Future internet: the internet of things architecture, possible applications and key challenges R Khan, SU Khan, R Zaheer, S Khan 2012 10th international conference on frontiers of information technology …, 2012 | 2165 | 2012 |
Localization performance evaluation of extended Kalman filter in wireless sensors network R Khan, SU Khan, S Khan, MUA Khan Procedia Computer Science 32, 117-124, 2014 | 55 | 2014 |
An efficient network monitoring and management system R Khan, SU Khan, R Zaheer, MI Babar International Journal of Information and Electronics Engineering 3 (1), 122-126, 2013 | 54 | 2013 |
A systematic review of bio-cyber interface technologies and security issues for internet of bio-nano things S Zafar, M Nazir, T Bakhshi, HA Khattak, S Khan, M Bilal, KKR Choo, ... IEEE Access 9, 93529-93566, 2021 | 50 | 2021 |
VANSec: Attack Resistant VANETs Security Algorithm in terms of Trust Computation Error and Normalized Routing Overhead S Ahmed, MU Rehman, A Ishtiaq, S Khan, A Ali, S Begum Journal of Sensors 2018, 17, 2018 | 48 | 2018 |
Longitudinal performance analysis of machine learning based Android malware detectors SY Yerima, S Khan 2019 International Conference on Cyber Security and Protection of Digital …, 2019 | 38 | 2019 |
Multiple authorities attribute-based verification mechanism for Blockchain mircogrid transactions S Khan, R Khan Energies 11 (5), 1154, 2018 | 38 | 2018 |
A compact mmWave MIMO antenna for future wireless networks MI Khan, S Khan, SH Kiani, N Ojaroudi Parchin, K Mahmood, U Rafique, ... Electronics 11 (15), 2450, 2022 | 30 | 2022 |
An energy and memory-efficient key management scheme for mobile heterogeneous sensor networks SU Khan, C Pastrone, L Lavagno, MA Spirito 2011 6th International Conference on Risks and Security of Internet and …, 2011 | 30 | 2011 |
Secure communication architecture for dynamic energy management in smart grid S Khan, R Khan, AH Al-Bayatti IEEE Power and Energy Technology Systems Journal 6 (1), 47-58, 2019 | 27 | 2019 |
Design and implementation of an automated network monitoring and reporting back system R Khan, SU Khan Journal of Industrial Information Integration 9, 24-34, 2018 | 26 | 2018 |
Quantized adaptive decentralized control for interconnected nonlinear systems with actuator faults W Khan, Y Lin, SU Khan, N Ullah Applied Mathematics and Computation 320, 175-189, 2018 | 24 | 2018 |
Acquisition strategies of GNSS receiver R Khan, SU Khan, R Zaheer, S Khan International Conference on Computer Networks and Information Technology …, 2011 | 24 | 2011 |
An authentication and key establishment scheme for the IP-based wireless sensor networks SU Khan, C Pastrone, L Lavagno, MA Spirito Procedia Computer Science 10, 1039-1045, 2012 | 23 | 2012 |
From conventional to state-of-the-art IoT access control models AK Malik, N Emmanuel, S Zafar, HA Khattak, B Raza, S Khan, ... Electronics 9 (10), 1693, 2020 | 22 | 2020 |
Energy‐efficient source location privacy protection for network lifetime maximization against local eavesdropper in wireless sensor network (EeSP) N Jan, S Khan Transactions on Emerging Telecommunications Technologies 33 (2), e3703, 2022 | 20 | 2022 |
An effective key management scheme for mobile heterogeneous sensor networks SU Khan, L Lavagno, C Pastrone, M Spirito International Conference on Information Society (i-Society 2011), 98-103, 2011 | 16 | 2011 |
Design and implementation of UPnP-based energy gateway for demand side management in smart grid R Khan, SU Khan Journal of Industrial Information Integration 8, 8-21, 2017 | 15 | 2017 |
Achieving energy saving through proxying applications on behalf of idle devices R Khan, SU Khan Procedia Computer Science 83, 187-194, 2016 | 15 | 2016 |
Resource efficient authentication and session key establishment procedure for low-resource IoT devices S Khan, AI Alzahrani, O Alfarraj, N Alalwan, AH Al-Bayatti IEEE Access 7, 170615-170628, 2019 | 14 | 2019 |