The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications of Khaled M. Khan Khaled Khan Khaled Md. Khan Md. Khaled Khan ( http://dblp.L3S.de/Authors/Khaled_M._Khan )

Publication years (Num. hits)
1994-2004 (15) 2005-2011 (16) 2012-2015 (18) 2016-2019 (14)
Publication types (Num. hits)
article(20) incollection(1) inproceedings(42)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 10 occurrences of 6 keywords

Results
Found 64 publication records. Showing 63 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Jin B. Hong, Armstrong Nhlabatsi, Dong Seong Kim, Alaa Hussein, Noora Fetais, Khaled M. Khan Systematic identification of threats in the cloud: A survey. Search on Bibsonomy Computer Networks The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Yongge Wang, Khaled M. Khan Matrix Barcode Based Secure Authentication without Trusting Third Party. Search on Bibsonomy IT Professional The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Maede Zolanvari, Marcio Andrey Teixeira, Lav Gupta, Khaled M. Khan, Raj Jain Machine Learning-Based Network Vulnerability Analysis of Industrial Internet of Things. Search on Bibsonomy IEEE Internet of Things Journal The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1SeoungMo An, Taehoon Eom, Jong Sou Park, Jin B. Hong, Armstrong Nhlabatsi, Noora Fetais, Khaled M. Khan, Dong Seong Kim CloudSafe: A Tool for an Automated Security Analysis for Cloud Computing. Search on Bibsonomy CoRR The full citation details ... 2019 DBLP  BibTeX  RDF
1Simon Enoch Yusuf, Jin B. Hong, Mengmeng Ge, Khaled M. Khan, Dong Seong Kim Multi-Objective Security Hardening Optimisation for Dynamic Networks. Search on Bibsonomy ICC The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Khaled Khan, Mahboob Shaheen, Yongge Wang Using Sparse Matrices to Prevent Information Leakage in Cloud Computing. Search on Bibsonomy FiCloud The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jin B. Hong, Simon Enoch Yusuf, Dong Seong Kim, Armstrong Nhlabatsi, Noora Fetais, Khaled M. Khan Dynamic security metrics for measuring the effectiveness of moving target defense techniques. Search on Bibsonomy Computers & Security The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Armstrong Nhlabatsi, Jin B. Hong, Dong Seong Kim, Rachael Fernandez, Noora Fetais, Khaled M. Khan Spiral^SRA: A Threat-Specific Security Risk Assessment Framework for the Cloud. Search on Bibsonomy QRS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jinwei Hu, Khaled M. Khan, Yan Zhang 0003, Yun Bai 0001, Ruixuan Li Role updating in information systems using model checking. Search on Bibsonomy Knowl. Inf. Syst. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Khaled M. Khan, Zhuhan Jiang Managing Client-Specific Customised Functions in Multi-Tenant Software-as-a-Service. Search on Bibsonomy QRS Companion The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Khaled M. Khan, Mahboob Shaheen, Yongge Wang Data confidentiality in cloud-based pervasive system. Search on Bibsonomy ICC The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Vernon Asuncion, Khaled M. Khan, Abdelkarim Erradi, Saleh Alhazbi Reasoning About Policies in Security-Aware Service Discovery Using Answer Set Programming. Search on Bibsonomy Int. J. Cooperative Inf. Syst. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Rana Adnan Rihan, Khaled M. Khan Using Block Cipher for Confidentiality of Images in Cloud-Based Systems. Search on Bibsonomy FiCloud Workshops The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Yongge Wang, Qutaibah M. Malluhi, Khaled Md. Khan Garbled computation in cloud. Search on Bibsonomy Future Generation Comp. Syst. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Armstrong Nhlabatsi, Thein Than Tun, Niamul Khan, Yijun Yu, Arosha K. Bandara, Khaled M. Khan, Bashar Nuseibeh "Why can't I do that?": Tracing Adaptive Security Decisions. Search on Bibsonomy EAI Endorsed Trans. Self-Adaptive Systems The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Khaled M. Khan, Mahboob Shaheen Data Obfuscation for Privacy and Confidentiality in Cloud Computing. Search on Bibsonomy QRS Companion The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Khaled M. Khan, Armstrong Nhlabatsi, Niamul Khan A Process Model for Customisation of Software in Multi-tenant SaaS Model. Search on Bibsonomy UCC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Armstrong Nhlabatsi, Yijun Yu, Andrea Zisman, Thein Than Tun, Niamul Khan, Arosha K. Bandara, Khaled M. Khan, Bashar Nuseibeh Managing Security Control Assumptions Using Causal Traceability. Search on Bibsonomy SST@ICSE The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Armstrong Nhlabatsi, Thein Than Tun, Niamul Khan, Yijun Yu, Arosha K. Bandara, Khaled Khan, Bashar Nuseibeh Traceability for Adaptive Information Security in the Cloud. Search on Bibsonomy IEEE CLOUD The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Seung Hwan Ryu, Abdelkarim Erradi, Khaled M. Khan, Saleh Alhazbi, Boualem Benatallah Semantics-Based Approach for Dynamic Evolution of Trust Negotiation Protocols in Cloud Collaboration. Search on Bibsonomy ICSOC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Khaled M. Khan, Mahboob Shaheen Empowering users of cloud computing on data confidentiality. Search on Bibsonomy CLOUDNET The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Vernon Asuncion, Khaled M. Khan, Abdelkarim Erradi, Saleh Alhazbi Reasoning about Security Policies of Services Using Answer Set Programming. Search on Bibsonomy IEEE SCC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Khaled M. Khan, Qutaibah M. Malluhi Role of contextual properties in enterprise service migration to cloud computing. Search on Bibsonomy Concurrency and Computation: Practice and Experience The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Khaled M. Khan, Qutaibah M. Malluhi Trust in Cloud Services: Providing More Controls to Clients. Search on Bibsonomy IEEE Computer The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Khaled M. Khan, Abdelkarim Erradi, Saleh Alhazbi, Jun Han 0004 Addressing security compatibility for multi-tenant cloud services. Search on Bibsonomy IJCAT The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Edward Caprin, Yan Zhang, Khaled M. Khan Social access control language (SocACL). Search on Bibsonomy SIN The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Khaled M. Khan, Yun Bai 0001 Automatic verification of health regulatory compliance in cloud computing. Search on Bibsonomy Healthcom The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Khaled M. Khan, Mahboob Shaheen Secure Cloud Services: Matrix Multiplication Revisited. Search on Bibsonomy CSE The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
1Khaled M. Khan Software Security Engineering: Design and Applications. Search on Bibsonomy IJSSE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jinwei Hu, Khaled M. Khan, Yun Bai 0001, Yan Zhang 0003 Constraint-enhanced role engineering via answer set programming. Search on Bibsonomy AsiaCCS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jinwei Hu, Khaled M. Khan, Yun Bai 0001, Yan Zhang 0003 Compliance Checking for Usage-Constrained Credentials in Trust Negotiation Systems. Search on Bibsonomy ISC The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Jinwei Hu, Khaled M. Khan, Yun Bai 0001, Yan Zhang 0003 Tracking and Constraining Authorization Provenance. Search on Bibsonomy IEA/AIE The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Yun Bai 0001, Khaled Khan A Modal Logic for Information System Security. Search on Bibsonomy AISC The full citation details ... 2011 DBLP  BibTeX  RDF
1Yun Bai 0001, Khaled M. Khan Ell Secure Information System Using Modal Logic Technique. Search on Bibsonomy IJSSE The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Khaled M. Khan Profile-Based Security Assurances for Service Software. Search on Bibsonomy IESS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Khaled M. Khan, Qutaibah M. Malluhi Identifying Contextual Properties of Software Architecture in Cloud Computing. Search on Bibsonomy DASC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Khaled M. Khan, Jun Han 0004 A Tool Support for Secure Software Integration. Search on Bibsonomy IJSSE The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Khaled M. Khan, Qutaibah M. Malluhi Establishing Trust in Cloud Computing. Search on Bibsonomy IT Professional The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Khaled M. Khan, Qutaibah M. Malluhi Security-Aware Service Composition for End Users of Small Enterprises. Search on Bibsonomy SoMeT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Zhuhan Jiang, Xiling Guo, Narendra Gangavarapu, Khaled Khan Knowledge-Based Algorithms to Optimise e-Learning Outcome. Search on Bibsonomy FECS The full citation details ... 2009 DBLP  BibTeX  RDF
1Khaled M. Khan, Calvin Tan SecCom: A Prototype for Integrating Security-Aware Components. Search on Bibsonomy UNISCON The full citation details ... 2009 DBLP  DOI  BibTeX  RDF composition, Software components, security properties, software services, security-aware
1Khaled M. Khan, Jun Han 0004 Specifying Security Goals of Component Based Systems: An End-User Perspective. Search on Bibsonomy ICCBSS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF security goals, end users perpective, security properties, software composition, software service
1Khaled M. Khan Assessing quality of web based systems. Search on Bibsonomy AICCSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Mohammed Samaka, Khaled Md. Khan Wireless Networks. Search on Bibsonomy Wiley Encyclopedia of Computer Science and Engineering The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Khaled Md. Khan Selecting Web Services with Security Compliances: A Managerial Perspective. Search on Bibsonomy PACIS The full citation details ... 2007 DBLP  BibTeX  RDF
1Khaled M. Khan, Jun Han 0004 Assessing Security Properties of Software Components: A Software Engineer's Perspective. Search on Bibsonomy ASWEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Jun Han 0004, Khaled M. Khan Security-Oriented Service Composition and Evolution. Search on Bibsonomy APSEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Khaled M. Khan, Jun Han 0004 Deriving Systems Level Security Properties of Component Based Composite Systems. Search on Bibsonomy Australian Software Engineering Conference The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Khaled Khan, Narendra Gangavarapu, Hiep Pham Evolution of Software Security - A Must. Search on Bibsonomy Software Engineering Research and Practice The full citation details ... 2004 DBLP  BibTeX  RDF
1Khaled M. Khan, Jun Han 0004 A Process Framework for Characterising Security Properties of Component-Based Software Systems. Search on Bibsonomy Australian Software Engineering Conference The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Khaled M. Khan, Mahesha Kapurubandara, Urvashi Chadha Incorporating Business Requirements and Constraints in Database Conceptual Model. Search on Bibsonomy APCCM The full citation details ... 2004 DBLP  BibTeX  RDF
1Thu Nga Tran, Khaled M. Khan, Yi-Chen Lan A framework for transforming artifacts from data flow diagrams to UML. Search on Bibsonomy IASTED Conf. on Software Engineering The full citation details ... 2004 DBLP  BibTeX  RDF
1Khaled M. Khan, Jun Han 0004 A Security Characterisation Framework for Trustworthy Component Based Software Systems. Search on Bibsonomy COMPSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Khaled M. Khan, Jun Han 0004 Composing Security-Aware Software. Search on Bibsonomy IEEE Software The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
1Khaled Khan, Bruce W. N. Lo, Torbjørn Skramstad Tasks and Methods for Software Maintenance: a process oriented framework. Search on Bibsonomy Australasian J. of Inf. Systems The full citation details ... 2001 DBLP  BibTeX  RDF
1Khaled M. Khan, Jun Han 0004, Yuliang Zheng A Framework for an Active Interface to Characterise Compositional Security Contracts of Software Components. Search on Bibsonomy Australian Software Engineering Conference The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Ned Chapin, Joanne E. Hale, Khaled Md. Khan, Juan F. Ramil, Wui-Gee Tan Types of software evolution and software maintenance. Search on Bibsonomy Journal of Software Maintenance The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Khaled M. Khan, Jun Han 0004, Yuliang Zheng Characterizing User Data Protection of Software Components. Search on Bibsonomy Australian Software Engineering Conference The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Khaled M. Khan, Jun Han 0004, Yuliang Zheng Security Characterization of Software Components and Their Composition. Search on Bibsonomy TOOLS (36) The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Khaled M. Khan, Jun Han 0004, Yuliang Zheng Security Properties of Software Components. Search on Bibsonomy ISW The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Component functionality, Software component, Security properties
1Khaled M. Khan, M. Ramakrishnan, Bruce W. N. Lo Assessment Model for Software Maintenance Tools: A Conceptual Framework. Search on Bibsonomy PACIS The full citation details ... 1997 DBLP  BibTeX  RDF
1Md. Mahbubur Rahim, Md. Khaled Khan, Mohd Hasan Selamat Adoption versus abandonment of CASE tools: lessons from two organizations. Search on Bibsonomy IT & People The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
1Khaled Khan Advantages of Using Prototypes in a Multi-Layer Perceptron and Comparison to Other Neural Networks. Search on Bibsonomy ECAI The full citation details ... 1994 DBLP  BibTeX  RDF
Displaying result #1 - #63 of 63 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license