default search action
Al-Sakib Khan Pathan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Books and Theses
- 2023
- [b1]Kutub Thakur, Al-Sakib Khan Pathan, Sadia Ismat:
Emerging ICT Technologies and Cybersecurity - From AI and ML to Other Futuristic Technologies. Springer 2023, ISBN 978-3-031-27764-1, pp. 1-269
Journal Articles
- 2024
- [j89]Shiwen Zhang, Biao Hu, Wei Liang, Kuan-Ching Li, Al-Sakib Khan Pathan:
A Trajectory Privacy-Preserving Scheme Based on Transition Matrix and Caching for IIoT. IEEE Internet Things J. 11(4): 5745-5756 (2024) - [j88]Mounya Smara, Al-Sakib Khan Pathan:
An Enhanced Mechanism for Fault Tolerance in Agricultural Wireless Sensor Networks. Network 4(2): 150-174 (2024) - [j87]Owais Nazir, Aruna Malik, Samayveer Singh, Al-Sakib Khan Pathan:
Multi speaker text-to-speech synthesis using generalized end-to-end loss function. Multim. Tools Appl. 83(24): 64205-64222 (2024) - [j86]Chahrazed Benrebbouh, Houssem Mansouri, Sarra Cherbal, Al-Sakib Khan Pathan:
Enhanced secure and efficient mutual authentication protocol in IoT-based energy internet using blockchain. Peer Peer Netw. Appl. 17(1): 68-88 (2024) - 2023
- [j85]A. F. M. Shahen Shah, Muhammet Ali Karabulut, A. F. M. Suaib Akhter, Nazifa Mustari, Al-Sakib Khan Pathan, Khaled M. Rabie, Thokozani Shongwe:
On the Vital Aspects and Characteristics of Cryptocurrency - A Survey. IEEE Access 11: 9451-9468 (2023) - [j84]Muhammet Ali Karabulut, A. F. M. Shahen Shah, Haci Ilhan, Al-Sakib Khan Pathan, Mohammed Atiquzzaman:
Inspecting VANET with Various Critical Aspects - A Systematic Review. Ad Hoc Networks 150: 103281 (2023) - [j83]Mohiuddin Ahmed, A. F. M. Suaib Akhter, A. N. M. Bazlur Rashid, Al-Sakib Khan Pathan:
A dependable and secure consensus algorithm for blockchain assisted microservice architecture. Comput. Electr. Eng. 109(Part B): 108762 (2023) - [j82]Chahrazed Benrebbouh, Houssem Mansouri, Sarra Cherbal, Al-Sakib Khan Pathan:
A lightweight security scheme to defend against quantum attack in IoT-based energy internet. Int. J. Sens. Networks 43(1): 13-26 (2023) - [j81]Md. Al-Masrur Khan, Seong-Hoon Kee, Al-Sakib Khan Pathan, Abdullah Al Nahid:
Image Processing Techniques for Concrete Crack Detection: A Scientometrics Literature Review. Remote. Sens. 15(9): 2400 (2023) - [j80]Dezhi Han, Hongxu Zhou, Tien-Hsiung Weng, Zhongdai Wu, Bing Han, Kuan-Ching Li, Al-Sakib Khan Pathan:
LMCA: a lightweight anomaly network traffic detection model integrating adjusted mobilenet and coordinate attention mechanism for IoT. Telecommun. Syst. 84(4): 549-564 (2023) - 2022
- [j79]A. F. M. Suaib Akhter, Tawsif Zaman Arnob, Ekra Binta Noor, Selman Hizal, Al-Sakib Khan Pathan:
An Edge-Supported Blockchain-Based Secure Authentication Method and a Cryptocurrency-Based Billing System for P2P Charging of Electric Vehicles. Entropy 24(11): 1644 (2022) - [j78]Uttam Ghosh, Deepak K. Tosh, Nawab Muhammad Faseeh Qureshi, Ali Kashif Bashir, Al-Sakib Khan Pathan, Zhaolong Ning:
Cyber-Physical Systems: Prospects, Challenges and Role in Software-Defined Networking and Blockchains. Future Internet 14(12): 382 (2022) - [j77]Alaa Hussein Abdulaal, A. F. M. Shahen Shah, Al-Sakib Khan Pathan:
NM-LEACH: A Novel Modified LEACH Protocol to Improve Performance in WSN. Int. J. Commun. Networks Inf. Secur. 14(1) (2022) - [j76]A. F. M. Suaib Akhter, Mohiuddin Ahmed, Adnan Anwar, A. F. M. Shahen Shah, Al-Sakib Khan Pathan, Ahmet Zengin:
Blockchain in vehicular ad hoc networks: applications, challenges and solutions. Int. J. Sens. Networks 40(2): 94-130 (2022) - [j75]Rachida Hireche, Houssem Mansouri, Al-Sakib Khan Pathan:
