Types of software evolution and software maintenance N Chapin, JE Hale, KM Khan, JF Ramil, WG Tan Journal of software maintenance and evolution: Research and Practice 13 (1 …, 2001 | 628 | 2001 |
Establishing trust in cloud computing KM Khan, Q Malluhi IT professional 12 (5), 20-27, 2010 | 532 | 2010 |
Machine learning-based network vulnerability analysis of industrial Internet of Things M Zolanvari, MA Teixeira, L Gupta, KM Khan, R Jain IEEE internet of things journal 6 (4), 6822-6834, 2019 | 459 | 2019 |
Cybersecurity for industrial control systems: A survey D Bhamare, M Zolanvari, A Erbad, R Jain, K Khan, N Meskin computers & security 89, 101677, 2020 | 315 | 2020 |
A dual-isolation-forests-based attack detection framework for industrial control systems M Elnour, N Meskin, K Khan, R Jain IEEE Access 8, 36639-36651, 2020 | 111 | 2020 |
Trust xai: Model-agnostic explanations for ai with a case study on iiot security M Zolanvari, Z Yang, K Khan, R Jain, N Meskin IEEE internet of things journal 10 (4), 2967-2978, 2021 | 92 | 2021 |
Composing security-aware software KM Khan, J Han IEEE software 19 (1), 34-41, 2002 | 80 | 2002 |
Systematic identification of threats in the cloud: A survey JB Hong, A Nhlabatsi, DS Kim, A Hussein, N Fetais, KM Khan Computer Networks 150, 46-69, 2019 | 78 | 2019 |
A security characterisation framework for trustworthy component based software systems KM Khan, J Han Proceedings 27th Annual International Computer Software and Applications …, 2003 | 62 | 2003 |
Measuring quality metrics for web applications B Lilburne, D Prajwol, KM Khan, M Khosrowpour Proceedings of the 15th Information Resources Management Association …, 2004 | 53 | 2004 |
Application of data-driven attack detection framework for secure operation in smart buildings M Elnour, N Meskin, K Khan, R Jain Sustainable Cities and Society 69, 102816, 2021 | 51 | 2021 |
Trust in cloud services: providing more controls to clients KM Khan, Q Malluhi Computer 46 (07), 94-96, 2013 | 43 | 2013 |
Physicochemical studies of pin-milled and air-classified dry edible bean fractions1 JY Han, K Khan Cereal chemistry 67 (4), 384-390, 1990 | 42 | 1990 |
Dynamic security metrics for measuring the effectiveness of moving target defense techniques JB Hong, SY Enoch, DS Kim, A Nhlabatsi, N Fetais, KM Khan Computers & Security 79, 33-52, 2018 | 41 | 2018 |
Managing Corporate Information Systems Evolution and Maintenance KM Khan, Y Zhang Igi Global, 2005 | 41 | 2005 |
Functional properties of pin-milled and air-classified dry edible bean fracitons JY Han, K Khan Cereal chemistry 67 (4), 390-394, 1990 | 39 | 1990 |
Threat-specific security risk evaluation in the cloud A Nhlabatsi, JB Hong, DS Kim, R Fernandez, A Hussein, N Fetais, ... IEEE Transactions on Cloud Computing 9 (2), 793-806, 2018 | 38 | 2018 |
Security-oriented service composition and evolution KM Khan, R Kowalczyk, H Jun 2006 13th Asia Pacific Software Engineering Conference (APSEC'06), 71-78, 2006 | 35 | 2006 |
Addressing cloud computing in enterprise architecture: issues and challenges KM Khan, NM Gangavarapu Cutter IT Journal, 27-33, 2009 | 31 | 2009 |
Assessing security properties of software components: A software engineer's perspective KM Khan, J Han Australian Software Engineering Conference (ASWEC'06), 10 pp.-210, 2006 | 30 | 2006 |