Saad Khan
Orcid: 0000-0001-8613-8200Affiliations:
- University of Huddersfield, UK
According to our database1,
Saad Khan
authored at least 28 papers
between 2017 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Cryptogr., September, 2024
Exploring perceptions of decision-makers and specialists in defensive machine learning cybersecurity applications: The need for a standardised approach.
Comput. Secur., 2024
Cybersecurity Education and Awareness Among Parents and Teachers: A Survey of Bahrain.
IEEE Access, 2024
2023
Context-based irregular activity detection in event logs for forensic investigations: An itemset mining approach.
Expert Syst. Appl., December, 2023
Comparison of deep learning classification models for facial image age estimation in digital forensic investigations.
Forensic Sci. Int. Digit. Investig., December, 2023
IET Biom., January, 2023
A Survey on Empirical Security Analysis of Access-control Systems: A Real-world Perspective.
ACM Comput. Surv., 2023
A Survey on the Detection and Impacts of Deepfakes in Visual, Audio, and Textual Formats.
IEEE Access, 2023
Automated Planning to Prioritise Digital Forensics Investigation Cases Containing Indecent Images of Children.
Proceedings of the Thirty-Third International Conference on Automated Planning and Scheduling, 2023
2022
Cybersecur., 2022
Multi-Mobile Agent Security by Design Itinerary Planning Approach in Wireless Sensor Network.
Proceedings of the Ubiquitous Security - Second International Conference, 2022
On the Variability in the Application and Measurement of Supervised Machine Learning in Cyber Security.
Proceedings of the Ubiquitous Security - Second International Conference, 2022
2021
OCEAN: A Non-Conventional Parameter Free Clustering Algorithm Using Relative Densities of Categories.
Int. J. Pattern Recognit. Artif. Intell., 2021
IET Biom., 2021
Biometric Systems Utilising Health Data from Wearable Devices: Applications and Future Challenges in Computer Security.
ACM Comput. Surv., 2021
2020
J. Cybersecur., 2020
2019
PhD thesis, 2019
J. Inf. Secur. Appl., 2019
<i>Creeper</i>: a tool for detecting permission creep in file system access controls.
Cybersecur., 2019
2018
Automated Planning of Administrative Tasks Using Historic Events: A File System Case Study.
Proceedings of the Guide to Vulnerability Analysis for Computer Networks and Systems, 2018
Review into State of the Art of Vulnerability Assessment using Artificial Intelligence.
Proceedings of the Guide to Vulnerability Analysis for Computer Networks and Systems, 2018
Identifying irregularities in security event logs through an object-based Chi-squared test of independence.
J. Inf. Secur. Appl., 2018
Eliciting and utilising knowledge for security event log analysis: An association rule mining and automated planning approach.
Expert Syst. Appl., 2018
2017
J. Cloud Comput., 2017
Proceedings of the Companion Proceedings of the 10th International Conference on Utility and Cloud Computing, 2017
Proceedings of the Knowledge Capture Conference, 2017
Proceedings of the Second International Conference on Internet of things and Cloud Computing, 2017
Towards A Multi-Tiered Knowledge-Based System for Autonomous Cloud Security Auditing.
Proceedings of the Workshops of the The Thirty-First AAAI Conference on Artificial Intelligence, 2017