|On cloud security attacks: A taxonomy and intrusion detection and prevention as a service|
S Iqbal, MLM Kiah, B Dhaghighi, M Hussain, S Khan, MK Khan, ...
Journal of Network and Computer Applications 74, 98-120, 2016
|Energy efficient computational offloading framework for mobile cloud computing|
M Shiraz, A Gani, A Shamim, S Khan, RW Ahmad
Journal of Grid Computing 13 (1), 1-18, 2015
|Topology discovery in software defined networks: Threats, taxonomy, and state-of-the-art|
S Khan, A Gani, AWA Wahab, M Guizani, MK Khan
IEEE Communications Surveys & Tutorials 19 (1), 303-324, 2016
|Network forensics: Review, taxonomy, and open challenges|
S Khan, A Gani, AWA Wahab, M Shiraz, I Ahmad
Journal of Network and Computer Applications 66, 214-235, 2016
|A review on interworking and mobility techniques for seamless connectivity in mobile cloud computing|
A Gani, GM Nayeem, M Shiraz, M Sookhak, M Whaiduzzaman, S Khan
Journal of Network and Computer Applications 43, 84-102, 2014
|Cloud log forensics: foundations, state of the art, and future directions|
S Khan, A Gani, AWA Wahab, MA Bagiwa, M Shiraz, SU Khan, R Buyya, ...
ACM Computing Surveys (CSUR) 49 (1), 7, 2016
|From intrusion detection to an intrusion response system: fundamentals, requirements, and future directions|
S Anwar, J Mohamad Zain, MF Zolkipli, Z Inayat, S Khan, B Anthony, ...
Algorithms 10 (2), 39, 2017
|Towards knowledge modeling and manipulation technologies: A survey|
AT Bimba, N Idris, A Al-Hunaiyyan, RB Mahmud, A Abdelaziz, S Khan, ...
International Journal of Information Management 36 (6), 857-871, 2016
|Feature selection of denial-of-service attacks using entropy and granular computing|
S Khan, A Gani, AWA Wahab, PK Singh
Arabian Journal for Science and Engineering 43 (2), 499-508, 2018
|A Comprehensive Review on Adaptability of Network Forensics Frameworks for Mobile Cloud Computing|
ZAR Suleman Khan, Muhammad Shiraz, AINUDDIN WAHID
Scientific World Journal, 2014
|A multi-objective software defined network traffic measurement|
H Tahaei, R Salleh, S Khan, R Izard, KKR Choo, NB Anuar
Measurement 95, 317-327, 2017
|WDARS: A weighted data aggregation routing strategy with minimum link cost in event-driven WSNs|
O Adil Mahdi, AW Abdul Wahab, MYI Idris, A Abu Znaid, YRB Al-Mayouf, ...
Journal of Sensors 2016, 2016
|Sierpinski triangle based data center architecture in cloud computing|
H Qi, M Shiraz, A Gani, M Whaiduzzaman, S Khan
The Journal of Supercomputing 69 (2), 887-907, 2014
|Software-defined network forensics: Motivation, potential locations, requirements, and challenges|
S Khan, A Gani, AWA Wahab, A Abdelaziz, K Ko, MK Khan, M Guizani
IEEE Network 30 (6), 6-13, 2016
|Efficient and stable routing algorithm based on user mobility and node density in urban vehicular network|
YRB Al-Mayouf, M Ismail, NF Abdullah, AWA Wahab, OA Mahdi, S Khan, ...
PloS one 11 (11), e0165966, 2016
|A comparison study on node clustering techniques used in target tracking WSNs for efficient data aggregation|
OA Mahdi, AW Abdul Wahab, MY Idna Idris, AMA Abu znaid, S Khan, ...
Wireless Communications and Mobile Computing 16 (16), 2663-2676, 2016
|Passive video forgery detection techniques: a survey|
AWA Wahab, MA Bagiwa, MYI Idris, S Khan, Z Razak, MRK Ariffin
2014 10th International Conference on Information Assurance and Security, 29-34, 2014
|Multi-objective optimization model for seamless application execution in mobile cloud computing|
E Ahmed, S Khan, I Yaqoob, A Gani, F Salim
2013 5th International Conference on Information and Communication …, 2013
|Distributed controller clustering in software defined networks|
A Abdelaziz, AT Fong, A Gani, U Garba, S Khan, A Akhunzada, ...
PloS one 12 (4), e0174715, 2017
|Forensic challenges in mobile cloud computing|
S Khan, E Ahmad, M Shiraz, A Gani, AWA Wahab, MA Bagiwa
2014 International Conference on Computer, Communications, and Control …, 2014