Extracellular export of sphingosine kinase-1a contributes to the vascular S1P gradient K Venkataraman, S Thangada, J Michaud, ML Oo, Y Ai, YM Lee, M Wu, ... Biochemical Journal 397 (3), 461-471, 2006 | 263 | 2006 |
Understanding security requirements and challenges in Internet of Things (IoT): A review S Hameed, FI Khan, B Hameed Journal of Computer Networks and Communications 2019 (1), 9629381, 2019 | 255 | 2019 |
Hybrid intrusion detection system for wireless sensor networks TH Hai, F Khan, EN Huh Computational Science and Its Applications–ICCSA 2007: International …, 2007 | 63 | 2007 |
Wormhole attack prevention mechanism for RPL based LLN network FI Khan, T Shon, T Lee, K Kim 2013 Fifth international conference on ubiquitous and future networks (ICUFN …, 2013 | 50 | 2013 |
Understanding security requirements and challenges in internet of things (IoTs): A review FI Khan, S Hameed arXiv preprint arXiv:1808.10529, 2018 | 28 | 2018 |
Empirical study of software development life cycle and its various models M Khan, S Shadab, F Khan International Journal of Software Engineering (IJSE) 8 (2), 16-26, 2020 | 19 | 2020 |
Software defined security service provisioning framework for internet of things FI Khan, S Hameed arXiv preprint arXiv:1711.11133, 2017 | 17 | 2017 |
Fog computing for ubiquitous transportation applications—A smart parking case study M Muzakkir Hussain, F Khan, MS Alam, MM Sufyan Beg Engineering Vibration, Communication and Information Processing: ICoEVCI …, 2019 | 14 | 2019 |
Merkle tree‐based wormhole attack avoidance mechanism in low power and lossy network based networks F Idris Khan, T Shon, T Lee, KH Kim Security and Communication Networks 7 (8), 1292-1309, 2014 | 14 | 2014 |
MUQAMI: A locally distributed key management scheme for clustered sensor networks SMKR Raazi, AM Khan, FI Khan, SY Lee, YJ Song, YK Lee Trust Management: Proceedings of IFIPTM 2007: Joint iTrust and PST …, 2007 | 11 | 2007 |
A comparison study of available sofware security ontologies M Alenezi, HA Basit, FI Khan, MA Beg Proceedings of the 24th International Conference on Evaluation and …, 2020 | 9 | 2020 |
Security assessment of four open source software systems FI Khan, Y Javed, M Alenezi Indonesian Journal of Electrical Engineering and Computer Science ( IJEECS …, 2019 | 8 | 2019 |
An adaptive resource management for mobile terminals on vertical handoff FI Khan, EN Huh annals of telecommunications-annales des télécommunications 63, 435-447, 2008 | 5 | 2008 |
Securing Software Defined Network Against Rogue Controllers FI Khan, A Sohail, MS Saleem, HB Javaid, MF Taimuri, S Hameed | 4 | 2016 |
An efficient re-keying scheme for cluster based wireless sensor networks FI Khan, H Jameel, SMK Raazi, AM Khan, EN Huh Computational Science and Its Applications–ICCSA 2007: International …, 2007 | 4 | 2007 |
트위터와 신문의 이슈 속성 비교 연구: MBC 파업을 중심으로 이미나, 박천일, 문지영 인터넷정보학회논문지 15 (4), 43-55, 2014 | 3 | 2014 |
Q-learning based adaptive subgraph generation algorithm for graph routing in ISA 100.11 a FI Khan, KH Kim 2013 International Conference on ICT Convergence (ICTC), 1099-1101, 2013 | 3 | 2013 |
Privacy assuring protocol using simple cryptographic operations for smart metering WA Baig, FI Khan, KH Kim, SW Yoo International Journal of Multimedia and Ubiquitous Engineering 7 (2), 315-322, 2012 | 3 | 2012 |
Solving fuzzy fractional wave equation by the variational iteration method in fluid mechanics F KHAN, KP GHADLE Journal of the Korean Society for Industrial and Applied Mathematics 23 (4 …, 2019 | 2 | 2019 |
Context-Sensitive Case-Based Software Security Management System M Alenezi, FI Khan 3rd Computational Methods in Systems and Software 1046, 135 - 141, 2019 | 2 | 2019 |