Follow
Wazir Zada Khan
Wazir Zada Khan
Department of Computer Science, University of Wah
Verified email at uow.edu.pk - Homepage
Title
Cited by
Cited by
Year
Mobile phone sensing systems: A survey
WZ Khan, Y Xiang, MY Aalsalem, Q Arshad
IEEE Communications Surveys Tutorials 15 (1), 402-427, 2013
6682013
Edge computing: A survey
WZ Khan, E Ahmed, S Hakak, I Yaqoob, A Ahmed
Future Generation Computer Systems 97, 219-235, 2019
4602019
Industrial internet of things: Recent advances, enabling technologies and open challenges
WZ Khan, MH Rehman, HM Zangoti, MK Afzal, N Armi, K Salah
Computers & Electrical Engineering 81, 106522, 2020
2432020
Unmanned aerial vehicles in smart agriculture: Applications, requirements, and challenges
PKR Maddikunta, S Hakak, M Alazab, S Bhattacharya, TR Gadekallu, ...
IEEE Sensors Journal 21 (16), 17608-17619, 2021
1192021
An ensemble machine learning approach through effective feature extraction to classify fake news
S Hakak, M Alazab, S Khan, TR Gadekallu, PKR Maddikunta, WZ Khan
Future Generation Computer Systems 117, 47-58, 2021
1082021
Wireless Sensor Networks in oil and gas industry: Recent advances, taxonomy, requirements, and open challenges
MY Aalsalem, WZ Khan, W Gharibi, MK Khan, Q Arshad
Journal of network and computer applications 113, 87-97, 2018
1032018
Securing smart cities through blockchain technology: Architecture, requirements, and challenges
S Hakak, WZ Khan, GA Gilkar, M Imran, N Guizani
IEEE Network 34 (1), 8-14, 2020
1022020
A reliable Internet of Things based architecture for oil and gas industry
WZ Khan, MY Aalsalem, MK Khan, MS Hossain, M Atiquzzaman
2017 19th International conference on advanced communication Technology …, 2017
972017
A systematic review on clone node detection in static wireless sensor networks
M Numan, F Subhan, WZ Khan, S Hakak, S Haider, GT Reddy, A Jolfaei, ...
IEEE Access 8, 65450-65461, 2020
852020
Have you been a victim of COVID-19-related cyber incidents? Survey, taxonomy, and mitigation strategies
S Hakak, WZ Khan, M Imran, KKR Choo, M Shoaib
Ieee Access 8, 124134-124144, 2020
842020
Detection and Mitigation of Node Replication Attacks in Wireless Sensor Networks: A Survey
WZ Khan, MY Aalsalem, NM Saad, Y Xiang
International Journal of Distributed Sensor Networks 2013, 2013
792013
A graphical password based system for small mobile devices
WZ Khan, MY Aalsalem, Y Xiang
arXiv preprint arXiv:1110.3844, 2011
772011
A deep neural networks based model for uninterrupted marine environment monitoring
T Reddy, SP RM, M Parimala, CL Chowdhary, S Hakak, WZ Khan
Computer Communications 157, 64-75, 2020
702020
Exact string matching algorithms: Survey, issues, and future research directions
SI Hakak, A Kamsin, P Shivakumara, GA Gilkar, WZ Khan, M Imran
IEEE access 7, 69614-69637, 2019
642019
Senti‐eSystem: A sentiment‐based eSystem‐using hybridized fuzzy and deep neural network for measuring customer satisfaction
MZ Asghar, F Subhan, H Ahmad, WZ Khan, S Hakak, TR Gadekallu, ...
Software: Practice and Experience 51 (3), 571-594, 2021
562021
A Comprehensive Study of Email Spam Botnet Detection
W Khan, M Khan, F Muhaya, M Aalsalem, HC Chao
Communications Surveys & Tutorials, IEEE, 2015
512015
Antlion re-sampling based deep neural network model for classification of imbalanced multimodal stroke dataset
S Bhattacharya, PKR Maddikunta, S Hakak, WZ Khan, AK Bashir, ...
Multimedia Tools and Applications, 1-25, 2020
422020
Comprehensive study of selective forwarding attack in wireless sensor networks
WZ Khan, X Yang, MY Aalsalem, Q Arshad
International Journal of Computer Network and Information Security 3 (1), 1, 2011
422011
A context-aware privacy-preserving method for IoT-based smart city using software defined networking
M Gheisari, G Wang, WZ Khan, C Fernández-Campusano
Computers & Security 87, 101470, 2019
382019
Enabling consumer trust upon acceptance of IoT technologies through security and privacy model
WZ Khan, MY Aalsalem, MK Khan, Q Arshad
Advanced multimedia and ubiquitous engineering, 111-117, 2016
382016
The system can't perform the operation now. Try again later.
Articles 1–20