Follow
Dr Wilayat Khan
Dr Wilayat Khan
COMSATS University Islamabad-Wah Campus
Verified email at kth.se
Title
Cited by
Cited by
Year
Density independent hydrodynamics model for crowd coherency detection
H Ullah, M Uzair, M Ullah, A Khan, A Ahmad, W Khan
Neurocomputing 242, 28-39, 2017
632017
CookiExt: patching the browser against session hijacking attacks
WK M. Bugliesi, S. Calzavara, R. Focardi
Journal of Computer Security, 2015
612015
Learning Outcomes and Assessment Methodology: Case study of an Undergraduate Engineering Project
N Syed, Rameez, A Tallha, H Sajjad, Ali, K Wilayat, K Muhammad, ...
International Journal of Electrical Engineering Education, 2018
38*2018
Scientific reasoning: a solution to the problem of induction
W Khan, H Ullah
International Journal of Basic & Applied Sciences 10 (3), 58-62, 2010
382010
Authentication and secure communication in GSM, GPRS, and UMTS using asymmetric cryptography
W Khan, H Ullah
International Journal of Computer Science Issues (IJCSI) 7 (3), 10, 2010
372010
Automatic and robust client-side protection for cookie-based sessions
M Bugliesi, S Calzavara, R Focardi, W Khan
Engineering Secure Software and Systems: 6th International Symposium, ESSoS …, 2014
322014
Provably Sound Browser-Based Enforcement of Web Session Integrity
Michele Bugliesi, Stefano Calzavara, Riccardo Focardi, Wilayat Khan, Mauro ...
2014 IEEE 27th Computer Security Foundations Symposium, 366-380, 2014
282014
Energy-efficient mutual authentication protocol for handhled devices based on public key cryptography
W Khan, H Ullah, R Hussain
International Journal of Computer Theory and Engineering 5 (5), 754, 2013
242013
CrashSafe: a formal model for proving crash-safety of Android applications
W Khan, H Ullah, A Ahmad, K Sultan, AJ Alzahrani, SD Khan, M Alhumaid, ...
Human-centric Computing and Information Sciences 8, 1-24, 2018
192018
Adaptive Security for Self-Protection of Mobile Computing Devices
A Aakash, M Asad, Waqar, A Abdulrahman, K Wilayat, S Maryam
Mobile Networks and Applications, 1-20, 2019
172019
Formal analysis of language-based android security using theorem proving approach
W Khan, M Kamran, A Ahmad, FA Khan, A Derhab
IEEE Access 7, 16550-16560, 2019
152019
Formal Verification of Hardware Components in Critical Systems
W Khan, K Muhammad, N Syed, Rameez, K Farrukh, Aslam, SA Ahmed, ...
Wireless Communications and Mobile Computing 2020, 2020
112020
VeriFormal: An Executable Formal Model of a Hardware Description Language
K Wilayat, T Alwen, S David
Singapore Cyber Security R&D Conference, 2017
10*2017
Client side web session integrity as a non-interference property
W Khan, S Calzavara, M Bugliesi, W De Groef, F Piessens
Information Systems Security: 10th International Conference, ICISS 2014 …, 2014
102014
IoT Data Sharing Platform in Web 3.0 Using Blockchain Technology
WKMA Abdul Razzaq, Ahmed B. Altamimi, Abdulrahman Alreshidi, Shahbaz Ahmed ...
Electronics 12 (1233), 1-18, 2023
9*2023
Automatic identification of sarcasm in tweets and customer reviews
F Naz, M Kamran, W Mehmood, W Khan, MS Alkatheiri, AS Alghamdi, ...
Journal of Intelligent & Fuzzy Systems 37 (5), 6815-6828, 2019
82019
Modernising Legacy Software as Context-sensitive and Portable Mobile-enabled Application
A Ahmad, A Alkhalil, AB Altamimi, K Sultan, W Khan
IT Professional, 2019
72019
Precision modeling: application of metaheuristics on current–voltage curves of superconducting films
SR Naqvi, T Akram, SA Haider, M Kamran, A Shahzad, W Khan, T Iqbal, ...
Electronics 7 (8), 138, 2018
72018
On embedding a hardware description language in Isabelle/HOL
W Khan, D Sanan, Z Hou, L Yang
Design Automation for Embedded Systems 23 (3), 123-151, 2019
52019
SpoofCatch: A client-side protection tool against phishing attacks
W Khan, A Ahmad, A Qamar, M Kamran, M Altaf
IT Professional 23 (2), 65-74, 2021
42021
The system can't perform the operation now. Try again later.
Articles 1–20