Defending Malicious Script Attacks Using Machine Learning Classifiers N Khan, A Shahid, Johari Abdullah Wireless Communications and Mobile Computing 2017 (Article ID 5360472), 9, 2017 | 82 | 2017 |
Effective way to defend the hypervisor attacks in cloud computing MS Dildar, N Khan, JB Abdullah, AS Khan 2017 2nd International Conference on Anti-Cyber Crimes (ICACC), 154 - 159, 2017 | 34 | 2017 |
Towards vulnerability prevention model for web browser using interceptor approach N Khan, J Abdullah, AS Khan 2015 9th International Conference on IT in Asia (CITA), 1-5, 2015 | 32 | 2015 |
Security issues in 5G device to device communication NK AS Khan, Yasir Javed, J Abdullah, JM Nazim IJCSNS 17 (5), 366, 2017 | 26 | 2017 |
Quantum-Elliptic curve Cryptography for Multihop Communication in 5G Networks ST S Khan, J Abdullah, N Khan, AA Julahi IJCSNS 17 (5), 357, 2017 | 22* | 2017 |
Lightweight multifactor authentication scheme for nextgen cellular networks AS Khan, Y Javed, RM Saqib, Z Ahmad, J Abdullah, K Zen, IA Abbasi, ... IEEE Access 10, 31273-31288, 2022 | 16 | 2022 |
MNN-XSS: Modular neural network based approach for XSS attack detection AA Alqarni, N Alsharif, NA Khan, L Georgieva, E Pardede, MY Alzahrani La Trobe, 2022 | 14 | 2022 |
A Dynamic Method of Detecting Malicious Scripts Using Classifiers N Khan, J Abdullah, AS Khan Adv. Sci. Lett. 23 (7), 5352–5355, 2017 | 13 | 2017 |
Enhancing the performance of SQL injection attack detection through probabilistic neural networks FK Alarfaj, NA Khan Applied Sciences 13 (7), 4365, 2023 | 10 | 2023 |
Cyberattack Detection Framework Using Machine Learning and User Behavior Analytics A Abdullah, K Nayeem Computer Systems Science & Engineering 44 (2), 1679-1689, 2022 | 10* | 2022 |
Hybrid Feature Classification Approach for Malicious JavaScript Attack Detection using Deep Learning HAK Nayeem A. Khan, Mohammad Y. Alzaharani International Journal of Computer Science and Information Security (IJCSIS …, 2020 | 10* | 2020 |
A Taxonomy Study of XSS Vulnerabilities N Khan, A Shahid, J Abdullah Asian Journal of Information Technology 16 (2), 169-177, 2017 | 8 | 2017 |
Blockchain-based lightweight multifactor authentication for cell-free in ultra-dense 6G-based (6-CMAS) cellular network AS Khan, MIB Yahya, KB Zen, JB Abdullah, RBA Rashid, Y Javed, ... IEEE Access 11, 20524-20541, 2023 | 6 | 2023 |
5G Network: Techniques to Increase Quality of Service and Quality of Experience NA Khan International Journal of Computer Networks and Applications, 476-496, 2022 | 5 | 2022 |
PKI-Based Security Enhancement for IoT in 5G Networks NA Khan Inventive Computation and Information Technologies: Proceedings of ICICIT …, 2022 | 5 | 2022 |
Employing public key infrastructure to encapsulate messages during transport layer security handshake procedure NA Khan, AS Khan, HA Kar, Z Ahmad, S Tarmizi, AA Julaihi 2022 Applied Informatics International Conference (AiIC), 126-130, 2022 | 3 | 2022 |
Establishing EndVisor and quarantine approach in solving security issues of virtualization N Khan, MY Alzaharani Indian Journal of Science and Technology 11, 47, 2018 | 3 | 2018 |
Protecting Attacks on Unmanned Aerial Vehicles using Homomorphic Encryption MY Alzahrani, NA Khan, L Georgieva, AM Bamahdi, OA Abdulkader, ... Indonesian Journal of Electrical Engineering and Informatics 11 (1), 88-96, 2023 | 2 | 2023 |
A Deep Study on security vulnerabilities in virtualization at cloud computing N Khan, TA War International Journal of Computer Applications 975, 8887, 2018 | 2 | 2018 |
A Framework for XSS Attack Prevention in Web Browser using Interceptor Approach N Khan Indian Journal of Science & Technology 11 (16), 1-12, 2018 | 2 | 2018 |