Hassan Khan
Orcid: 0000-0001-6417-1181
According to our database1,
Hassan Khan
authored at least 51 papers
between 2009 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
MRAAC: A Multi-stage Risk-aware Adaptive Authentication and Access Control Framework for Android.
ACM Trans. Priv. Secur., May, 2024
SHRIMPS: A framework for evaluating multi-user, multi-modal implicit authentication systems.
Comput. Secur., February, 2024
Nat. Lang. Process. J., 2024
2023
Revisiting the Security of Biometric Authentication Systems Against Statistical Attacks.
ACM Trans. Priv. Secur., May, 2023
"My Privacy for their Security": Employees' Privacy Perspectives and Expectations when using Enterprise Security Software.
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Business Model Evaluation for Peer-to-peer Energy Sharing Systems: Insights from Off-grid DC Microgrid Deployment in Pakistan.
Proceedings of the IEEE Global Humanitarian Technology Conference, 2023
2022
Numerical Simulation of Entropy Optimization in Radiative Hybrid Nanofluid Flow in a Variable Features Darcy-Forchheimer Curved Surface.
Symmetry, 2022
IEEE Access, 2022
A Modified Approach of Adomian Decomposition Method to Solve Two-Term Diffusion Wave and Time Fractional Telegraph Equations.
IEEE Access, 2022
Proceedings of the Eighteenth Symposium on Usable Privacy and Security, 2022
TMorph: A Traffic Morphing Framework to Test Network Defenses Against Adversarial Attacks.
Proceedings of the International Conference on Information Networking, 2022
2021
Concerned but Ineffective: User Perceptions, Methods, and Challenges when Sanitizing Old Devices for Disposal.
Proceedings of the Seventeenth Symposium on Usable Privacy and Security, 2021
2020
ACM Trans. Priv. Secur., 2020
On the Fractional View Analysis of Keller-Segel Equations with Sensitivity Functions.
Complex., 2020
An Approximate-Analytical Solution to Analyze Fractional View of Telegraph Equations.
IEEE Access, 2020
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the Web, Artificial Intelligence and Network Applications, 2020
Widely Reused and Shared, Infrequently Updated, and Sometimes Inherited: A Holistic View of PIN Authentication in Digital Lives and Beyond.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
An Investigation of the Third Hankel Determinant Problem for Certain Subfamilies of Univalent Functions Involving the Exponential Function.
Symmetry, 2019
Laplace Adomian Decomposition Method for Multi Dimensional Time Fractional Model of Navier-Stokes Equation.
Symmetry, 2019
Analytical Solutions of Fractional Klein-Gordon and Gas Dynamics Equations, via the (<i>G</i><sup>′</sup>/<i>G</i>)-Expansion Method.
Symmetry, 2019
Analytical Solutions of Fractional-Order Diffusion Equations by Natural Transform Decomposition Method.
Entropy, 2019
Application of Laplace-Adomian Decomposition Method for the Analytical Solution of Third-Order Dispersive Fractional Partial Differential Equations.
Entropy, 2019
Analytical Solutions of Fractional-Order Heat and Wave Equations by the Natural Transform Decomposition Method.
Entropy, 2019
Numerical solutions of fractional delay differential equations using Chebyshev wavelet method.
Comput. Appl. Math., 2019
Axioms, 2019
A New Analytical Technique to Solve System of Fractional-Order Partial Differential Equations.
IEEE Access, 2019
Families of Travelling Waves Solutions for Fractional-Order Extended Shallow Water Wave Equations, Using an Innovative Analytical Method.
IEEE Access, 2019
2018
Sensors, 2018
Augmented Reality-based Mimicry Attacks on Behaviour-Based Smartphone Authentication.
Proceedings of the 16th Annual International Conference on Mobile Systems, 2018
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018
2016
Evaluating the Efficacy of Implicit Authentication Under Realistic Operating Scenarios.
PhD thesis, 2016
Ask Me Again But Don't Annoy Me: Evaluating Re-authentication Strategies for Smartphones.
Proceedings of the Twelfth Symposium on Usable Privacy and Security, 2016
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016
2015
Usability and Security Perceptions of Implicit Authentication: Convenient, Secure, Sometimes Annoying.
Proceedings of the Eleventh Symposium On Usable Privacy and Security, 2015
2014
Proceedings of the 15th Workshop on Mobile Computing Systems and Applications, 2014
Proceedings of the Research in Attacks, Intrusions and Defenses, 2014
Proceedings of the 20th Annual International Conference on Mobile Computing and Networking, 2014
Proceedings of the IEEE 39th Conference on Local Computer Networks, 2014
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
2013
ACM Trans. Inf. Syst. Secur., 2013
2012
Macroflows and Microflows: Enabling Rapid Network Innovation through a Split SDN Data Plane.
Proceedings of the European Workshop on Software Defined Networking, 2012
2011
Determining malicious executable distinguishing attributes and low-complexity detection.
J. Comput. Virol., 2011
Comput. Secur., 2011
Proceedings of IEEE International Conference on Communications, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
2010
Proceedings of the Recent Advances in Intrusion Detection, 13th International Symposium, 2010
2009
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009
Proceedings of the 43rd Annual Conference on Information Sciences and Systems, 2009
On achieving good operating points on an ROC plane using stochastic anomaly score prediction.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009