Hassan Khan
Hassan Khan
Assistant Professor, University of Guelph
Verified email at uoguelph.ca - Homepage
TitleCited byYear
Itus: an implicit authentication framework for android
H Khan, A Atwater, U Hengartner
Proceedings of the 20th annual international conference on Mobile computing …, 2014
642014
Towards application-centric implicit authentication on smartphones
H Khan, U Hengartner
Proceedings of the 15th Workshop on Mobile Computing Systems and …, 2014
552014
Macroflows and microflows: Enabling rapid network innovation through a split sdn data plane
R Narayanan, S Kotha, G Lin, A Khan, S Rizvi, W Javed, H Khan, ...
2012 European Workshop on Software Defined Networking, 79-84, 2012
432012
Usability and security perceptions of implicit authentication: Convenient, secure, sometimes annoying
H Khan, U Hengartner, D Vogel
Eleventh Symposium On Usable Privacy and Security (SOUPS 2015), 225-239, 2015
412015
A comparative evaluation of implicit authentication schemes
H Khan, A Atwater, U Hengartner
International Workshop on Recent Advances in Intrusion Detection, 255-275, 2014
332014
Designing a cluster-based covert channel to evade disk investigation and forensics
H Khan, M Javed, SA Khayam, F Mirza
Computers & Security 30 (1), 35-49, 2011
322011
Automated anomaly detector adaptation using adaptive threshold tuning
MQ Ali, E Al-Shaer, H Khan, SA Khayam
ACM Transactions on Information and System Security (TISSEC) 15 (4), 17, 2013
242013
What is the impact of p2p traffic on anomaly detection?
IU Haq, S Ali, H Khan, SA Khayam
International Workshop on Recent Advances in Intrusion Detection, 1-17, 2010
232010
Targeted Mimicry Attacks on Touch Input Based Implicit Authentication Schemes
H Khan, U Hengartner, D Vogel
Proceedings of the 14th Annual International Conference on Mobile Systems …, 2016
212016
Determining malicious executable distinguishing attributes and low-complexity detection
H Khan, F Mirza, SA Khayam
Journal in computer virology 7 (2), 95-105, 2011
202011
On achieving good operating points on an ROC plane using stochastic anomaly score prediction
MQ Ali, H Khan, A Sajjad, SA Khayam
Proceedings of the 16th ACM conference on Computer and communications …, 2009
152009
Embedding a covert channel in active network connections
H Khan, Y Javed, F Mirza, SA Khayam
Global Telecommunications Conference, 2009. GLOBECOM 2009. IEEE, 1-6, 2009
122009
Evaluating Attack and Defense Strategies for Smartphone PIN Shoulder Surfing
H Khan, U Hengartner, D Vogel
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems …, 2018
92018
Evaluating authentication options for mobile health applications in younger and older adults
K Grindrod, H Khan, U Hengartner, S Ong, AG Logan, D Vogel, R Gebotys, ...
PloS one 13 (1), e0189048, 2018
92018
POSTER: When and How to Implicitly Authenticate Smartphone Users
A Atwater, H Khan, U Hengartner
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
62014
Evading Disk Investigation and Forensics using a Cluster-Based Covert Channel
H Khan, M Javed, F Mirza, SA Khayam
National University of Science & Technology (NUST), Islamabad 44000, 0
6*
Augmented Reality-based Mimicry Attacks on Behaviour-Based Smartphone Authentication
H Khan, U Hengartner, D Vogel
Proceedings of the 16th Annual International Conference on Mobile Systems …, 2018
42018
Ask Me Again But Don't Annoy Me: Evaluating Re-authentication Strategies for Smartphones
L Agarwal, H Khan, U Hengartner
Twelfth Symposium on Usable Privacy and Security (SOUPS 2016), 2016
42016
Traffic Anomaly Detection in the presence of P2P traffic
S Ali, K Wu, H Khan
39th Annual IEEE Conference on Local Computer Networks, 482-485, 2014
22014
Poster: Destabilizing BitTorrent's clusters to attack high bandwidth leechers
F Adamsky, H Khan, M Rajarajan, SA Khayam, R Jäger
Proceedings of the 18th ACM conference on Computer and communications …, 2011
22011
The system can't perform the operation now. Try again later.
Articles 1–20