ARTICLE IN ACADEMIC JOURNALS
NO | DETAILS OF ARTICLE IN ACADEMIC JOURNALS |
---|---|
1. |
Blockchain-Enhanced Sensor-as-a-Service (SEaaS) in IoT: Leveraging Blockchain for Efficient and Secure Sensing Data Transactions
2024
Author(s) : Burhan Ul Islam Khan Source : Information (Switzerland) DOI : 10.3390/info15040212 |
2. |
Secure IoT Routing Through Manifold Criterion Trust Evaluation using Ant Colony Optimization
2023
Author(s) : Burhan Ul Islam Khan Source : International Journal of Advanced Computer Science and Applications DOI : 10.14569/IJACSA.2023.0141113 |
3. |
A Holistic Architecture for a Sales Enablement Sensing-as-a-Service Model in the IoT Environment
2022
Author(s) : Burhan Ul Islam Khan Source : Information DOI : 10.3390/info13110514 |
4. |
Decentralized Blockchain Network for Resisting Side-Channel Attacks in Mobility-Based IoT
2022
Source : ELECTRONICS DOI : 10.3390/electronics11233982 |
5. |
EVOLUTION AND ANALYSIS OF SECURE HASH ALGORITHM (SHA) FAMILY
2022
Author(s) : Miss Laiha Binti Mat Kiah,Burhan Ul Islam Khan Source : MALAYSIAN JOURNAL OF COMPUTER SCIENCE DOI : 10.22452/mjcs.vol35no3.1 |
6. |
A Comprehensive Insight into Blockchain Technology: Past Development, Present Impact and Future Considerations
2022
Source : INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS |
7. |
Decentralized Blockchain Network for Resisting Side-Channel Attacks in Mobility-Based IoT
2022
Author(s) : Burhan Ul Islam Khan Source : Electronics |
8. |
A Comprehensive Insight into Blockchain Technology: Past Development, Present Impact and Future Considerations
2022
Author(s) : Burhan Ul Islam Khan Source : International Journal of Advanced Computer Science and Applications DOI : 10.14569/IJACSA.2022.01311101 |
9. |
Evolution and Analysis of Secure Hash Algorithm (SHA) Family
2022
Author(s) : Burhan Ul Islam Khan Source : Malaysian Journal of Computer Science DOI : 10.22452/mjcs.vol35no3.1 |
10. |
SGM: Strategic Game Model for Resisting Node Misbehaviour in IoT-Cloud Ecosystem
2022
Author(s) : Burhan Ul Islam Khan Source : Information DOI : 10.3390/info13110544 |
11. |
Exploring MANET Security Aspects: Analysis of Attacks and Nodes Misbehaviour Issues
2022
Author(s) : Burhan Ul Islam Khan Source : Malaysian Journal of Computer Science DOI : 10.22452/mjcs.vol35no4.2 |
12. |
The Internet of Things Vision: A Comprehensive Review of Architecture, Enabling Technologies, Adoption Challenges, Research Open Issues and Contemporary Applications
2022
Author(s) : Burhan Ul Islam Khan Source : JOURNAL OF ADVANCED RESEARCH IN APPLIED SCIENCES AND ENGINEERING TECHNOLOGY DOI : 10.37934/araset.26.1.5177 |
13. |
A Frictionless and Secure User Authentication in Web-Based Premium Applications
2021
Author(s) : Burhan Ul Islam Khan Source : IEEE Access DOI : 10.1109/ACCESS.2021.3110310 |
14. |
Game Theory Analysis and Modeling of Sophisticated Multi-Collusion Attack in MANETs
2021
Author(s) : Burhan Ul Islam Khan Source : IEEE Access DOI : 10.1109/ACCESS.2021.3073343 |
15. |
MANET Security Appraisal: Challenges, Essentials, Attacks, Countermeasures & Future Directions
2020
Author(s) : Burhan Ul Islam Khan DOI : 10.35940/ijrte.E6537.038620 |
16. |
A Novel Multi-Agent and Multilayered Game Formulation for Intrusion Detection in Internet of Things (IoT)
2020
Author(s) : Burhan Ul Islam Khan Source : IEEE Access DOI : 10.1109/ACCESS.2020.2997711 |
17. |
A Game Theory-Based Strategic Approach to Ensure Reliable Data Transmission with Optimized Network Operations in Futuristic Mobile Adhoc Networks
2020
