default search action
Khaled M. Khan
Person information
- affiliation: Qatar University, KINDI Computing Lab, Doha, Qatar
- affiliation: Western Sydney University, School of ComputingandInformationTechnology, Sydney, NSW, Australia
- affiliation: Southern Cross University, Lismore, NSW, Australia
- affiliation (PhD 2005): Monash University, Clayton, VIC, Australia
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j31]Raseena M. Haris, Khaled M. Khan, Armstrong Nhlabatsi, Mahmoud Barhamgi:
A machine learning-based optimization approach for pre-copy live virtual machine migration. Clust. Comput. 27(2): 1293-1312 (2024) - [j30]Raseena M. Haris, Mahmoud Barhamgi, Armstrong Nhlabatsi, Khaled M. Khan:
Optimizing pre-copy live virtual machine migration in cloud computing using machine learning-based prediction model. Computing 106(9): 3031-3062 (2024) - [c50]Amina Mollazehi, Israa Abuelezz, Mahmoud Barhamgi, Khaled M. Khan, Raian Ali:
Do Cialdini's Persuasion Principles Still Influence Trust and Risk-Taking When Social Engineering is Knowingly Possible? RCIS (1) 2024: 273-288 - 2023
- [j29]Rachael Fernandez, Peter C.-H. Cheng, Armstrong Nhlabatsi, Khaled Md. Khan, Noora Fetais:
Effective Collaboration in the Management of Access Control Policies: A Survey of Tools. IEEE Access 11: 13929-13947 (2023) - [j28]Mariam Elnour, Mohammad Noorizadeh, Mohammad Shakerpour, Nader Meskin, Khaled M. Khan, Raj Jain:
A Machine Learning Based Framework for Real-Time Detection and Mitigation of Sensor False Data Injection Cyber-Physical Attacks in Industrial Control Systems. IEEE Access 11: 86977-86998 (2023) - [j27]Maede Zolanvari, Zebo Yang, Khaled M. Khan, Raj Jain, Nader Meskin:
TRUST XAI: Model-Agnostic Explanations for AI With a Case Study on IIoT Security. IEEE Internet Things J. 10(4): 2967-2978 (2023) - [j26]Armstrong Nhlabatsi, Khaled Md. Khan, Jin B. Hong, Dong Seong Kim, Rachael Fernandez, Noora Fetais:
Quantifying Satisfaction of Security Requirements of Cloud Software Systems. IEEE Trans. Cloud Comput. 11(1): 426-444 (2023) - [c49]Rachael Fernandez, Peter C.-H. Cheng, Ben Smith, Tania Fenton, Yehia Boraey, Armstrong Nhlabatsi, Khaled M. Khan, Noora Fetais:
Interactive Graphical Access Control Tools. VL/HCC 2023: 255-259 - 2022
- [j25]Raseena M. Haris, Khaled M. Khan, Armstrong Nhlabatsi:
Live migration of virtual machine memory content in networked systems. Comput. Networks 209: 108898 (2022) - [i4]Maede Zolanvari, Zebo Yang, Khaled M. Khan, Raj Jain, Nader Meskin:
TRUST XAI: Model-Agnostic Explanations for AI With a Case Study on IIoT Security. CoRR abs/2205.01232 (2022) - 2021
- [j24]Khaled M. Khan, Moutaz Saleh Mustafa:
Understanding the Impact of Emotions on the Quality of Software Artifacts. IEEE Access 9: 110194-110208 (2021) - [j23]Marcio Andrey Teixeira, Maede Zolanvari, Khaled M. Khan, Raj Jain, Nader Meskin:
Flow-based intrusion detection algorithm for supervisory control and data acquisition systems: A real-time approach. IET Cyper-Phys. Syst.: Theory & Appl. 6(3): 178-191 (2021) - [j22]Armstrong Nhlabatsi, Jin B. Hong, Dong Seong Kim, Rachael Fernandez, Alaa Hussein, Noora Fetais, Khaled M. Khan:
Threat-Specific Security Risk Evaluation in the Cloud. IEEE Trans. Cloud Comput. 9(2): 793-806 (2021) - 2020
- [j21]Mariam Elnour, Nader Meskin, Khaled M. Khan, Raj Jain:
A Dual-Isolation-Forests-Based Attack Detection Framework for Industrial Control Systems. IEEE Access 8: 36639-36651 (2020) - [j20]Deval Bhamare, Maede Zolanvari, Aiman Erbad, Raj Jain, Khaled M. Khan, Nader Meskin:
Cybersecurity for industrial control systems: A survey. Comput. Secur. 89 (2020) - [c48]Mariam Elnour, Nader Meskin, Khaled M. Khan:
Hybrid Attack Detection Framework for Industrial Control Systems using 1D-Convolutional Neural Network and Isolation Forest. CCTA 2020: 877-884 - [c47]Armstrong Nhlabatsi, Alaa Hussein, Noora Fetais, Khaled M. Khan:
Design and Implementation of a Threat-Specific Security Risk Assessment Tool. ICIoT 2020: 511-518 - [c46]Mahdi Kh. Alkaeed, Zaid Alamro, Muhammed Samir Al-Ali, Hasan Abbas Al-Mohammed, Khaled M. Khan:
Highlight on Cryptocurrencies Mining with CPUs and GPUs and their Benefits Based on their Characteristics. ICSET 2020: 67-72 - [i3]Deval Bhamare, Maede Zolanvari, Aiman Erbad, Raj Jain, Khaled M. Khan, Nader Meskin:
Cybersecurity for Industrial Control Systems: A Survey. CoRR abs/2002.04124 (2020)
2010 – 2019
- 2019
- [j19]Jin B. Hong, Armstrong Nhlabatsi, Dong Seong Kim, Alaa Hussein, Noora Fetais, Khaled M. Khan:
Systematic identification of threats in the cloud: A survey. Comput. Networks 150: 46-69 (2019) - [j18]Maede Zolanvari, Marcio Andrey Teixeira, Lav Gupta, Khaled M. Khan, Raj Jain:
Machine Learning-Based Network Vulnerability Analysis of Industrial Internet of Things. IEEE Internet Things J. 6(4): 6822-6834 (2019) - [j17]Yongge Wang, Khaled M. Khan:
Matrix Barcode Based Secure Authentication without Trusting Third Party. IT Prof. 21(3): 41-48 (2019) - [c45]Simon Yusuf Enoch, Jin B. Hong, Mengmeng Ge, Khaled M. Khan, Dong Seong Kim:
Multi-Objective Security Hardening Optimisation for Dynamic Networks. ICC 2019: 1-7 - [c44]SeongMo An, Taehoon Eom, Jong Sou Park, Jin Bum Hong, Armstrong Nhlabatsi, Noora Fetais, Khaled M. Khan, Dong Seong Kim:
CloudSafe: A Tool for an Automated Security Analysis for Cloud Computing. TrustCom/BigDataSE 2019: 602-609 - [i2]SeoungMo An, Taehoon Eom, Jong Sou Park, Jin B. Hong, Armstrong Nhlabatsi, Noora Fetais, Khaled M. Khan, Dong Seong Kim:
CloudSafe: A Tool for an Automated Security Analysis for Cloud Computing. CoRR abs/1903.04271 (2019) - [i1]Maede Zolanvari, Marcio Andrey Teixeira, Lav Gupta, Khaled M. Khan, Raj Jain:
Machine Learning Based Network Vulnerability Analysis of Industrial Internet of Things. CoRR abs/1911.05771 (2019) - 2018
- [j16]Jin B. Hong, Simon Yusuf Enoch, Dong Seong Kim, Armstrong Nhlabatsi, Noora Fetais, Khaled M. Khan:
Dynamic security metrics for measuring the effectiveness of moving target defense techniques. Comput. Secur. 79: 33-52 (2018) - [c43]Jin Bum Hong, Simon Yusuf Enoch, Dong Seong Kim, Khaled Md. Khan:
Stateless Security Risk Assessment for Dynamic Networks. DSN Workshops 2018: 65-66 - [c42]Khaled M. Khan, Mahboob Shaheen, Yongge Wang:
Using Sparse Matrices to Prevent Information Leakage in Cloud Computing. FiCloud 2018: 444-447 - [c41]Thein Than Tun, M. Yang, Arosha K. Bandara, Yijun Yu, Armstrong Nhlabatsi, Niamul Khan, Khaled M. Khan, Bashar Nuseibeh:
Requirements and specifications for adaptive security: concepts and analysis. SEAMS@ICSE 2018: 161-171 - [c40]Armstrong Nhlabatsi, Jin B. Hong, Dong Seong Kim, Rachael Fernandez, Noora Fetais, Khaled M. Khan:
Spiral^SRA: A Threat-Specific Security Risk Assessment Framework for the Cloud. QRS 2018: 367-374 - 2017
- [j15]Jinwei Hu, Khaled M. Khan, Yan Zhang, Yun Bai, Ruixuan Li:
Role updating in information systems using model checking. Knowl. Inf. Syst. 51(1): 187-234 (2017) - [c39]Khaled M. Khan, Mahboob Shaheen, Yongge Wang:
Data confidentiality in cloud-based pervasive system. ICC 2017: 185:1-185:6 - [c38]Khaled M. Khan, Zhuhan Jiang:
Managing Client-Specific Customised Functions in Multi-Tenant Software-as-a-Service. QRS Companion 2017: 108-113 - 2016
- [j14]Yongge Wang, Qutaibah M. Malluhi, Khaled Md. Khan:
Garbled computation in cloud. Future Gener. Comput. Syst. 62: 54-65 (2016) - [j13]Vernon Asuncion, Khaled M. Khan, Abdelkarim Erradi, Saleh Alhazbi:
Reasoning About Policies in Security-Aware Service Discovery Using Answer Set Programming. Int. J. Cooperative Inf. Syst. 25(1): 1650003:1-1650003:37 (2016) - [c37]Rana Adnan Rihan, Khaled M. Khan:
Using Block Cipher for Confidentiality of Images in Cloud-Based Systems. FiCloud Workshops 2016: 28-33 - 2015
- [j12]Armstrong Nhlabatsi, Thein Than Tun, Niamul Khan, Yijun Yu, Arosha K. Bandara, Khaled M. Khan, Bashar Nuseibeh:
"Why can't I do that?": Tracing Adaptive Security Decisions. EAI Endorsed Trans. Self Adapt. Syst. 1(1): e2 (2015) - [c36]Armstrong Nhlabatsi, Yijun Yu, Andrea Zisman, Thein Than Tun, Niamul Khan, Arosha K. Bandara, Khaled M. Khan, Bashar Nuseibeh:
Managing Security Control Assumptions Using Causal Traceability. SST@ICSE 2015: 43-49 - [c35]Khaled M. Khan, Mahboob Shaheen:
Data Obfuscation for Privacy and Confidentiality in Cloud Computing. QRS Companion 2015: 195-196 - [c34]Khaled M. Khan, Armstrong Nhlabatsi, Niamul Khan:
A Process Model for Customisation of Software in Multi-tenant SaaS Model. UCC 2015: 418-419 - 2014
- [c33]Armstrong Nhlabatsi, Thein Than Tun, Niamul Khan, Yijun Yu, Arosha K. Bandara, Khaled M. Khan, Bashar Nuseibeh:
Traceability for Adaptive Information Security in the Cloud. IEEE CLOUD 2014: 958-959 - [c32]Vernon Asuncion, Khaled M. Khan, Abdelkarim Erradi, Saleh Alhazbi:
Reasoning about Security Policies of Services Using Answer Set Programming. IEEE SCC 2014: 857-858 - [c31]Khaled M. Khan, Mahboob Shaheen:
Empowering users of cloud computing on data confidentiality. CloudNet 2014: 272-274 - [c30]Seung Hwan Ryu, Abdelkarim Erradi, Khaled M. Khan, Saleh Alhazbi, Boualem Benatallah:
Semantics-Based Approach for Dynamic Evolution of Trust Negotiation Protocols in Cloud Collaboration. ICSOC 2014: 518-526 - 2013
- [j11]Khaled M. Khan, Qutaibah M. Malluhi:
Trust in Cloud Services: Providing More Controls to Clients. Computer 46(7): 94-96 (2013) - [j10]Khaled M. Khan, Qutaibah M. Malluhi:
Role of contextual properties in enterprise service migration to cloud computing. Concurr. Comput. Pract. Exp. 25(18): 2455-2470 (2013) - [j9]Khaled M. Khan, Abdelkarim Erradi, Saleh Alhazbi, Jun Han:
Addressing security compatibility for multi-tenant cloud services. Int. J. Comput. Appl. Technol. 47(4): 370-378 (2013) - [c29]Khaled M. Khan, Mahboob Shaheen:
Secure Cloud Services: Matrix Multiplication Revisited. CSE 2013: 9-14 - [c28]Khaled M. Khan, Yun Bai:
Automatic verification of health regulatory compliance in cloud computing. Healthcom 2013: 719-721 - [c27]Edward Caprin, Yan Zhang, Khaled M. Khan:
Social access control language (SocACL). SIN 2013: 261-265 - 2012
- [j8]Khaled M. Khan:
Software Security Engineering: Design and Applications. Int. J. Secur. Softw. Eng. 3(1): 62-63 (2012) - [c26]Jinwei Hu, Khaled M. Khan, Yun Bai, Yan Zhang:
Constraint-enhanced role engineering via answer set programming. AsiaCCS 2012: 73-74 - [c25]Jinwei Hu, Khaled M. Khan, Yun Bai, Yan Zhang:
Tracking and Constraining Authorization Provenance. IEA/AIE 2012: 669-678 - [c24]Jinwei Hu, Khaled M. Khan, Yun Bai, Yan Zhang:
Compliance Checking for Usage-Constrained Credentials in Trust Negotiation Systems. ISC 2012: 290-305 - 2011
- [j7]Yun Bai, Khaled M. Khan:
Ell Secure Information System Using Modal Logic Technique. Int. J. Secur. Softw. Eng. 2(2): 65-76 (2011) - [c23]Yun Bai, Khaled M. Khan:
A Modal Logic for Information System Security. AISC 2011: 51-56 - [c22]Khaled M. Khan, Qutaibah M. Malluhi:
Identifying Contextual Properties of Software Architecture in Cloud Computing. DASC 2011: 561-568 - [c21]Khaled M. Khan:
Profile-Based Security Assurances for Service Software. IESS 2011: 232-236 - 2010
- [j6]Khaled M. Khan, Jun Han:
A Tool Support for Secure Software Integration. Int. J. Secur. Softw. Eng. 1(2): 35-56 (2010) - [j5]Khaled M. Khan, Qutaibah M. Malluhi:
Establishing Trust in Cloud Computing. IT Prof. 12(5): 20-27 (2010) - [c20]Khaled M. Khan, Qutaibah M. Malluhi:
Security-Aware Service Composition for End Users of Small Enterprises. SoMeT 2010: 257-267
2000 – 2009
- 2009
- [c19]Zhuhan Jiang, Xiling Guo, Narendra Gangavarapu, Khaled M. Khan:
Knowledge-Based Algorithms to Optimise e-Learning Outcome. FECS 2009: 247-253 - [c18]Khaled M. Khan, Calvin Tan:
SecCom: A Prototype for Integrating Security-Aware Components. UNISCON 2009: 393-403 - 2008
- [c17]Khaled M. Khan:
Assessing quality of web based systems. AICCSA 2008: 763-769 - [c16]Khaled M. Khan, Jun Han:
Specifying Security Goals of Component Based Systems: An End-User Perspective. ICCBSS 2008: 101-109 - [p1]Mohammed Samaka, Khaled Md. Khan:
Wireless Networks. Wiley Encyclopedia of Computer Science and Engineering 2008 - 2007
- [c15]Khaled Md. Khan:
Selecting Web Services with Security Compliances: A Managerial Perspective. PACIS 2007: 86 - 2006
- [c14]Jun Han, Khaled M. Khan:
Security-Oriented Service Composition and Evolution. APSEC 2006: 71-78 - [c13]Khaled M. Khan, Jun Han:
Assessing Security Properties of Software Components: A Software Engineer's Perspective. ASWEC 2006: 199-210 - 2005
- [c12]Khaled M. Khan, Jun Han:
Deriving Systems Level Security Properties of Component Based Composite Systems. Australian Software Engineering Conference 2005: 334-343 - 2004
- [c11]Khaled M. Khan, Mahesha Kapurubandara, Urvashi Chadha:
Incorporating Business Requirements and Constraints in Database Conceptual Model. APCCM 2004: 59-64 - [c10]Khaled M. Khan, Jun Han:
A Process Framework for Characterising Security Properties of Component-Based Software Systems. Australian Software Engineering Conference 2004: 358-367 - [c9]Thu Nga Tran, Khaled M. Khan, Yi-Chen Lan:
A framework for transforming artifacts from data flow diagrams to UML. IASTED Conf. on Software Engineering 2004: 123-128 - [c8]Khaled M. Khan, Narendra Gangavarapu, Hiep Pham:
Evolution of Software Security - A Must. Software Engineering Research and Practice 2004: 807-812 - 2003
- [c7]Khaled M. Khan, Jun Han:
A Security Characterisation Framework for Trustworthy Component Based Software Systems. COMPSAC 2003: 164-169 - 2002
- [j4]Khaled M. Khan, Jun Han:
Composing Security-Aware Software. IEEE Softw. 19(1): 34-41 (2002) - 2001
- [j3]Khaled M. Khan, Bruce W. N. Lo, Torbjørn Skramstad:
Tasks and Methods for Software Maintenance: a process oriented framework. Australas. J. Inf. Syst. 9(1) (2001) - [j2]Ned Chapin, Joanne E. Hale, Khaled Md. Khan, Juan F. Ramil, Wui-Gee Tan:
Types of software evolution and software maintenance. J. Softw. Maintenance Res. Pract. 13(1): 3-30 (2001) - [c6]Khaled M. Khan, Jun Han, Yuliang Zheng:
A Framework for an Active Interface to Characterise Compositional Security Contracts of Software Components. Australian Software Engineering Conference 2001: 117-126 - 2000
- [c5]Khaled M. Khan, Jun Han, Yuliang Zheng:
Characterizing User Data Protection of Software Components. Australian Software Engineering Conference 2000: 3-12 - [c4]Khaled M. Khan, Jun Han, Yuliang Zheng:
Security Characterization of Software Components and Their Composition. TOOLS (36) 2000: 240-249
1990 – 1999
- 1999
- [c3]Khaled M. Khan, Jun Han, Yuliang Zheng:
Security Properties of Software Components. ISW 1999: 52-56 - 1997
- [j1]Md. Mahbubur Rahim, Md. Khaled Khan, Mohd Hasan Selamat:
Adoption versus abandonment of CASE tools: lessons from two organizations. Inf. Technol. People 10(4): 316-329 (1997) - [c2]Khaled M. Khan, M. Ramakrishnan, Bruce W. N. Lo:
Assessment Model for Software Maintenance Tools: A Conceptual Framework. PACIS 1997: 51 - 1992
- [c1]Torbjørn Skramstad, Khaled M. Khan:
A redefined software life cycle model for improved maintenance. ICSM 1992: 193-197
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-29 21:01 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint