IIUM Repository

Dr. Al-Sakib Khan Pathan

Department of Computer Science

KULLIYYAH OF INFORMATION AND COMMUNICATION TECHNOLOGY

Profile Picture

Latest Additions

  1. Yusof, Imran and Pathan, Al Sakib Khan (2016) Mitigating cross-site scripting attacks with a content security Policy. Computer, 49 (3). pp. 56-63. ISSN 0018-9162
  2. Mansouri, Houssem and Aliouat, Makhlouf and Badache, Nadjib and Khan, Al Sakib Pathan (2015) A non-blocking coordinated checkpointing algorithm for message-passing systems. In: International Conference on Intelligent Information Processing, Security and Advanced Communication ( IPAC 2015 ), 23rd–25th November 2015, Batna, Algeria.
  3. Mansour, Houssem and Badache, Nadjib and Aliouat, Makhlouf and Pathan, Al-Sakib Khan (2015) Adaptive fault tolerant checkpointing algorithm for cluster based mobile Ad Hoc networks. In: International Conference on Advanced Wireless Information and Communication Technologies (AWICT 2015), 5th-7th October 2015, Tunisia.
  4. Mansouri, Houssem and Badache, Nadjib and Aliouat, Makhlouf and Pathan, Al-Sakib Khan (2015) A new efficient checkpointing algorithm for distributed mobile computing. Journal of Control Engineering and Applied Informatics, 17 (2). pp. 43-54. ISSN 1454-8658
  5. Pathan, Al-Sakib Khan and Abdullah , Matin Saad and Al Shaikhli, Imad Fakhri (2015) Teaching and learning qur'anic Arabic utilizing adaptive and intelligent systems for collaborative learning (EDW B13-084-0969). Research Report. RMC, IIUM, IIUM. (Unpublished)
  6. Hossain, M. Shamim and Pathan, Al-Sakib Khan and Goebel, Stefan and Rahman, Shawon M. and Murshed, Manzur (2015) Advances in multimedia sensor networks for health-care and related applications. International Journal of Distributed Sensor Networks. pp. 1-2. ISSN 1550-1329 (P) E-ISSN 1550-1477 (O)
  7. Pathan, Al-Sakib Khan and Fadlullah, Zubair Muhammad and Fouda, Mostafa M. and Monowar, Muhammad Mostafa and Korn, Philip (2015) Information integrity in smart grid systems. Information Systems. ISSN 0306-4379 (In Press)
  8. Pathan, Al-Sakib Khan and Mohammed, Mohssen M. Z. E. (2015) Building customer trust in cloud computing with an ICT-enabled global regulatory body. Wireless Personal Communications. ISSN 0929-6212 (p); 1572-834X (e)
  9. Boubiche, Djallel Eddine and Boubiche, Sabrina and Toral-Cruz, Homero and Pathan, Al-Sakib Khan and Bilami, Azzedine and Athmani, Samir (2015) SDAW: secure data aggregation watermarking-based scheme in homogeneous WSNs. Telecommunication Systems, 62 (2). pp. 277-288. ISSN 1572-9451 (O), 1018-4864 (P)
  10. Pathan, Al-Sakib Khan (2015) Building customer trust in cloud computing model. In: 2nd IEEE International Conference on Advances in Computing & Communication Engineering (ICACCE-2015), May 1-2, 2015, Dehradun, India, 1-2 May 2015, Dehradun, India. (Unpublished)
  11. Azad, Saiful and Hasan, Khandaker Tabin and Nandi, Dip and Pathan, Al-Sakib Khan (2015) A high-throughput routing metric for multi-hop underwater acoustic networks. Computers and Electrical Engineering, 44. pp. 24-33. ISSN 0045-7906
  12. Pathan, Al-Sakib Khan and Monowar, Muhammad Mostafa and Alzaid, Hani and Hoque, Mohammad Asadul (2015) Editorial. International Journal of Computational Science and Engineering, 10 (3). pp. 231-233. ISSN 1742-7193 (O), 1742-7185 (P)
  13. Mall, Dieynaba and Konaté, Karim and Pathan, Al-Sakib Khan (2015) Key revocation in wireless sensor networks: a survey on a less-addressed yet vital issue. International Journal of Ad Hoc and Ubiquitous Computing, 18 (1/2). pp. 3-22. ISSN 1743-8233 (O) 1743-8225 (P)
  14. Kumar, Neeraj and Pathan, Al-Sakib Khan and Duarte Jr., Elias. P. and Shaikh, Riaz Ahmed (2014) Critical applications in vehicular ad hoc/sensor networks. Telecommunication Systems, Nov. ISSN 1018-4864 (P) 1572-9451 (O)
  15. Karuppiah, A. Babu and Dalfiah, J. and Yuvashri, K. and Rajaram, S. and Pathan, Al-Sakib Khan (2014) A novel energy-efficient sybil node detection algorithm for intrusion detection system in wireless sensor networks. In: 3rd International Conference on Eco-Friendly Computing and Communication Systems (ICECCS 2014), 18th-21st December 2014, Mangalore, India.
  16. Mohammed, Mohssen M. Z. E. and Pathan, Al-Sakib Khan (2014) International center for monitoring cloud computing providers (ICMCCP) for ensuring trusted clouds. In: 20114 IEEE UIC/ATC/ScalCom Multi Conference, 9th-12th December 2014, Bali, Indonesia.
  17. Pathan, Al-Sakib Khan (2014) Basics of security and cryptography. In: Practical Cryptography: Algorithms and Implementations using C++. CRC Press, Taylor & Francis Group, USA, USA, pp. 1-10. ISBN 978-1-48-222889-2
  18. Pathan, Al-Sakib Khan and Monowar, Muhammad Mostafa and Khan, Shafiullah, eds. (2015) Simulation technologies in networking and communications: selecting the best tool for the test. CRC Press, Taylor & Francis Group, USA, USA. ISBN 9781482225495
  19. Azad, Saiful and Pathan, Al-Sakib Khan, eds. (2014) Practical cryptography: algorithms and implementations using C++. CRC Press, Taylor & Francis Group, USA, USA. ISBN 9781482228892
  20. Islam, Md. Rafiqul and Shakib, M. A. E and Rahaman, Md. Azizur and Rahman, Md. Obaidur and Pathan, Al-Sakib Khan (2014) A neighbour discovery approach for cognitive radio network using tower of Hanoi (ToH) sequence based channel Rendezvous. In: 2014 The 5th International Conference on Information & Communication Technology for the Muslim World (ICT4M 2014), 17-19 November 2014, Sarawak.

Most Viewed Items

Item titleViews
1A Survey on SQL injection: vulnerabilities, attacks, and prevention techniques3360
2A generator of cauchy-distributed time series with specific Hurst index1527
3Introduction to wireless sensor network security1503
4Performance analysis of a highly available home agent in mobile networks1447
5Intruder detection in camera networks using the one-class neighbor machine1443
6Security wireless sensor networks: prospects, challenges, and future1416
7Wireless sensor network security: Current status and future trends1397
8An efficient approach of secure group association management in densely deployed heterogeneous distributed sensor network1391
9Performance analysis of a highly available home agent in mobile networks1390
10ViSim: a user-friendly graphical simulation tool for performance analysis of MANET routing protocols1380
11Automatic defense against zero-day polymorphic worms in communication networks1374
12Data gathering with multi-attribute fusion in wireless sensor networks1333
13Securing wireless sensor networks with an efficient B+ tree-based key management scheme1311
14A walk through SQL injection: vulnerabilities, attacks, and countermeasures in current and future networks1297
15Security attacks and challenges in wireless sensor networks1291
16A detailed survey on various aspects of SQL Injection: vulnerabilities, innovative attacks, and remedies1282
17A new data hiding technique based on irreducible polynomials1279
18"무선 센서 네트워크에서 센서 노드들 사이의 메시지 암호화/복호화 방법" (Translated TITLE: Message encryption/ecryption method between sensor nodes in wireless sensor networks)1277
19Network management in distributed systems1255
20Special issue on recent advances in next-generation and resource-constrained converged networks1245
21A new visual simulation tool for performance evaluation of MANET routing protocols1234
22Security in wireless sensor networks: issues and challenges1231
23PeerMate: a malicious peer detection algorithm for P2P systems based on MSPCA1230
24Peer-to-peer video-on-demand in future internet1226
25Accurate modeling of VoIP traffic QoS parameters in current and future networks with multifractal and Markov Models1221
26Network and traffic engineering in emerging distributed computing applications1218
27A resource-optimal key pre-distribution scheme with improved security for wireless sensor networks1211
28On the key factors of usability in small-sized mobile touch-screen application 1186
29Weakly connected dominating set-based secure clustering and operation in distributed sensor networks1170
30A pragmatic approach of performance evaluation of MPI-OpenMP on a 12 nodes multi-core cluster1158