ARTICLE IN ACADEMIC JOURNALS
NO | DETAILS OF ARTICLE IN ACADEMIC JOURNALS |
---|---|
1. |
Integrating AI and Blockchain for Enhanced Data Security in IoT-Driven Smart Cities
2024
Author(s) : Burhan Ul Islam Khan Source :
PROCESSES
DOI :
10.3390/pr12091825
|
2. |
Blockchain-Enhanced Sensor-as-a-Service (SEaaS) in IoT: Leveraging Blockchain for Efficient and Secure Sensing Data Transactions
2024
Author(s) : Burhan Ul Islam Khan Source :
INFORMATION
DOI :
10.3390/info15040212
|
3. |
Blockchain-Enhanced Sensor-as-a-Service (SEaaS) in IoT: Leveraging Blockchain for Efficient and Secure Sensing Data Transactions
2024
Author(s) : Burhan Ul Islam Khan Source :
Information (Switzerland)
DOI :
10.3390/info15040212
|
4. |
Secure IoT Routing through Manifold Criterion Trust Evaluation using Ant Colony Optimization
2023
Author(s) : Burhan Ul Islam Khan Source :
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS
|
5. |
Secure IoT Routing Through Manifold Criterion Trust Evaluation using Ant Colony Optimization
2023
Author(s) : Burhan Ul Islam Khan Source :
International Journal of Advanced Computer Science and Applications
DOI :
10.14569/IJACSA.2023.0141113
|
6. |
Exploring MANET Security Aspects: Analysis of Attacks and Nodes Misbehaviour Issues
2022
Author(s) : Burhan Ul Islam Khan Source :
Malaysian Journal of Computer Science
DOI :
10.22452/mjcs.vol35no4.2
|
7. |
A Holistic Architecture for a Sales Enablement Sensing-as-a-Service Model in the IoT Environment
2022
Author(s) : Burhan Ul Islam Khan Source :
Information
DOI :
10.3390/info13110514
|
8. |
SGM: Strategic Game Model for Resisting Node Misbehaviour in IoT-Cloud Ecosystem
2022
Author(s) : Burhan Ul Islam Khan Source :
Information
DOI :
10.3390/info13110544
|
9. |
Evolution and Analysis of Secure Hash Algorithm (SHA) Family
2022
Author(s) : Burhan Ul Islam Khan Source :
Malaysian Journal of Computer Science
DOI :
10.22452/mjcs.vol35no3.1
|
10. |
SGM: Strategic Game Model for Resisting Node Misbehaviour in IoT-Cloud Ecosystem
2022
Author(s) : Burhan Ul Islam Khan Source :
INFORMATION
DOI :
10.3390/info13110544
|
11. |
A Comprehensive Insight into Blockchain Technology: Past Development, Present Impact and Future Considerations
2022
Author(s) : Burhan Ul Islam Khan Source :
International Journal of Advanced Computer Science and Applications
DOI :
10.14569/IJACSA.2022.01311101
|
12. |
A Comprehensive Insight into Blockchain Technology: Past Development, Present Impact and Future Considerations
2022
Source :
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS
|
13. |
Decentralized Blockchain Network for Resisting Side-Channel Attacks in Mobility-Based IoT
2022
Author(s) : Burhan Ul Islam Khan Source :
Electronics
|
14. |
EXPLORING MANET SECURITY ASPECTS: ANALYSIS OF ATTACKS AND NODE MISBEHAVIOUR ISSUES
2022
Author(s) : Burhan Ul Islam Khan Source :
MALAYSIAN JOURNAL OF COMPUTER SCIENCE
DOI :
10.22452/mjcs.vol35no4.2
|
15. |
A Holistic Architecture for a Sales Enablement Sensing-as-a-Service Model in the IoT Environment
2022
Author(s) : Burhan Ul Islam Khan Source :
INFORMATION
DOI :
