Atta ur Rehman Khan
Orcid: 0000-0003-2930-6508Affiliations:
- COMSATS Institute of Information Technology, Abbottabad, Pakistan
- University of Malaya, Kuala Lumpur, Malaysia
According to our database1,
Atta ur Rehman Khan
authored at least 63 papers
between 2012 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
ACS-IoT: Smart Contract and Blockchain Assisted Framework for Access Control Systems in IoT Enterprise Environment.
Wirel. Pers. Commun., June, 2024
Sustainable computing across datacenters: A review of enabling models and techniques.
Comput. Sci. Rev., 2024
A Survey of Deep Learning Technologies for Intrusion Detection in Internet of Things.
IEEE Access, 2024
Hybrid Bat and Salp Swarm Algorithm for Feature Selection and Classification of Crisis-Related Tweets in Social Networks.
IEEE Access, 2024
2023
Clust. Comput., April, 2023
Reinforcement learning for intelligent online computation offloading in wireless powered edge networks.
Clust. Comput., April, 2023
Zone of trust: blockchain assisted IoT authentication to support cross-communication between bubbles of trusted IoTs.
Clust. Comput., February, 2023
Impact of COVID-19 lockdown on air quality analyzed through machine learning techniques.
PeerJ Comput. Sci., 2023
An Explainable Ensemble Deep Learning Approach for Intrusion Detection in Industrial Internet of Things.
IEEE Access, 2023
Classifying Parkinson's Disease Using Resting State Electroencephalogram Signals and U<sup>EN</sup>-PDNet.
IEEE Access, 2023
Blockchain-Based Transparent and Secure System for Construction Equipment and Machinery Rental.
Proceedings of the 24th International Arab Conference on Information Technology, 2023
Proceedings of the 24th International Arab Conference on Information Technology, 2023
2022
Wirel. Pers. Commun., 2022
Trans. Emerg. Telecommun. Technol., 2022
Blockchain-Based Autonomous Authentication and Integrity for Internet of Battlefield Things in C3I System.
IEEE Access, 2022
IEEE Access, 2022
2021
Improving security of the Internet of Things via RF fingerprinting based device identification system.
Neural Comput. Appl., 2021
RC-AAM: blockchain-enabled decentralized role-centric authentication and access management for distributed organizations.
Clust. Comput., 2021
2020
An energy, performance efficient resource consolidation scheme for heterogeneous cloud datacenters.
J. Netw. Comput. Appl., 2020
KSII Trans. Internet Inf. Syst., 2020
IEEE Access, 2020
2019
Wirel. Commun. Mob. Comput., 2019
Multim. Tools Appl., 2019
Int. J. Inf. Technol. Web Eng., 2019
Comput. Syst. Sci. Eng., 2019
Secure-CamFlow: A device-oriented security model to assist information flow control systems in cloud environments for IoTs.
Concurr. Comput. Pract. Exp., 2019
Clust. Comput., 2019
SocialRec: A Context-Aware Recommendation Framework With Explicit Sentiment Analysis.
IEEE Access, 2019
2018
KSII Trans. Internet Inf. Syst., 2018
IEEE Access, 2018
Proceedings of the 2018 International Symposium on Performance Evaluation of Computer and Telecommunication Systems, 2018
2017
Wirel. Pers. Commun., 2017
Wirel. Pers. Commun., 2017
RedEdge: A Novel Architecture for Big Data Processing in Mobile Edge Computing Environments.
J. Sens. Actuator Networks, 2017
KSII Trans. Internet Inf. Syst., 2017
A comparative study and workload distribution model for re-encryption schemes in a mobile cloud computing environment.
Int. J. Commun. Syst., 2017
Formal verification and performance evaluation of task scheduling heuristics for makespan optimization and workflow distribution in large-scale computing systems.
Comput. Syst. Sci. Eng., 2017
2016
ACM Comput. Surv., 2016
2015
J. Grid Comput., 2015
A Cloud-Manager-Based Re-Encryption Scheme for Mobile Users in Cloud Environment: a Hybrid Approach.
J. Grid Comput., 2015
Trans. Emerg. Telecommun. Technol., 2015
Comput. Electr. Eng., 2015
2014
Wirel. Pers. Commun., 2014
J. Supercomput., 2014
J. Supercomput., 2014
BSS: block-based sharing scheme for secure data storage services in mobile cloud environment.
J. Supercomput., 2014
Routing protocols for mobile sensor networks: a comparative study.
Comput. Syst. Sci. Eng., 2014
IEEE Commun. Surv. Tutorials, 2014
2013
Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing.
J. Supercomput., 2013
2012
Int. J. Commun. Syst., 2012
Proceedings of the 10th International Conference on Frontiers of Information Technology, 2012