Follow
Muhammad Mubashir Khan
Muhammad Mubashir Khan
Verified email at neduet.edu.pk
Title
Cited by
Cited by
Year
Secure digital voting system based on blockchain technology
KM Khan, J Arshad, MM Khan
International Journal of Electronic Government Research (IJEGR) 14 (1), 53-62, 2018
1892018
Investigating performance constraints for blockchain based secure e-voting system
KM Khan, J Arshad, MM Khan
Future Generation Computer Systems 105, 13-26, 2020
1662020
High error-rate quantum key distribution for long-distance communication
MM Khan, M Murphy, A Beige
New Journal of Physics 11 (6), 063043, 2009
782009
Scalable blockchains—A systematic review
MH Nasir, J Arshad, MM Khan, M Fatima, K Salah, R Jayaraman
Future Generation Computer Systems, 2021
732021
A blockchain-based decentralized machine learning framework for collaborative intrusion detection within UAVs
AA Khan, MM Khan, KM Khan, J Arshad, F Ahmad
Computer Networks, 108217, 2021
512021
Simulation of transaction malleability attack for blockchain-based e-Voting
KM Khan, J Arshad, MM Khan
Computers & Electrical Engineering 83, 106583, 2020
462020
Swarm intelligence inspired intrusion detection systems—a systematic literature review
MH Nasir, SA Khan, MM Khan, M Fatima
Computer Networks 205, 108708, 2022
442022
Empirical analysis of transaction malleability within blockchain-based e-Voting
KM Khan, J Arshad, MM Khan
Computers & Security 100, 102081, 2021
442021
PRISED tangle: a privacy-aware framework for smart healthcare data sharing using IOTA tangle
S Abdullah, J Arshad, MM Khan, M Alazab, K Salah
Complex & Intelligent Systems 9 (3), 3023-3041, 2023
352023
Analysis of security and privacy challenges for DNA-genomics applications and databases
S Arshad, J Arshad, MM Khan, S Parkinson
Journal of Biomedical Informatics 119, 103815, 2021
212021
A novel framework for collaborative intrusion detection for m2m networks
J Arshad, MM Abdellatif, MM Khan, MA Azad
2018 9th International Conference on Information and Communication Systems …, 2018
192018
An overview of quantum cryptography for wireless networking infrastructure
KH Sheikh, SS Hyder, MM Khan
International Symposium on Collaborative Technologies and Systems (CTS'06 …, 2006
172006
Signature-based detection of privilege-escalation attacks on Android
RH Niazi, JA Shamsi, T Waseem, MM Khan
2015 conference on information assurance and cyber security (CIACS), 44-49, 2015
162015
A Quantum key distribution network through single mode optical fiber
MM Khan, S Hyder, MK Pathan, KH Sheikh
International Symposium on Collaborative Technologies and Systems (CTS'06 …, 2006
142006
A bibliometric approach to quantitatively assess current research trends in 5G security
MNI Farooqui, J Arshad, MM Khan
Library Hi Tech 39 (4), 1097-1120, 2021
122021
Ransomware prevention using moving target defense based approach
MM Khan, MF Hyder, SM Khan, J Arshad, MM Khan
Concurrency and Computation: Practice and Experience 35 (7), e7592, 2023
102023
A Layered Approach to Threat Modeling for 5G-Based Systems
MNI Farooqui, J Arshad, MM Khan
Electronics 11 (12), 1819, 2022
92022
Anomaly detection through keystroke and tap dynamics implemented via machine learning algorithms
H Jawed, Z Ziad, MM Khan, M Asrar
Turkish Journal of Electrical Engineering and Computer Sciences 26 (4), 1698 …, 2018
92018
Route constancy and energy aware routing protocol for MANET
SM Khan, MM Khan, NA Khan
International Journal of Computer Science and Network Security 17 (5), 56-64, 2017
72017
Collaborative device-level botnet detection for internet of things
MH Nasir, J Arshad, MM Khan
Computers & Security 129, 103172, 2023
62023
The system can't perform the operation now. Try again later.
Articles 1–20