10.3390/info13110514
|
16. |
Decentralized Blockchain Network for Resisting Side-Channel Attacks in Mobility-Based IoT
2022
Source :
ELECTRONICS
DOI :
10.3390/electronics11233982
|
17. |
EVOLUTION AND ANALYSIS OF SECURE HASH ALGORITHM (SHA) FAMILY
2022
Author(s) : Miss Laiha Binti Mat Kiah, Burhan Ul Islam Khan Source :
MALAYSIAN JOURNAL OF COMPUTER SCIENCE
DOI :
10.22452/mjcs.vol35no3.1
|
18. |
The Internet of Things Vision: A Comprehensive Review of Architecture, Enabling Technologies, Adoption Challenges, Research Open Issues and Contemporary Applications
2022
Author(s) : Burhan Ul Islam Khan Source :
JOURNAL OF ADVANCED RESEARCH IN APPLIED SCIENCES AND ENGINEERING TECHNOLOGY
DOI :
10.37934/araset.26.1.5177
|
19. |
A Frictionless and Secure User Authentication in Web-Based Premium Applications
2021
Author(s) : Burhan Ul Islam Khan Source :
IEEE Access
DOI :
10.1109/ACCESS.2021.3110310
|
20. |
Game Theory Analysis and Modeling of Sophisticated Multi-Collusion Attack in MANETs
2021
Author(s) : Burhan Ul Islam Khan Source :
IEEE Access
DOI :
10.1109/ACCESS.2021.3073343
|
21. |
MANET Security Appraisal: Challenges, Essentials, Attacks, Countermeasures & Future Directions
2020
Author(s) : Burhan Ul Islam Khan DOI :
10.35940/ijrte.E6537.038620
|
22. |
A Game Theory-Based Strategic Approach to Ensure Reliable Data Transmission with Optimized Network Operations in Futuristic Mobile Adhoc Networks
2020
Author(s) : Burhan Ul Islam Khan Source :
IEEE Access
DOI :
10.1109/ACCESS.2020.3006043
|
23. |
A Novel Multi-Agent and Multilayered Game Formulation for Intrusion Detection in Internet of Things (IoT)
2020
Author(s) : Burhan Ul Islam Khan Source :
IEEE Access
DOI :
10.1109/ACCESS.2020.2997711
|
24. |
A Comprehensive Insight into Game Theory in relevance to Cyber Security
2020
Author(s) : Burhan Ul Islam Khan Source :
INDONESIAN JOURNAL OF ELECTRICAL ENGINEERING AND INFORMATICS
DOI :
10.52549/ijeei.v8i1.1810
|
25. |
Scrutinising Internet Banking Security Solutions
2020
Author(s) : Burhan Ul Islam Khan Source :
INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY
DOI :
10.1504/IJICS.2020.105180
|
26. |
Implementation of Security Enhancement in AES by Inducting Dynamicity in AES S-Box
2019
Author(s) : Burhan Ul Islam Khan Source :
INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY AND EXPLORING ENGINEERING
DOI :
10.35940/ijitee.J9311.0881019
|
27. |
ECM-GT: Design of Efficient Computational Modelling based on Game Theoretical Approach Towards Enhancing the Security Solutions in MANET
2019
Author(s) : Burhan Ul Islam Khan Source :
INTERNATIONAL JOURNAL OF INNOVATIVE TECHNOLOGY AND EXPLORING ENGINEERING
|
28. |
A Critical Insight into the Effectiveness of Research Methods Evolved to Secure IoT Ecosystem
2019
Author(s) : Burhan Ul Islam Khan Source :
INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY
DOI :
10.1504/IJICS.2019.101908
|
29. |
Bandwidth Allocation Policy using the Game Theory Model in Heterogeneous Wireless Networks
2018
Author(s) : Burhan Ul Islam Khan |
30. |
Snort-Based Smart and Swift Intrusion Detection System
2018
