Survey on botnet: Its architecture, detection, prevention and mitigation I Ullah, N Khan, HA Aboalsamh 2013 10th IEEE International Conference on Networking, Sensing and Control …, 2013 | 46 | 2013 |
Software risk identification and mitigation in incremental model B Shahzad, I Ullah, N Khan 2009 International Conference on Information and Multimedia Technology, 366-370, 2009 | 24 | 2009 |
Optimal parameter exploration for online change-point detection in activity monitoring using genetic algorithms N Khan, S McClean, S Zhang, C Nugent Sensors 16 (11), 1784, 2016 | 21 | 2016 |
Discriminating features-based cost-sensitive approach for software defect prediction A Ali, N Khan, M Abu-Tair, J Noppen, S McClean, I McChesney Automated Software Engineering 28, 1-18, 2021 | 17 | 2021 |
Protection of records and data authentication based on secret shares and watermarking Z Ali, M Imran, S McClean, N Khan, M Shoaib Future Generation Computer Systems 98, 331-341, 2019 | 17 | 2019 |
An LBP based key management for secure wireless body area network (WBAN) A Alsadhan, N Khan 2013 14th ACIS International Conference on Software Engineering, Artificial …, 2013 | 16 | 2013 |
Automatic mass detection in mammograms using multiscale spatial weber local descriptor M Hussain, N Khan 2012 19th International Conference on Systems, Signals and Image Processing …, 2012 | 16 | 2012 |
Solution of linear and quadratic equations based on triangular linear diophantine fuzzy numbers N Khan, N Yaqoob, M Shams, YU Gaba, M Riaz Journal of function spaces 2021, 1-14, 2021 | 15 | 2021 |
A proposed optimized and efficient intrusion detection system for wireless sensor network A Alsadhan, N Khan International Journal of Computer and Information Engineering 7 (12), 1621-1624, 2013 | 14 | 2013 |
Sensor-based change detection for timely solicitation of user engagement T Patterson, N Khan, S McClean, C Nugent, S Zhang, I Cleland, Q Ni IEEE Transactions on Mobile Computing 16 (10), 2889-2900, 2016 | 13 | 2016 |
Secure & Energy Efficient key Management Scheme for WBAN–A Hybrid Approach IA AL-Rassan, N Khan vol 11, 169-172, 2011 | 11 | 2011 |
Understanding contrail business processes through hierarchical clustering: A multi-stage framework Z Tariq, N Khan, D Charles, S McClean, I McChesney, P Taylor Algorithms 13 (10), 244, 2020 | 10 | 2020 |
An adaptive EWMA control chart based on Hampel function to monitor the process location parameter B Zaman, SZ Mahfooz, R Mehmood, N Khan, T Imran Quality and Reliability Engineering International 39 (4), 1277-1298, 2023 | 8 | 2023 |
Asbestos induced oxidative injury to DNA N Mahmood, N KHAN, S Ali, M Athar, Q Rahman The Annals of occupational hygiene 37 (3), 315-319, 1993 | 8 | 1993 |
A Generic Model for End State Prediction of Business Processes Towards Target Compliance K Naveed, MC Sally, A Zulfiqar, A Aftab, C Darryl, T Paul, D Nauck AI-2019- 39th SGAI International Conference on Artificial Intelligence …, 2019 | 6* | 2019 |
The impact of earnings management on dividend policy: Empirical analysis of KSE-100 index firms N Khan, FA Shah Journal of Business & Tourism 5 (2), 79-88, 2019 | 5 | 2019 |
Energy efficient key agreement scheme for ubiquitous and continuous remote healthcare systems using data mining technique SM Al-Saleem, A Ali, N Khan Cluster Computing 21, 469-480, 2018 | 5 | 2018 |
Parameter optimization for online change detection in activity monitoring using multivariate exponentially weighted moving average (MEWMA) N Khan, S McClean, S Zhang, C Nugent Ubiquitous Computing and Ambient Intelligence. Sensing, Processing, and …, 2015 | 5 | 2015 |
A Provable Secure Cross-Verification Scheme for IoT Using Public Cloud Computing N Khan, J Zhang, J Ali, MS Pathan, SA Chaudhry Security and Communication Networks 2022, 2022 | 4 | 2022 |
Optimizing power and energy efficiency in cloud computing N Khan, H Haugerud, R Shrestha, A Yazidi Proceedings of the 11th International Conference on Management of Digital …, 2019 | 4 | 2019 |