Al-Sakib Khan Pathan
Orcid: 0000-0001-6572-3451
According to our database1,
Al-Sakib Khan Pathan
authored at least 138 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
Multim. Tools Appl., July, 2024
A Trajectory Privacy-Preserving Scheme Based on Transition Matrix and Caching for IIoT.
IEEE Internet Things J., February, 2024
Enhanced secure and efficient mutual authentication protocol in IoT-based energy internet using blockchain.
Peer Peer Netw. Appl., January, 2024
Network, 2024
2023
LMCA: a lightweight anomaly network traffic detection model integrating adjusted mobilenet and coordinate attention mechanism for IoT.
Telecommun. Syst., December, 2023
Ad Hoc Networks, November, 2023
A dependable and secure consensus algorithm for blockchain assisted microservice architecture.
Comput. Electr. Eng., August, 2023
Image Processing Techniques for Concrete Crack Detection: A Scientometrics Literature Review.
Remote. Sens., May, 2023
A lightweight security scheme to defend against quantum attack in IoT-based energy internet.
Int. J. Sens. Networks, 2023
IEEE Access, 2023
Lightweight Mutual Authentication and Key Agreement Scheme for Wearable Devices in Fog-enabled WBAN.
Proceedings of the 5th International Conference on Pattern Analysis and Intelligent Systems, 2023
RansomCoin: A New Dataset for Analysing Cryptocurrency Transactions - Addressing a Gap in the Literature.
Proceedings of the IEEE INFOCOM 2023, 2023
Emerging ICT Technologies and Cybersecurity - From AI and ML to Other Futuristic Technologies
Springer, ISBN: 978-3-031-27764-1, 2023
2022
An Edge-Supported Blockchain-Based Secure Authentication Method and a Cryptocurrency-Based Billing System for P2P Charging of Electric Vehicles.
Entropy, November, 2022
J. Cybersecur. Priv., August, 2022
Int. J. Commun. Networks Inf. Secur., April, 2022
J. Supercomput., 2022
Int. J. Sens. Networks, 2022
Cyber-Physical Systems: Prospects, Challenges and Role in Software-Defined Networking and Blockchains.
Future Internet, 2022
Blockchain Meets Secured Microservice Architecture: A Trustworthy Consensus Algorithm.
Proceedings of the 19th International Conference on Wireless Networks and Mobile Systems, 2022
2021
Infrequent Pattern Detection for Reliable Network Traffic Analysis Using Robust Evolutionary Computation.
Sensors, 2021
A formally verified authentication protocol in secure framework for mobile healthcare during COVID-19-like pandemic.
Connect. Sci., 2021
IEEE Access Special Section Editorial: Software-Defined Networks for Energy Internet and Smart Grid Communication.
IEEE Access, 2021
2020
IEEE Internet Things Mag., 2020
Int. J. Commun. Networks Inf. Secur., 2020
False data injection attack (FDIA): an overview and new metrics for fair evaluation of its countermeasure.
Complex Adapt. Syst. Model., 2020
A Communication-Induced Checkpointing Algorithm for Consistent-Transaction in Distributed Database Systems.
Proceedings of the Security in Computing and Communications - 8th International Symposium, 2020
2019
Two energy and time-efficient data dissemination protocols for large-scale wireless sensor networks.
Telecommun. Syst., 2019
Int. J. High Perform. Comput. Netw., 2019
A Routing Algorithm for Extending Mobile Sensor Network's Lifetime using Connectivity and Target Coverage.
Int. J. Commun. Networks Inf. Secur., 2019
Trusted service manager (TSM) based privacy preserving and secure mobile commerce framework with formal verification.
Complex Adapt. Syst. Model., 2019
A Resilient Hierarchical Checkpointing Algorithm for Distributed Systems Running on Cluster Federation.
Proceedings of the Security in Computing and Communications - 7th International Symposium, 2019
2018
Wirel. Networks, 2018
J. Supercomput., 2018
Int. J. High Perform. Comput. Netw., 2018
Int. J. Distributed Sens. Networks, 2018
Int. J. Distributed Sens. Networks, 2018
Int. J. Commun. Networks Inf. Secur., 2018
Finding a suitable hop-to-hop busty traffic transmission approach for underwater acoustic networks: handshake-based vs. handshake-free MAC protocols.
Int. J. Ad Hoc Ubiquitous Comput., 2018
IEEE Commun. Mag., 2018
IEEE Access, 2018
Investigating Deep Learning for Collective Anomaly Detection - An Experimental Study.
Proceedings of the Security in Computing and Communications - 6th International Symposium, 2018
On Delay-Sensitive Healthcare Data Analytics at the Network Edge Based on Deep Learning.
Proceedings of the 14th International Wireless Communications & Mobile Computing Conference, 2018
2017
MMSMAC: A Multi-mode Medium Access Control Protocol for Wireless Sensor Networks with Latency and Energy-Awareness.
Wirel. Pers. Commun., 2017
Innov. Syst. Softw. Eng., 2017
Future Gener. Comput. Syst., 2017
IEEE Commun. Mag., 2017
IEEE Commun. Mag., 2017
IEEE Access, 2017
ECL-EKM: An enhanced Certificateless Effective Key Management protocol for dynamic WSN.
Proceedings of the International Conference on Networking, Systems and Security, 2017
2016
Telecommun. Syst., 2016
Telecommun. Syst., 2016
Multim. Tools Appl., 2016
Int. J. Commun. Networks Inf. Secur., 2016
Computer, 2016
Proceedings of the IEEE Wireless Communications and Networking Conference, 2016
An efficient minimum-process non-intrusive snapshot algorithm for vehicular ad hoc networks.
Proceedings of the 13th IEEE/ACS International Conference of Computer Systems and Applications, 2016
2015
Building Customer Trust in Cloud Computing with an ICT-Enabled Global Regulatory Body.
Wirel. Pers. Commun., 2015
Int. J. Syst. Dyn. Appl., 2015
Int. J. Distributed Sens. Networks, 2015
Key revocation in wireless sensor networks: a survey on a less-addressed yet vital issue.
Int. J. Ad Hoc Ubiquitous Comput., 2015
Comput. Electr. Eng., 2015
Proceedings of the IPAC '15: International Conference on Intelligent Information Processing, 2015
2014
J. Netw. Comput. Appl., 2014
Editorial article: On the boundaries of trust and security in computing and communications systems.
Int. J. Trust. Manag. Comput. Commun., 2014
Int. J. Distributed Sens. Networks, 2014
Int. J. Distributed Sens. Networks, 2014
Int. J. Comput. Sci. Eng., 2014
On the Medium Access Control Protocols Suitable for Wireless Sensor Networks - A Survey.
Int. J. Commun. Networks Inf. Secur., 2014
Mix column transform based on irreducible polynomial mathematics for color image steganography: A novel approach.
Comput. Electr. Eng., 2014
International Center for Monitoring Cloud Computing Providers (ICMCCP) for Ensuring Trusted Clouds.
Proceedings of the 2014 IEEE 11th Intl Conf on Ubiquitous Intelligence and Computing and 2014 IEEE 11th Intl Conf on Autonomic and Trusted Computing and 2014 IEEE 14th Intl Conf on Scalable Computing and Communications and Its Associated Workshops, 2014
SECRET: A secure and efficient certificate revocation scheme for Mobile Ad hoc Networks.
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014
Proceedings of the 2014 International Conference on Advances in Computing, 2014
2013
Telecommun. Syst., 2013
Simul., 2013
Simul., 2013
Accurate modeling of VoIP traffic QoS parameters in current and future networks with multifractal and Markov models.
Math. Comput. Model., 2013
Int. J. Distributed Sens. Networks, 2013
Int. J. Commun. Networks Inf. Secur., 2013
A Detailed Survey on Various Aspects of SQL Injection in Web Applications: Vulnerabilities, Innovative Attacks, and Remedies.
Int. J. Commun. Networks Inf. Secur., 2013
Strengths and Weaknesses of Prominent Data Dissemination Techniques in Wireless Sensor Networks.
Int. J. Commun. Networks Inf. Secur., 2013
IEEE Commun. Surv. Tutorials, 2013
Reversible Data Hiding Scheme Based on 3-Least Significant Bits and Mix Column Transform.
Proceedings of the Security and Privacy in Communication Networks, 2013
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013
2012
Int. J. Commun. Networks Inf. Secur., 2012
Int. Arab J. Inf. Technol., 2012
CoRR, 2012
Proceedings of the 14th International Conference on Computer Modelling and Simulation, 2012
An Efficient Detection Model of Selective Forwarding Attacks in Wireless Mesh Networks.
Proceedings of the Internet and Distributed Computing Systems, 2012
Proceedings of the International Conference on Computing, Networking and Communications, 2012
2011
An efficient approach of secure group association management in densely deployed heterogeneous distributed sensor network.
Secur. Commun. Networks, 2011
ViSim: A user-friendly graphical simulation tool for performance analysis of MANET routing protocols.
Math. Comput. Model., 2011
Math. Comput. Model., 2011
Proceedings of the 2011 Spring Simulation Multi-conference, 2011
Proceedings of the Algorithms and Architectures for Parallel Processing, 2011
Proceedings of the Algorithms and Architectures for Parallel Processing, 2011
2010
A case study: establishing redundant access networks in the telecommunication sector of a developing country.
Int. J. Inf. Technol. Commun. Convergence, 2010
Securing Wireless Sensor Networks with An Efficient B+ Tree-Based Key Management Scheme.
Int. J. Commun. Networks Inf. Secur., 2010
A Review and Cryptanalysis of Similar Timestamp-Based Password Authentication Schemes Using Smart Cards.
Int. J. Commun. Networks Inf. Secur., 2010
Proceedings of the Algorithms and Architectures for Parallel Processing, 2010
An Enhanced Tree-Based Key Management Scheme for Secure Communication in Wireless Sensor Network.
Proceedings of the 12th IEEE International Conference on High Performance Computing and Communications, 2010
2009
Proceedings of the Guide to Wireless Ad Hoc Networks, 2009
Performance Analysis of MANET Routing Protocols Using An Elegant Visual Simulation Tool
CoRR, 2009
Proceedings of the 3rd International Conference on Ubiquitous Information Management and Communication, 2009
2008
KSII Trans. Internet Inf. Syst., 2008
NAMP: Neighbor Aware Multicast Routing Protocol for Mobile Ad Hoc Networks.
Int. Arab J. Inf. Technol., 2008
CoRR, 2008
SERP: secure energy-efficient routing protocol for densely deployed wireless sensor networks.
Ann. des Télécommunications, 2008
Congestion control protocol for wireless sensor networks handling prioritized heterogeneous traffic.
Proceedings of the 5th Annual International Conference on Mobile and Ubiquitous Systems: Computing, 2008
2007
A Security Enhanced Timestamp-Based Password Authentication Scheme Using Smart Cards.
IEICE Trans. Inf. Syst., 2007
CoRR, 2007
CoRR, 2007
CoRR, 2007
CoRR, 2007
A Framework for Providing E-Services to the Rural Areas using Wireless Ad Hoc and Sensor Networks
CoRR, 2007
Proceedings of the Parallel and Distributed Processing and Applications, 2007
Proceedings of the Euro-Par 2007, 2007
Proceedings of the Managing Next Generation Networks and Services, 2007
2006
A Key Management Scheme with Encoding and Improved Security for Wireless Sensor Networks.
Proceedings of the Distributed Computing and Internet Technology, 2006
A Key-Predistribution-Based Weakly Connected Dominating Set for Secure Clustering in DSN.
Proceedings of the High Performance Computing and Communications, 2006
A Resource-Optimal Key Pre-distribution Scheme with Enhanced Security for Wireless Sensor Networks.
Proceedings of the Management of Convergence Networks and Services, 2006
An Efficient LU Decomposition-based Key Pre-distribution Scheme for Ensuring Security in Wireless Sensor Networks.
Proceedings of the Sixth International Conference on Computer and Information Technology (CIT 2006), 2006