Security and Privacy Management in Internet of Medical Things (IoMT): A Synthesis. J. Cybersecur. Priv. 2(3): 640-661 (2022) - [j74]Mounya Smara, Makhlouf Aliouat, Saad Harous, Al-Sakib Khan Pathan:
Robustness improvement of component-based cloud computing systems. J. Supercomput. 78(4): 4977-5009 (2022) - 2021
- [j73]Mubashir Husain Rehmani, Alan Davy, Brendan Jennings, Zeeshan Kaleem, Akhilesh S. Thyagaturu, Hassnaa Moustafa, Al-Sakib Khan Pathan:
IEEE Access Special Section Editorial: Software-Defined Networks for Energy Internet and Smart Grid Communication. IEEE Access 9: 69139-69142 (2021) - [j72]Shaik Shakeel Ahamad, Al-Sakib Khan Pathan:
A formally verified authentication protocol in secure framework for mobile healthcare during COVID-19-like pandemic. Connect. Sci. 33(3): 532-554 (2021) - [j71]A. N. M. Bazlur Rashid, Mohiuddin Ahmed, Al-Sakib Khan Pathan:
Infrequent Pattern Detection for Reliable Network Traffic Analysis Using Robust Evolutionary Computation. Sensors 21(9): 3005 (2021) - [j70]Al-Sakib Khan Pathan, Zubair Md. Fadlullah, Salimur Choudhury, Mohamed Guerroumi:
Internet of Things for smart living. Wirel. Networks 27(6): 4293-4295 (2021) - 2020
- [j69]Mohiuddin Ahmed, Al-Sakib Khan Pathan:
False data injection attack (FDIA): an overview and new metrics for fair evaluation of its countermeasure. Complex Adapt. Syst. Model. 8: 4 (2020) - [j68]Mohiuddin Ahmed, Al-Sakib Khan Pathan:
Blockchain: Can It Be Trusted? Computer 53(4): 31-35 (2020) - [j67]Abdul Hamid, Monsur Alam, Hafsina Sheherin, Al-Sakib Khan Pathan:
Cyber Security Concerns in Social Networking Service. Int. J. Commun. Networks Inf. Secur. 12(2) (2020) - [j66]Mohiuddin Ahmed, Al-Sakib Khan Pathan:
Deep learning for collective anomaly detection. Int. J. Comput. Sci. Eng. 21(1): 137-145 (2020) - [j65]Zubair Md. Fadlullah, Mostafa M. Fouda, Al-Sakib Khan Pathan, Nidal Nasser, Abderrahim Benslimane, Ying-Dar Lin:
Smart IoT Solutions for Combating the COVID-19 Pandemic. IEEE Internet Things Mag. 3(3): 10-11 (2020) - 2019
- [j64]Shaik Shakeel Ahamad, Al-Sakib Khan Pathan:
Trusted service manager (TSM) based privacy preserving and secure mobile commerce framework with formal verification. Complex Adapt. Syst. Model. 7: 3 (2019) - [j63]Kalpana Murugan, Al-Sakib Khan Pathan:
A Routing Algorithm for Extending Mobile Sensor Network's Lifetime using Connectivity and Target Coverage. Int. J. Commun. Networks Inf. Secur. 11(2) (2019) - [j62]Houssem Mansouri, Al-Sakib Khan Pathan:
Checkpointing distributed computing systems: an optimisation approach. Int. J. High Perform. Comput. Netw. 15(3/4): 202-209 (2019) - [j61]Leila Kheroua, Samira Moussaoui, Mohamed Guerroumi, Al-Sakib Khan Pathan:
Two energy and time-efficient data dissemination protocols for large-scale wireless sensor networks. Telecommun. Syst. 70(1): 81-96 (2019) - [j60]Fadi Al-Turjman, Ahmed E. Kamal, Mubashir Husain Rehmani, Ayman Radwan, Al-Sakib Khan Pathan:
The Green Internet of Things (G-IoT). Wirel. Commun. Mob. Comput. 2019: 6059343:1-6059343:2 (2019) - 2018
- [j59]Ali Safa Sadiq, Basem Y. Alkazemi, Seyedali Mirjalili, Ahmad Noraziah, Suleman Khan, Ihsan Ali, Al-Sakib Khan Pathan, Kayhan Zrar Ghafoor:
An Efficient IDS Using Hybrid Magnetic Swarm Optimization in WANETs. IEEE Access 6: 29041-29053 (2018) - [j58]Djallel Eddine Boubiche, Al-Sakib Khan Pathan, Jaime Lloret, Huiyu Zhou, Seongik Hong, Syed Obaid Amin, Mohamed Ali Feki:
Advanced Industrial Wireless Sensor Networks and Intelligent IoT. IEEE Commun. Mag. 56(2): 14-15 (2018) - [j57]Dilara Ireen Swarna, Saiful Azad, Al-Sakib Khan Pathan, Arafatur Rahman:
Finding a suitable hop-to-hop busty traffic transmission approach for underwater acoustic networks: handshake-based vs. handshake-free MAC protocols. Int. J. Ad Hoc Ubiquitous Comput. 27(3): 222-231 (2018) - [j56]Kutub Thakur, Juan Shan, Al-Sakib Khan Pathan:
Innovations of Phishing Defense: The Mechanism, Measurement and Defense Strategies. Int. J. Commun. Networks Inf. Secur. 10(1) (2018) - [j55]Rahat Ali Khan, Al-Sakib Khan Pathan:
The state-of-the-art wireless body area sensor networks: A survey. Int. J. Distributed Sens. Networks 14(4) (2018) - [j54]Al-Sakib Khan Pathan, Saiful Azad, Rasib Khan, Luca Caviglione:
Security mechanisms and data access protocols in innovative wireless networks. Int. J. Distributed Sens. Networks 14(9) (2018) - [j53]Houssem Mansouri, Nadjib Badache, Makhlouf Aliouat, Al-Sakib Khan Pathan:
Checkpointing distributed application running on mobile ad hoc networks. Int. J. High Perform. Comput. Netw. 11(2): 95-107 (2018) - [j52]Zubair Md. Fadlullah, Al-Sakib Khan Pathan, Karan Singh:
Smart Grid Internet of Things. Mob. Networks Appl. 23(4): 879-880 (2018) - [j51]Junaid Chaudhry, Al-Sakib Khan Pathan, Mubashir Husain Rehmani, Ali Kashif Bashir:
Threats to critical infrastructure from AI and human intelligence. J. Supercomput. 74(10): 4865-4866 (2018) - [j50]Mohamed Guerroumi, Al-Sakib Khan Pathan:
Hybrid data dissemination protocol (HDDP) for wireless sensor networks. Wirel. Networks 24(5): 1739-1754 (2018) - 2017
- [j49]Junaid Qadir, Muhammad Mujeeb-U.-Rahman, Mubashir Husain Rehmani, Al-Sakib Khan Pathan, Muhammad Ali Imran, Amir Hussain, Rajib Rana, Bin Luo:
IEEE Access Special Section Editorial: Health Informatics for the Developing World. IEEE Access 5: 27818-27823 (2017) - [j48]M. Shamim Hossain, Changsheng Xu, Ying Li, Al-Sakib Khan Pathan, Josu Bilbao, Wenjun Zeng, Abdulmotaleb El-Saddik:
Impact of Next-Generation Mobile Technologies on IoT-Cloud Convergence. IEEE Commun. Mag. 55(1): 18-19 (2017) - [j47]Saiful Azad, Arafatur Rahman, A. Taufiq Asyhari, Al-Sakib Khan Pathan:
Crowd Associated Network: Exploiting over a Smart Garbage Management System. IEEE Commun. Mag. 55(7): 186-192 (2017) - [j46]Mounya Smara, Makhlouf Aliouat, Al-Sakib Khan Pathan, Zibouda Aliouat:
Acceptance Test for Fault Detection in Component-based Cloud Computing and Systems. Future Gener. Comput. Syst. 70: 74-93 (2017) - [j45]Al-Sakib Khan Pathan, Yudong Zhang, Sambit Bakshi, Patrick Siarry, Pankaj Kumar Sa, Nabendu Chaki, Agostino Cortesi:
Introduction to special issue on 'intelligent computing and adaptive systems'. Innov. Syst. Softw. Eng. 13(4): 241-242 (2017) - [j44]Mohamed Guerroumi, Al-Sakib Khan Pathan, Abdelouahid Derhab, Nadjib Badache, Samira Moussaoui:
MMSMAC: A Multi-mode Medium Access Control Protocol for Wireless Sensor Networks with Latency and Energy-Awareness. Wirel. Pers. Commun. 96(4): 4973-5010 (2017) - 2016
- [j43]Imran Yusof, Al-Sakib Khan Pathan:
Mitigating Cross-Site Scripting Attacks with a Content Security Policy. Computer 49(3): 56-63 (2016) - [j42]Malak Abdullah I. Almarshad, Mohssen M. Z. E. Mohammed, Al-Sakib Khan Pathan:
Detecting Zero-day Polymorphic Worms with Jaccard Similarity Algorithm. Int. J. Commun. Networks Inf. Secur. 8(3) (2016) - [j41]N. M. Masoodhu Banu, S. Sujatha, Al-Sakib Khan Pathan:
Skip block based distributed source coding for hyperspectral image compression. Multim. Tools Appl. 75(18): 11267-11289 (2016) - [j40]Djallel Eddine Boubiche, Sabrina Boubiche, Homero Toral-Cruz, Al-Sakib Khan Pathan, Azeddine Bilami, Samir Athmani:
SDAW: secure data aggregation watermarking-based scheme in homogeneous WSNs. Telecommun. Syst. 62(2): 277-288 (2016) - [j39]Kalpana Murugan, Al-Sakib Khan Pathan:
Prolonging the lifetime of wireless sensor networks using secondary sink nodes. Telecommun. Syst. 62(2): 347-361 (2016) - 2015
- [j38]Saiful Azad, Khandaker Tabin Hasan, Dip Nandi, Al-Sakib Khan Pathan:
A High-throughput routing metric for multi-hop Underwater Acoustic Networks. Comput. Electr. Eng. 44: 24-33 (2015) - [j37]Dieynaba Mall, Karim Konaté, Al-Sakib Khan Pathan:
Key revocation in wireless sensor networks: a survey on a less-addressed yet vital issue. Int. J. Ad Hoc Ubiquitous Comput. 18(1/2): 3-22 (2015) - [j36]M. Shamim Hossain, Al-Sakib Khan Pathan, Stefan Göbel, Shawon Rahman, M. Manzur Murshed:
Advances in Multimedia Sensor Networks for Health-Care and Related Applications. Int. J. Distributed Sens. Networks 11: 596096:1-596096:2 (2015) - [j35]Tarem Ahmed, Al-Sakib Khan Pathan, Supriyo Ahmed:
Learning Algorithms for Anomaly Detection from Images. Int. J. Syst. Dyn. Appl. 4(3): 43-69 (2015) - [j34]Al-Sakib Khan Pathan, Zubair Muhammad Fadlullah, Mostafa Fouda, Muhammad Mostafa Monowar, Philip Korn:
Information integrity in smart grid systems. Inf. Syst. 53: 145-146 (2015) - [j33]Neeraj Kumar, Al-Sakib Khan Pathan, Elias P. Duarte Jr., Riaz Ahmed Shaikh:
Critical applications in vehicular ad hoc/sensor networks. Telecommun. Syst. 58(4): 275-277 (2015) - [j32]Al-Sakib Khan Pathan, Mohssen M. Z. E. Mohammed:
Building Customer Trust in Cloud Computing with an ICT-Enabled Global Regulatory Body. Wirel. Pers. Commun. 85(1): 77-99 (2015) - 2014
- [j31]Wafaa Mustafa Abduallah, Abdul Monem S. Rahma, Al-Sakib Khan Pathan:
Mix column transform based on irreducible polynomial mathematics for color image steganography: A novel approach. Comput. Electr. Eng. 40(4): 1390-1404 (2014) - [j30]Mohamed Guerroumi, Al-Sakib Khan Pathan, Nadjib Badache, Samira Moussaoui:
On the Medium Access Control Protocols Suitable for Wireless Sensor Networks - A Survey. Int. J. Commun. Networks Inf. Secur. 6(2) (2014) - [j29]Al-Sakib Khan Pathan, Diallo Abdoulaye Kindy:
Lethality of SQL injection against current and future internet technologies. Int. J. Comput. Sci. Eng. 9(4): 386-394 (2014) - [j28]Mohammad Mehedi Hassan, Al-Sakib Khan Pathan, Eui-Nam Huh, Jemal H. Abawajy:
Emerging Sensor-Cloud Technology for Pervasive Services and Applications. Int. J. Distributed Sens. Networks 10 (2014) - [j27]Hyung Seok Kim, Waleed Ejaz, Khalid Al-Begain, Al-Sakib Khan Pathan, Najam Ul Hasan:
Advances in Cognitive Radio Sensor Networks. Int. J. Distributed Sens. Networks 10 (2014) - [j26]Al-Sakib Khan Pathan:
Editorial article: On the boundaries of trust and security in computing and communications systems. Int. J. Trust. Manag. Comput. Commun. 2(1): 1-6 (2014) - [j25]Al-Sakib Khan Pathan, Zubair Md. Fadlullah, Mostafa Fouda, Hae Young Lee:
Defending against wireless network intrusion. J. Comput. Syst. Sci. 80(3): 499-501 (2014) - [j24]Shazana Md Zin, Nor Badrul Anuar, Miss Laiha Mat Kiah, Al-Sakib Khan Pathan:
Routing protocol design for secure WSN: Review and open research issues. J. Netw. Comput. Appl. 41: 517-530 (2014) - 2013
- [j23]Abror Abduvaliyev, Al-Sakib Khan Pathan, Jianying Zhou, Rodrigo Roman, Wai-Choong Wong:
On the Vital Areas of Intrusion Detection Systems in Wireless Sensor Networks. IEEE Commun. Surv. Tutorials 15(3): 1223-1237 (2013) - [j22]Xianglin Wei, Jianhua Fan, Ming Chen, Tarem Ahmed, Al-Sakib Khan Pathan:
SMART: A Subspace based Malicious Peers Detection algorithm for P2P Systems. Int. J. Commun. Networks Inf. Secur. 5(1) (2013) - [j21]Diallo Abdoulaye Kindy, Al-Sakib Khan Pathan:
A Detailed Survey on Various Aspects of SQL Injection in Web Applications: Vulnerabilities, Innovative Attacks, and Remedies. Int. J. Commun. Networks Inf. Secur. 5(2) (2013) - [j20]Mohamed Guerroumi, Al-Sakib Khan Pathan, Nadjib Badache, Samira Moussaoui:
Strengths and Weaknesses of Prominent Data Dissemination Techniques in Wireless Sensor Networks. Int. J. Commun. Networks Inf. Secur. 5(3) (2013) - [j19]Guangjie Han, Lei Shu, Al-Sakib Khan Pathan, Joel J. P. C. Rodrigues, Abdelhamid Mellouk:
Wireless Sensor Networks Based on Environmental Energy Harvesting. Int. J. Distributed Sens. Networks 9 (2013) - [j18]Homero Toral-Cruz, Al-Sakib Khan Pathan, Julio Cesar Ramírez Pacheco:
Accurate modeling of VoIP traffic QoS parameters in current and future networks with multifractal and Markov models. Math. Comput. Model. 57(11-12): 2832-2845 (2013) - [j17]Tarem Ahmed, Xianglin Wei, Supriyo Ahmed, Al-Sakib Khan Pathan:
Efficient and effective automated surveillance agents using kernel tricks. Simul. 89(5): 562-577 (2013) - [j16]Al-Sakib Khan Pathan, Wafaa Mustafa Abduallah, Shapla Khanam, Habibullah Yusuf Saleem:
A Pay-and-Stay model for tackling intruders in hybrid wireless mesh networks. Simul. 89(5): 616-634 (2013) - [j15]Lei Shu, Athanasios V. Vasilakos, Jaime Lloret, Al-Sakib Khan Pathan:
Guest Editorial - Special Issue on Recent Advance on Mobile Sensor Systems. Telecommun. Syst. 52(4): 2407-2409 (2013) - [j14]Sherali Zeadally, Al-Sakib Khan Pathan, Cristina Alcaraz, Mohamad Badra:
Towards Privacy Protection in Smart Grid. Wirel. Pers. Commun. 73(1): 23-50 (2013) - 2012
- [j13]Muhammad Mostafa Monowar, Md. Obaidur Rahman, Al-Sakib Khan Pathan, Choong Seon Hong:
Prioritized heterogeneous traffic-oriented congestion control protocol for WSNs. Int. Arab J. Inf. Technol. 9(1): 39-48 (2012) - [j12]Tarem Ahmed, Xianglin Wei, Supriyo Ahmed, Al-Sakib Khan Pathan:
Automated Intruder Detection from Image Sequences using Minimum Volume Sets. Int. J. Commun. Networks Inf. Secur. 4(1) (2012) - 2011
- [j11]Sudip Misra, N. Balakrishnan, Al-Sakib Khan Pathan:
Recent advances in simulation and mathematical modeling of wireless networks. Math. Comput. Model. 53(11-12): 2057-2058 (2011) - [j10]Nazmus Saquib, Md. Sabbir Rahman Sakib, Al-Sakib Khan Pathan:
ViSim: A user-friendly graphical simulation tool for performance analysis of MANET routing protocols. Math. Comput. Model. 53(11-12): 2204-2218 (2011) - [j9]Al-Sakib Khan Pathan, Muhammad Mostafa Monowar, Jinfang Jiang, Lei Shu, Guangjie Han:
An efficient approach of secure group association management in densely deployed heterogeneous distributed sensor network. Secur. Commun. Networks 4(9): 1013-1026 (2011) - 2010
- [j8]Al-Sakib Khan Pathan:
A Review and Cryptanalysis of Similar Timestamp-Based Password Authentication Schemes Using Smart Cards. Int. J. Commun. Networks Inf. Secur. 2(1) (2010) - [j7]Khadija Rasul, Nujhat Nuerie, Al-Sakib Khan Pathan:
Securing Wireless Sensor Networks with An Efficient B+ Tree-Based Key Management Scheme. Int. J. Commun. Networks Inf. Secur. 2(3) (2010) - [j6]Mohammad Ziaur Rahman, Al-Sakib Khan Pathan:
A case study: establishing redundant access networks in the telecommunication sector of a developing country. Int. J. Inf. Technol. Commun. Convergence 1(1): 108-126 (2010) - [j5]Jemal H. Abawajy, Mukaddim Pathan, Al-Sakib Khan Pathan, Mustafizur Rahman:
Network Management in Distributed Systems. Scalable Comput. Pract. Exp. 11(4) (2010) - 2008
- [j4]Al-Sakib Khan Pathan, Choong Seon Hong:
SERP: secure energy-efficient routing protocol for densely deployed wireless sensor networks. Ann. des Télécommunications 63(9-10): 529-541 (2008) - [j3]Al-Sakib Khan Pathan, Muhammad Mostafa Monowar, Md Forhad Rabbi, Muhammad Mahbub Alam, Choong Seon Hong:
NAMP: Neighbor Aware Multicast Routing Protocol for Mobile Ad Hoc Networks. Int. Arab J. Inf. Technol. 5(1): 102-107 (2008) - [j2]Md. Mokammel Haque, Al-Sakib Khan Pathan, Choong Seon Hong, Eui-nam Huh:
An Asymmetric Key-Based Security Architecture for Wireless Sensor Networks. KSII Trans. Internet Inf. Syst. 2(5): 265-279 (2008) - 2007
- [j1]Al-Sakib Khan Pathan, Choong Seon Hong:
A Security Enhanced Timestamp-Based Password Authentication Scheme Using Smart Cards. IEICE Trans. Inf. Syst. 90-D(11): 1885-1888 (2007)
Conference and Workshop Papers
- 2023
- [c33]Mohiuddin Ahmed, Clark Pagutaisidro, Apichart Alexander Pike, Yuting Yang, Al-Sakib Khan Pathan:
RansomCoin: A New Dataset for Analysing Cryptocurrency Transactions - Addressing a Gap in the Literature. INFOCOM Workshops 2023: 1-6 - [c32]Rachida Hireche, Houssem Mansouri, Yasmine Harbi, Al-Sakib Khan Pathan:
Lightweight Mutual Authentication and Key Agreement Scheme for Wearable Devices in Fog-enabled WBAN. PAIS 2023: 1-8 - 2022
- [c31]Mohiuddin Ahmed, A. F. M. Suaib Akhter, A. N. M. Bazlur Rashid, Mahdi Fahmideh, Al-Sakib Khan Pathan, Adnan Anwar:
Blockchain Meets Secured Microservice Architecture: A Trustworthy Consensus Algorithm. WINSYS 2022: 53-60 - 2020
- [c30]Houssem Mansouri, Al-Sakib Khan Pathan:
A Communication-Induced Checkpointing Algorithm for Consistent-Transaction in Distributed Database Systems. SSCC 2020: 21-32 - 2019
- [c29]Houssem Mansouri, Al-Sakib Khan Pathan:
A Resilient Hierarchical Checkpointing Algorithm for Distributed Systems Running on Cluster Federation. SSCC 2019: 99-110 - 2018
- [c28]Zubair Md. Fadlullah, Al-Sakib Khan Pathan, Haris Gacanin:
On Delay-Sensitive Healthcare Data Analytics at the Network Edge Based on Deep Learning. IWCMC 2018: 388-393 - [c27]Mohiuddin Ahmed, Al-Sakib Khan Pathan:
Investigating Deep Learning for Collective Anomaly Detection - An Experimental Study. SSCC 2018: 211-219 - 2017
- [c26]Dieynaba Mall, Karim Konaté, Al-Sakib Khan Pathan:
ECL-EKM: An enhanced Certificateless Effective Key Management protocol for dynamic WSN. NSysS 2017: 150-155 - 2016
- [c25]Houssem Mansouri, Al-Sakib Khan Pathan:
An efficient minimum-process non-intrusive snapshot algorithm for vehicular ad hoc networks. AICCSA 2016: 1-6 - [c24]Mohamed Guerroumi, Abdelouahid Derhab, Al-Sakib Khan Pathan, Nadjib Badache, Samira Moussaoui:
MMSMAC: A multi-mode medium access control protocol for Wireless Sensor Networks. WCNC 2016: 1-7 - 2015
- [c23]Houssem Mansouri, Nadjib Badache, Makhlouf Aliouat, Al-Sakib Khan Pathan:
A Non-Blocking Coordinated Checkpointing Algorithm for Message-Passing Systems. IPAC 2015: 34:1-34:5 - 2014
- [c22]Tarem Ahmed, Al-Sakib Khan Pathan, Supriyo Ahmed:
Adaptive algorithms for automated intruder detection in surveillance networks. ICACCI 2014: 2775-2780 - [c21]Dieynaba Mall, Karim Konaté, Al-Sakib Khan Pathan:
SECRET: A secure and efficient certificate revocation scheme for Mobile Ad hoc Networks. ISBAST 2014: 137-143 - [c20]Mohssen M. Z. E. Mohammed, Al-Sakib Khan Pathan:
International Center for Monitoring Cloud Computing Providers (ICMCCP) for Ensuring Trusted Clouds. UIC/ATC/ScalCom 2014: 571-576 - 2013
- [c19]Dieynaba Mall, Karim Konaté, Al-Sakib Khan Pathan:
On the Key Revocation Schemes in Wireless Sensor Networks. GreenCom/iThings/CPScom 2013: 290-297 - [c18]Wafaa Mustafa Abduallah, Abdul Monem S. Rahma, Al-Sakib Khan Pathan:
Reversible Data Hiding Scheme Based on 3-Least Significant Bits and Mix Column Transform. SecureComm 2013: 405-417 - 2012
- [c17]Xianglin Wei, Tarem Ahmed, Ming Chen, Al-Sakib Khan Pathan:
PeerMate: A malicious peer detection algorithm for P2P systems based on MSPCA. ICNC 2012: 815-819 - [c16]Shapla Khanam, Habibullah Yusuf Saleem, Al-Sakib Khan Pathan:
An Efficient Detection Model of Selective Forwarding Attacks in Wireless Mesh Networks. IDCS 2012: 1-14 - [c15]Imad Fakhri Al Shaikhli, Akram M. Zeki, Rusydi H. Makarim, Al-Sakib Khan Pathan:
Protection of Integrity and Ownership of PDF Documents Using Invisible Signature. UKSim 2012: 533-537 - 2011
- [c14]Abdelgadir Tageldin Abdelgadir, Al-Sakib Khan Pathan, Mohiuddin Ahmed:
On the Performance of MPI-OpenMP on a 12 Nodes Multi-core Cluster. ICA3PP (2) 2011: 225-234 - [c13]Homero Toral-Cruz, Al-Sakib Khan Pathan, Julio C. Ramírez-Pacheco:
Modeling QoS Parameters of VoIP Traffic with Multifractal and Markov Models. ICA3PP (2) 2011: 255-265 - [c12]Abdelgadir Tageldin Abdelgadir, Al-Sakib Khan Pathan, Ariff Abdullah, Mohiuddin Ahmed, Omar Al-Mushayt, Shariq Haseeb:
Performance analysis of a highly available home agent in mobile networks. SpringSim (CNS) 2011: 62-70 - 2010
- [c11]Khadija Rasul, Nujhat Nuerie, Al-Sakib Khan Pathan:
An Enhanced Tree-Based Key Management Scheme for Secure Communication in Wireless Sensor Network. HPCC 2010: 671-676 - [c10]Md. Sabbir Rahman Sakib, Nazmus Saquib, Al-Sakib Khan Pathan:
A New Visual Simulation Tool for Performance Evaluation of MANET Routing Protocols. ICA3PP (2) 2010: 208-217 - 2009
- [c9]Al-Sakib Khan Pathan, Choong Seon Hong:
Bilinear-pairing-based remote user authentication schemes using smart cards. ICUIMC 2009: 356-361 - 2008
- [c8]Muhammad Mostafa Monowar, Md. Obaidur Rahman, Al-Sakib Khan Pathan, Choong Seon Hong:
Congestion control protocol for wireless sensor networks handling prioritized heterogeneous traffic. MobiQuitous 2008 - 2007
- [c7]Al-Sakib Khan Pathan, Jae Hyun Ryu, Md. Mokammel Haque, Choong Seon Hong:
Security Management in Wireless Sensor Networks with a Public Key Based Scheme. APNOMS 2007: 503-506 - [c6]Al-Sakib Khan Pathan, Choong Seon Hong:
Securing Sensor Reports in Wireless Sensor Networks*. Euro-Par 2007: 881-890 - [c5]Al-Sakib Khan Pathan, Choong Seon Hong:
A Secure Energy-Efficient Routing Protocol for WSN. ISPA 2007: 407-418 - 2006
- [c4]Al-Sakib Khan Pathan, Tran Thanh Dai, Choong Seon Hong:
An Efficient LU Decomposition-based Key Pre-distribution Scheme for Ensuring Security in Wireless Sensor Networks. CIT 2006: 227 - [c3]Tran Thanh Dai, Al-Sakib Khan Pathan, Choong Seon Hong:
A Resource-Optimal Key Pre-distribution Scheme with Enhanced Security for Wireless Sensor Networks. APNOMS 2006: 546-549 - [c2]Al-Sakib Khan Pathan, Choong Seon Hong:
A Key-Predistribution-Based Weakly Connected Dominating Set for Secure Clustering in DSN. HPCC 2006: 270-279 - [c1]Al-Sakib Khan Pathan, Tran Thanh Dai, Choong Seon Hong:
A Key Management Scheme with Encoding and Improved Security for Wireless Sensor Networks. ICDCIT 2006: 102-115
Parts in Books or Collections
- 2009
- [p1]Al-Sakib Khan Pathan, Choong Seon Hong:
Routing in Mobile Ad Hoc Networks. Guide to Wireless Ad Hoc Networks 2009: 59-96
Editorship
- 2022
- [e3]Huilong Jin, Chungang Liu, Al-Sakib Khan Pathan, Zubair Md. Fadlullah, Salimur Choudhury:
