Al-Sakib Khan Pathan

Orcid: 0000-0001-6572-3451

According to our database1, Al-Sakib Khan Pathan authored at least 138 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Multi speaker text-to-speech synthesis using generalized end-to-end loss function.
Multim. Tools Appl., July, 2024

A Trajectory Privacy-Preserving Scheme Based on Transition Matrix and Caching for IIoT.
IEEE Internet Things J., February, 2024

Enhanced secure and efficient mutual authentication protocol in IoT-based energy internet using blockchain.
Peer Peer Netw. Appl., January, 2024

An Enhanced Mechanism for Fault Tolerance in Agricultural Wireless Sensor Networks.
Network, 2024

2023
LMCA: a lightweight anomaly network traffic detection model integrating adjusted mobilenet and coordinate attention mechanism for IoT.
Telecommun. Syst., December, 2023

Inspecting VANET with Various Critical Aspects - A Systematic Review.
Ad Hoc Networks, November, 2023

A dependable and secure consensus algorithm for blockchain assisted microservice architecture.
Comput. Electr. Eng., August, 2023

Image Processing Techniques for Concrete Crack Detection: A Scientometrics Literature Review.
Remote. Sens., May, 2023

A lightweight security scheme to defend against quantum attack in IoT-based energy internet.
Int. J. Sens. Networks, 2023

On the Vital Aspects and Characteristics of Cryptocurrency - A Survey.
IEEE Access, 2023

Lightweight Mutual Authentication and Key Agreement Scheme for Wearable Devices in Fog-enabled WBAN.
Proceedings of the 5th International Conference on Pattern Analysis and Intelligent Systems, 2023

RansomCoin: A New Dataset for Analysing Cryptocurrency Transactions - Addressing a Gap in the Literature.
Proceedings of the IEEE INFOCOM 2023, 2023

Emerging ICT Technologies and Cybersecurity - From AI and ML to Other Futuristic Technologies
Springer, ISBN: 978-3-031-27764-1, 2023

2022
An Edge-Supported Blockchain-Based Secure Authentication Method and a Cryptocurrency-Based Billing System for P2P Charging of Electric Vehicles.
Entropy, November, 2022

Security and Privacy Management in Internet of Medical Things (IoMT): A Synthesis.
J. Cybersecur. Priv., August, 2022

NM-LEACH: A Novel Modified LEACH Protocol to Improve Performance in WSN.
Int. J. Commun. Networks Inf. Secur., April, 2022

Robustness improvement of component-based cloud computing systems.
J. Supercomput., 2022

Blockchain in vehicular ad hoc networks: applications, challenges and solutions.
Int. J. Sens. Networks, 2022

Cyber-Physical Systems: Prospects, Challenges and Role in Software-Defined Networking and Blockchains.
Future Internet, 2022

Blockchain Meets Secured Microservice Architecture: A Trustworthy Consensus Algorithm.
Proceedings of the 19th International Conference on Wireless Networks and Mobile Systems, 2022

2021
Internet of Things for smart living.
Wirel. Networks, 2021

Infrequent Pattern Detection for Reliable Network Traffic Analysis Using Robust Evolutionary Computation.
Sensors, 2021

A formally verified authentication protocol in secure framework for mobile healthcare during COVID-19-like pandemic.
Connect. Sci., 2021

IEEE Access Special Section Editorial: Software-Defined Networks for Energy Internet and Smart Grid Communication.
IEEE Access, 2021

2020
Smart IoT Solutions for Combating the COVID-19 Pandemic.
IEEE Internet Things Mag., 2020

Deep learning for collective anomaly detection.
Int. J. Comput. Sci. Eng., 2020

Cyber Security Concerns in Social Networking Service.
Int. J. Commun. Networks Inf. Secur., 2020

Blockchain: Can It Be Trusted?
Computer, 2020

False data injection attack (FDIA): an overview and new metrics for fair evaluation of its countermeasure.
Complex Adapt. Syst. Model., 2020

A Communication-Induced Checkpointing Algorithm for Consistent-Transaction in Distributed Database Systems.
Proceedings of the Security in Computing and Communications - 8th International Symposium, 2020

2019
The Green Internet of Things (G-IoT).
Wirel. Commun. Mob. Comput., 2019

Two energy and time-efficient data dissemination protocols for large-scale wireless sensor networks.
Telecommun. Syst., 2019

Checkpointing distributed computing systems: an optimisation approach.
Int. J. High Perform. Comput. Netw., 2019

A Routing Algorithm for Extending Mobile Sensor Network's Lifetime using Connectivity and Target Coverage.
Int. J. Commun. Networks Inf. Secur., 2019

Trusted service manager (TSM) based privacy preserving and secure mobile commerce framework with formal verification.
Complex Adapt. Syst. Model., 2019

A Resilient Hierarchical Checkpointing Algorithm for Distributed Systems Running on Cluster Federation.
Proceedings of the Security in Computing and Communications - 7th International Symposium, 2019

2018
Hybrid data dissemination protocol (HDDP) for wireless sensor networks.
Wirel. Networks, 2018

Threats to critical infrastructure from AI and human intelligence.
J. Supercomput., 2018

Smart Grid Internet of Things.
Mob. Networks Appl., 2018

Checkpointing distributed application running on mobile ad hoc networks.
Int. J. High Perform. Comput. Netw., 2018

Security mechanisms and data access protocols in innovative wireless networks.
Int. J. Distributed Sens. Networks, 2018

The state-of-the-art wireless body area sensor networks: A survey.
Int. J. Distributed Sens. Networks, 2018

Innovations of Phishing Defense: The Mechanism, Measurement and Defense Strategies.
Int. J. Commun. Networks Inf. Secur., 2018

Finding a suitable hop-to-hop busty traffic transmission approach for underwater acoustic networks: handshake-based vs. handshake-free MAC protocols.
Int. J. Ad Hoc Ubiquitous Comput., 2018

Advanced Industrial Wireless Sensor Networks and Intelligent IoT.
IEEE Commun. Mag., 2018

An Efficient IDS Using Hybrid Magnetic Swarm Optimization in WANETs.
IEEE Access, 2018

Investigating Deep Learning for Collective Anomaly Detection - An Experimental Study.
Proceedings of the Security in Computing and Communications - 6th International Symposium, 2018

On Delay-Sensitive Healthcare Data Analytics at the Network Edge Based on Deep Learning.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018

2017
MMSMAC: A Multi-mode Medium Access Control Protocol for Wireless Sensor Networks with Latency and Energy-Awareness.
Wirel. Pers. Commun., 2017

Introduction to special issue on 'intelligent computing and adaptive systems'.
Innov. Syst. Softw. Eng., 2017

Acceptance Test for Fault Detection in Component-based Cloud Computing and Systems.
Future Gener. Comput. Syst., 2017

Impact of Next-Generation Mobile Technologies on IoT-Cloud Convergence.
IEEE Commun. Mag., 2017

Crowd Associated Network: Exploiting over a Smart Garbage Management System.
IEEE Commun. Mag., 2017

IEEE Access Special Section Editorial: Health Informatics for the Developing World.
IEEE Access, 2017

ECL-EKM: An enhanced Certificateless Effective Key Management protocol for dynamic WSN.
Proceedings of the International Conference on Networking, Systems and Security, 2017

2016
Prolonging the lifetime of wireless sensor networks using secondary sink nodes.
Telecommun. Syst., 2016

SDAW: secure data aggregation watermarking-based scheme in homogeneous WSNs.
Telecommun. Syst., 2016

Skip block based distributed source coding for hyperspectral image compression.
Multim. Tools Appl., 2016

Detecting Zero-day Polymorphic Worms with Jaccard Similarity Algorithm.
Int. J. Commun. Networks Inf. Secur., 2016

Mitigating Cross-Site Scripting Attacks with a Content Security Policy.
Computer, 2016

MMSMAC: A multi-mode medium access control protocol for Wireless Sensor Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2016

An efficient minimum-process non-intrusive snapshot algorithm for vehicular ad hoc networks.
Proceedings of the 13th IEEE/ACS International Conference of Computer Systems and Applications, 2016

2015
Building Customer Trust in Cloud Computing with an ICT-Enabled Global Regulatory Body.
Wirel. Pers. Commun., 2015

Critical applications in vehicular ad hoc/sensor networks.
Telecommun. Syst., 2015

Information integrity in smart grid systems.
Inf. Syst., 2015

Learning Algorithms for Anomaly Detection from Images.
Int. J. Syst. Dyn. Appl., 2015

Advances in Multimedia Sensor Networks for Health-Care and Related Applications.
Int. J. Distributed Sens. Networks, 2015

Key revocation in wireless sensor networks: a survey on a less-addressed yet vital issue.
Int. J. Ad Hoc Ubiquitous Comput., 2015

A High-throughput routing metric for multi-hop Underwater Acoustic Networks.
Comput. Electr. Eng., 2015

A Non-Blocking Coordinated Checkpointing Algorithm for Message-Passing Systems.
Proceedings of the IPAC '15: International Conference on Intelligent Information Processing, 2015

2014
Routing protocol design for secure WSN: Review and open research issues.
J. Netw. Comput. Appl., 2014

Defending against wireless network intrusion.
J. Comput. Syst. Sci., 2014

Editorial article: On the boundaries of trust and security in computing and communications systems.
Int. J. Trust. Manag. Comput. Commun., 2014

Advances in Cognitive Radio Sensor Networks.
Int. J. Distributed Sens. Networks, 2014

Emerging Sensor-Cloud Technology for Pervasive Services and Applications.
Int. J. Distributed Sens. Networks, 2014

Lethality of SQL injection against current and future internet technologies.
Int. J. Comput. Sci. Eng., 2014

On the Medium Access Control Protocols Suitable for Wireless Sensor Networks - A Survey.
Int. J. Commun. Networks Inf. Secur., 2014

Mix column transform based on irreducible polynomial mathematics for color image steganography: A novel approach.
Comput. Electr. Eng., 2014

International Center for Monitoring Cloud Computing Providers (ICMCCP) for Ensuring Trusted Clouds.
Proceedings of the 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops, 2014

SECRET: A secure and efficient certificate revocation scheme for Mobile Ad hoc Networks.
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014

Adaptive algorithms for automated intruder detection in surveillance networks.
Proceedings of the 2014 International Conference on Advances in Computing, 2014

2013
Towards Privacy Protection in Smart Grid.
Wirel. Pers. Commun., 2013

Guest Editorial - Special Issue on Recent Advance on Mobile Sensor Systems.
Telecommun. Syst., 2013

A Pay-and-Stay model for tackling intruders in hybrid wireless mesh networks.
Simul., 2013

Efficient and effective automated surveillance agents using kernel tricks.
Simul., 2013

Accurate modeling of VoIP traffic QoS parameters in current and future networks with multifractal and Markov models.
Math. Comput. Model., 2013

Wireless Sensor Networks Based on Environmental Energy Harvesting.
Int. J. Distributed Sens. Networks, 2013

SMART: A Subspace based Malicious Peers Detection algorithm for P2P Systems.
Int. J. Commun. Networks Inf. Secur., 2013

A Detailed Survey on Various Aspects of SQL Injection in Web Applications: Vulnerabilities, Innovative Attacks, and Remedies.
Int. J. Commun. Networks Inf. Secur., 2013

Strengths and Weaknesses of Prominent Data Dissemination Techniques in Wireless Sensor Networks.
Int. J. Commun. Networks Inf. Secur., 2013

On the Vital Areas of Intrusion Detection Systems in Wireless Sensor Networks.
IEEE Commun. Surv. Tutorials, 2013

Reversible Data Hiding Scheme Based on 3-Least Significant Bits and Mix Column Transform.
Proceedings of the Security and Privacy in Communication Networks, 2013

On the Key Revocation Schemes in Wireless Sensor Networks.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

2012
Automated Intruder Detection from Image Sequences using Minimum Volume Sets.
Int. J. Commun. Networks Inf. Secur., 2012

Prioritized heterogeneous traffic-oriented congestion control protocol for WSNs.
Int. Arab J. Inf. Technol., 2012

On the Boundaries of Trust and Security in Computing and Communications Systems
CoRR, 2012

IDPS: An Integrated Intrusion Handling Model for Cloud
CoRR, 2012

Protection of Integrity and Ownership of PDF Documents Using Invisible Signature.
Proceedings of the 14th International Conference on Computer Modelling and Simulation, 2012

An Efficient Detection Model of Selective Forwarding Attacks in Wireless Mesh Networks.
Proceedings of the Internet and Distributed Computing Systems, 2012

PeerMate: A malicious peer detection algorithm for P2P systems based on MSPCA.
Proceedings of the International Conference on Computing, Networking and Communications, 2012

2011
An efficient approach of secure group association management in densely deployed heterogeneous distributed sensor network.
Secur. Commun. Networks, 2011

ViSim: A user-friendly graphical simulation tool for performance analysis of MANET routing protocols.
Math. Comput. Model., 2011

Recent advances in simulation and mathematical modeling of wireless networks.
Math. Comput. Model., 2011

Performance analysis of a highly available home agent in mobile networks.
Proceedings of the 2011 Spring Simulation Multi-conference, 2011

Modeling QoS Parameters of VoIP Traffic with Multifractal and Markov Models.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2011

On the Performance of MPI-OpenMP on a 12 Nodes Multi-core Cluster.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2011

2010
Network Management in Distributed Systems.
Scalable Comput. Pract. Exp., 2010

A case study: establishing redundant access networks in the telecommunication sector of a developing country.
Int. J. Inf. Technol. Commun. Convergence, 2010

Securing Wireless Sensor Networks with An Efficient B+ Tree-Based Key Management Scheme.
Int. J. Commun. Networks Inf. Secur., 2010

A Review and Cryptanalysis of Similar Timestamp-Based Password Authentication Schemes Using Smart Cards.
Int. J. Commun. Networks Inf. Secur., 2010

A New Visual Simulation Tool for Performance Evaluation of MANET Routing Protocols.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2010

An Enhanced Tree-Based Key Management Scheme for Secure Communication in Wireless Sensor Network.
Proceedings of the 12th IEEE International Conference on High Performance Computing and Communications, 2010

2009
Routing in Mobile Ad Hoc Networks.
Proceedings of the Guide to Wireless Ad Hoc Networks, 2009

Performance Analysis of MANET Routing Protocols Using An Elegant Visual Simulation Tool
CoRR, 2009

Bilinear-pairing-based remote user authentication schemes using smart cards.
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, 2009

2008
An Asymmetric Key-Based Security Architecture for Wireless Sensor Networks.
KSII Trans. Internet Inf. Syst., 2008

NAMP: Neighbor Aware Multicast Routing Protocol for Mobile Ad Hoc Networks.
Int. Arab J. Inf. Technol., 2008

Cryptanalysis of Yang-Wang-Chang's Password Authentication Scheme with Smart Cards
CoRR, 2008

Securing U-Healthcare Sensor Networks using Public Key Based Scheme
CoRR, 2008

SERP: secure energy-efficient routing protocol for densely deployed wireless sensor networks.
Ann. des Télécommunications, 2008

Congestion control protocol for wireless sensor networks handling prioritized heterogeneous traffic.
Proceedings of the 5th Annual International Conference on Mobile and Ubiquitous Systems: Computing, 2008

2007
A Security Enhanced Timestamp-Based Password Authentication Scheme Using Smart Cards.
IEICE Trans. Inf. Syst., 2007

An Efficient PKC-Based Security Architecture for Wireless Sensor Networks
CoRR, 2007

A Secure Lightweight Approach of Node Membership Verification in Dense HDSN
CoRR, 2007

An Improved Timestamp-Based Password Authentication Scheme Using Smart Cards
CoRR, 2007

A Novel and Efficient Bilateral Remote User Authentication Scheme Using Smart Cards
CoRR, 2007

Secure Clustering in DSN with Key Predistribution and WCDS
CoRR, 2007

Developing an Efficient DMCIS with Next-Generation Wireless Networks
CoRR, 2007

Smartening the Environment using Wireless Sensor Networks in a Developing Country
CoRR, 2007

Security in Wireless Sensor Networks: Issues and Challenges
CoRR, 2007

A Framework for Providing E-Services to the Rural Areas using Wireless Ad Hoc and Sensor Networks
CoRR, 2007

A Secure Energy-Efficient Routing Protocol for WSN.
Proceedings of the Parallel and Distributed Processing and Applications, 2007

Securing Sensor Reports in Wireless Sensor Networks*.
Proceedings of the Euro-Par 2007, 2007

Security Management in Wireless Sensor Networks with a Public Key Based Scheme.
Proceedings of the Managing Next Generation Networks and Services, 2007

2006
A Key Management Scheme with Encoding and Improved Security for Wireless Sensor Networks.
Proceedings of the Distributed Computing and Internet Technology, 2006

A Key-Predistribution-Based Weakly Connected Dominating Set for Secure Clustering in DSN.
Proceedings of the High Performance Computing and Communications, 2006

A Resource-Optimal Key Pre-distribution Scheme with Enhanced Security for Wireless Sensor Networks.
Proceedings of the Management of Convergence Networks and Services, 2006

An Efficient LU Decomposition-based Key Pre-distribution Scheme for Ensuring Security in Wireless Sensor Networks.
Proceedings of the Sixth International Conference on Computer and Information Technology (CIT 2006), 2006


  Loading...