Author(s) : Burhan Ul Islam Khan DOI :
10.17485/ijst/2018/v11i4/120917
|
31. |
Radio Access Technology (RAT) Selection Mechanism using TOPSIS Method in Heterogeneous Wireless Networks (HWN)
2018
Author(s) : Burhan Ul Islam Khan Source :
INDONESIAN JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCE
DOI :
10.11591/ijeecs.v12.i2.pp852-864
|
32. |
Rehashing System Security Solutions in E-Banking
2018
Author(s) : Burhan Ul Islam Khan Source :
INTERNATIONAL JOURNAL OF ENGINEERING AND TECHNOLOGY(UAE)
DOI :
10.14419/ijet.v7i4.23148
|
33. |
Securely Eradicating Cellular for E-Banking Applications
2018
Author(s) : Burhan Ul Islam Khan Source :
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS
DOI :
10.14569/IJACSA.2018.090253
|
34. |
A Survey on MANETs: Architecture, Evolution, Applications, Security Issues and Solutions
2018
Author(s) : Burhan Ul Islam Khan Source :
INDONESIAN JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCE
DOI :
10.11591/ijeecs.v12.i2.pp832-842
|
35. |
Internet of Things - Security Vulnerabilities and Recommended Solutions
2018
Author(s) : Burhan Ul Islam Khan Source :
INTERNATIONAL JOURNAL OF ENGINEERING AND TECHNOLOGY(UAE)
DOI :
10.14419/ijet.v7i4.23147
|
36. |
Efficient Cache Replacement Policy for Minimizing Error Rate in L2-STT-MRAM Caches
2018
Author(s) : Burhan Ul Islam Khan Source :
International Journal of Grid and Utility Computing
DOI :
10.1504/IJGUC.2018.095434
|
37. |
Game Theory for Resource Allocation in Heterogeneous Wireless Networks - A Review
2018
Author(s) : Burhan Ul Islam Khan Source :
INDONESIAN JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCE
DOI :
10.11591/ijeecs.v12.i2.pp843-851
|
38. |
Secure Annihilation of Out-of-Band Authorization for Online Transactions
2018
Author(s) : Burhan Ul Islam Khan DOI :
10.17485/ijst/2018/v11i5/121107
|
39. |
Analysis of Packet Reordering Delay for Bandwidth Aggregation in Heterogeneous Wireless Networks
2018
Author(s) : Burhan Ul Islam Khan |
40. |
Critical Security Challenges in Cloud Computing Environment: An Appraisal
2017
Author(s) : Burhan Ul Islam Khan Source :
JOURNAL OF THEORETICAL AND APPLIED INFORMATION TECHNOLOGY
|
41. |
A Survey on E-Payment Systems: Elements, Adoption, Architecture, Challenges and Security Concepts
2017
Author(s) : Burhan Ul Islam Khan DOI :
10.17485/ijst/2017/v10i19/113930
|
42. |
A Compendious Study of Online Payment Systems: Past Developments, Present Impact, and Future Considerations
2017
Author(s) : Burhan Ul Islam Khan Source :
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS
DOI :
10.14569/IJACSA.2017.080532
|
43. |
Adoption of Cloud Computing in Higher Learning Institutions: A Systematic Review
2017
Author(s) : Burhan Ul Islam Khan DOI :
10.17485/ijst/2017/v10i36/117641
|
44. |
Linking Software Engineering Paradigms to Islamic Values
2017
Author(s) : Burhan Ul Islam Khan Source :
JOURNAL OF THEORETICAL AND APPLIED INFORMATION TECHNOLOGY
|
45. |
Securing Electronic Transactions via Payment Gateways – A Systematic Review
2017
Author(s) : Burhan Ul Islam Khan Source :
INTERNATIONAL JOURNAL OF INTERNET TECHNOLOGY AND SECURED TRANSACTIONS
DOI :
10.1504/IJITST.2017.089781 PDF
|
46. |
Modeling Malicious Multi-Attacker Node Collusion in MANETs via Game Theory
2017
Author(s) : Burhan Ul Islam Khan Source :
MIDDLE EAST JOURNAL OF SCIENTIFIC RESEARCH
DOI :
0.5829/idosi.mejsr.2017.568.579
|
47. |
A Computationally Efficient P-LRU based Optimal Cache Heap Object Replacement Policy
2017
Author(s) : Burhan Ul Islam Khan Source :
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS
DOI :
10.14569/IJACSA.2017.080118
|
48. |
DTASR: Dual Threshold-based Authentication for Secure Routing in Mobile Adhoc Network
2016
Author(s) : Burhan Ul Islam Khan DOI :
10.5829/idosi.weasj.2016.7.2.22637
|
49. |
MANET – A Cogitation of its Design and Security Issues
2016
Author(s) : Burhan Ul Islam Khan Source :
MIDDLE EAST JOURNAL OF SCIENTIFIC RESEARCH
DOI :
10.5829/idosi.mejsr.2016.3094.3107
|
50. |
DFAM: A Distributed Feedback Analysis mechanism for Knowledge based educational Big Data
2016
Author(s) : Burhan Ul Islam Khan DOI :
10.11113/jt.v78.10020
|
51. |
Contemplation of Effective Security Measures in Access Management from Adoptability Perspective
2015
Author(s) : Burhan Ul Islam Khan Source :
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS
DOI :
10.14569/IJACSA.2015.060826 PDF
|
52. |
Behaviour Visualization for Malicious-Attacker Node Collusion in MANET Based on Probabilistic Approach
2015
Author(s) : Burhan Ul Islam Khan |
53. |
Strategic Profiling for Behaviour Visualization of Malicious Node in Manets Using Game Theory
2015
Author(s) : Burhan Ul Islam Khan Source :
JOURNAL OF THEORETICAL AND APPLIED INFORMATION TECHNOLOGY
|
54. |
Critical Insight for MapReduce Optimization in Hadoop
2014
Author(s) : Burhan Ul Islam Khan |
55. |
ElePSO: Energy Aware Elephant Swarm Optimization for Mobile Adhoc Network
2014
Author(s) : Burhan Ul Islam Khan |
56. |
Manifestation and Mitigation of Node Misbehavior in Adhoc Networks
2014
Author(s) : Burhan Ul Islam Khan |
57. |
QoS oriented MapReduce Optimization for Hadoop Based BigData Application
2014
Author(s) : Burhan Ul Islam Khan |
58. |
Malicious Behaviour of Node and its Significant Security Techniques in MANET-A Review
2013
Author(s) : Burhan Ul Islam Khan Source :
AUSTRALIAN JOURNAL OF BASIC AND APPLIED SCIENCES
|
59. |
Evaluating the Effect of using IP version and Physical Media on the ICMP Throughput of a LAN
2013
Author(s) : Burhan Ul Islam Khan |
60. |
Evaluating the Effect of IP and IGP on the ICMP Throughput of a WAN
2013
Author(s) : Burhan Ul Islam Khan |
CHAPTER IN BOOK
NO | DETAILS OF CHAPTER IN BOOK |
---|---|
1. |
Predictive Classification Framework for Software Demand Using Ensembled Machine Learning
2024
Author(s) : Burhan Ul Islam Khan |
RESEARCH PROJECT
GRANT | PROGRESS | STATUS |
---|---|---|
Game Theory-Based Exhaustive Strategic Modelling of Node Misbehavior Issues Towards Threat Analysis in Futuristic MANET-enabled IoT Systems.
Researcher(s) : Dr. Muhammad Faiz Bin Mohd Zaki, Prof. Ts. Dr. Miss Laiha Binti Mat Kiah |
|
new |
RESEARCH COLLABORATOR
GRANT | PROGRESS | STATUS |
---|