default search action
Atta ur Rehman Khan
Person information
- affiliation: COMSATS Institute of Information Technology, Abbottabad, Pakistan
- affiliation: University of Malaya, Kuala Lumpur, Malaysia
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j55]Han Liao, Mohd Zamri Murah, Mohammad Kamrul Hasan, Azana Hafizah Mohd Aman, Jin Fang, Xuting Hu, Atta ur Rehman Khan:
A Survey of Deep Learning Technologies for Intrusion Detection in Internet of Things. IEEE Access 12: 4745-4761 (2024) - [j54]Nafees Akhter Farooqui, Mohammad Kamrul Hasan, Mohammed Ahsan Raza Noori, Abdul Hadi Abd Rahman, Shayla Islam, Mohammad Haleem, Sheikh Fahad Ahmad, Asif Khan, Fatima Rayan Awad Ahmed, Nissrein Babiker Mohammed Babiker, Thowiba E. Ahmed, Atta ur Rehman Khan:
Hybrid Bat and Salp Swarm Algorithm for Feature Selection and Classification of Crisis-Related Tweets in Social Networks. IEEE Access 12: 103908-103920 (2024) - [j53]Muhammad Zakarya, Ayaz Ali Khan, Mohammad Reza Chalak Qazani, Hashim Ali, Mahmood Al-Bahri, Atta ur Rehman Khan, Ahmad Ali, Rahim Khan:
Sustainable computing across datacenters: A review of enabling models and techniques. Comput. Sci. Rev. 52: 100620 (2024) - [j52]Aqsa Rashid, Asif Masood, Atta ur Rehman Khan:
ACS-IoT: Smart Contract and Blockchain Assisted Framework for Access Control Systems in IoT Enterprise Environment. Wirel. Pers. Commun. 136(3): 1331-1352 (2024) - 2023
- [j51]Syed Qasim Afser Rizvi, Guojun Wang, Asif Khan, Mohammad Kamrul Hasan, Taher M. Ghazal, Atta ur Rehman Khan:
Classifying Parkinson's Disease Using Resting State Electroencephalogram Signals and UEN-PDNet. IEEE Access 11: 107703-107724 (2023) - [j50]Mousa'B Mohammad Shtayat, Mohammad Kamrul Hasan, Rossilawati Sulaiman, Shayla Islam, Atta ur Rehman Khan:
An Explainable Ensemble Deep Learning Approach for Intrusion Detection in Industrial Internet of Things. IEEE Access 11: 115047-115061 (2023) - [j49]Aqsa Rashid, Asif Masood, Atta ur Rehman Khan:
Zone of trust: blockchain assisted IoT authentication to support cross-communication between bubbles of trusted IoTs. Clust. Comput. 26(1): 237-254 (2023) - [j48]Imtiaz Ali shah, Abid Mehmood, Abdul Nasir Khan, Mourad Elhadef, Atta ur Rehman Khan:
HeuCrip: a malware detection approach for internet of battlefield things. Clust. Comput. 26(2): 977-992 (2023) - [j47]Ehzaz Mustafa, Junaid Shuja, Kashif Bilal, Saad Mustafa, Tahir Maqsood, Faisal Rehman, Atta ur Rehman Khan:
Reinforcement learning for intelligent online computation offloading in wireless powered edge networks. Clust. Comput. 26(2): 1053-1062 (2023) - [j46]Khaldoun Senjab, Sohail Abbas, Naveed Ahmed, Atta ur Rehman Khan:
A survey of Kubernetes scheduling algorithms. J. Cloud Comput. 12(1): 87 (2023) - [j45]Umer Zukaib, Mohammed Maray, Saad Mustafa, Nuhman ul Haq, Atta ur Rehman Khan, Faisal Rehman:
Impact of COVID-19 lockdown on air quality analyzed through machine learning techniques. PeerJ Comput. Sci. 9: e1270 (2023) - [c4]Salman Rain Ullah Mir, Yaman Ahmed Atef Kalaji, Raja Wasim Ahmad, Atta ur Rehman Khan:
Blockchain-Based System for End-to-End Donations Monitoring. ACIT 2023: 1-5 - [c3]Fatima Zahra, Maha Mohammad Safdar, Raja Wasim Ahmad, Atta ur Rehman Khan:
Blockchain-Based Transparent and Secure System for Construction Equipment and Machinery Rental. ACIT 2023: 1-5 - 2022
- [j44]Atta ur Rehman Khan, Raja Wasim Ahmad:
A Blockchain-Based IoT-Enabled E-Waste Tracking and Tracing System for Smart Cities. IEEE Access 10: 86256-86269 (2022) - [j43]Aqsa Rashid, Atta ur Rehman Khan:
Blockchain-Based Autonomous Authentication and Integrity for Internet of Battlefield Things in C3I System. IEEE Access 10: 91572-91587 (2022) - [j42]Muhammad Faisal Aziz, Abdul Nasir Khan, Junaid Shuja, Iftikhar Ahmed Khan, Fiaz Gul Khan, Atta ur Rehman Khan:
A lightweight and compromise-resilient authentication scheme for IoTs. Trans. Emerg. Telecommun. Technol. 33(3) (2022) - [j41]Syed Shakir Hameed Shah, Norziana Jamil, Atta ur Rehman Khan:
Memory Visualization-Based Malware Detection Technique. Sensors 22(19): 7611 (2022) - [j40]Kottilingam Kottursamy, Atta ur Rehman Khan, Banupriya Sadayappillai, Gunasekaran Raja:
Optimized D-RAN Aware Data Retrieval for 5G Information Centric Networks. Wirel. Pers. Commun. 124(2): 1011-1032 (2022) - 2021
- [j39]Aqsa Rashid, Asif Masood, Atta ur Rehman Khan:
RC-AAM: blockchain-enabled decentralized role-centric authentication and access management for distributed organizations. Clust. Comput. 24(4): 3551-3571 (2021) - [j38]Sohail Abbas, Qassim Nasir, Douae Nouichi, Mohamed Abdelsalam, Manar AbuTalib, Omnia Abu Waraga, Atta ur Rehman Khan:
Improving security of the Internet of Things via RF fingerprinting based device identification system. Neural Comput. Appl. 33(21): 14753-14769 (2021) - 2020
- [j37]Hamid R. Alsanad, Osman N. Uçan, Muhammad Ilyas, Atta ur Rehman Khan, Oguz Bayat:
Real-Time Fuel Truck Detection Algorithm Based on Deep Convolutional Neural Network. IEEE Access 8: 118808-118817 (2020) - [j36]Sohail Abbas, Muhammad Haqdad, Muhammad Zahid Khan, Haseeb Ur Rehman, Ajab Khan, Atta ur Rehman Khan:
Survivability Analysis of MANET Routing Protocols under DOS Attacks. KSII Trans. Internet Inf. Syst. 14(9): 3639-3662 (2020) - [j35]Ayaz Ali Khan, Muhammad Zakarya, Rahim Khan, Izaz Ur Rahman, Mukhtaj Khan, Atta ur Rehman Khan:
An energy, performance efficient resource consolidation scheme for heterogeneous cloud datacenters. J. Netw. Comput. Appl. 150 (2020)
2010 – 2019
- 2019
- [j34]Rizwana Irfan, Osman Khalid, Muhammad Usman Shahid Khan, Faisal Rehman, Atta ur Rehman Khan, Raheel Nawaz:
SocialRec: A Context-Aware Recommendation Framework With Explicit Sentiment Analysis. IEEE Access 7: 116295-116308 (2019) - [j33]Hafeez Ur Rehman, Usman Habib, Umer Ijaz, Naveed Islam, Atta ur Rehman Khan, Raheel Nawaz:
Identification of Yeast's Interactome Using Neural Networks. IEEE Access 7: 179634-179645 (2019) - [j32]Malik Najmus Saqib, Junaid Kiani, Basit Shahzad, Adeel Anjum, Saif Ur Rehman Malik, Naveed Ahmad, Atta ur Rehman Khan:
Anonymous and formally verified dual signature based online e-voting protocol. Clust. Comput. 22(Suppl 1): 1703-1716 (2019) - [j31]Anum Khurshid, Abdul Nasir Khan, Fiaz Gul Khan, Mazhar Ali, Junaid Shuja, Atta ur Rehman Khan:
Secure-CamFlow: A device-oriented security model to assist information flow control systems in cloud environments for IoTs. Concurr. Comput. Pract. Exp. 31(8) (2019) - [j30]Sardar Khaliq uz Zaman, Tahir Maqsood, Mazhar Ali, Kashif Bilal, Sajjad Ahmad Madani, Atta ur Rehman Khan:
A load balanced task scheduling heuristic for large-scale computing systems. Comput. Syst. Sci. Eng. 34(2) (2019) - [j29]Sardar Khaliq uz Zaman, Atta ur Rehman Khan, Junaid Shuja, Tahir Maqsood, Faisal Rehman, Saad Mustafa:
A Systems Overview of Commercial Data Centers: Initial Energy and Cost Analysis. Int. J. Inf. Technol. Web Eng. 14(1): 42-65 (2019) - [j28]Tauqeer Khalid, Abdul Nasir Khan, Mazhar Ali, Adil Adeel, Atta ur Rehman Khan, Junaid Shuja:
A fog-based security framework for intelligent traffic light control system. Multim. Tools Appl. 78(17): 24595-24615 (2019) - [j27]Beenish Gul, Imran Ali Khan, Saad Mustafa, Osman Khalid, Atta ur Rehman Khan:
CPU-RAM-based energy-efficient resource allocation in clouds. J. Supercomput. 75(11): 7606-7624 (2019) - [j26]Faiza Qazi, Osman Khalid, Rao Naveed Bin Rais, Imran Ali Khan, Atta ur Rehman Khan:
Optimal Content Caching in Content-Centric Networks. Wirel. Commun. Mob. Comput. 2019 (2019) - 2018
- [j25]Sohail Abbas, Mohammad Faisal, Haseeb Ur Rahman, Muhammad Zahid Khan, Madjid Merabti, Atta ur Rehman Khan:
Masquerading Attacks Detection in Mobile Ad Hoc Networks. IEEE Access 6: 55013-55025 (2018) - [j24]Hajra Qadir, Osman Khalid, Muhammad Usman Shahid Khan, Atta ur Rehman Khan, Raheel Nawaz:
An Optimal Ride Sharing Recommendation Framework for Carpooling Services. IEEE Access 6: 62296-62313 (2018) - [j23]Tassawar Iqbal, Muhammad Tariq Yousafzai, Sabeen Ali, Kinza Sattar, Muhammad Qaiser Saleem, Usman Habib, Atta ur Rehman Khan:
There's No Such Thing as Free Lunch but Envy among Young Facebookers. KSII Trans. Internet Inf. Syst. 12(10): 4724-4737 (2018) - [c2]Raja Wasim Ahmad, Siti Hafizah Ab Hamid, Abdullah Gani, Mohammad S. Obaidat, Junaid Shuja, Faisal Rehman, Atta ur Rehman Khan:
Performance Assessment of Dynamic Analysis Based Energy Estimation Tools. SPECTS 2018: 1-12 - 2017
- [j22]Sardar Khaliq uz Zaman, Atta ur Rehman Khan, Saif Ur Rehman Malik, Abdul Nasir Khan, Tahir Maqsood, Sajjad Ahmad Madani:
Formal verification and performance evaluation of task scheduling heuristics for makespan optimization and workflow distribution in large-scale computing systems. Comput. Syst. Sci. Eng. 32(3) (2017) - [j21]Abdul Nasir Khan, Mazhar Ali, Atta ur Rehman Khan, Fiaz Gul Khan, Iftikhar Ahmed Khan, Waqas Jadoon, Shahab Shamshirband, Anthony T. Chronopoulos:
A comparative study and workload distribution model for re-encryption schemes in a mobile cloud computing environment. Int. J. Commun. Syst. 30(16) (2017) - [j20]Faisal Rehman, Osman Khalid, Nuhman ul Haq, Atta ur Rehman Khan, Kashif Bilal, Sajjad Ahmad Madani:
Diet-Right: A Smart Food Recommendation System. KSII Trans. Internet Inf. Syst. 11(6): 2910-2925 (2017) - [j19]Muhammad Habib Ur Rehman, Aisha Batool, Chee Sun Liew, Ying Wah Teh, Atta ur Rehman Khan:
Execution Models for Mobile Data Analytics. IT Prof. 19(3): 24-30 (2017) - [j18]Muhammad Habib Ur Rehman, Prem Prakash Jayaraman, Saif Ur Rehman Malik, Atta ur Rehman Khan, Mohamed Medhat Gaber:
RedEdge: A Novel Architecture for Big Data Processing in Mobile Edge Computing Environments. J. Sens. Actuator Networks 6(3): 17 (2017) - [j17]Sardar Muhammad Bilal, Atta ur Rehman Khan, Shahzad Ali:
Review and Performance Analysis of Position Based Routing in VANETs. Wirel. Pers. Commun. 94(3): 559-578 (2017) - [j16]Atta ur Rehman Khan, Mazliza Othman, Abdul Nasir Khan, Junaid Shuja, Saad Mustafa:
Computation Offloading Cost Estimation in Mobile Cloud Application Models. Wirel. Pers. Commun. 97(3): 4897-4920 (2017) - 2016
- [j15]Junaid Shuja, Abdullah Gani, Kashif Bilal, Atta ur Rehman Khan, Sajjad Ahmad Madani, Samee U. Khan, Albert Y. Zomaya:
A Survey of Mobile Device Virtualization: Taxonomy and State of the Art. ACM Comput. Surv. 49(1): 1:1-1:36 (2016) - 2015
- [j14]Saad Mustafa, Babar Nazir, Amir Hayat, Atta ur Rehman Khan, Sajjad Ahmad Madani:
Resource management in cloud computing: Taxonomy, prospects, and challenges. Comput. Electr. Eng. 47: 186-203 (2015) - [j13]Shahbaz Akhtar Abid, Mazliza Othman, Nadir Shah, Mazhar Ali, Atta ur Rehman Khan:
3D-RP: A DHT-Based Routing Protocol for MANETs. Comput. J. 58(2): 258-279 (2015) - [j12]Atta ur Rehman Khan, Mazliza Othman, Feng Xia, Abdul Nasir Khan:
Context-Aware Mobile Cloud Computing and Its Challenges. IEEE Cloud Comput. 2(3): 42-49 (2015) - [j11]Shahbaz Akhtar Abid, Mazliza Othman, Nadir Shah, Osama Sabir, Atta ur Rehman Khan, Mazhar Ali, Jawad Shafi, Saleem Ullah:
Merging of DHT-based logical networks in MANETs. Trans. Emerg. Telecommun. Technol. 26(12): 1347-1367 (2015) - [j10]Atta ur Rehman Khan, Mazliza Othman, Abdul Nasir Khan, Shahbaz Akhtar Abid, Sajjad Ahmad Madani:
MobiByte: An Application Development Model for Mobile Cloud Computing. J. Grid Comput. 13(4): 605-628 (2015) - [j9]Abdul Nasir Khan, Miss Laiha Mat Kiah, Mazhar Ali, Shahaboddin Shamshirband, Atta ur Rehman Khan:
A Cloud-Manager-Based Re-Encryption Scheme for Mobile Users in Cloud Environment: a Hybrid Approach. J. Grid Comput. 13(4): 651-675 (2015) - 2014
- [j8]Atta ur Rehman Khan, Mazliza Othman, Sajjad Ahmad Madani, Samee Ullah Khan:
A Survey of Mobile Cloud Computing Application Models. IEEE Commun. Surv. Tutorials 16(1): 393-413 (2014) - [j7]Shahzad Ali, Sajjad Ahmad Madani, Atta ur Rehman Khan, Imran Ali Khan:
Routing protocols for mobile sensor networks: a comparative study. Comput. Syst. Sci. Eng. 29(2) (2014) - [j6]Abdul Nasir Khan, Miss Laiha Mat Kiah, Sajjad Ahmad Madani, Mazhar Ali, Atta ur Rehman Khan, Shahaboddin Shamshirband:
Incremental proxy re-encryption scheme for mobile cloud computing environment. J. Supercomput. 68(2): 624-651 (2014) - [j5]Atta ur Rehman Khan, Mazliza Othman, Mazhar Ali, Abdul Nasir Khan, Sajjad Ahmad Madani:
Pirax: framework for application piracy control in mobile cloud environment. J. Supercomput. 68(2): 753-776 (2014) - [j4]Abdul Nasir Khan, Miss Laiha Mat Kiah, Mazhar Ali, Sajjad Ahmad Madani, Atta ur Rehman Khan, Shahaboddin Shamshirband:
BSS: block-based sharing scheme for secure data storage services in mobile cloud environment. J. Supercomput. 70(2): 946-976 (2014) - [j3]Sardar Muhammad Bilal, Atta ur Rehman Khan, Samee Ullah Khan, Sajjad Ahmad Madani, Babar Nazir, Mazliza Othman:
Road Oriented Traffic Information System for Vehicular Ad hoc Networks. Wirel. Pers. Commun. 77(4): 2497-2515 (2014) - [i6]Atta ur Rehman Khan, Mazliza Othman, Abdul Nasir Khan:
A Novel Application Licensing Framework for Mobile Cloud Environment. CoRR abs/1401.0034 (2014) - [i5]Shahzad Ali, Sajjad Ahmad Madani, Atta ur Rehman Khan, Imran Ali Khan:
Routing protocols for mobile sensor networks: a comparative study. CoRR abs/1403.3162 (2014) - 2013
- [j2]Abdul Nasir Khan, Miss Laiha Mat Kiah, Sajjad Ahmad Madani, Atta ur Rehman Khan, Mazhar Ali:
Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing. J. Supercomput. 66(3): 1687-1706 (2013) - [i4]Atta ur Rehman Khan, Mazliza Othman, Abdul Nasir Khan, Imran Ali Khan:
Framework for Ubiquitous Social Networks. CoRR abs/1307.2953 (2013) - [i3]Sardar Muhammad Bilal, Muhammad Naveed Dilber, Atta ur Rehman Khan:
Routing Proposals for Multipath Interdomain Routing. CoRR abs/1307.4124 (2013) - [i2]Atta ur Rehman Khan, Shahzad Ali, Saad Mustafa, Mazliza Othman:
Impact of mobility models on clustering based routing protocols in mobile WSNs. CoRR abs/1307.4127 (2013) - [i1]Atta ur Rehman Khan, Sardar Muhammad Bilal, Mazliza Othman:
A Performance Comparison of Network Simulators for Wireless Networks. CoRR abs/1307.4129 (2013) - 2012
- [j1]Atta ur Rehman Khan, Sajjad Ahmad Madani, Khizar Hayat, Samee Ullah Khan:
Clustering-based power-controlled routing for mobile wireless sensor networks. Int. J. Commun. Syst. 25(4): 529-542 (2012) - [c1]Atta ur Rehman Khan, Shahzad Ali, Saad Mustafa, Mazliza Othman:
Impact of Mobility Models on Clustering Based Routing Protocols in Mobile WSNs. FIT 2012: 366-370
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint