A Novel Two-Stage Deep Learning Model for Efficient Network Intrusion Detection FA Khan, A Gumaei, A Derhab, A Hussain IEEE Access, 2019 | 348 | 2019 |
A comprehensive survey on security in cloud computing G Ramachandra, M Iftikhar, FA Khan Procedia Computer Science 110, 465-472, 2017 | 239 | 2017 |
Securing critical infrastructures: deep-learning-based threat detection in IIoT K Yu, L Tan, S Mumtaz, S Al-Rubaye, A Al-Dulaimi, AK Bashir, FA Khan IEEE Communications Magazine 59 (10), 76-82, 2021 | 215 | 2021 |
Energy-efficient clustering in mobile ad-hoc networks using multi-objective particle swarm optimization H Ali, W Shahzad, FA Khan Applied Soft Computing 12 (7), 1913-1928, 2012 | 190 | 2012 |
Blockchain and smart healthcare security: a survey N Tariq, A Qamar, M Asim, FA Khan Procedia Computer Science 175, 615-620, 2020 | 153 | 2020 |
KDD cup 99 data sets: A perspective on the role of data sets in network intrusion detection research K Siddique, Z Akhtar, FA Khan, Y Kim Computer 52 (2), 41-51, 2019 | 148 | 2019 |
Blockchain and random subspace learning-based IDS for SDN-enabled industrial IoT security A Derhab, M Guerroumi, A Gumaei, L Maglaras, MA Ferrag, M Mukherjee, ... Sensors 19 (14), 3119, 2019 | 145 | 2019 |
Intrusion detection systems for wireless sensor networks: A survey AH Farooqi, FA Khan International Conference on Future Generation Communication and Networking …, 2009 | 120 | 2009 |
An innovative optimization strategy for efficient energy management with day-ahead demand response signal and energy consumption forecasting in smart grid using artificial … G Hafeez, KS Alimgeer, Z Wadud, I Khan, M Usman, AB Qazi, FA Khan IEEe Access 8, 84415-84433, 2020 | 109 | 2020 |
Intrusion detection system for internet of things based on temporal convolution neural network and efficient feature engineering A Derhab, A Aldweesh, AZ Emam, FA Khan Wireless Communications and Mobile Computing 2020 (1), 6689134, 2020 | 106 | 2020 |
Malicious AODV: implementation and analysis of routing attacks in MANETs H Ehsan, FA Khan 2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012 | 104 | 2012 |
A cloud-based healthcare framework for security and patients’ data privacy using wireless body area networks FA Khan, A Ali, H Abbas, NAH Haldar Procedia Computer Science 34, 511-517, 2014 | 99 | 2014 |
A hybrid technique using binary particle swarm optimization and decision tree pruning for network intrusion detection AJ Malik, FA Khan Cluster Computing 21, 667-680, 2018 | 98 | 2018 |
Arrhythmia classification using Mahalanobis distance based improved Fuzzy C-Means clustering for mobile health monitoring systems NAH Haldar, FA Khan, A Ali, H Abbas Neurocomputing 220, 221-235, 2017 | 83 | 2017 |
Malicious insiders attack in IoT based Multi-Cloud e-Healthcare environment: A Systematic Literature Review A Ahmed, R Latif, S Latif, H Abbas, FA Khan Multimedia Tools and Applications 77, 21947-21965, 2018 | 82 | 2018 |
Network intrusion detection using hybrid binary PSO and random forests algorithm AJ Malik, W Shahzad, FA Khan Security and Communication Networks 8 (16), 2646-2660, 2015 | 76 | 2015 |
Energy-efficient cluster-based security mechanism for intra-WBAN and inter-WBAN communications for healthcare applications A Ali, FA Khan EURASIP Journal on Wireless Communications and Networking 2013, 1-19, 2013 | 74 | 2013 |
A novel hybrid load forecasting framework with intelligent feature engineering and optimization algorithm in smart grid G Hafeez, I Khan, S Jan, IA Shah, FA Khan, A Derhab Applied Energy 299, 117178, 2021 | 73 | 2021 |
Toward an optimal solution against denial of service attacks in software defined networks M Imran, MH Durad, FA Khan, A Derhab Future Generation Computer Systems 92, 444-453, 2019 | 67 | 2019 |
Detection and prediction of diabetes using data mining: a comprehensive review FA Khan, K Zeb, M Al-Rakhami, A Derhab, SAC Bukhari IEEE Access 9, 43711-43735, 2021 | 64 | 2021 |