Dr Wilayat Khan
Dr Wilayat Khan
COMSATS University Islamabad-Wah Campus
Потвърден имейл адрес: kth.se
Density independent hydrodynamics model for crowd coherency detection
H Ullah, M Uzair, M Ullah, A Khan, A Ahmad, W Khan
Neurocomputing 242, 28-39, 2017
CookiExt: patching the browser against session hijacking attacks
WK M. Bugliesi, S. Calzavara, R. Focardi
Journal of Computer Security, 2015
Scientific reasoning: a solution to the problem of induction
W Khan, H Ullah
International Journal of Basic & Applied Sciences 10 (3), 58-62, 2010
Authentication and secure communication in GSM, GPRS, and UMTS using asymmetric cryptography
W Khan, H Ullah
International Journal of Computer Science Issues (IJCSI) 7 (3), 10, 2010
Learning Outcomes and Assessment Methodology: Case study of an Undergraduate Engineering Project
N Syed, Rameez, A Tallha, H Sajjad, Ali, K Wilayat, K Muhammad, ...
International Journal of Electrical Engineering Education, 2018
Automatic and robust client-side protection for cookie-based sessions
M Bugliesi, S Calzavara, R Focardi, W Khan
Engineering Secure Software and Systems: 6th International Symposium, ESSoS …, 2014
Provably Sound Browser-Based Enforcement of Web Session Integrity
Michele Bugliesi, Stefano Calzavara, Riccardo Focardi, Wilayat Khan, Mauro ...
2014 IEEE 27th Computer Security Foundations Symposium, 366-380, 2014
Energy-efficient mutual authentication protocol for handhled devices based on public key cryptography
W Khan, H Ullah, R Hussain
International Journal of Computer Theory and Engineering 5 (5), 754, 2013
CrashSafe: a formal model for proving crash-safety of Android applications
W Khan, H Ullah, A Ahmad, K Sultan, AJ Alzahrani, SD Khan, M Alhumaid, ...
Human-centric Computing and Information Sciences 8, 1-24, 2018
Adaptive Security for Self-Protection of Mobile Computing Devices
A Aakash, M Asad, Waqar, A Abdulrahman, K Wilayat, S Maryam
Mobile Networks and Applications, 1-20, 2019
Formal analysis of language-based android security using theorem proving approach
W Khan, M Kamran, A Ahmad, FA Khan, A Derhab
IEEE Access 7, 16550-16560, 2019
Formal Verification of Hardware Components in Critical Systems
W Khan, K Muhammad, N Syed, Rameez, K Farrukh, Aslam, SA Ahmed, ...
Wireless Communications and Mobile Computing 2020, 2020
Client side web session integrity as a non-interference property
W Khan, S Calzavara, M Bugliesi, W De Groef, F Piessens
Information Systems Security: 10th International Conference, ICISS 2014 …, 2014
Automatic identification of sarcasm in tweets and customer reviews
F Naz, M Kamran, W Mehmood, W Khan, MS Alkatheiri, AS Alghamdi, ...
Journal of Intelligent & Fuzzy Systems 37 (5), 6815-6828, 2019
VeriFormal: An Executable Formal Model of a Hardware Description Language
K Wilayat, T Alwen, S David
Singapore Cyber Security R&D Conference, 2017
Modernising Legacy Software as Context-sensitive and Portable Mobile-enabled Application
A Ahmad, A Alkhalil, AB Altamimi, K Sultan, W Khan
IT Professional, 2019
Precision modeling: application of metaheuristics on current–voltage curves of superconducting films
SR Naqvi, T Akram, SA Haider, M Kamran, A Shahzad, W Khan, T Iqbal, ...
Electronics 7 (8), 138, 2018
IoT Data Sharing Platform in Web 3.0 Using Blockchain Technology
WKMA Abdul Razzaq, Ahmed B. Altamimi, Abdulrahman Alreshidi, Shahbaz Ahmed ...
Electronics 12 (1233), 1-18, 2023
On embedding a hardware description language in Isabelle/HOL
W Khan, D Sanan, Z Hou, L Yang
Design Automation for Embedded Systems 23, 123-151, 2019
SpoofCatch: A client-side protection tool against phishing attacks
W Khan, A Ahmad, A Qamar, M Kamran, M Altaf
IT Professional 23 (2), 65-74, 2021
Системата не може да изпълни операцията сега. Опитайте отново по-късно.
Статии 1–20