Sohail Khan

Orcid: 0000-0001-9286-5236

According to our database1, Sohail Khan authored at least 23 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Interpretable Detection of Malicious Behavior in Windows Portable Executables Using Multi-Head 2D Transformers.
Big Data Min. Anal., 2024

2021
Finite element analysis of distribution transformer under harmonics condition
PhD thesis, 2021

2020
Optimal Placement of Electric Vehicle Charging Stations in the Active Distribution Network.
IEEE Access, 2020

Optimal Energy Interruption Planning and Generation Re-dispatch for Improving Reliability during Contingencies.
Proceedings of the IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2020

2018
Design and implementation of an attestation protocol for measured dynamic behavior.
J. Supercomput., 2018

Deep neural architectures for large scale android malware analysis.
Clust. Comput., 2018

2016
TSSDroid: realization of an efficient and usable TSS API for the Android software stack.
Secur. Commun. Networks, 2016

Stochastic battery model for aggregation of thermostatically controlled loads.
Proceedings of the IEEE International Conference on Industrial Technology, 2016

2015
Realization of a user-centric, privacy preserving permission framework for Android.
Secur. Commun. Networks, 2015

2014
Survey, Illustrations and Limits of Game Theory for Cyber-Physical Energy Systems.
Autom., 2014

Transforming high-level requirements to executable policies for Android.
Proceedings of the 8th International Conference on Ubiquitous Information Management and Communication, 2014

A Replicator Dynamics method for the Unit Commitment problem.
Proceedings of the Workshop on Modeling and Simulation of Cyber-Physical Energy Systems, 2014

2013
Dynamics of wind-turbine driven Self-Excited Induction Generator with online parameter calculation.
Proceedings of the IECON 2013, 2013

Towards a high-level trusted computing API for Android software stack.
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, 2013

Realization of dynamic behavior using remotely verifiable n-call slides in Unix process execution trace.
Proceedings of the 7th International Conference on Ubiquitous Information Management and Communication, 2013

2012
A sense of others: behavioral attestation of UNIX processes on remote platforms.
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, 2012

POAuth: privacy-aware open authorization for native apps on smartphone platforms.
Proceedings of the 6th International Conference on Ubiquitous Information Management and Communication, 2012

How secure is your smartphone: An analysis of smartphone security mechanisms.
Proceedings of the 2012 International Conference on Cyber Security, 2012

2011
Design and implementation of a fine-grained resource usage model for the android platform.
Int. Arab J. Inf. Technol., 2011

2010
Beyond Kernel-Level Integrity Measurement: Enabling Remote Attestation for the Android Platform.
Proceedings of the Trust and Trustworthy Computing, Third International Conference, 2010

MAuth: A Fine-Grained and User-centric Permission Delegation Framework for Multi-mashup Web Services.
Proceedings of the 6th World Congress on Services, 2010

Apex: extending Android permission model and enforcement with user-defined runtime constraints.
Proceedings of the 5th ACM Symposium on Information, 2010

2009
A trustworthy identity management architecture for e-government processes in Pakistan.
Proceedings of the FIT '09, 2009


  Loading...