Author(s) : Burhan Ul Islam Khan Source : IEEE Access DOI : 10.1109/ACCESS.2020.3006043 |
18. |
Scrutinising Internet Banking Security Solutions
2020
Author(s) : Burhan Ul Islam Khan Source : INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY DOI : 10.1504/IJICS.2020.105180 |
19. |
A Comprehensive Insight into Game Theory in relevance to Cyber Security
2020
Author(s) : Burhan Ul Islam Khan Source : INDONESIAN JOURNAL OF ELECTRICAL ENGINEERING AND INFORMATICS DOI : 10.52549/ijeei.v8i1.1810 |
20. |
Implementation of Security Enhancement in AES by Inducting Dynamicity in AES S-Box
2019
Author(s) : Burhan Ul Islam Khan Source : INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY AND EXPLORING ENGINEERING DOI : 10.35940/ijitee.J9311.0881019 |
21. |
A Critical Insight into the Effectiveness of Research Methods Evolved to Secure IoT Ecosystem
2019
Author(s) : Burhan Ul Islam Khan Source : INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY DOI : 10.1504/IJICS.2019.101908 |
22. |
ECM-GT: Design of Efficient Computational Modelling based on Game Theoretical Approach Towards Enhancing the Security Solutions in MANET
2019
Author(s) : Burhan Ul Islam Khan Source : INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY AND EXPLORING ENGINEERING |
23. |
Internet of Things - Security Vulnerabilities and Recommended Solutions
2018
Author(s) : Burhan Ul Islam Khan Source : INTERNATIONAL JOURNAL OF ENGINEERING AND TECHNOLOGY(UAE) DOI : 10.14419/ijet.v7i4.23147 |
24. |
Efficient Cache Replacement Policy for Minimizing Error Rate in L2-STT-MRAM Caches
2018
Author(s) : Burhan Ul Islam Khan Source : International Journal of Grid and Utility Computing DOI : 10.1504/IJGUC.2018.095434 |
25. |
Game Theory for Resource Allocation in Heterogeneous Wireless Networks - A Review
2018
Author(s) : Burhan Ul Islam Khan Source : INDONESIAN JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCE DOI : 10.11591/ijeecs.v12.i2.pp843-851 |
26. |
Snort-Based Smart and Swift Intrusion Detection System
2018
Author(s) : Burhan Ul Islam Khan DOI : 10.17485/ijst/2018/v11i4/120917 |
27. |
Securely Eradicating Cellular for E-Banking Applications
2018
Author(s) : Burhan Ul Islam Khan Source : INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS DOI : 10.14569/IJACSA.2018.090253 |
28. |
Radio Access Technology (RAT) Selection Mechanism using TOPSIS Method in Heterogeneous Wireless Networks (HWN)
2018
Author(s) : Burhan Ul Islam Khan Source : INDONESIAN JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCE DOI : 10.11591/ijeecs.v12.i2.pp852-864 |
29. |
Secure Annihilation of Out-of-Band Authorization for Online Transactions
2018
Author(s) : Burhan Ul Islam Khan DOI : 10.17485/ijst/2018/v11i5/121107 |
30. |
Bandwidth Allocation Policy using the Game Theory Model in Heterogeneous Wireless Networks
2018
Author(s) : Burhan Ul Islam Khan |
31. |
A Survey on MANETs: Architecture, Evolution, Applications, Security Issues and Solutions
2018
Author(s) : Burhan Ul Islam Khan Source : INDONESIAN JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCE DOI : 10.11591/ijeecs.v12.i2.pp832-842 |
32. |
Analysis of Packet Reordering Delay for Bandwidth Aggregation in Heterogeneous Wireless Networks
2018
Author(s) : Burhan Ul Islam Khan |
33. |
Rehashing System Security Solutions in E-Banking
2018
Author(s) : Burhan Ul Islam Khan Source : INTERNATIONAL JOURNAL OF ENGINEERING AND TECHNOLOGY(UAE) DOI : 10.14419/ijet.v7i4.23148 |
34. |
A Survey on E-Payment Systems: Elements, Adoption, Architecture, Challenges and Security Concepts
2017
Author(s) : Burhan Ul Islam Khan DOI : 10.17485/ijst/2017/v10i19/113930 |
