Follow
Abid Khan (PhD)
Abid Khan (PhD)
College of Science and Engineering, University of Derby
Verified email at derby.ac.uk - Homepage
Title
Cited by
Cited by
Year
Smart cities: A survey on security concerns
S Ijaz, MA Shah, A Khan, M Ahmed
International Journal of Advanced Computer Science and Applications 7 (2), 2016
1672016
A survey of cloud computing data integrity schemes: Design challenges, taxonomy and future trends
F Zafar, A Khan, SUR Malik, M Ahmed, A Anjum, MI Khan, N Javed, ...
Computers & Security 65, 29-49, 2017
1322017
Android Malware Detection & Protection: A Survey
S Arshad, MA Shah, A Khan, M Ahmed
International Journal of Advanced Computer Science and Applications 7 (2), 2016
1242016
Comparative Analysis of Machine Learning Techniques for Predicting Air Quality in Smart Cities
S Ameer, MA Shah, A Khan, H Song, C Maple, S ul Islam, MN Asghar
IEEE Access, 2019
1222019
Trustworthy data: A survey, taxonomy and future trends of secure provenance schemes
F Zafar, A Khan, S Suhail, I Ahmed, K Hameed, HM Khan, F Jabeen, ...
Journal of network and computer applications 94, 50-68, 2017
1002017
FESDA: Fog-Enabled Secure Data Aggregation in Smart Grid IoT Network
A Saleem, A Khan, SUR Malik, H Pervaiz, H Malik, M Alam, A Jindal
IEEE Internet of Things, 2020
832020
A modified feature selection and artificial neural network-based day-ahead load forecasting model for a smart grid
A Ahmad, N Javaid, N Alrajeh, ZA Khan, U Qasim, A Khan
Applied Sciences 5 (4), 1756-1772, 2015
682015
Towards a Formally Verified Zero Watermarking Scheme for Data Integrity in the Internet of Things based-wireless Sensor Networks
K Hameed, A Khan, M Ahmed, AG Reddy, MM Rathore
Future Generation Computer Systems 82, 274-289, 2018
672018
An efficient privacy mechanism for electronic health records
A Anjum, KKR Choo, A Khan, A Haroon, S Khan, SU Khan, N Ahmad, ...
computers & security 72, 196-211, 2018
562018
Detection of rank attack in routing protocol for Low Power and Lossy Networks
MA Usman Shafique, Abid Khan, Abdur Rehman, Faisal Bashir
Annals of Telecommunications 2018, 1-10, 2018
50*2018
Privacy Preservation in E-Health Cloud: Taxonomy, Privacy Requirements, Feasibility Analysis, and Opportunities
T Kanwal, A Anjum, A Khan
Cluster Computing, 2020
482020
Region based cooperative routing in underwater wireless sensor networks
N Javaid, S Hussain, A Ahmad, M Imran, A Khan, M Guizani
Journal of Network and Computer Applications 92, 31-41, 2017
472017
Improved Generalization for Secure Data Publishing
AKB SabaYaseen, Syed M. Ali Abbas, Adeel Anjum, Tanzila Saba, Abid Khan ...
IEEE Access, 2018
45*2018
RALBA: a computation-aware load balancing scheduler for cloud computing
A Hussain, M Aleem, A Khan, MA Iqbal, MA Islam
Cluster Computing, 1-14, 2018
452018
Towards Smart Manufacturing Using Spiral Digital Twin Framework and Twinchain
A Khan, F Shahid, C Maple, A Ahmad, G Jeon
IEEE Transactions on Industrial Informatics 18 (2), 1359 - 1366, 2022
432022
On the Role of Hash-based Signatures in Quantum-Safe Internet of Things: Current Solutions and Future Directions
S Suhail, R Hussain, A Khan, CS Hong
IEEE Internet of Things Journal, 2020
422020
Orchestrating Product Provenance Story: When IOTA Ecosystem Meets The Electronics Supply Chain Space
S Suhail, CS Hong, A Khan
Computers in Industry, 2020
382020
Privacy Aware Decentralized Access Control System
S Sehrish, A Masoom, A Khan
Future Generation Computer Systems, 2019
38*2019
Decision support system for risk assessment and management strategies in distributed software development
A Aslam, N Ahmad, T Saba, AS Almazyad, A Rehman, A Anjum, A Khan
IEEE Access 5, 20349-20373, 2017
382017
Introducing Secure Provenance in IoT: Requirements and challenges
S Suhail, CS Hong, ZU Ahmad, F Zafar, A Khan
2016 International Workshop on Secure Internet of Things (SIoT), 39-46, 2016
382016
The system can't perform the operation now. Try again later.
Articles 1–20