Follow
M. Taimoor Khan
M. Taimoor Khan
Other namesMuhammad Taimoor Khan
Centre for Sustainable Cyber Security (CS2), University of Greenwich
Verified email at gre.ac.uk - Homepage
Title
Cited by
Cited by
Year
Cyber threats detection in smart environments using SDN-enabled DNN-LSTM hybrid framework
M Al Razib, D Javeed, MT Khan, R Alkanhel, MSA Muthanna
IEEe Access 10, 53015-53026, 2022
982022
SDN-enabled hybrid DL-driven framework for the detection of emerging cyber threats in IoT
D Javeed, T Gao, MT Khan
Electronics 10 (8), 918, 2021
972021
A hybrid deep learning-driven SDN enabled mechanism for secure communication in Internet of Things (IoT)
D Javeed, T Gao, MT Khan, I Ahmad
Sensors 21 (14), 4884, 2021
912021
ARMET: Behavior-based secure and resilient industrial control systems
MT Khan, D Serpanos, H Shrobe
Proceedings of the IEEE 106 (1), 129-143, 2017
512017
A hybrid intelligent framework to combat sophisticated threats in secure industries
D Javeed, T Gao, MT Khan, D Shoukat
Sensors 22 (4), 1582, 2022
432022
FOG-empowered augmented-intelligence-based proactive defensive mechanism for IoT-enabled smart industries
D Javeed, T Gao, MS Saeed, MT Khan
IEEE Internet of Things Journal 10 (21), 18599-18608, 2023
282023
An efficient approach of threat hunting using memory forensics
D Javeed, MT Khan, I Ahmad, T Iqbal, UM Badamasi, CO Ndubuisi, ...
International Journal of Computer Networks and Communications Security 8 (5 …, 2020
272020
A rigorous and efficient run-time security monitor for real-time critical embedded system applications
MT Khan, D Serpanos, H Shrobe
2016 IEEE 3rd World Forum on Internet of Things (WF-IoT), 100-105, 2016
242016
Proactive defense for fog-to-things critical infrastructure
MT Khan, A Akhunzada, S Zeadally
IEEE Communications Magazine 60 (12), 44-49, 2022
202022
Securing industrial cyber–physical systems: A run-time multilayer monitoring
MT Khan, I Tomić
IEEE Transactions on Industrial Informatics 17 (9), 6251-6259, 2020
162020
Internet of things
J Wu, M Schnauss
KMU-Ratgeber, 2018
162018
Extracting timed automata from Java methods
G Liva, MT Khan, M Pinzger
2017 IEEE 17th International Working Conference on Source Code Analysis and …, 2017
162017
Cybersecurity for autonomous vehicles against malware attacks in smart-cities
S Aurangzeb, M Aleem, MT Khan, H Anwar, MS Siddique
Cluster Computing 27 (3), 3363-3378, 2024
152024
Indexing of real time geospatial data by IoT enabled devices: Opportunities, challenges and design considerations
N Chaudhry, MM Yousaf, MT Khan
Journal of Ambient Intelligence and Smart Environments 12 (4), 281-312, 2020
152020
Designing safe and secure industrial control systems: a tutorial review
D Serpanos, MT Khan, H Shrobe
IEEE Design & Test 35 (3), 73-88, 2018
132018
Towards the formal specification and verification of maple programs
MT Khan, W Schreiner
International Conference on Intelligent Computer Mathematics, 231-247, 2012
132012
Studies on varietal screening of maize against maize stem borer Chilo partellus (Swinhoe)
AS Kakar, KM Kakar, MT Khan, MI Shawani, AB Tareen
OnLine Journal of Biological Sciences (Pakistan) 3 (2), 2003
132003
On the formal semantics of the cognitive middleware AWDRAT
MT Khan, D Serpanos, H Shrobe
arXiv preprint arXiv:1412.3588, 2014
122014
Future context-aware pervasive learning environment: smart campus
MT Khan, K Zia
International conference on integration of information technology in science …, 2007
112007
Security assessment of data management systems for cyber physical system applications
N Chaudhry, MM Yousaf, MT Khan
Journal of Software: Evolution and Process 32 (2), e2241, 2020
102020
The system can't perform the operation now. Try again later.
Articles 1–20