Следене
Khaled Khan
Khaled Khan
Потвърден имейл адрес: qu.edu.qa - Начална страница
Заглавие
Позовавания
Позовавания
Година
Types of software evolution and software maintenance
N Chapin, JE Hale, KM Khan, JF Ramil, WG Tan
Journal of software maintenance and evolution: Research and Practice 13 (1 …, 2001
5622001
Establishing trust in cloud computing
KM Khan, Q Malluhi
IT professional 12 (5), 20-27, 2010
4862010
Machine learning-based network vulnerability analysis of industrial Internet of Things
M Zolanvari, MA Teixeira, L Gupta, KM Khan, R Jain
IEEE Internet of Things Journal 6 (4), 6822-6834, 2019
1572019
Cybersecurity for industrial control systems: A survey
D Bhamare, M Zolanvari, A Erbad, R Jain, K Khan, N Meskin
computers & security 89, 101677, 2020
952020
Composing security-aware software
KM Khan, J Han
IEEE software 19 (1), 34-41, 2002
782002
A security characterisation framework for trustworthy component based software systems
K Khan, J Han
Proceedings 27th Annual International Computer Software and Applications …, 2003
612003
Measuring quality metrics for web applications
B Lilburne, D Prajwol, KM Khan, M Khosrowpour
Proceedings of the 15th Information Resources Management Association …, 2004
482004
Systematic identification of threats in the cloud: A survey
JB Hong, A Nhlabatsi, DS Kim, A Hussein, N Fetais, KM Khan
Computer Networks 150, 46-69, 2019
472019
Trust in cloud services: providing more controls to clients
KM Khan, Q Malluhi
Computer 46 (07), 94-96, 2013
432013
Security-Oriented Service Composition and Evolution.
J Han, KM Khan
APSEC 6, 71-78, 2006
352006
Managing Corporate Information Systems Evolution and Maintenance
KM Khan, Y Zhang
Igi Global, 2005
342005
A dual-isolation-forests-based attack detection framework for industrial control systems
M Elnour, N Meskin, K Khan, R Jain
IEEE Access 8, 36639-36651, 2020
322020
Addressing non-functional properties in software architecture using adl
CVEOH Khaled, M Khan
The Sixth Australasian Workshop on Software and System Architectures (AWSA …, 2005
322005
Assessing security properties of software components: A software engineer's perspective
KM Khan, J Han
Australian Software Engineering Conference (ASWEC'06), 10 pp.-210, 2006
292006
Addressing cloud computing in enterprise architecture: issues and challenges
KM Khan, NM Gangavarapu
Cutter IT Journal, 27-33, 2009
272009
Deriving systems level security properties of component based composite systems
KM Khan, J Han
2005 Australian Software Engineering Conference, 334-343, 2005
252005
Dynamic security metrics for measuring the effectiveness of moving target defense techniques
JB Hong, SY Enoch, DS Kim, A Nhlabatsi, N Fetais, KM Khan
Computers & Security 79, 33-52, 2018
242018
A framework for an active interface to characterise compositional security contracts of software components
K Khan, J Han, Y Zheng
Proceedings 2001 Australian Software Engineering Conference, 117-126, 2001
242001
Characterising user data protection of software components
KM Khan, J Han, Y Zheng
Proceedings 2000 Australian Software Engineering Conference, 3-11, 2000
222000
Threat-specific security risk evaluation in the cloud
A Nhlabatsi, JB Hong, DS Kim, R Fernandez, A Hussein, N Fetais, ...
IEEE Transactions on Cloud Computing 9 (2), 793-806, 2018
192018
Системата не може да изпълни операцията сега. Опитайте отново по-късно.
Статии 1–20