Follow
Nayeem Ahmad Khan
Nayeem Ahmad Khan
Associate Professor, AlBaha University
Verified email at bu.edu.sa - Homepage
Title
Cited by
Cited by
Year
Defending Malicious Script Attacks Using Machine Learning Classifiers
N Khan, A Shahid, Johari Abdullah
Wireless Communications and Mobile Computing 2017 (Article ID 5360472), 9, 2017
822017
Effective way to defend the hypervisor attacks in cloud computing
MS Dildar, N Khan, JB Abdullah, AS Khan
2017 2nd International Conference on Anti-Cyber Crimes (ICACC), 154 - 159, 2017
332017
Towards vulnerability prevention model for web browser using interceptor approach
N Khan, J Abdullah, AS Khan
2015 9th International Conference on IT in Asia (CITA), 1-5, 2015
322015
Security issues in 5G device to device communication
NK AS Khan, Yasir Javed, J Abdullah, JM Nazim
IJCSNS 17 (5), 366, 2017
262017
Quantum-Elliptic curve Cryptography for Multihop Communication in 5G Networks
ST S Khan, J Abdullah, N Khan, AA Julahi
IJCSNS 17 (5), 357, 2017
21*2017
Lightweight multifactor authentication scheme for nextgen cellular networks
AS Khan, Y Javed, RM Saqib, Z Ahmad, J Abdullah, K Zen, IA Abbasi, ...
IEEE Access 10, 31273-31288, 2022
162022
MNN-XSS: Modular neural network based approach for XSS attack detection
AA Alqarni, N Alsharif, NA Khan, L Georgieva, E Pardede, MY Alzahrani
La Trobe, 2022
142022
A Dynamic Method of Detecting Malicious Scripts Using Classifiers
N Khan, J Abdullah, AS Khan
Adv. Sci. Lett. 23 (7), 5352–5355, 2017
132017
Hybrid Feature Classification Approach for Malicious JavaScript Attack Detection using Deep Learning
HAK Nayeem A. Khan, Mohammad Y. Alzaharani
International Journal of Computer Science and Information Security (IJCSIS …, 2020
10*2020
Enhancing the performance of SQL injection attack detection through probabilistic neural networks
FK Alarfaj, NA Khan
Applied Sciences 13 (7), 4365, 2023
92023
Cyberattack Detection Framework Using Machine Learning and User Behavior Analytics
A Abdullah, K Nayeem
Computer Systems Science & Engineering 44 (2), 1679-1689, 2022
9*2022
A Taxonomy Study of XSS Vulnerabilities
N Khan, A Shahid, J Abdullah
Asian Journal of Information Technology 16 (2), 169-177, 2017
82017
Blockchain-based lightweight multifactor authentication for cell-free in ultra-dense 6G-based (6-CMAS) cellular network
AS Khan, MIB Yahya, KB Zen, JB Abdullah, RBA Rashid, Y Javed, ...
IEEE Access 11, 20524-20541, 2023
52023
5G Network: Techniques to Increase Quality of Service and Quality of Experience
NA Khan
International Journal of Computer Networks and Applications, 476-496, 2022
52022
PKI-Based Security Enhancement for IoT in 5G Networks
NA Khan
Inventive Computation and Information Technologies: Proceedings of ICICIT …, 2022
52022
Employing public key infrastructure to encapsulate messages during transport layer security handshake procedure
NA Khan, AS Khan, HA Kar, Z Ahmad, S Tarmizi, AA Julaihi
2022 Applied Informatics International Conference (AiIC), 126-130, 2022
32022
Establishing EndVisor and quarantine approach in solving security issues of virtualization
N Khan, MY Alzaharani
Indian Journal of Science and Technology 11, 47, 2018
32018
A Deep Study on security vulnerabilities in virtualization at cloud computing
N Khan, TA War
International Journal of Computer Applications 975, 8887, 2018
22018
A Framework for XSS Attack Prevention in Web Browser using Interceptor Approach
N Khan
Indian Journal of Science & Technology 11 (16), 1-12, 2018
22018
Security Tradeoff in Network Virtualization and Their Countermeasures
NA Khan, M Al Qurashi
Inventive Computation and Information Technologies: Proceedings of ICICIT …, 2023
12023
The system can't perform the operation now. Try again later.
Articles 1–20