Cognitive Radio Oriented Wireless Networks and Wireless Internet - 16th EAI International Conference, CROWNCOM 2021, Virtual Event, December 11, 2021, and 14th EAI International Conference, WiCON 2021, Virtual Event, November 9, 2021, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 427, Springer 2022, ISBN 978-3-030-98001-6 [contents] - 2019
- [e2]Al-Sakib Khan Pathan, Zubair Md. Fadlullah, Mohamed Guerroumi:
Smart Grid and Internet of Things - Second EAI International Conference, SGIoT 2018, Niagara Falls, ON, Canada, July 11, 2018, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 256, Springer 2019, ISBN 978-3-030-05927-9 [contents] - 2013
- [e1]Shafiullah Khan, Al-Sakib Khan Pathan:
Wireless Networks and Security, Issues, Challenges and Research Trends. Springer 2013, ISBN 978-3-642-36168-5 [contents]
Informal and Other Publications
- 2012
- [i16]Hassen Mohammed Alsafi, Wafaa Mustafa Abduallah, Al-Sakib Khan Pathan:
IDPS: An Integrated Intrusion Handling Model for Cloud. CoRR abs/1203.3323 (2012) - [i15]Al-Sakib Khan Pathan:
On the Boundaries of Trust and Security in Computing and Communications Systems. CoRR abs/1203.4614 (2012) - 2011
- [i14]Abdelgadir Tageldin Abdelgadir, Al-Sakib Khan Pathan, Mohiuddin Ahmed:
On the Performance of MPI-OpenMP on a 12 nodes Multi-core Cluster. CoRR abs/1108.3268 (2011) - 2009
- [i13]Nazmus Saquib, Md. Sabbir Rahman Sakib, Al-Sakib Khan Pathan:
Performance Analysis of MANET Routing Protocols Using An Elegant Visual Simulation Tool. CoRR abs/0911.2620 (2009) - 2008
- [i12]Md. Mokammel Haque, Al-Sakib Khan Pathan, Choong Seon Hong:
Securing U-Healthcare Sensor Networks using Public Key Based Scheme. CoRR abs/0804.1184 (2008) - [i11]Al-Sakib Khan Pathan, Choong Seon Hong:
Cryptanalysis of Yang-Wang-Chang's Password Authentication Scheme with Smart Cards. CoRR abs/0804.1185 (2008) - [i10]Muhammad Mostafa Monowar, Md. Obaidur Rahman, Al-Sakib Khan Pathan, Choong Seon Hong:
Congestion Control Protocol for Wireless Sensor Networks Handling Prioritized Heterogeneous Traffic. CoRR abs/0812.2288 (2008) - 2007
- [i9]Al-Sakib Khan Pathan, Humayun Kadir Islam, Sabit Anjum Sayeed, Farruk Ahmed, Choong Seon Hong:
A Framework for Providing E-Services to the Rural Areas using Wireless Ad Hoc and Sensor Networks. CoRR abs/0712.4168 (2007) - [i8]Al-Sakib Khan Pathan, Hyung-Woo Lee, Choong Seon Hong:
Security in Wireless Sensor Networks: Issues and Challenges. CoRR abs/0712.4169 (2007) - [i7]Al-Sakib Khan Pathan, Choong Seon Hong, Hyung-Woo Lee:
Smartening the Environment using Wireless Sensor Networks in a Developing Country. CoRR abs/0712.4170 (2007) - [i6]Al-Sakib Khan Pathan, Choong Seon Hong:
Developing an Efficient DMCIS with Next-Generation Wireless Networks. CoRR abs/0712.4172 (2007) - [i5]Al-Sakib Khan Pathan, Choong Seon Hong:
Secure Clustering in DSN with Key Predistribution and WCDS. CoRR abs/0712.4173 (2007) - [i4]Al-Sakib Khan Pathan, Choong Seon Hong, Tatsuya Suda:
A Novel and Efficient Bilateral Remote User Authentication Scheme Using Smart Cards. CoRR abs/0712.4174 (2007) - [i3]Al-Sakib Khan Pathan, Choong Seon Hong:
An Improved Timestamp-Based Password Authentication Scheme Using Smart Cards. CoRR abs/0712.4176 (2007) - [i2]Al-Sakib Khan Pathan, Gihyuk Heo, Choong Seon Hong:
A Secure Lightweight Approach of Node Membership Verification in Dense HDSN. CoRR abs/0712.4177 (2007) - [i1]Md. Mokammel Haque, Al-Sakib Khan Pathan, Byung Goo Choi, Choong Seon Hong:
An Efficient PKC-Based Security Architecture for Wireless Sensor Networks. CoRR abs/0712.4178 (2007)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint