Khaled M. Khan
Orcid: 0000-0002-8848-0760Affiliations:
- Qatar University, KINDI Computing Lab, Doha, Qatar
- Western Sydney University, School of ComputingandInformationTechnology, Sydney, NSW, Australia
- Southern Cross University, Lismore, NSW, Australia
- Monash University, Clayton, VIC, Australia (PhD 2005)
According to our database1,
Khaled M. Khan
authored at least 83 papers
between 1992 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on linkedin.com
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Correction to: Optimizing pre‑copy live virtual machine migration in cloud computing using machine learning‑based prediction model.
Computing, December, 2024
Optimizing pre-copy live virtual machine migration in cloud computing using machine learning-based prediction model.
Computing, September, 2024
A machine learning-based optimization approach for pre-copy live virtual machine migration.
Clust. Comput., April, 2024
Do Cialdini's Persuasion Principles Still Influence Trust and Risk-Taking When Social Engineering is Knowingly Possible?
Proceedings of the Research Challenges in Information Science, 2024
2023
IEEE Internet Things J., February, 2023
IEEE Trans. Cloud Comput., 2023
Effective Collaboration in the Management of Access Control Policies: A Survey of Tools.
IEEE Access, 2023
A Machine Learning Based Framework for Real-Time Detection and Mitigation of Sensor False Data Injection Cyber-Physical Attacks in Industrial Control Systems.
IEEE Access, 2023
Proceedings of the IEEE Symposium on Visual Languages and Human-Centric Computing, 2023
2022
Comput. Networks, 2022
2021
IEEE Trans. Cloud Comput., 2021
Flow-based intrusion detection algorithm for supervisory control and data acquisition systems: A real-time approach.
IET Cyper-Phys. Syst.: Theory & Appl., 2021
IEEE Access, 2021
2020
A Dual-Isolation-Forests-Based Attack Detection Framework for Industrial Control Systems.
IEEE Access, 2020
Highlight on Cryptocurrencies Mining with CPUs and GPUs and their Benefits Based on their Characteristics.
Proceedings of the 10th IEEE International Conference on System Engineering and Technology, 2020
Proceedings of the IEEE International Conference on Informatics, 2020
Hybrid Attack Detection Framework for Industrial Control Systems using 1D-Convolutional Neural Network and Isolation Forest.
Proceedings of the 2020 IEEE Conference on Control Technology and Applications, 2020
2019
IT Prof., 2019
Machine Learning-Based Network Vulnerability Analysis of Industrial Internet of Things.
IEEE Internet Things J., 2019
Proceedings of the 18th IEEE International Conference On Trust, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
2018
Dynamic security metrics for measuring the effectiveness of moving target defense techniques.
Comput. Secur., 2018
Proceedings of the 2018 IEEE International Conference on Software Quality, 2018
Proceedings of the 13th International Conference on Software Engineering for Adaptive and Self-Managing Systems, 2018
Proceedings of the 6th IEEE International Conference on Future Internet of Things and Cloud, 2018
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2018
2017
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017
Proceedings of the Second International Conference on Internet of things and Cloud Computing, 2017
2016
Reasoning About Policies in Security-Aware Service Discovery Using Answer Set Programming.
Int. J. Cooperative Inf. Syst., 2016
Proceedings of the 4th IEEE International Conference on Future Internet of Things and Cloud Workshops, 2016
2015
EAI Endorsed Trans. Self Adapt. Syst., 2015
Proceedings of the 8th IEEE/ACM International Conference on Utility and Cloud Computing, 2015
Proceedings of the 2015 IEEE International Conference on Software Quality, 2015
Proceedings of the 8th IEEE/ACM International Symposium on Software and Systems Traceability, 2015
2014
Semantics-Based Approach for Dynamic Evolution of Trust Negotiation Protocols in Cloud Collaboration.
Proceedings of the Service-Oriented Computing - 12th International Conference, 2014
Proceedings of the 3rd IEEE International Conference on Cloud Networking, 2014
Proceedings of the IEEE International Conference on Services Computing, SCC 2014, Anchorage, AK, USA, June 27, 2014
Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, June 27, 2014
2013
Int. J. Comput. Appl. Technol., 2013
Concurr. Comput. Pract. Exp., 2013
Proceedings of the 6th International Conference on Security of Information and Networks, 2013
Proceedings of the IEEE 15th International Conference on e-Health Networking, 2013
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013
2012
Int. J. Secur. Softw. Eng., 2012
Proceedings of the Information Security - 15th International Conference, 2012
Proceedings of the Advanced Research in Applied Artificial Intelligence, 2012
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
2011
Int. J. Secur. Softw. Eng., 2011
Proceedings of the Exploring Services Science - Second International Conference, 2011
Proceedings of the IEEE Ninth International Conference on Dependable, 2011
Proceedings of the Ninth Australasian Information Security Conference, 2011
2010
Proceedings of the New Trends in Software Methodologies, Tools and Techniques, 2010
2009
Proceedings of the Information Systems: Modeling, 2009
Knowledge-Based Algorithms to Optimise e-Learning Outcome.
Proceedings of the 2009 International Conference on Frontiers in Education: Computer Science & Computer Engineering, 2009
2008
Proceedings of the Wiley Encyclopedia of Computer Science and Engineering, 2008
Proceedings of the Seventh International Conference on Composition-Based Software Systems (ICCBSS 2008), 2008
Proceedings of the 6th ACS/IEEE International Conference on Computer Systems and Applications, 2008
2007
Proceedings of the Pacific Asia Conference on Information Systems, 2007
2006
Assessing Security Properties of Software Components: A Software Engineer's Perspective.
Proceedings of the 17th Australian Software Engineering Conference (ASWEC 2006), 2006
Proceedings of the 13th Asia-Pacific Software Engineering Conference (APSEC 2006), 2006
2005
Proceedings of the 16th Australian Software Engineering Conference (ASWEC 2005), 31 March, 2005
2004
Evolution of Software Security - A Must.
Proceedings of the International Conference on Software Engineering Research and Practice, 2004
A framework for transforming artifacts from data flow diagrams to UML.
Proceedings of the IASTED International Conference on Software Engineering, 2004
A Process Framework for Characterising Security Properties of Component-Based Software Systems.
Proceedings of the 15th Australian Software Engineering Conference (ASWEC 2004), 2004
Proceedings of the Conceptual Modelling 2004, 2004
2003
A Security Characterisation Framework for Trustworthy Component Based Software Systems.
Proceedings of the 27th International Computer Software and Applications Conference (COMPSAC 2003): Design and Assessment of Trustworthy Software-Based Systems, 2003
2002
2001
J. Softw. Maintenance Res. Pract., 2001
Australas. J. Inf. Syst., 2001
A Framework for an Active Interface to Characterise Compositional Security Contracts of Software Components.
Proceedings of the 13th Australian Software Engineering Conference (ASWEC 2001), 2001
2000
Proceedings of the TOOLS Asia 2000: 36th International Conference on Technology of Object-Oriented Languages and Systems, Xi'an, China, 30 October, 2000
Proceedings of the 12th Australian Software Engineering Conference (ASWEC 2000), 2000
1999
Proceedings of the Information Security, Second International Workshop, 1999
1997
Inf. Technol. People, 1997
Proceedings of the Third Pacific Asia Conference on Information Systems, 1997
1992
Proceedings of the Conference on Software Maintenance, 1992