default search action
Muhammad Taimoor Khan 0001
Person information
- affiliation: University of Greenwich, UK
- affiliation: CSAIL, MIT, USA
- affiliation (former): University of Surrey, UK
- affiliation (former): Alpen-Adria University, Klagenfurt, Austria
- affiliation (former): Johannes Kepler University, Linz, Austria
Other persons with the same name
- Muhammad Taimoor Khan — disambiguation page
- Muhammad Taimoor Khan 0002 — Pakistan Institute of Engineering and Applied Sciences, Pakistan
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Sana Aurangzeb, Muhammad Aleem, Muhammad Taimoor Khan, Haris Anwar, Muhammad Shaoor Siddique:
Cybersecurity for autonomous vehicles against malware attacks in smart-cities. Clust. Comput. 27(3): 3363-3378 (2024) - 2023
- [c16]Zakaria Sawadogo, Muhammad Taimoor Khan, Jean Marie Dembele, Gervais Mendy, Samuel Ouya:
Towards a DeepMalOb Improvement in the Use of Formal Security Risk Analysis Methods. CloudTech 2023: 1-5 - [c15]Zakaria Sawadogo, Muhammad Taimoor Khan, George Loukas, Jean Marie Dembele, Georgia Sakellari, Gervais Mendy:
Towards Behavior-Based Analysis of Android Obfuscated Malware. ECSA (Tracks, Workshops and Doctoral Symposium) 2023: 151-165 - [c14]George E. Raptis, Muhammad Taimoor Khan, Kyriakos Stefanidis, Christos Koulamas, Dimitrios Serpanos:
Towards Run-Time Security Monitoring of Distributed Industrial Control Systems. ETFA 2023: 1-8 - 2022
- [c13]Muhammad Taimoor Khan:
Towards Practical and Formal Security Risk Analysis of IoT (Internet of Things) Applications. ETFA 2022: 1-4 - [c12]Ali Mohsin, Sana Aurangzeb, Muhammad Aleem, Muhammad Taimoor Khan:
On the Performance and Scalability of Simulators for Improving Security and Safety of Smart Cities. ETFA 2022: 1-8 - [c11]Muhammad Taimoor Khan:
Challenges in Modelling Applications for Safe and Resilient Digital Twins. ISC2 2022: 1-6 - 2021
- [j10]Muhammad Taimoor Khan, Ivana Tomic:
Securing Industrial Cyber-Physical Systems: A Run-Time Multilayer Monitoring. IEEE Trans. Ind. Informatics 17(9): 6251-6259 (2021) - [j9]Giovanni Liva, Muhammad Taimoor Khan, Martin Pinzger, Francesco Spegni, Luca Spalazzi:
Automatic Repair of Timestamp Comparisons. IEEE Trans. Software Eng. 47(11): 2369-2381 (2021) - [c10]Muhammad Taimoor Khan, Dimitrios Serpanos, Howard E. Shrobe:
Towards Scalable Security of Real-time Applications: A Formally Certified Approach. ETFA 2021: 1-4 - 2020
- [j8]Muhammad Taimoor Khan, Martin Pinzger, Dimitrios Serpanos, Howard E. Shrobe:
Runtime Protection of Real-time Critical Control Applications against Known Threats. IEEE Des. Test 37(6): 88-95 (2020) - [j7]Natalia Chaudhry, Muhammad Murtaza Yousaf, Muhammad Taimoor Khan:
Indexing of real time geospatial data by IoT enabled devices: Opportunities, challenges and design considerations. J. Ambient Intell. Smart Environ. 12(4): 281-312 (2020) - [j6]Natalia Chaudhry, Muhammad Murtaza Yousaf, Muhammad Taimoor Khan:
Security assessment of data management systems for cyber physical system applications. J. Softw. Evol. Process. 32(2) (2020) - [c9]Muhammad Taimoor Khan, Dimitrios Serpanos, Howard E. Shrobe, Muhammad Murtaza Yousuf:
Rigorous Machine Learning for Secure and Autonomous Cyber Physical Systems. ETFA 2020: 1815-1819
