Follow
Faraz Idris Khan
Title
Cited by
Cited by
Year
Extracellular export of sphingosine kinase-1a contributes to the vascular S1P gradient
K Venkataraman, S Thangada, J Michaud, ML Oo, Y Ai, YM Lee, M Wu, ...
Biochemical Journal 397 (3), 461-471, 2006
2582006
Understanding security requirements and challenges in Internet of Things (IoT): A review
S Hameed, FI Khan, B Hameed
Journal of Computer Networks and Communications 2019, 1-14, 2019
2242019
Hybrid intrusion detection system for wireless sensor networks
TH Hai, F Khan, EN Huh
Computational Science and Its Applications–ICCSA 2007: International …, 2007
622007
Wormhole attack prevention mechanism for RPL based LLN network
FI Khan, T Shon, T Lee, K Kim
2013 Fifth International Conference on Ubiquitous and Future Networks (ICUFN …, 2013
502013
Understanding security requirements and challenges in internet of things (IoTs): A review
FI Khan, S Hameed
arXiv preprint arXiv:1808.10529, 2018
292018
Software defined security service provisioning framework for internet of things
FI Khan, S Hameed
arXiv preprint arXiv:1711.11133, 2017
172017
Empirical study of software development life cycle and its various models
M Khan, S Shadab, F Khan
International Journal of Software Engineering (IJSE) 8 (2), 16-26, 2020
142020
Fog computing for ubiquitous transportation applications—A smart parking case study
M Muzakkir Hussain, F Khan, MS Alam, MM Sufyan Beg
Engineering Vibration, Communication and Information Processing: ICoEVCI …, 2019
142019
Merkle tree‐based wormhole attack avoidance mechanism in low power and lossy network based networks
F Idris Khan, T Shon, T Lee, KH Kim
Security and Communication Networks 7 (8), 1292-1309, 2014
142014
MUQAMI: A locally distributed key management scheme for clustered sensor networks
SMKR Raazi, AM Khan, FI Khan, SY Lee, YJ Song, YK Lee
Trust Management: Proceedings of IFIPTM 2007: Joint iTrust and PST …, 2007
112007
A comparison study of available sofware security ontologies
M Alenezi, HA Basit, FI Khan, MA Beg
Proceedings of the 24th International Conference on Evaluation and …, 2020
72020
Security assessment of four open source software systems
FI Khan, Y Javed, M Alenezi
Indonesian Journal of Electrical Engineering and Computer Science ( IJEECS …, 2019
62019
An adaptive resource management for mobile terminals on vertical handoff
FI Khan, EN Huh
annals of telecommunications-annales des télécommunications 63, 435-447, 2008
62008
An efficient re-keying scheme for cluster based wireless sensor networks
FI Khan, H Jameel, SMK Raazi, AM Khan, EN Huh
Computational Science and Its Applications–ICCSA 2007: International …, 2007
42007
Securing Software Defined Network Against Rogue Controllers
FI Khan, A Sohail, MS Saleem, HB Javaid, MF Taimuri, S Hameed
32016
트위터와 신문의 이슈 속성 비교 연구: MBC 파업을 중심으로
이미나, 박천일, 문지영
인터넷정보학회논문지 15 (4), 43-55, 2014
32014
Privacy assuring protocol using simple cryptographic operations for smart metering
WA Baig, FI Khan, KH Kim, SW Yoo
International Journal of Multimedia and Ubiquitous Engineering 7 (2), 315-322, 2012
32012
Context-Sensitive Case-Based Software Security Management System
M Alenezi, FI Khan
3rd Computational Methods in Systems and Software 1046, 135 - 141, 2019
22019
Q-learning based adaptive subgraph generation algorithm for graph routing in ISA 100.11 a
FI Khan, KH Kim
2013 International Conference on ICT Convergence (ICTC), 1099-1101, 2013
22013
Adaptive vertical handoff management architecture
FI Khan, EN Huh
Computational Science–ICCS 2007: 7th International Conference, Beijing …, 2007
22007
The system can't perform the operation now. Try again later.
Articles 1–20