Adnan Shahid Khan

ORCID: 0000-0002-3924-3646
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Mobile Ad Hoc Networks
  • Advanced Authentication Protocols Security
  • Network Security and Intrusion Detection
  • Cooperative Communication and Network Coding
  • Cryptography and Data Security
  • Opportunistic and Delay-Tolerant Networks
  • Wireless Communication Security Techniques
  • Innovation and Knowledge Management
  • Vehicular Ad Hoc Networks (VANETs)
  • Energy Efficient Wireless Sensor Networks
  • Anomaly Detection Techniques and Applications
  • Advanced Malware Detection Techniques
  • University-Industry-Government Innovation Models
  • Advanced MIMO Systems Optimization
  • Internet Traffic Analysis and Secure E-voting
  • IoT and Edge/Fog Computing
  • Advanced Wireless Network Optimization
  • Spam and Phishing Detection
  • User Authentication and Security Systems
  • Cryptographic Implementations and Security
  • Intellectual Capital and Performance Analysis
  • Software-Defined Networks and 5G
  • Energy Harvesting in Wireless Networks
  • Blockchain Technology Applications and Security
  • IPv6, Mobility, Handover, Networks, Security

Universiti Malaysia Sarawak
2016-2025

Advocate Lutheran General Hospital
2024

King Fahd University of Petroleum and Minerals
2022

Saint Louis University
2021

Qatar University
2020

Behman Hospital
2019

Bangladesh University of Engineering and Technology
2018

University of Missouri–Kansas City
2016

Innopolis University
2016

University of Technology Malaysia
2010-2013

Abstract The rapid advances in the internet and communication fields have resulted a huge increase network size corresponding data. As result, many novel attacks are being generated posed challenges for security to accurately detect intrusions. Furthermore, presence of intruders with aim launch various within cannot be ignored. An intrusion detection system (IDS) is one such tool that prevents from possible intrusions by inspecting traffic, ensure its confidentiality, integrity,...

10.1002/ett.4150 article EN cc-by Transactions on Emerging Telecommunications Technologies 2020-10-16

Vehicular ad hoc networks (VANET) are also known as intelligent transportation systems. VANET ensures timely and accurate communications between vehicle to (V2V) infrastructure (V2I) improve road safety enhance the efficiency of traffic flow. Due its open wireless boundary high mobility, is vulnerable malicious nodes that could gain access into network carry out serious medium control (MAC) layer threats, such denial service (DoS) attacks, data modification impersonation Sybil replay...

10.3390/s19224954 article EN cc-by Sensors 2019-11-14

The revolutionary idea of the internet things (IoT) architecture has gained enormous popularity over last decade, resulting in an exponential growth IoT networks, connected devices, and data processed therein. Since devices generate exchange sensitive traditional internet, security become a prime concern due to generation zero-day cyberattacks. A network-based intrusion detection system (NIDS) can provide much-needed efficient solution network by protecting entry points through constant...

10.3390/app11157050 article EN cc-by Applied Sciences 2021-07-30

The dynamics of computer networks have changed rapidly over the past few years due to a tremendous increase in volume connected devices and corresponding applications. This growth network's size our dependence on it for all aspects life therefore resulted generation many attacks network by malicious parties that are either novel or mutations older attacks. These pose challenges security personnel protect nodes data from possible intrusions. A intrusion detection system (NIDS) can act as one...

10.1109/access.2021.3088149 article EN cc-by-nc-nd IEEE Access 2021-01-01

The web application has become a primary target for cyber criminals by injecting malware especially JavaScript to perform malicious activities impersonation. Thus, it becomes an imperative detect such code in real time before any activity is performed. This study proposes efficient method of detecting previously unknown java scripts using interceptor at the client side classifying key features code. Feature subset was obtained wrapper dimensionality reduction. Supervised machine learning...

10.1155/2017/5360472 article EN Wireless Communications and Mobile Computing 2017-01-01

Cloud computing is vital in various applications, such as healthcare, transportation, governance, and mobile computing. When using a public cloud server, it mandatory to be secured from all known threats because minor attacker’s disturbance severely threatens the whole system. A server posed with numerous threats; an adversary can easily enter access sensitive information, especially for healthcare industry, which offers services patients, researchers, labs, hospitals flexible way minimal...

10.1371/journal.pone.0294429 article EN cc-by PLoS ONE 2024-01-30

Short Message Service (SMS) spam poses significant risks, including financial scams and phishing attempts. Although numerous datasets from online repositories have been utilized to address this issue, little attention has given evaluating their effectiveness impact on SMS detection models. This study fills gap by assessing the performance of ten using Decision Tree Multinomial Naïve Bayes Datasets were evaluated based accuracy qualitative factors such as authenticity, class imbalance,...

10.1038/s41598-025-92223-1 article EN cc-by-nc-nd Scientific Reports 2025-03-10

Purpose: The purpose of this work is to understand the changes brought by artificial intelligence (AI) and big data analytics (BDA) supply chain management (SCM) sustainable manufacturing (SM) in developing countries context. It seeks identify key enablers, advantages, challenges implementing those technologies toward advancement UN SDGs. Design/Methodology/Approach: Cross-sectional survey research method was adopted; specifically, structured questionnaires were administered 356 mid senior...

10.26710/sbsee.v7i1.3266 article EN cc-by-nc Sustainable Business and Society in Emerging Economies 2025-03-31

In this work, a new heuristic computing design is presented with an artificial intelligence approach to exploit the models feed-forward (FF) Gudermannian neural networks (GNN) accomplished global search capability of genetic algorithms (GA) combined local convergence aptitude active-set method (ASM), i.e., FF-GNN-GAASM solve second kind Lane–Emden nonlinear singular (LE-NSM). The proposed based on intelligent kernel incorporated hidden layer configuration FF-GNN differential operatives...

10.3390/app11114725 article EN cc-by Applied Sciences 2021-05-21

Abstract Software‐defined networking (SDN) has received considerable attention and adoption owing to its inherent advantages, such as enhanced scalability, increased adaptability, the ability exercise centralized control. However, control plane of system is vulnerable denial‐of‐service (DoS) attacks, which are a primary focus for attackers. These attacks have potential result in substantial delays packet loss. In this study, we present novel called Two‐Phase Authentication Attack Detection...

10.1002/nem.2258 article EN cc-by International Journal of Network Management 2024-01-12

With increased interest in 6G (6th Generation) cellular networks that can support intelligently small-cell communication will result effective device-to-device (D2D) communication. High throughput requirement 5G/6G technology requires each device to act as intelligent transmission relays. Inclusion of such intelligence relays and quantum computing at D2D may compromise existing security mechanisms lead towards primitive attacks impersonation attack, rouge replay MITM DoS attack. Thus, an yet...

10.1109/access.2022.3159686 article EN cc-by-nc-nd IEEE Access 2022-01-01

This paper demonstrates a broad exploration of existing authentication and secure communication unmanned aerial vehicles (UAVs) in ‘6G network’. We begin with an overview surveys that deal UAV 6G beyond communications, standardization, applications security. In order to highlight the impact blockchain ‘UAV networks’ future systems, we categorize groups this review into two comprehensive groups. The first group, named Performance Group (PG), comprises performance-related needs on data rates,...

10.3390/app13010277 article EN cc-by Applied Sciences 2022-12-26

Cell-Free mMIMO is a part of technology that will be integrated with future 6G ultra-dense cellular networks to ensure unlimited wireless connectivity and ubiquitous latency-sensitive services. gained researchers' interest as it offers communication large bandwidth, high throughput, data transmission, greater signal gain. eliminates the idea cell boundary in reduces frequent handover inter-cell interference issues. However, effectiveness current authentication protocol could become serious...

10.1109/access.2023.3249969 article EN cc-by IEEE Access 2023-01-01

Vehicular ad hoc networks (VANETs) have earned a gigantic consideration in the recent era. Wide deployment of VANETs for enhancing traffic safety, management, and assisting drivers through elegant transportation system is facing several research challenges that need to be addressed. One crucial issues consists design scalable routing algorithms are robust rapid topology changes frequent link disconnections caused by high mobility vehicles. In this article, first all, we give detailed...

10.1186/s13638-018-1233-z article EN cc-by EURASIP Journal on Wireless Communications and Networking 2018-10-10

Nowadays, the organizations are emphasizing on security and resilient aspect of cloud computing to protect privacy confidentiality their data information. However, hypervisor attack remains a hot issue by user even though enormous research have accomplished inhibit vulnerabilities in virtualized environment. Therefore, we proposed Virtual Machines Hypervisor Intrusion Detection System, VMHIDS as our technique detecting preventing attacks The has adopted several features from other techniques...

10.1109/anti-cybercrime.2017.7905282 article EN 2017-03-01

VANET (Vehicular Ad-hoc Network) is an emerging offshoot of MANETs (Mobile Networks) with highly mobile nodes. It envisioned to play a vital role in providing safety communications and commercial applications the on-road public. Establishing optimal route for vehicles send packets their respective destinations VANETs challenging because quick speed vehicles, dynamic nature network, intermittent connectivity among This paper presents novel position based routing technique called Dynamic...

10.3390/app8050687 article EN cc-by Applied Sciences 2018-04-28
Coming Soon ...