default search action
Farrukh Aslam Khan
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j66]Faiza Babar Khan, Muhammad Hanif Durad, Asifullah Khan, Farrukh Aslam Khan, Muhammad Rizwan, Aftab Ali:
Design and Performance Analysis of an Anti-Malware System Based on Generative Adversarial Network Framework. IEEE Access 12: 27683-27708 (2024) - [j65]Rahmoune Bitit, Abdelouahid Derhab, Mohamed Guerroumi, Farrukh Aslam Khan:
DDoS attack forecasting based on online multiple change points detection and time series analysis. Multim. Tools Appl. 83(18): 53655-53685 (2024) - [j64]Rabia Khan, Noshina Tariq, Muhammad Ashraf, Farrukh Aslam Khan, Saira Shafi, Aftab Ali:
FL-DSFA: Securing RPL-Based IoT Networks against Selective Forwarding Attacks Using Federated Learning. Sensors 24(17): 5834 (2024) - [c40]Saira Shafi, Noshina Tariq, Farrukh Aslam Khan, Aftab Ali:
Federated Learning for Enhanced Malware Threat Detection to Secure Smart Power Grids. UCAmI 2024: 692-703 - 2023
- [j63]Muhammad Hassan, Noshina Tariq, Amjad Alsirhani, Abdullah Alomari, Farrukh Aslam Khan, Mohammed Mujib Alshahrani, Muhammad Ashraf, Mamoona Humayun:
GITM: A GINI Index-Based Trust Mechanism to Mitigate and Isolate Sybil Attack in RPL-Enabled Smart Grid Advanced Metering Infrastructures. IEEE Access 11: 62697-62720 (2023) - [j62]Faiza Babar Khan, Muhammad Hanif Durad, Asifullah Khan, Farrukh Aslam Khan, Sajjad Hussain Chauhdary, Mohammed A. Alqarni:
Detection of Data Scarce Malware Using One-Shot Learning With Relation Network. IEEE Access 11: 74438-74457 (2023) - [j61]Muhammad Ismail, Hamza Qadir, Farrukh Aslam Khan, Sadeeq Jan, Zahid Wadud, Ali Kashif Bashir:
A novel routing protocol for underwater wireless sensor networks based on shifted energy efficiency and priority. Comput. Commun. 210: 147-162 (2023) - [j60]Shayan E. Ali, Noshina Tariq, Farrukh Aslam Khan, Muhammad Ashraf, Wadood Abdul, Kashif Saleem:
BFT-IoMT: A Blockchain-Based Trust Mechanism to Mitigate Sybil Attack Using Fuzzy Logic in the Internet of Medical Things. Sensors 23(9): 4265 (2023) - [j59]Mannan Javed, Noshina Tariq, Muhammad Ashraf, Farrukh Aslam Khan, Muhammad Asim, Muhammad Imran:
Securing Smart Healthcare Cyber-Physical Systems against Blackhole and Greyhole Attacks Using a Blockchain-Enabled Gini Index Framework. Sensors 23(23): 9372 (2023) - [j58]Abdelouahid Derhab, Omar Cheikhrouhou, Azza Allouch, Anis Koubaa, Basit Qureshi, Mohamed Amine Ferrag, Leandros Maglaras, Farrukh Aslam Khan:
Internet of drones security: Taxonomies, open issues, and future directions. Veh. Commun. 39: 100552 (2023) - [i1]Noshina Tariq, Farrukh Aslam Khan, Syed Atif Moqurrab, Gautam Srivastava:
CAPTCHA Types and Breaking Techniques: Design Issues, Challenges, and Future Research Directions. CoRR abs/2307.10239 (2023) - 2021
- [j57]Farrukh Aslam Khan, Khan Zeb, Mabrook Al-Rakhami, Abdelouahid Derhab, Syed Ahmad Chan Bukhari:
Detection and Prediction of Diabetes Using Data Mining: A Comprehensive Review. IEEE Access 9: 43711-43735 (2021) - [j56]Abdelouahid Derhab, Rahaf Alawwad, Khawlah Dehwah, Noshina Tariq, Farrukh Aslam Khan, Jalal Al-Muhtadi:
