Stebėti
Dr Wilayat Khan
Dr Wilayat Khan
University of Hail, Saudi Arabia
Patvirtintas el. paštas kth.se
Pavadinimas
Cituota
Cituota
Metai
CookiExt: patching the browser against session hijacking attacks
WK M. Bugliesi, S. Calzavara, R. Focardi
Journal of Computer Security, 2015
672015
Density independent hydrodynamics model for crowd coherency detection
H Ullah, M Uzair, M Ullah, A Khan, A Ahmad, W Khan
Neurocomputing 242, 28-39, 2017
642017
Scientific reasoning: a solution to the problem of induction
W Khan, H Ullah
International Journal of Basic & Applied Sciences 10 (3), 58-62, 2010
422010
Authentication and secure communication in GSM, GPRS, and UMTS using asymmetric cryptography
W Khan, H Ullah
International Journal of Computer Science Issues (IJCSI) 7 (3), 10, 2010
392010
Learning Outcomes and Assessment Methodology: Case study of an Undergraduate Engineering Project
N Syed, Rameez, A Tallha, H Sajjad, Ali, K Wilayat, K Muhammad, ...
International Journal of Electrical Engineering Education, 2018
36*2018
Automatic and robust client-side protection for cookie-based sessions
M Bugliesi, S Calzavara, R Focardi, W Khan
Engineering Secure Software and Systems: 6th International Symposium, ESSoS …, 2014
342014
Provably Sound Browser-Based Enforcement of Web Session Integrity
Michele Bugliesi, Stefano Calzavara, Riccardo Focardi, Wilayat Khan, Mauro ...
2014 IEEE 27th Computer Security Foundations Symposium, 366-380, 2014
282014
Energy-efficient mutual authentication protocol for handhled devices based on public key cryptography
W Khan, H Ullah, R Hussain
International Journal of Computer Theory and Engineering 5 (5), 754, 2013
242013
CrashSafe: a formal model for proving crash-safety of Android applications
W Khan, H Ullah, A Ahmad, K Sultan, AJ Alzahrani, SD Khan, M Alhumaid, ...
Human-centric Computing and Information Sciences 8, 1-24, 2018
202018
Adaptive Security for Self-Protection of Mobile Computing Devices
A Aakash, M Asad, Waqar, A Abdulrahman, K Wilayat, S Maryam
Mobile Networks and Applications, 1-20, 2019
18*2019
Formal analysis of language-based android security using theorem proving approach
W Khan, M Kamran, A Ahmad, FA Khan, A Derhab
IEEE Access 7, 16550-16560, 2019
162019
PhishCatcher: Client-Side Defense Against Web Spoofing Attacks Using Machine Learning
M Ahmed, AB Altamimi, W Khan, M Alsaffar, A Ahmad, ZH Khan, ...
IEEE Access 11, 1-15, 2023
142023
IoT Data Sharing Platform in Web 3.0 Using Blockchain Technology
WKMA Abdul Razzaq, Ahmed B. Altamimi, Abdulrahman Alreshidi, Shahbaz Ahmed ...
Electronics 12 (1233), 1-18, 2023
13*2023
Formal Verification of Hardware Components in Critical Systems
W Khan, K Muhammad, N Syed, Rameez, K Farrukh, Aslam, SA Ahmed, ...
Wireless Communications and Mobile Computing 2020, 2020
122020
Client side web session integrity as a non-interference property
W Khan, S Calzavara, M Bugliesi, W De Groef, F Piessens
Information Systems Security: 10th International Conference, ICISS 2014 …, 2014
112014
Automatic identification of sarcasm in tweets and customer reviews
F Naz, M Kamran, W Mehmood, W Khan, MS Alkatheiri, AS Alghamdi, ...
Journal of Intelligent & Fuzzy Systems 37 (5), 6815-6828, 2019
102019
VeriFormal: An Executable Formal Model of a Hardware Description Language
K Wilayat, T Alwen, S David
Singapore Cyber Security R&D Conference, 2017
10*2017
Modernising Legacy Software as Context-sensitive and Portable Mobile-enabled Application
A Ahmad, A Alkhalil, AB Altamimi, K Sultan, W Khan
IT Professional, 2019
82019
SpoofCatch: A client-side protection tool against phishing attacks
W Khan, A Ahmad, A Qamar, M Kamran, M Altaf
IT Professional 23 (2), 65-74, 2021
72021
On embedding a hardware description language in Isabelle/HOL
W Khan, D Sanan, Z Hou, L Yang
Design Automation for Embedded Systems 23 (3), 123-151, 2019
72019
Sistema negali atlikti operacijos. Bandykite vėliau dar kartą.
Straipsniai 1–20