[go: up one dir, main page]

Follow
Muhammad Mubashir Khan
Muhammad Mubashir Khan
Verified email at neduet.edu.pk
Title
Cited by
Cited by
Year
Secure digital voting system based on blockchain technology
KM Khan, J Arshad, MM Khan
International Journal of Electronic Government Research (IJEGR) 14 (1), 53-62, 2018
2862018
Investigating performance constraints for blockchain based secure e-voting system
KM Khan, J Arshad, MM Khan
Future Generation Computer Systems 105, 13-26, 2020
2332020
Scalable blockchains—A systematic review
MH Nasir, J Arshad, MM Khan, M Fatima, K Salah, R Jayaraman
Future Generation Computer Systems, 2021
1852021
A blockchain-based decentralized machine learning framework for collaborative intrusion detection within UAVs
AA Khan, MM Khan, KM Khan, J Arshad, F Ahmad
Computer Networks, 108217, 2021
1042021
High error-rate quantum key distribution for long-distance communication
MM Khan, M Murphy, A Beige
New Journal of Physics 11 (6), 063043, 2009
982009
Swarm intelligence inspired intrusion detection systems—a systematic literature review
MH Nasir, SA Khan, MM Khan, M Fatima
Computer Networks 205, 108708, 2022
942022
PRISED tangle: a privacy-aware framework for smart healthcare data sharing using IOTA tangle
S Abdullah, J Arshad, MM Khan, M Alazab, K Salah
Complex & Intelligent Systems 9 (3), 3023-3041, 2023
812023
Simulation of transaction malleability attack for blockchain-based e-Voting
KM Khan, J Arshad, MM Khan
Computers & Electrical Engineering 83, 106583, 2020
722020
Analysis of security and privacy challenges for DNA-genomics applications and databases
S Arshad, J Arshad, MM Khan, S Parkinson
Journal of Biomedical Informatics 119, 103815, 2021
682021
Empirical analysis of transaction malleability within blockchain-based e-Voting
KM Khan, J Arshad, MM Khan
Computers & Security 100, 102081, 2021
582021
Collaborative device-level botnet detection for internet of things
MH Nasir, J Arshad, MM Khan
Computers & Security 129, 103172, 2023
372023
Anomaly Detection and Enterprise Security using User and Entity Behavior Analytics (UEBA)
MZA Khan, MM Khan, J Arshad
2022 3rd International Conference on Innovations in Computer Science …, 2022
262022
A Layered Approach to Threat Modeling for 5G-Based Systems
MNI Farooqui, J Arshad, MM Khan
Electronics 11 (12), 1819, 2022
262022
A novel framework for collaborative intrusion detection for m2m networks
J Arshad, MM Abdellatif, MM Khan, MA Azad
2018 9th International Conference on Information and Communication Systems …, 2018
242018
Ransomware prevention using moving target defense based approach
MM Khan, MF Hyder, SM Khan, J Arshad, MM Khan
Concurrency and Computation: Practice and Experience 35 (7), e7592, 2023
222023
A bibliometric approach to quantitatively assess current research trends in 5G security
MNI Farooqui, J Arshad, MM Khan
Library Hi Tech 39 (4), 1097-1120, 2021
222021
An overview of quantum cryptography for wireless networking infrastructure
KH Sheikh, SS Hyder, MM Khan
International Symposium on Collaborative Technologies and Systems (CTS'06 …, 2006
172006
Signature-based detection of privilege-escalation attacks on Android
RH Niazi, JA Shamsi, T Waseem, MM Khan
2015 conference on information assurance and cyber security (CIACS), 44-49, 2015
162015
A Quantum key distribution network through single mode optical fiber
MM Khan, S Hyder, MK Pathan, KH Sheikh
International Symposium on Collaborative Technologies and Systems (CTS'06 …, 2006
152006
Anomaly detection through keystroke and tap dynamics implemented via machine learning algorithms
H Jawed, Z Ziad, MM Khan, M Asrar
Turkish Journal of Electrical Engineering and Computer Sciences 26 (4), 1698 …, 2018
122018
The system can't perform the operation now. Try again later.
Articles 1–20