Tweet-Based Bot Detection Using Big Data Analytics. IEEE Access 9: 65988-66005 (2021) - [j55]Tengfei Wu, Lu Leng, Muhammad Khurram Khan, Farrukh Aslam Khan:
Palmprint-Palmvein Fusion Recognition Based on Deep Hashing Network. IEEE Access 9: 135816-135827 (2021) - [j54]Ayesha Altaf, Haider Abbas, Faiza Iqbal, Farrukh Aslam Khan, Saddaf Rubab, Abdelouahid Derhab:
Context-oriented trust computation model for industrial Internet of Things. Comput. Electr. Eng. 92: 107123 (2021) - [j53]Keping Yu, Liang Tan, Shahid Mumtaz, Saba Al-Rubaye, Anwer Al-Dulaimi, Ali Kashif Bashir, Farrukh Aslam Khan:
Securing Critical Infrastructures: Deep-Learning-Based Threat Detection in IIoT. IEEE Commun. Mag. 59(10): 76-82 (2021) - [j52]Jalal Al-Muhtadi, Rawan A. Alamri, Farrukh Aslam Khan, Kashif Saleem:
Subjective logic-based trust model for fog computing. Comput. Commun. 178: 221-233 (2021) - [j51]Wilayat Khan, Farrukh Aslam Khan, Abdelouahid Derhab, Adi Alhudhaif:
CoCEC: An Automatic Combinational Circuit Equivalence Checker Based on the Interactive Theorem Prover. Complex. 2021: 5525539:1-5525539:12 (2021) - [j50]Abdelouahab Amira, Abdelouahid Derhab, ElMouatez Billah Karbab, Omar Nouali, Farrukh Aslam Khan:
TriDroid: a triage and classification framework for fast detection of mobile threats in android markets. J. Ambient Intell. Humaniz. Comput. 12(2): 1731-1755 (2021) - [j49]Samina Naz, Hammad Majeed, Farrukh Aslam Khan:
Memory augmented hyper-heuristic framework to solve multi-disciplinary problems inspired by cognitive problem solving skills. Neural Comput. Appl. 33(4): 1367-1378 (2021) - [j48]Anum Aftab, Farrukh Aslam Khan, Muhammad Khurram Khan, Haider Abbas, Waseem Iqbal, Farhan Riaz:
Hand-based multibiometric systems: state-of-the-art and future challenges. PeerJ Comput. Sci. 7: e707 (2021) - [j47]Noshina Tariq, Muhammad Asim, Farrukh Aslam Khan, Thar Baker, Umair Khalid, Abdelouahid Derhab:
A Blockchain-Based Multi-Mobile Code-Driven Trust Mechanism for Detecting Internal Attacks in Internet of Things. Sensors 21(1): 23 (2021) - [c39]Noshina Tariq, Farrukh Aslam Khan, Muhammad Asim:
Security Challenges and Requirements for Smart Internet of Things Applications: A Comprehensive Analysis. FNC/MobiSPC 2021: 425-430 - 2020
- [j46]Mohamed Belaoued, Abdelouahid Derhab, Smaine Mazouzi, Farrukh Aslam Khan:
MACoMal: A Multi-Agent Based Collaborative Mechanism for Anti-Malware Assistance. IEEE Access 8: 14329-14343 (2020) - [j45]Abdelouahid Derhab, Mohamed Belaoued, Mohamed Guerroumi, Farrukh Aslam Khan:
Two-Factor Mutual Authentication Offloading for Mobile Cloud Computing. IEEE Access 8: 28956-28969 (2020) - [j44]Ghulam Hafeez, Khurram Saleem Alimgeer, Zahid Wadud, Imran Khan, Muhammad Usman, Abdul Baseer Qazi, Farrukh Aslam Khan:
An Innovative Optimization Strategy for Efficient Energy Management With Day-Ahead Demand Response Signal and Energy Consumption Forecasting in Smart Grid Using Artificial Neural Network. IEEE Access 8: 84415-84433 (2020) - [j43]Ghulam Hafeez, Khurram Saleem Alimgeer, Abdul Baseer Qazi, Imran Khan, Muhammad Usman, Farrukh Aslam Khan, Zahid Wadud:
A Hybrid Approach for Energy Consumption Forecasting With a New Feature Engineering and Optimization Framework in Smart Grid. IEEE Access 8: 96210-96226 (2020) - [j42]Muhammad Ismail, Mazhar Islam, Ibrar Ahmad, Farrukh Aslam Khan, Abdul Baseer Qazi, Zawar H. Khan, Zahid Wadud, Mabrook Al-Rakhami:
Reliable Path Selection and Opportunistic Routing Protocol for Underwater Wireless Sensor Networks. IEEE Access 8: 100346-100364 (2020) - [j41]Zeshan Aslam Khan, Syed Zubair, Naveed Ishtiaq Chaudhary, Muhammad Asif Zahoor Raja, Farrukh Aslam Khan, Nebojsa Dedovic:
Design of normalized fractional SGD computing paradigm for recommender systems. Neural Comput. Appl. 32(14): 10245-10262 (2020) - [j40]Abdelouahid Derhab, Abdelghani Bouras, Mohamed Belaoued, Leandros Maglaras, Farrukh Aslam Khan:
Two-Hop Monitoring Mechanism Based on Relaxed Flow Conservation Constraints against Selective Routing Attacks in Wireless Sensor Networks. Sensors 20(21): 6106 (2020) - [j39]Muhammad Imran, Muhammad Hanif Durad, Farrukh Aslam Khan, Haider Abbas:
DAISY: A Detection and Mitigation System Against Denial-of-Service Attacks in Software-Defined Networks. IEEE Syst. J. 14(2): 1933-1944 (2020) - [j38]Zaineb Dar, Adnan Ahmad, Farrukh Aslam Khan, Furkh Zeshan, Razi Iqbal, Hafiz Husnain Raza Sherazi, Ali Kashif Bashir:
A context-aware encryption protocol suite for edge computing-based IoT devices. J. Supercomput. 76(4): 2548-2567 (2020) - [j37]Abdelouahid Derhab, Arwa Aldweesh, Ahmed Z. Emam, Farrukh Aslam Khan:
Intrusion Detection System for Internet of Things Based on Temporal Convolution Neural Network and Efficient Feature Engineering. Wirel. Commun. Mob. Comput. 2020: 6689134:1-6689134:16 (2020) - [j36]Wilayat Khan, Muhammad Kamran, Syed Rameez Naqvi, Farrukh Aslam Khan, Ahmed S. Alghamdi, Eesa Alsolami:
Formal Verification of Hardware Components in Critical Systems. Wirel. Commun. Mob. Comput. 2020: 7346763:1-7346763:15 (2020) - [c38]Noshina Tariq, Ayesha Qamar, Muhammad Asim, Farrukh Aslam Khan:
Blockchain and Smart Healthcare Security: A Survey. FNC/MobiSPC 2020: 615-620
2010 – 2019
- 2019
- [j35]Wilayat Khan, Muhammad Kamran, Aakash Ahmad, Farrukh Aslam Khan, Abdelouahid Derhab:
Formal Analysis of Language-Based Android Security Using Theorem Proving Approach. IEEE Access 7: 16550-16560 (2019) - [j34]Farrukh Aslam Khan, Abdu Gumaei, Abdelouahid Derhab, Amir Hussain:
TSDL: A Two-Stage Deep Learning Model for Efficient Network Intrusion Detection. IEEE Access 7: 30373-30385 (2019) - [j33]Zahid Wadud, Muhammad Ismail, Abdul Baseer Qazi, Farrukh Aslam Khan, Abdelouahid Derhab, Ibrar Ahmad, Arbab Masood Ahmad:
An Energy Balanced Efficient and Reliable Routing Protocol for Underwater Wireless Sensor Networks. IEEE Access 7: 175980-175999 (2019) - [j32]Kamran Siddique, Zahid Akhtar, Farrukh Aslam Khan, Yangwoo Kim:
KDD Cup 99 Data Sets: A Perspective on the Role of Data Sets in Network Intrusion Detection Research. Computer 52(2): 41-51 (2019) - [j31]Muhammad Imran, Muhammad Hanif Durad, Farrukh Aslam Khan, Abdelouahid Derhab:
Toward an optimal solution against Denial of Service attacks in Software Defined Networks. Future Gener. Comput. Syst. 92: 444-453 (2019) - [j30]Muhammad Tariq, Hammad Majeed, Mirza Omer Beg, Farrukh Aslam Khan, Abdelouahid Derhab:
Accurate detection of sitting posture activities in a secure IoT based assisted living environment. Future Gener. Comput. Syst. 92: 745-757 (2019) - [j29]Muhammad Imran, Muhammad Hanif Durad, Farrukh Aslam Khan, Abdelouahid Derhab:
Reducing the effects of DoS attacks in software defined networks using parallel flow installation. Hum. centric Comput. Inf. Sci. 9: 16 (2019) - [j28]Mohamed Belaoued, Abdelaziz Boukellal, Mohamed Amir Koalal, Abdelouahid Derhab, Smaine Mazouzi, Farrukh Aslam Khan:
Combined dynamic multi-feature and rule-based behavior for accurate malware detection. Int. J. Distributed Sens. Networks 15(11) (2019) - [j27]Abdelouahid Derhab, Mohamed Guerroumi, Abdu Gumaei, Leandros A. Maglaras, Mohamed Amine Ferrag, Mithun Mukherjee, Farrukh Aslam Khan:
Blockchain and Random Subspace Learning-Based IDS for SDN-Enabled Industrial IoT Security. Sensors 19(14): 3119 (2019) - [j26]Zahid Wadud, Khadem Ullah, Abdul Baseer Qazi, Sadeeq Jan, Farrukh Aslam Khan, Nasru Minallah:
An Efficient Routing Protocol Based on Stretched Holding Time Difference for Underwater Wireless Sensor Networks. Sensors 19(24): 5557 (2019) - [j25]Farrukh Aslam Khan, Ashfaq Hussain Farooqi, Abdelouahid Derhab:
A comprehensive security analysis of LEACH++ clustering protocol for wireless sensor networks. J. Supercomput. 75(4): 2221-2242 (2019) - [c37]Farrukh Aslam Khan, Abdu Gumaei:
A Comparative Study of Machine Learning Classifiers for Network Intrusion Detection. ICAIS (2) 2019: 75-86 - [c36]Haider Abbas, Farrukh Aslam Khan, Kashif Kifayat, Asif Masood, Imran Rashid, Fawad Khan:
Security Safety and Trust Management (SSTM' 19). WETICE 2019: 196-197 - 2018
- [j24]Arif Jamal Malik, Farrukh Aslam Khan:
A hybrid technique using binary particle swarm optimization and decision tree pruning for network intrusion detection. Clust. Comput. 21(1): 667-680 (2018) - [j23]Afsheen Ahmed, Rabia Latif, Seemab Latif, Haider Abbas, Farrukh Aslam Khan:
Malicious insiders attack in IoT based Multi-Cloud e-Healthcare environment: A Systematic Literature Review. Multim. Tools Appl. 77(17): 21947-21965 (2018) - [j22]Farrukh Aslam Khan, Wang-Cheol Song, Khi-Jung Ahn:
Performance Analysis of Location-Aware Grid-Based Hierarchical Routing Protocol for Mobile Ad Hoc Networks. Wirel. Commun. Mob. Comput. 2018: 1583205:1-1583205:10 (2018) - [c35]Naeem Amjad, Hammad Afzal, Muhammad Faisal Amjad, Farrukh Aslam Khan:
A Multi-Classifier Framework for Open Source Malware Forensics. WETICE 2018: 106-111 - 2017
- [j21]Farrukh Aslam Khan, Nur Al Hasan Haldar, Aftab Ali, Mohsin Iftikhar, Tanveer A. Zia, Albert Y. Zomaya:
A Continuous Change Detection Mechanism to Identify Anomalies in ECG Signals for WBAN-Based Healthcare Environments. IEEE Access 5: 13531-13544 (2017) - [j20]Ashfaq Hussain Farooqi, Farrukh Aslam Khan:
Securing wireless sensor networks for improved performance in cloud-based environments. Ann. des Télécommunications 72(5-6): 265-282 (2017) - [j19]Farrukh Aslam Khan, Muhammad Imran, Haider Abbas, Muhammad Hanif Durad:
A detection and prevention system against collaborative attacks in Mobile Ad hoc Networks. Future Gener. Comput. Syst. 68: 416-427 (2017) - [j18]Nur Al Hasan Haldar, Farrukh Aslam Khan, Aftab Ali, Haider Abbas:
Arrhythmia classification using Mahalanobis distance based improved Fuzzy C-Means clustering for mobile health monitoring systems. Neurocomputing 220: 221-235 (2017) - [j17]Farrukh Aslam Khan, Umar Manzoor, Azhar Khan, Aftab Ali, Haider Abbas, Maruf Pasha:
Peer-to-Peer File Sharing Framework for Smartphones: Deployment and Evaluation on Android. J. Inf. Sci. Eng. 33(6): 1417-1432 (2017) - [c34]Gururaj Ramachandra, Mohsin Iftikhar, Farrukh Aslam Khan:
A Comprehensive Survey on Security in Cloud Computing. FNC/MobiSPC 2017: 465-472 - [c33]Haider Abbas, Eugenio Orlandi, Farrukh Aslam Khan, Oliver Popov, Asif Masood:
Security, Safety and Trust Management (SSTM '17). WETICE 2017: 242-243 - 2016
- [j16]Haider Abbas, Muhammad Yasin, Fahad Ahmed, Anam Sajid, Farrukh Aslam Khan, Rana Aamir Raza Ashfaq, Nur Al Hasan Haldar:
Forensic artifacts modeling for social media client applications to enhance investigatory learning mechanisms. J. Intell. Fuzzy Syst. 31(5): 2645-2658 (2016) - [j15]Haider Abbas, Moeen Qaemi Mahmoodzadeh, Farrukh Aslam Khan, Maruf Pasha:
Identifying an OpenID anti-phishing scheme for cyberspace. Secur. Commun. Networks 9(6): 481-491 (2016) - 2015
- [j14]Waleed Halboob, Haider Abbas, Muhammad Khurram Khan, Farrukh Aslam Khan, Maruf Pasha:
A framework to address inconstant user requirements in cloud SLAs management. Clust. Comput. 18(1): 123-133 (2015) - [j13]Ramsha Rizwan, Farrukh Aslam Khan, Haider Abbas, Sajjad Hussain Chauhdary:
Anomaly Detection in Wireless Sensor Networks Using Immune-Based Bioinspired Mechanism. Int. J. Distributed Sens. Networks 11: 684952:1-684952:10 (2015) - [j12]Aftab Ali, Farrukh Aslam Khan:
Key Agreement Schemes in Wireless Body Area Networks: Taxonomy and State-of-the-Art. J. Medical Syst. 39(10): 115:1-115:14 (2015) - [j11]Arif Jamal Malik, Waseem Shahzad, Farrukh Aslam Khan:
Network intrusion detection using hybrid binary PSO and random forests algorithm. Secur. Commun. Networks 8(16): 2646-2660 (2015) - [c32]Muhammad Imran, Farrukh Aslam Khan, Tauseef Jamal, Muhammad Hanif Durad:
Analysis of Detection Features for Wormhole Attacks in MANETs. FNC/MobiSPC 2015: 384-390 - [c31]Aftab Ali, Nur Al Hasan Haldar, Farrukh Aslam Khan, Sana Ullah:
ECG Arrhythmia Classification Using Mahalanobis-Taguchi System in a Body Area Network Environment. GLOBECOM 2015: 1-7 - [c30]Muhammad Shafique Gondal, Arif Jamal Malik, Farrukh Aslam Khan:
Network Intrusion Detection Using Diversity-Based Centroid Mechanism. ITNG 2015: 224-228 - 2014
- [j10]Sana Ullah, Joel J. P. C. Rodrigues, Farrukh Aslam Khan, Christos V. Verikoukis, Zuqing Zhu:
Protocols and Architectures for Next-Generation Wireless Sensor Networks. Int. J. Distributed Sens. Networks 10 (2014) - [j9]Aftab Ali, Farrukh Aslam Khan:
A Broadcast-Based Key Agreement Scheme Using Set Reconciliation for Wireless Body Area Networks. J. Medical Syst. 38(5): 33 (2014) - [c29]Muhammad Imran, Farrukh Aslam Khan, Haider Abbas, Mohsin Iftikhar:
Detection and Prevention of Black Hole Attacks in Mobile Ad hoc Networks. ADHOC-NOW Workshops 2014: 111-122 - [c28]Farrukh Aslam Khan, Aftab Ali, Haider Abbas, Nur Al Hasan Haldar:
A Cloud-based Healthcare Framework for Security and Patients' Data Privacy Using Wireless Body Area Networks. FNC/MobiSPC 2014: 511-517 - [c27]Natasha Arjumand Shoaib Mirza, Haider Abbas, Farrukh Aslam Khan, Jalal Al-Muhtadi:
Anticipating Advanced Persistent Threat (APT) countermeasures using collaborative security mechanisms. ISBAST 2014: 129-132 - [c26]Arif Jamal Malik, Farrukh Aslam Khan:
Particle Swarm Optimization with non-linear velocity. SMC 2014: 602-607 - 2013
- [j8]Hamid Ali, Farrukh Aslam Khan:
Attributed multi-objective comprehensive learning particle swarm optimization for optimal security of networks. Appl. Soft Comput. 13(9): 3903-3921 (2013) - [j7]Aftab Ali, Farrukh Aslam Khan:
Energy-efficient cluster-based security mechanism for intra-WBAN and inter-WBAN communications for healthcare applications. EURASIP J. Wirel. Commun. Netw. 2013: 216 (2013) - [j6]Sarah Irum, Aftab Ali, Farrukh Aslam Khan, Haider Abbas:
A Hybrid Security Mechanism for Intra-WBAN and Inter-WBAN Communications. Int. J. Distributed Sens. Networks 9 (2013) - [j5]Aftab Ali, Sarah Irum, Firdous Kausar, Farrukh Aslam Khan:
A cluster-based key agreement scheme using keyed hashing for Body Area Networks. Multim. Tools Appl. 66(2): 201-214 (2013) - [j4]Ashfaq Hussain Farooqi, Farrukh Aslam Khan, Jin Wang, Sungyoung Lee:
A novel intrusion detection framework for wireless sensor networks. Pers. Ubiquitous Comput. 17(5): 907-919 (2013) - [j3]Sajid Hussain, Firdous Kausar, Laurence T. Yang, Farrukh Aslam Khan, Jong Hyuk Park:
Advances in communication networks for pervasive and ubiquitous applications. J. Supercomput. 64(2): 251-255 (2013) - [c25]Hamid Ali, Farrukh Aslam Khan:
Group Counseling Optimization for multi-objective functions. IEEE Congress on Evolutionary Computation 2013: 705-712 - [c24]Hamid Ali, Farrukh Aslam Khan:
Welfare State Optimization. IEEE Congress on Evolutionary Computation 2013: 3315-3322 - [c23]Mansoor-ul-haque, Farrukh Aslam Khan, Mohsin Iftikhar:
Optimized Energy-Efficient Iterative Distributed Localization for Wireless Sensor Networks. SMC 2013: 1407-1412 - [c22]Arif Jamal Malik, Farrukh Aslam Khan:
A Hybrid Technique Using Multi-objective Particle Swarm Optimization and Random Forests for PROBE Attacks Detection in a Network. SMC 2013: 2473-2478 - 2012
- [j2]Hamid Ali, Waseem Shahzad, Farrukh Aslam Khan:
Energy-efficient clustering in mobile ad-hoc networks using multi-objective particle swarm optimization. Appl. Soft Comput. 12(7): 1913-1928 (2012) - [j1]Ashfaq Hussain Farooqi, Farrukh Aslam Khan:
A survey of Intrusion Detection Systems for Wireless Sensor Networks. Int. J. Ad Hoc Ubiquitous Comput. 9(2): 69-83 (2012) - [c21]Hamid Ali, Farrukh Aslam Khan:
Comprehensive Parent Selection-based Genetic Algorithm. SGAI Conf. 2012: 123-135 - [c20]Humaira Ehsan, Farrukh Aslam Khan:
Malicious AODV: Implementation and Analysis of Routing Attacks in MANETs. TrustCom 2012: 1181-1187 - 2011
- [c19]Arif Jamal Malik, Waseem Shahzad, Farrukh Aslam Khan:
Binary PSO and random forests algorithm for PROBE attacks detection in a network. IEEE Congress on Evolutionary Computation 2011: 662-668 - [c18]Ashfaq Hussain Farooqi, Farrukh Aslam Khan, Jin Wang, Sungyoung Lee:
Security requirements for a cyber physical community system: a case study. ISABEL 2011: 166:1-166:5 - [c17]Salabat Khan, Mohsin Bilal, Muhammad Sharif, Farrukh Aslam Khan:
A Solution to Bipartite Drawing Problem Using Genetic Algorithm. ICSI (1) 2011: 530-538 - [c16]Humaira Ehsan, Farrukh Aslam Khan:
Query Processing Systems for Wireless Sensor Networks. UCMA (1) 2011: 273-282 - [c15]Afshan Ahmed, Jawad Hassan, Mata ur Rehman, Farrukh Aslam Khan:
Binding Update Schemes for Inter-domain Mobility Management in Hierarchical Mobile IPv6: A Survey. UCMA (2) 2011: 411-420 - 2010
- [c14]Raees Khan, Farrukh Aslam Khan:
SRCP: Sensor Reliability and Congestion Control Protocol. CIT 2010: 1542-1548 - [c13]Safdar Ali, Waseem Shahzad, Farrukh Aslam Khan:
Remote-to-Local attacks detection using incremental genetic algorithm. ICITST 2010: 1-6 - [c12]Aftab Ali, Farrukh Aslam Khan:
An Improved EKG-Based Key Agreement Scheme for Body Area Networks. ISA 2010: 298-308 - [c11]Syed Ali Abbas Hamdani, Sarah Shafiq, Farrukh Aslam Khan:
Cryptanalysis of Four-Rounded DES Using Binary Artificial Immune System. ICSI (1) 2010: 338-346 - [c10]Farrukh Aslam Khan, Khi-Jung Ahn, Wang-Cheol Song:
A New Location-Aware Hierarchical Routing Protocol for MANETs. UIC 2010: 519-533
2000 – 2009
- 2009
- [c9]Ashfaq Hussain Farooqi, Farrukh Aslam Khan:
Intrusion Detection Systems for Wireless Sensor Networks: A Survey. FGIT-FGCN 2009: 234-241 - [c8]Waseem Shahzad, Farrukh Aslam Khan, Abdul Basit Siddiqui:
Clustering in Mobile Ad Hoc Networks Using Comprehensive Learning Particle Swarm Optimization (CLPSO). FGIT-FGCN 2009: 342-349 - [c7]Waseem Shahzad, Abdul Basit Siddiqui, Farrukh Aslam Khan:
Cryptanalysis of four-rounded DES using binary particle swarm optimization. GECCO 2009: 1757-1758 - [c6]Waseem Shahzad, Abdul Basit Siddiqui, Farrukh Aslam Khan:
Cryptanalysis of four-rounded DES using binary particleswarm optimization. GECCO (Companion) 2009: 2161-2166 - 2007
- [c5]Farrukh Aslam Khan, Khi-Jung Ahn, Wang-Cheol Song:
Geocasting in Wireless Ad Hoc Networks with Guaranteed Delivery. ICOIN 2007: 213-222 - 2006
- [c4]Farrukh Aslam Khan, Umer Zeeshan Ijaz, Kyung Youn Kim, Min-Jae Kang, Wang-Cheol Song:
Policy-Based Management in Ad hoc Networks Using Geographic Routing. ICOIN 2006: 237-246 - [c3]Min-Jae Kang, Ho-Chan Kim, Farrukh Aslam Khan, Wang-Cheol Song, Sang Joon Lee:
Neural Networks for Optimization Problem with Nonlinear Constraints. ICONIP (2) 2006: 1014-1021 - [c2]Min-Jae Kang, Ho-Chan Kim, Farrukh Aslam Khan, Wang-Cheol Song, Jacek M. Zurada:
Convergence Analysis of Continuous-Time Neural Networks. ISNN (1) 2006: 100-108 - [c1]Farrukh Aslam Khan, Momin Uppal, Wang-Cheol Song, Min-Jae Kang, Anwar M. Mirza:
FPGA Implementation of a Neural Network for Character Recognition. ISNN (2) 2006: 1357-1365
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-15 20:49 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint