Density independent hydrodynamics model for crowd coherency detection H Ullah, M Uzair, M Ullah, A Khan, A Ahmad, W Khan Neurocomputing 242, 28-39, 2017 | 63 | 2017 |
CookiExt: patching the browser against session hijacking attacks WK M. Bugliesi, S. Calzavara, R. Focardi Journal of Computer Security, 2015 | 61 | 2015 |
Scientific reasoning: a solution to the problem of induction W Khan, H Ullah International Journal of Basic & Applied Sciences 10 (3), 58-62, 2010 | 42 | 2010 |
Authentication and secure communication in GSM, GPRS, and UMTS using asymmetric cryptography W Khan, H Ullah International Journal of Computer Science Issues (IJCSI) 7 (3), 10, 2010 | 37 | 2010 |
Learning Outcomes and Assessment Methodology: Case study of an Undergraduate Engineering Project N Syed, Rameez, A Tallha, H Sajjad, Ali, K Wilayat, K Muhammad, ... International Journal of Electrical Engineering Education, 2018 | 36* | 2018 |
Automatic and robust client-side protection for cookie-based sessions M Bugliesi, S Calzavara, R Focardi, W Khan Engineering Secure Software and Systems: 6th International Symposium, ESSoS …, 2014 | 32 | 2014 |
Provably Sound Browser-Based Enforcement of Web Session Integrity Michele Bugliesi, Stefano Calzavara, Riccardo Focardi, Wilayat Khan, Mauro ... 2014 IEEE 27th Computer Security Foundations Symposium, 366-380, 2014 | 28 | 2014 |
Energy-efficient mutual authentication protocol for handhled devices based on public key cryptography W Khan, H Ullah, R Hussain International Journal of Computer Theory and Engineering 5 (5), 754, 2013 | 24 | 2013 |
CrashSafe: a formal model for proving crash-safety of Android applications W Khan, H Ullah, A Ahmad, K Sultan, AJ Alzahrani, SD Khan, M Alhumaid, ... Human-centric Computing and Information Sciences 8, 1-24, 2018 | 20 | 2018 |
Adaptive Security for Self-Protection of Mobile Computing Devices A Aakash, M Asad, Waqar, A Abdulrahman, K Wilayat, S Maryam Mobile Networks and Applications, 1-20, 2019 | 17* | 2019 |
Formal analysis of language-based android security using theorem proving approach W Khan, M Kamran, A Ahmad, FA Khan, A Derhab IEEE Access 7, 16550-16560, 2019 | 16 | 2019 |
IoT Data Sharing Platform in Web 3.0 Using Blockchain Technology WKMA Abdul Razzaq, Ahmed B. Altamimi, Abdulrahman Alreshidi, Shahbaz Ahmed ... Electronics 12 (1233), 1-18, 2023 | 12* | 2023 |
Formal Verification of Hardware Components in Critical Systems W Khan, K Muhammad, N Syed, Rameez, K Farrukh, Aslam, SA Ahmed, ... Wireless Communications and Mobile Computing 2020, 2020 | 12 | 2020 |
Client side web session integrity as a non-interference property W Khan, S Calzavara, M Bugliesi, W De Groef, F Piessens Information Systems Security: 10th International Conference, ICISS 2014 …, 2014 | 11 | 2014 |
Automatic identification of sarcasm in tweets and customer reviews F Naz, M Kamran, W Mehmood, W Khan, MS Alkatheiri, AS Alghamdi, ... Journal of Intelligent & Fuzzy Systems 37 (5), 6815-6828, 2019 | 10 | 2019 |
VeriFormal: An Executable Formal Model of a Hardware Description Language K Wilayat, T Alwen, S David Singapore Cyber Security R&D Conference, 2017 | 10* | 2017 |
PhishCatcher: Client-Side Defense Against Web Spoofing Attacks Using Machine Learning M Ahmed, AB Altamimi, W Khan, M Alsaffar, A Ahmad, ZH Khan, ... IEEE Access 11, 1-15, 2023 | 7 | 2023 |
Modernising Legacy Software as Context-sensitive and Portable Mobile-enabled Application A Ahmad, A Alkhalil, AB Altamimi, K Sultan, W Khan IT Professional, 2019 | 7 | 2019 |
Precision modeling: application of metaheuristics on current–voltage curves of superconducting films SR Naqvi, T Akram, SA Haider, M Kamran, A Shahzad, W Khan, T Iqbal, ... Electronics 7 (8), 138, 2018 | 7 | 2018 |
On embedding a hardware description language in Isabelle/HOL W Khan, D Sanan, Z Hou, L Yang Design Automation for Embedded Systems 23 (3), 123-151, 2019 | 6 | 2019 |