IIUM Repository (IREP)

Dr. Al-Sakib Khan Pathan

Department of Computer Science

KULLIYYAH OF INFORMATION AND COMMUNICATION TECHNOLOGY

Profile Picture

Latest Additions

  1. Yusof, Imran and Pathan, Al Sakib Khan (2016) Mitigating cross-site scripting attacks with a content security Policy. Computer, 49 (3). pp. 56-63. ISSN 0018-9162
  2. Mansouri, Houssem and Aliouat, Makhlouf and Badache, Nadjib and Khan, Al Sakib Pathan (2015) A non-blocking coordinated checkpointing algorithm for message-passing systems. In: International Conference on Intelligent Information Processing, Security and Advanced Communication ( IPAC 2015 ), 23rd–25th November 2015, Batna, Algeria.
  3. Mansour, Houssem and Badache, Nadjib and Aliouat, Makhlouf and Pathan, Al-Sakib Khan (2015) Adaptive fault tolerant checkpointing algorithm for cluster based mobile Ad Hoc networks. In: International Conference on Advanced Wireless Information and Communication Technologies (AWICT 2015), 5th-7th October 2015, Tunisia.
  4. Mansouri, Houssem and Badache, Nadjib and Aliouat, Makhlouf and Pathan, Al-Sakib Khan (2015) A new efficient checkpointing algorithm for distributed mobile computing. Journal of Control Engineering and Applied Informatics, 17 (2). pp. 43-54. ISSN 1454-8658
  5. Pathan, Al-Sakib Khan and Abdullah , Matin Saad and Al Shaikhli, Imad Fakhri (2015) Teaching and learning qur'anic Arabic utilizing adaptive and intelligent systems for collaborative learning (EDW B13-084-0969). Research Report. RMC, IIUM, IIUM. (Unpublished)
  6. Hossain, M. Shamim and Pathan, Al-Sakib Khan and Goebel, Stefan and Rahman, Shawon M. and Murshed, Manzur (2015) Advances in multimedia sensor networks for health-care and related applications. International Journal of Distributed Sensor Networks. pp. 1-2. ISSN 1550-1329 (P)
  7. Pathan, Al-Sakib Khan and Fadlullah, Zubair Muhammad and Fouda, Mostafa M. and Monowar, Muhammad Mostafa and Korn, Philip (2015) Information integrity in smart grid systems. Information Systems. ISSN 0306-4379 (In Press)
  8. Pathan, Al-Sakib Khan and Mohammed, Mohssen M. Z. E. (2015) Building customer trust in cloud computing with an ICT-enabled global regulatory body. Wireless Personal Communications. ISSN 0929-6212 (p); 1572-834X (e)
  9. Boubiche, Djallel Eddine and Boubiche, Sabrina and Toral-Cruz, Homero and Pathan, Al-Sakib Khan and Bilami, Azzedine and Athmani, Samir (2015) SDAW: secure data aggregation watermarking-based scheme in homogeneous WSNs. Telecommunication Systems, 62 (2). pp. 277-288. ISSN 1572-9451 (O), 1018-4864 (P)
  10. Pathan, Al-Sakib Khan (2015) Building customer trust in cloud computing model. In: 2nd IEEE International Conference on Advances in Computing & Communication Engineering (ICACCE-2015), May 1-2, 2015, Dehradun, India, 1-2 May 2015, Dehradun, India. (Unpublished)
  11. Azad, Saiful and Hasan, Khandaker Tabin and Nandi, Dip and Pathan, Al-Sakib Khan (2015) A high-throughput routing metric for multi-hop underwater acoustic networks. Computers and Electrical Engineering, 44. pp. 24-33. ISSN 0045-7906
  12. Pathan, Al-Sakib Khan and Monowar, Muhammad Mostafa and Alzaid, Hani and Hoque, Mohammad Asadul (2015) Editorial. International Journal of Computational Science and Engineering, 10 (3). pp. 231-233. ISSN 1742-7193 (O), 1742-7185 (P)
  13. Mall, Dieynaba and Konaté, Karim and Pathan, Al-Sakib Khan (2015) Key revocation in wireless sensor networks: a survey on a less-addressed yet vital issue. International Journal of Ad Hoc and Ubiquitous Computing, 18 (1/2). pp. 3-22. ISSN 1743-8233 (O) 1743-8225 (P)
  14. Kumar, Neeraj and Pathan, Al-Sakib Khan and Duarte Jr., Elias. P. and Shaikh, Riaz Ahmed (2014) Critical applications in vehicular ad hoc/sensor networks. Telecommunication Systems, Nov. ISSN 1018-4864 (P) 1572-9451 (O)
  15. Karuppiah, A. Babu and Dalfiah, J. and Yuvashri, K. and Rajaram, S. and Pathan, Al-Sakib Khan (2014) A novel energy-efficient sybil node detection algorithm for intrusion detection system in wireless sensor networks. In: 3rd International Conference on Eco-Friendly Computing and Communication Systems (ICECCS 2014), 18th-21st December 2014, Mangalore, India.
  16. Mohammed, Mohssen M. Z. E. and Pathan, Al-Sakib Khan (2014) International center for monitoring cloud computing providers (ICMCCP) for ensuring trusted clouds. In: 20114 IEEE UIC/ATC/ScalCom Multi Conference, 9th-12th December 2014, Bali, Indonesia.
  17. Pathan, Al-Sakib Khan (2014) Basics of security and cryptography. In: Practical Cryptography: Algorithms and Implementations using C++. CRC Press, Taylor & Francis Group, USA, USA, pp. 1-10. ISBN 978-1-48-222889-2
  18. Pathan, Al-Sakib Khan and Monowar, Muhammad Mostafa and Khan, Shafiullah, eds. (2015) Simulation technologies in networking and communications: selecting the best tool for the test. CRC Press, Taylor & Francis Group, USA, USA. ISBN 9781482225495
  19. Azad, Saiful and Pathan, Al-Sakib Khan, eds. (2014) Practical cryptography: algorithms and implementations using C++. CRC Press, Taylor & Francis Group, USA, USA. ISBN 9781482228892
  20. Islam, Md. Rafiqul and Shakib, M. A. E and Rahaman, Md. Azizur and Rahman, Md. Obaidur and Pathan, Al-Sakib Khan (2014) A neighbour discovery approach for cognitive radio network using tower of Hanoi (ToH) sequence based channel Rendezvous. In: 2014 The 5th International Conference on Information & Communication Technology for the Muslim World (ICT4M 2014), 17-19 November 2014, Sarawak.

