Burhan Ul Islam Khan
Burhan Ul Islam Khan
Department of ECE, Kulliyyah of Engineering, IIUM Gombak.
Verified email at live.iium.edu.my - Homepage
Title
Cited by
Cited by
Year
A compendious study of online payment systems: Past developments, present impact, and future considerations
BUI Khan, RF Olanrewaju, AM Baba, AA Langoo, S Assad
International journal of advanced computer science and applications 8 (5 …, 2017
402017
A survey on e-payment systems: elements, adoption, architecture, challenges and security concepts
M Masihuddin, BUI Khan, M Mattoo, RF Olanrewaju
Indian Journal of Science and Technology 10 (20), 1-19, 2017
242017
SSM: Secure-Split-Merge data distribution in cloud infrastructure
BUI Khan, AM Baba, RF Olanrewaju, SA Lone, NF Zulkurnain
2015 IEEE Conference on Open Systems (ICOS), 40-45, 2015
162015
Malicious Behaviour of Node and its Significant Security Techniques in MANET - A Review
BUI Khan, RF Olanrewaju, MH Habaebi
Australian Journal of Basic and Applied Sciences 7 (12), 286 - 293, 2013
152013
Behaviour visualization for malicious-attacker node collusion in MANET based on probabilistic approach
RF Olanrewaju, BUI Khan, RN Mir, A Shah
American Journal of Computer Science and Engineering 2 (3), 10-19, 2015
142015
A survey on MANETs: architecture, evolution, applications, security issues and solutions
BUI Khan, RF Olanrewaju, F Anwar, AR Najeeb, M Yaacob
Indonesian Journal of Electrical Engineering and Computer Science 12 (2 …, 2018
122018
Snort-based smart and swift intrusion detection system
RF Olanrewaju, BUI Khan, AR Najeeb, K Zahir, S Hussain
Indian Journal of Science and Technology 8 (1), 1-9, 2018
122018
Contemplation of effective security measures in access management from adoptability perspective
T Mehraj, B Rasool, BUI Khan, A Baba, AG Lone
International Journal of Advanced Computer Science and Applications 6 (8 …, 2015
122015
Securing electronic transactions via payment gateways–a systematic review
RF Olanrewaju, BUI Khan, MMUI Mattoo, F Anwar, ANB Nordin, RN Mir
International Journal of Internet Technology and Secured Transactions 7 (3 …, 2017
112017
STRATEGIC PROFILING FOR BEHAVIOUR VISUALIZATION OF MALICIOUS NODE IN MANETS USING GAME THEORY.
BUL ISLAM KHAN, RF OLANREWAJU, RN MIR, A BABA, BW ADEBAYO
Journal of Theoretical & Applied Information Technology 77 (1), 2015
112015
Critical insight for MapReduce optimization in Hadoop
BUI Khan, RF Olanrewaju, H Altaf, A Shah
Int J Comput Sci Control Eng 2 (1), 1-7, 2014
112014
CRITICAL SECURITY CHALLENGES IN CLOUD COMPUTING ENVIRONMENT: AN APPRAISAL.
MS MIR, BIN SUHAIMI, M ADAM, B UL ISLAM KHAN, ...
Journal of Theoretical & Applied Information Technology 95 (10), 2017
102017
Adoption of cloud computing in higher learning institutions: a systematic review
NB Nordin, RN Mir, Z Noor
Indian Journal of Science and Technology 10, 36, 2017
92017
RFDA: Reliable framework for data administration based on split-merge policy
RF Olanrewaju, BUI Khan, A Baba, RN Mir, SA Lone
2016 SAI Computing Conference (SAI), 545-552, 2016
92016
Manifestation and mitigation of node misbehaviour in adhoc networks
RF Khan, Burhan Ul Islam, Olanrewaju, F Anwar, A Shah
Wulfenia Journal 21 (3), 462-470, 2014
92014
Secure annihilation of out-of-band authorization for online transactions
S Hussain, BUI Khan, F Anwar, RF Olanrewaju
Indian Journal of Science and Technology 11 (5), 1-9, 2018
82018
Securely eradicating cellular dependency for e-banking applications
BR Pampori, T Mehraj, BUI Khan, AM Baba, ZA Najar
IJACSA 9 (2), 2018
82018
Modeling malicious multi-attacker node collusion in MANETs via game theory
BUI Khan, RF Olanrewaju, MUI Mattoo, AA Aziz, SA Lone
Middle-East Journal of Scientific Research 25 (3), 568-579, 2017
82017
Offline OTP based solution for secure internet banking access
BUI Khan, RF Olanrewaju, F Anwar, M Yaacob
2018 IEEE Conference on e-Learning, e-Management and e-Services (IC3e), 167-172, 2018
72018
Intelligent systems and applications
Y Bi, S Kapoor, R Bhatia
Springer International Publishing AG, 2016
72016
The system can't perform the operation now. Try again later.
Articles 1–20