关注
Khaled Khan
标题
引用次数
年份
How do Gender and Age Similarities with a Potential Social Engineer Influence One's Trust and Willingness to Take Security Risks?
I Abuelezz, M Barhmagi, S Al-Shakhsi, A Yankouskaya, A Nhlabatsi, ...
2024
Do Cialdini’s Persuasion Principles Still Influence Trust and Risk-Taking When Social Engineering is Knowingly Possible?
A Mollazehi, I Abuelezz, M Barhamgi, KM Khan, R Ali
International Conference on Research Challenges in Information Science, 273-288, 2024
2024
A machine learning-based optimization approach for pre-copy live virtual machine migration
RM Haris, KM Khan, A Nhlabatsi, M Barhamgi
Cluster Computing 27 (2), 1293-1312, 2024
42024
When Deciding to Trust a Potential Social Engineer, does their Age, Gender, Ethnic Similarity, and Appearance Formality Matter?
I Abuelezz, M Barhamgi, A Nhlabatsi, KM Khan, R Ali
Gender, Ethnic Similarity, and Appearance Formality Matter, 2024
2024
Interactive Graphical Access Control Tools
R Fernandez, P Cheng, B Smith, T Fenton, Y Boraey, A Nhlabatsi, K Khan, ...
2023 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC …, 2023
2023
A Machine Learning Based Framework for Real-Time Detection and Mitigation of Sensor False Data Injection Cyber-Physical Attacks in Industrial Control Systems
M Elnour, M Noorizadeh, M Shakerpour, N Meskin, K Khan, R Jain
IEEE Access, 2023
52023
Quantifying satisfaction of security features of cloud software systems
A Nhlabatsi, K Khan, J Hong, DS Kim, R Fernandez, N Fetais
US Patent App. 17/993,073, 2023
2023
Effective collaboration in the management of access control policies: A survey of tools
R Fernandez, PCH Cheng, A Nhlabatsi, KM Khan, N Fetais
IEEE Access 11, 13929-13947, 2023
22023
Live migration of virtual machine memory content in networked systems
RM Haris, KM Khan, A Nhlabatsi
Computer Networks 209, 108898, 2022
132022
Methods and systems for monitoring network security
KM Khan, DS Kim, JB Hong, SE Yusuf, M Ge, HK Kim, P Kim, A Nhlabatsi, ...
US Patent 11,228,616, 2022
132022
TRUST XAI: A Novel Model for Explainable AI with An Example Using IIoT Security
M Zolanvari, Z Yang, K Khan, R Jain, N Meskin
IEEE Internet of Things Journal, 2021
12021
Trust xai: Model-agnostic explanations for ai with a case study on iiot security
M Zolanvari, Z Yang, K Khan, R Jain, N Meskin
IEEE internet of things journal 10 (4), 2967-2978, 2021
682021
Threat-specific security risk evaluation for networked systems
A Nhlabatsi, J Hong, DS Kim, R Fernandez, A Hussein, N Fetais, ...
US Patent 11,146,583, 2021
192021
Flow‐based intrusion detection algorithm for supervisory control and data acquisition systems: A real‐time approach
MA Teixeira, M Zolanvari, KM Khan, R Jain, N Meskin
IET Cyber‐Physical Systems: Theory & Applications 6 (3), 178-191, 2021
122021
Understanding the impact of emotions on the quality of software artifacts
KM Khan, M Saleh
IEEE Access 9, 110194-110208, 2021
42021
HVAC system attack detection dataset
M Elnour, N Meskin, K Khan, R Jain
Data in Brief 37, 107166, 2021
82021
Quantifying satisfaction of security requirements of cloud software systems
AM Nhlabatsi, KM Khan, JB Hong, DSD Kim, R Fernandez, N Fetais
IEEE Transactions on Cloud Computing, 2021
72021
Application of data-driven attack detection framework for secure operation in smart buildings
M Elnour, N Meskin, K Khan, R Jain
Sustainable Cities and Society 69, 102816, 2021
452021
Highlight on cryptocurrencies mining with CPUs and GPUs and their benefits based on their characteristics
MK Alkaeed, Z Alamro, MS Al-Ali, HA Al-Mohammed, KM Khan
2020 IEEE 10th International Conference on System Engineering and Technology …, 2020
72020
Distributed framework via block-chain smart contracts for smart grid systems against cyber-attacks
M Alkaeed, MM Soliman, KM Khan, TM Elfouly
2020 11th IEEE Control and System Graduate Research Colloquium (ICSGRC), 100-105, 2020
52020
系统目前无法执行此操作,请稍后再试。
文章 1–20