A new fuzzy FUCOM-QFD approach for evaluating strategies to enhance the resilience of the healthcare sector to combat the COVID-19 pandemic F Khan, Y Ali, D Pamucar Kybernetes 51 (4), 1429-1451, 2022 | 42 | 2022 |
A cognitive key management technique for energy efficiency and scalability in securing the sensor nodes in the IoT environment: CKMT AB Feroz Khan, G Anandharaj SN Applied Sciences 1 (12), 1575, 2019 | 39 | 2019 |
Ahkm: an improved class of hash based key management mechanism with combined solution for single hop and multi hop nodes in iot ABF Khan, G Anandharaj Egyptian Informatics Journal (Elseveir), 2020 | 36 | 2020 |
A cognitive energy efficient and trusted routing model for the security of wireless sensor networks: CEMT AB Feroz Khan, G Anandharaj Wireless Personal Communications 119 (4), 3149-3159, 2021 | 31 | 2021 |
A Multi-layer Security approach for DDoS detection in Internet of Things AB Feroz Khan International Journal of Intelligent Unmanned Systems 9 (3), 178-191, 2021 | 23 | 2021 |
A multi-attribute based trusted routing for embedded devices in MANET-IoT ABF Khan, CN Rajalakshmi Microprocessors and Microsystems (Elsevier), 104446, 2022 | 19 | 2022 |
DDoS attack modeling and resistance using trust based protocol for the security of Internet of Things ABF Khan, MM Hussain, SK Devi, MA Gunavathie Journal of Engineering Research 11 (2), 100058, 2023 | 17 | 2023 |
The Embedded Framework for Securing the Internet of Things. AB Ferozkhan, G Anandharaj Journal of Engineering Research 9 (2), 2021 | 12 | 2021 |
Integrating Machine Learning and Stochastic Pattern Analysis for the Forecasting of Time-Series Data ABF Khan, K Kamalakannan, NSS Ahmed SN Computer Science 4 (5), 484, 2023 | 8 | 2023 |
Evaluating online learning adaptability in students using machine learning-based techniques: A novel analytical approach AB Feroz Khan, SRA Samad Educ. Sci. Manag 2 (1), 25-34, 2024 | 6 | 2024 |
An enhanced AES-GCM based security protocol for securing the IoT communication FK AB, DK Rama Научно-технический вестник информационных технологий, механики и оптики 23 …, 2023 | 6 | 2023 |
Integrating Machine Learning and Deep Learning in Smart Cities for Enhanced Traffic Congestion Management: An Empirical Review ABF Khan, P Ivan J. Urban Dev. Manag 2 (4), 211-221, 2023 | 4 | 2023 |
What is Mobile Phishing and How to Detect it A Khan, KT Chui Insights2Techinfo, 2021 | 2 | 2021 |
Congestion control using load balancing and multipath routing technique in MANET A Verma, A Khan Proceedings of Recent Advances in Interdisciplinary Trends in Engineering …, 2019 | 2 | 2019 |
A cognitive key management technique for energy efficiency and scalability in securing the sensor nodes in the IoT environment: CKMT. SN Appl Sci. 2019; 1: 1575 ABF Khan, G Anandharaj | 2 | 2019 |
An Enhanced Multi Attribute Based Trusted Attack Resistance (EMBTR) for the Secure Routing of Sensor Nodes in Wireless Sensor Network AB Feroz Khan Wireless Personal Communications 137 (4), 2397-2407, 2024 | 1 | 2024 |
Fuzzy rules-based Data Analytics and Machine Learning for Prognosis and Early Diagnosis of Coronary Heart Disease A Ali A, F Khan AB, J Ramakrishnan Journal of Information and Organizational Sciences 48 (1), 167-181, 2024 | 1 | 2024 |
Securing the Internet of Things: Challenges, Strategies, and Future Directions FK AB, B Karthick, M Matheena BP International, 2023 | 1 | 2023 |
Enhancing Security in the Internet of Things: A Trust-Based Protocol for Resilient Communication A Althaf Ali, MM Hussain, A Subramaneswara Rao, S Lavanya, ... SN Computer Science 5 (1), 4, 2023 | 1 | 2023 |
All about Geographic Information System (GIS) A Khan Insights2Tecinfo, 2021 | 1 | 2021 |