35. |
Linking Software Engineering Paradigms to Islamic Values
2017
Author(s) : Burhan Ul Islam Khan Source : JOURNAL OF THEORETICAL AND APPLIED INFORMATION TECHNOLOGY |
36. |
Modeling Malicious Multi-Attacker Node Collusion in MANETs via Game Theory
2017
Author(s) : Burhan Ul Islam Khan Source : MIDDLE EAST JOURNAL OF SCIENTIFIC RESEARCH DOI : 0.5829/idosi.mejsr.2017.568.579 |
37. |
Securing Electronic Transactions via Payment Gateways – A Systematic Review
2017
Author(s) : Burhan Ul Islam Khan Source : INTERNATIONAL JOURNAL OF INTERNET TECHNOLOGY AND SECURED TRANSACTIONS DOI : 10.1504/IJITST.2017.089781 PDF |
38. |
A Computationally Efficient P-LRU based Optimal Cache Heap Object Replacement Policy
2017
Author(s) : Burhan Ul Islam Khan Source : INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS DOI : 10.14569/IJACSA.2017.080118 |
39. |
Adoption of Cloud Computing in Higher Learning Institutions: A Systematic Review
2017
Author(s) : Burhan Ul Islam Khan DOI : 10.17485/ijst/2017/v10i36/117641 |
40. |
Critical Security Challenges in Cloud Computing Environment: An Appraisal
2017
Author(s) : Burhan Ul Islam Khan Source : JOURNAL OF THEORETICAL AND APPLIED INFORMATION TECHNOLOGY |
41. |
A Compendious Study of Online Payment Systems: Past Developments, Present Impact, and Future Considerations
2017
Author(s) : Burhan Ul Islam Khan Source : INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS DOI : 10.14569/IJACSA.2017.080532 |
42. |
DTASR: Dual Threshold-based Authentication for Secure Routing in Mobile Adhoc Network
2016
Author(s) : Burhan Ul Islam Khan DOI : 10.5829/idosi.weasj.2016.7.2.22637 |
43. |
DFAM: A Distributed Feedback Analysis mechanism for Knowledge based educational Big Data
2016
Author(s) : Burhan Ul Islam Khan DOI : 10.11113/jt.v78.10020 |
44. |
MANET – A Cogitation of its Design and Security Issues
2016
Author(s) : Burhan Ul Islam Khan Source : MIDDLE EAST JOURNAL OF SCIENTIFIC RESEARCH DOI : 10.5829/idosi.mejsr.2016.3094.3107 |
45. |
Strategic Profiling for Behaviour Visualization of Malicious Node in Manets Using Game Theory
2015
Author(s) : Burhan Ul Islam Khan Source : JOURNAL OF THEORETICAL AND APPLIED INFORMATION TECHNOLOGY |
46. |
Contemplation of Effective Security Measures in Access Management from Adoptability Perspective
2015
Author(s) : Burhan Ul Islam Khan Source : INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS DOI : 10.14569/IJACSA.2015.060826 PDF |
47. |
Behaviour Visualization for Malicious-Attacker Node Collusion in MANET Based on Probabilistic Approach
2015
Author(s) : Burhan Ul Islam Khan |
48. |
QoS oriented MapReduce Optimization for Hadoop Based BigData Application
2014
Author(s) : Burhan Ul Islam Khan |
49. |
Manifestation and Mitigation of Node Misbehavior in Adhoc Networks
2014
Author(s) : Burhan Ul Islam Khan |
50. |
Critical Insight for MapReduce Optimization in Hadoop
2014
Author(s) : Burhan Ul Islam Khan |
51. |
ElePSO: Energy Aware Elephant Swarm Optimization for Mobile Adhoc Network
2014
Author(s) : Burhan Ul Islam Khan |
52. |
Evaluating the Effect of using IP version and Physical Media on the ICMP Throughput of a LAN
2013
Author(s) : Burhan Ul Islam Khan |
53. |
Malicious Behaviour of Node and its Significant Security Techniques in MANET-A Review
2013
Author(s) : Burhan Ul Islam Khan Source : AUSTRALIAN JOURNAL OF BASIC AND APPLIED SCIENCES |
54. |
Evaluating the Effect of IP and IGP on the ICMP Throughput of a WAN
2013
Author(s) : Burhan Ul Islam Khan |
RESEARCH COLLABORATOR
GRANT | PROGRESS | STATUS |
---|