关注
Dr Wilayat Khan
Dr Wilayat Khan
COMSATS University Islamabad-Wah Campus
在 kth.se 的电子邮件经过验证
标题
引用次数
引用次数
年份
Density independent hydrodynamics model for crowd coherency detection
H Ullah, M Uzair, M Ullah, A Khan, A Ahmad, W Khan
Neurocomputing 242, 28-39, 2017
632017
CookiExt: patching the browser against session hijacking attacks
WK M. Bugliesi, S. Calzavara, R. Focardi
Journal of Computer Security, 2015
612015
Scientific reasoning: a solution to the problem of induction
W Khan, H Ullah
International Journal of Basic & Applied Sciences 10 (3), 58-62, 2010
422010
Authentication and secure communication in GSM, GPRS, and UMTS using asymmetric cryptography
W Khan, H Ullah
International Journal of Computer Science Issues (IJCSI) 7 (3), 10, 2010
372010
Learning Outcomes and Assessment Methodology: Case study of an Undergraduate Engineering Project
N Syed, Rameez, A Tallha, H Sajjad, Ali, K Wilayat, K Muhammad, ...
International Journal of Electrical Engineering Education, 2018
36*2018
Automatic and robust client-side protection for cookie-based sessions
M Bugliesi, S Calzavara, R Focardi, W Khan
Engineering Secure Software and Systems: 6th International Symposium, ESSoS …, 2014
322014
Provably Sound Browser-Based Enforcement of Web Session Integrity
Michele Bugliesi, Stefano Calzavara, Riccardo Focardi, Wilayat Khan, Mauro ...
2014 IEEE 27th Computer Security Foundations Symposium, 366-380, 2014
282014
Energy-efficient mutual authentication protocol for handhled devices based on public key cryptography
W Khan, H Ullah, R Hussain
International Journal of Computer Theory and Engineering 5 (5), 754, 2013
242013
CrashSafe: a formal model for proving crash-safety of Android applications
W Khan, H Ullah, A Ahmad, K Sultan, AJ Alzahrani, SD Khan, M Alhumaid, ...
Human-centric Computing and Information Sciences 8, 1-24, 2018
202018
Adaptive Security for Self-Protection of Mobile Computing Devices
A Aakash, M Asad, Waqar, A Abdulrahman, K Wilayat, S Maryam
Mobile Networks and Applications, 1-20, 2019
17*2019
Formal analysis of language-based android security using theorem proving approach
W Khan, M Kamran, A Ahmad, FA Khan, A Derhab
IEEE Access 7, 16550-16560, 2019
162019
IoT Data Sharing Platform in Web 3.0 Using Blockchain Technology
WKMA Abdul Razzaq, Ahmed B. Altamimi, Abdulrahman Alreshidi, Shahbaz Ahmed ...
Electronics 12 (1233), 1-18, 2023
12*2023
Formal Verification of Hardware Components in Critical Systems
W Khan, K Muhammad, N Syed, Rameez, K Farrukh, Aslam, SA Ahmed, ...
Wireless Communications and Mobile Computing 2020, 2020
122020
Client side web session integrity as a non-interference property
W Khan, S Calzavara, M Bugliesi, W De Groef, F Piessens
Information Systems Security: 10th International Conference, ICISS 2014 …, 2014
112014
Automatic identification of sarcasm in tweets and customer reviews
F Naz, M Kamran, W Mehmood, W Khan, MS Alkatheiri, AS Alghamdi, ...
Journal of Intelligent & Fuzzy Systems 37 (5), 6815-6828, 2019
102019
VeriFormal: An Executable Formal Model of a Hardware Description Language
K Wilayat, T Alwen, S David
Singapore Cyber Security R&D Conference, 2017
10*2017
PhishCatcher: Client-Side Defense Against Web Spoofing Attacks Using Machine Learning
M Ahmed, AB Altamimi, W Khan, M Alsaffar, A Ahmad, ZH Khan, ...
IEEE Access 11, 1-15, 2023
72023
Modernising Legacy Software as Context-sensitive and Portable Mobile-enabled Application
A Ahmad, A Alkhalil, AB Altamimi, K Sultan, W Khan
IT Professional, 2019
72019
Precision modeling: application of metaheuristics on current–voltage curves of superconducting films
SR Naqvi, T Akram, SA Haider, M Kamran, A Shahzad, W Khan, T Iqbal, ...
Electronics 7 (8), 138, 2018
72018
On embedding a hardware description language in Isabelle/HOL
W Khan, D Sanan, Z Hou, L Yang
Design Automation for Embedded Systems 23 (3), 123-151, 2019
62019
系统目前无法执行此操作,请稍后再试。
文章 1–20