Follow
Shawal Khan
Shawal Khan
Verified email at student.westernsydney.edu.au - Homepage
Title
Cited by
Cited by
Year
A secure and privacy preserved parking recommender system using elliptic curve cryptography and local differential privacy
AA Khaliq, A Anjum, AB Ajmal, JL Webber, A Mehbodniya, S Khan
IEEE Access 10, 56410-56426, 2022
482022
Security Challenges of Location Privacy in VANETs and State-of-The Art Solutions: A Survey
S Khan, I Sharma, M Aslam, MZ Khan, S Khan
Future Internet 13 (4), 96, 2021
472021
Last Line of Defense: Reliability Through Inducing Cyber Threat Hunting With Deception in SCADA Networks
AB Ajmal, M Alam, AA Khaliq, S Khan, Z Qadir, MAP Mahmud
IEEE Access 9, 126789-126800, 2021
212021
An Efficient and Secure Revocation-Enabled Attribute-Based Access Control for eHealth in Smart Society
S Khan, W Iqbal, A Waheed, G Mehmood, S Khan, M Zareei, RR Biswal
Sensors 22 (1), 10.3390/s22010336, 2022
192022
Offensive Security: Cyber Threat Intelligence Enrichment With Counterintelligence and Counterattack
MU Rana, O Ellahi, M Alam, JL Webber, A Mehbodniya, S Khan
IEEE Access 10, 108760-108774, 2022
82022
A strong construction of S-box using Mandelbrot set an image encryption scheme
M Aslam, S Beg, A Anjum​, Z Qadir, S Khan, SUR Malik, MAP Mahmud
PeerJ Computer Science 8, 30, 2022
62022
ABKS-PBM: Attribute-Based Keyword Search With Partial Bilinear Map
S Khan, S Khan, M Zareei, F Alanazi, N Kama, M Alam, A Anjum
IEEE Access 9, 46313-46324, 2021
52021
OO-ABMS: Online/Offline-Aided Attribute-Based Multi-Keyword Search
S Khan, M Zareei, S Khan, F Alanazi, M Alam, A Waheed
IEEE Access 9, 114392-114406, 2021
42021
Towards Effective Evaluation of Cyber Defense: Threat Based Adversary Emulation Approach
AB Ajmal, S Khan, M Alam, A Mehbodniya, J Webber, A Waheed
IEEE Access, 2023
32023
Defeating Modern Day Anti-Viruses for Defense Evaluation
AB Ajmal, S Khan, F Jabeen
2022 International Conference on Frontiers of Information Technology (FIT …, 2022
12022
The system can't perform the operation now. Try again later.
Articles 1–10