene 37 (3), 315-319, 1993
81993
A Generic Model for End State Prediction of Business Processes Towards Target Compliance
K Naveed, MC Sally, A Zulfiqar, A Aftab, C Darryl, T Paul, D Nauck
AI-2019- 39th SGAI International Conference on Artificial Intelligence …, 2019
6*2019
The impact of earnings management on dividend policy: Empirical analysis of KSE-100 index firms
N Khan, FA Shah
Journal of Business & Tourism 5 (2), 79-88, 2019
52019
Energy efficient key agreement scheme for ubiquitous and continuous remote healthcare systems using data mining technique
SM Al-Saleem, A Ali, N Khan
Cluster Computing 21, 469-480, 2018
52018
Parameter optimization for online change detection in activity monitoring using multivariate exponentially weighted moving average (MEWMA)
N Khan, S McClean, S Zhang, C Nugent
Ubiquitous Computing and Ambient Intelligence. Sensing, Processing, and …, 2015
52015
A Provable Secure Cross-Verification Scheme for IoT Using Public Cloud Computing
N Khan, J Zhang, J Ali, MS Pathan, SA Chaudhry
Security and Communication Networks 2022, 2022
42022
Optimizing power and energy efficiency in cloud computing
N Khan, H Haugerud, R Shrestha, A Yazidi
Proceedings of the 11th International Conference on Management of Digital …, 2019
42019
The system can't perform the operation now. Try again later.
Articles 1–20