Most Viewed Items

Item titleViews
1A Survey on SQL injection: vulnerabilities, attacks, and prevention techniques3299
2A generator of cauchy-distributed time series with specific Hurst index1476
3Introduction to wireless sensor network security1454
4Performance analysis of a highly available home agent in mobile networks1392
5Intruder detection in camera networks using the one-class neighbor machine1383
6Security wireless sensor networks: prospects, challenges, and future1363
7Wireless sensor network security: Current status and future trends1354
8An efficient approach of secure group association management in densely deployed heterogeneous distributed sensor network1344
9Performance analysis of a highly available home agent in mobile networks1335
10ViSim: a user-friendly graphical simulation tool for performance analysis of MANET routing protocols1332
11Automatic defense against zero-day polymorphic worms in communication networks1308
12Data gathering with multi-attribute fusion in wireless sensor networks1293
13Securing wireless sensor networks with an efficient B+ tree-based key management scheme1266
14Security attacks and challenges in wireless sensor networks1252
15A walk through SQL injection: vulnerabilities, attacks, and countermeasures in current and future networks1248
16A detailed survey on various aspects of SQL Injection: vulnerabilities, innovative attacks, and remedies1230
17A new data hiding technique based on irreducible polynomials1229
18"무선 센서 네트워크에서 센서 노드들 사이의 메시지 암호화/복호화 방법" (Translated TITLE: Message encryption/ecryption method between sensor nodes in wireless sensor networks)1229
19Network management in distributed systems1201
20A new visual simulation tool for performance evaluation of MANET routing protocols1190
21Special issue on recent advances in next-generation and resource-constrained converged networks1186
22Peer-to-peer video-on-demand in future internet1182
23PeerMate: a malicious peer detection algorithm for P2P systems based on MSPCA1181
24Security in wireless sensor networks: issues and challenges1175
25Accurate modeling of VoIP traffic QoS parameters in current and future networks with multifractal and Markov Models1173
26A resource-optimal key pre-distribution scheme with improved security for wireless sensor networks1170
27Network and traffic engineering in emerging distributed computing applications1169
28On the key factors of usability in small-sized mobile touch-screen application 1139
29Weakly connected dominating set-based secure clustering and operation in distributed sensor networks1119
30Public key cryptography in resource-constrained WSN1117