Follow
sarmadullah khan
sarmadullah khan
Cyber Technology Institute (CSI), De Montfort University, UK
Verified email at dmu.ac.uk - Homepage
Title
Cited by
Cited by
Year
Future internet: the internet of things architecture, possible applications and key challenges
R Khan, SU Khan, R Zaheer, S Khan
2012 10th international conference on frontiers of information technology …, 2012
21652012
Localization performance evaluation of extended Kalman filter in wireless sensors network
R Khan, SU Khan, S Khan, MUA Khan
Procedia Computer Science 32, 117-124, 2014
552014
An efficient network monitoring and management system
R Khan, SU Khan, R Zaheer, MI Babar
International Journal of Information and Electronics Engineering 3 (1), 122-126, 2013
542013
A systematic review of bio-cyber interface technologies and security issues for internet of bio-nano things
S Zafar, M Nazir, T Bakhshi, HA Khattak, S Khan, M Bilal, KKR Choo, ...
IEEE Access 9, 93529-93566, 2021
502021
VANSec: Attack Resistant VANETs Security Algorithm in terms of Trust Computation Error and Normalized Routing Overhead
S Ahmed, MU Rehman, A Ishtiaq, S Khan, A Ali, S Begum
Journal of Sensors 2018, 17, 2018
482018
Longitudinal performance analysis of machine learning based Android malware detectors
SY Yerima, S Khan
2019 International Conference on Cyber Security and Protection of Digital …, 2019
382019
Multiple authorities attribute-based verification mechanism for Blockchain mircogrid transactions
S Khan, R Khan
Energies 11 (5), 1154, 2018
382018
A compact mmWave MIMO antenna for future wireless networks
MI Khan, S Khan, SH Kiani, N Ojaroudi Parchin, K Mahmood, U Rafique, ...
Electronics 11 (15), 2450, 2022
302022
An energy and memory-efficient key management scheme for mobile heterogeneous sensor networks
SU Khan, C Pastrone, L Lavagno, MA Spirito
2011 6th International Conference on Risks and Security of Internet and …, 2011
302011
Secure communication architecture for dynamic energy management in smart grid
S Khan, R Khan, AH Al-Bayatti
IEEE Power and Energy Technology Systems Journal 6 (1), 47-58, 2019
272019
Design and implementation of an automated network monitoring and reporting back system
R Khan, SU Khan
Journal of Industrial Information Integration 9, 24-34, 2018
262018
Quantized adaptive decentralized control for interconnected nonlinear systems with actuator faults
W Khan, Y Lin, SU Khan, N Ullah
Applied Mathematics and Computation 320, 175-189, 2018
242018
Acquisition strategies of GNSS receiver
R Khan, SU Khan, R Zaheer, S Khan
International Conference on Computer Networks and Information Technology …, 2011
242011
An authentication and key establishment scheme for the IP-based wireless sensor networks
SU Khan, C Pastrone, L Lavagno, MA Spirito
Procedia Computer Science 10, 1039-1045, 2012
232012
From conventional to state-of-the-art IoT access control models
AK Malik, N Emmanuel, S Zafar, HA Khattak, B Raza, S Khan, ...
Electronics 9 (10), 1693, 2020
222020
Energy‐efficient source location privacy protection for network lifetime maximization against local eavesdropper in wireless sensor network (EeSP)
N Jan, S Khan
Transactions on Emerging Telecommunications Technologies 33 (2), e3703, 2022
202022
An effective key management scheme for mobile heterogeneous sensor networks
SU Khan, L Lavagno, C Pastrone, M Spirito
International Conference on Information Society (i-Society 2011), 98-103, 2011
162011
Design and implementation of UPnP-based energy gateway for demand side management in smart grid
R Khan, SU Khan
Journal of Industrial Information Integration 8, 8-21, 2017
152017
Achieving energy saving through proxying applications on behalf of idle devices
R Khan, SU Khan
Procedia Computer Science 83, 187-194, 2016
152016
Resource efficient authentication and session key establishment procedure for low-resource IoT devices
S Khan, AI Alzahrani, O Alfarraj, N Alalwan, AH Al-Bayatti
IEEE Access 7, 170615-170628, 2019
142019
The system can't perform the operation now. Try again later.
Articles 1–20