Muhammad Imran Khan
Affiliations:- Insight Centre for Data Analytics, University College Cork, Ireland
- Saarland University, Department of Computer Science, Germany
- Petronas University of Technology, Department of Electrical and Electronics Engineering, Teronoh, Malaysia
According to our database1,
Muhammad Imran Khan
authored at least 14 papers
between 2010 and 2021.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2021
Proceedings of the 14th International Conference on Security of Information and Networks, 2021
Database Intrusion Detection Systems (DIDs): Insider Threat Detection via Behaviour-Based Anomaly Detection Systems - A Brief Survey of Concepts and Approaches.
Proceedings of the Emerging Information Security and Applications, 2021
2020
Quantitatively Measuring Privacy in Interactive Query Settings Within RDBMS Framework.
Frontiers Big Data, 2020
Database Intrusion Detection Systems (DIDs): Insider Threat Detection via Behavioural-based Anomaly Detection Systems - A Brief Survey of Concepts and Approaches.
CoRR, 2020
Towards Privacy-anomaly Detection: Discovering Correlation between Privacy and Security-anomalies.
Proceedings of the 17th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2020) / The 15th International Conference on Future Networks and Communications (FNC-2020) / The 10th International Conference on Sustainable Energy Information Technology, 2020
2019
Proceedings of the 10th IFIP International Conference on New Technologies, 2019
2018
Towards Modelling Insiders Behaviour as Rare Behaviour to Detect Malicious RDBMS Access.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018
2017
On database intrusion detection: A Query analytics-based model of normative behavior to detect insider attacks.
Proceedings of the 7th International Conference on Communication and Network Security, 2017
A Semantic Approach to Frequency Based Anomaly Detection of Insider Access in Database Management Systems.
Proceedings of the Risks and Security of Internet and Systems, 2017
2016
Proceedings of the Risks and Security of Internet and Systems, 2016
2011
Proceedings of the IEEE 17th Asia-Pacific Conference on Communications, 2011
2010
On Perceptual Encryption: Variants of DCT Block Scrambling Scheme for JPEG Compressed Images.
Proceedings of the Signal Processing and Multimedia, 2010