2010 – 2019
- 2019
- [j5]Muhammad Taimoor Khan, Howard E. Shrobe:
Security of Cyberphysical Systems: Chaining Induction and Deduction. Computer 52(7): 72-75 (2019) - [j4]Giovanni Liva, Muhammad Taimoor Khan, Martin Pinzger:
Semantics-driven extraction of timed automata from Java programs. Empir. Softw. Eng. 24(5): 3114-3150 (2019) - 2018
- [j3]Dimitrios N. Serpanos, Muhammad Taimoor Khan, Howard E. Shrobe:
Designing Safe and Secure Industrial Control Systems: A Tutorial Review. IEEE Des. Test 35(3): 73-88 (2018) - [j2]Muhammad Taimoor Khan, Dimitrios N. Serpanos, Howard E. Shrobe:
ARMET: Behavior-Based Secure and Resilient Industrial Control Systems. Proc. IEEE 106(1): 129-143 (2018) - [c8]Giovanni Liva, Muhammad Taimoor Khan, Francesco Spegni, Luca Spalazzi, Andreas Bollin, Martin Pinzger:
Modeling time in Java programs for automatic error detection. FormaliSE@ICSE 2018: 50-59 - [c7]Muhammad Taimoor Khan, Dimitrios Serpanos, Howard E. Shrobe:
Highly Assured Safety and Security of e-Health Applications. WiMob 2018: 137-144 - 2017
- [c6]Giovanni Liva, Muhammad Taimoor Khan, Martin Pinzger:
Extracting Timed Automata from Java Methods. SCAM 2017: 91-100 - 2016
- [c5]Muhammad Taimoor Khan, Dimitrios N. Serpanos, Howard E. Shrobe:
A rigorous and efficient run-time security monitor for real-time critical embedded system applications. WF-IoT 2016: 100-105 - [i6]Muhammad Taimoor Khan, Dimitrios N. Serpanos, Howard E. Shrobe:
Sound and Complete Runtime Security Monitor for Application Software. CoRR abs/1601.04263 (2016) - [i5]Dimitrios N. Serpanos, Howard E. Shrobe, Muhammad Taimoor Khan:
Behaviour-Based Security for Cyber-Physical Systems. ERCIM News 2016(107) (2016) - 2015
- [c4]Muhammad Taimoor Khan, Anastasios Fragopoulos, Dimitrios N. Serpanos, Howard E. Shrobe:
Abstract Data Machine: Data Classifier for Reliable Embedded Systems Software. WESS 2015: 8 - 2014
- [i4]Muhammad Taimoor Khan, Dimitrios N. Serpanos, Howard E. Shrobe:
On the Behavioural Formalization of the Cognitive Middleware AWDRAT. CoRR abs/1412.2328 (2014) - [i3]Muhammad Taimoor Khan, Dimitrios N. Serpanos, Howard E. Shrobe:
On the Formal Semantics of the Cognitive Middleware AWDRAT. CoRR abs/1412.3588 (2014) - 2013
- [j1]Muhammad Taimoor Khan, Wolfgang Schreiner:
A verification framework for minimaple programs. ACM Commun. Comput. Algebra 47(3/4): 98-99 (2013) - 2012
- [c3]Muhammad Taimoor Khan, Wolfgang Schreiner:
Towards the Formal Specification and Verification of Maple Programs. AISC/MKM/Calculemus 2012: 231-247 - [c2]Muhammad Taimoor Khan, Wolfgang Schreiner:
On Formal Specification of Maple Programs. AISC/MKM/Calculemus 2012: 443-447 - [c1]Muhammad Taimoor Khan:
On the Formal Semantics of MiniMaple and its Specification Language. FIT 2012: 169-174 - [i2]Muhammad Taimoor Khan, Wolfgang Schreiner:
On Formal Specification of Maple Programs. CoRR abs/1207.2291 (2012) - [i1]Muhammad Taimoor Khan, Wolfgang Schreiner:
Towards the Formal Specification and Verification of Maple Programs. CoRR abs/1207.2300 (2012)
Coauthor Index
aka: Dimitrios N. Serpanos
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-06 00:38 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint