-
A. Khandakar, et al., K. Khan, ”Harnessing Smartphone Sensors for Enhanced Road Safety: A Comprehensive Dataset and Review” Scientific Data, Vol. 12(1), Springer Nature,2025. (Impact Factor 9.55, Q1)
-
I. Abuelezz, M. Barhamgi, S. Alshakhsi, A. Yankouskaya, A. Nhlabatsi, K. Khan, R. Ali, ”How do gender and age similarities with a potential social engineer influence one’s trust and willingness to take security risks?” International Journal of Information Security, Springer Nature, Vol. 24, 2025 (Impact Factor 3.2, Q1).
-
T. Supti, K. Khan, et al. ”Examining the Role of Self-Construal on Cybersecurity Attitudes and Perceptions of Vulnerability,” Journal of Applied Security Research, 2025, pp. 1-27 (Impact Factor 1.1,, Q3).
- Abuelezz, I., Barhamgi, M., Nhlabatsi, A., Khan, K., Ali, R., “When Deciding to Trust a Potential Social Engineer, does their Age, Gender, Ethnic Similarity, and Appearance Formality Matter?” Social Science Research Network (SSRN) Electronic journal, Elsevier, January 2024. https://ssrn.com/abstract=476585
- Haris, R., Barhamgi, M., Nhlabatsi, A., Khan, K., “Optimizing pre-copy live virtual machine migration in cloud computing using machine learning-based prediction model” Spring, Computing Journal, 2024 (Impact factor 3.3, Q1)
- Haris, R., Khan, K., Barhamgi, M., Nhlabatsi, A., ”A machine learning-based optimization approach for pre-copy live virtual machine migration,” Journal of Cluster Computing, Springer, 2024, Vol. 27 (2), pp. 1293-1312 (Impact Factor 3.6, Q1).
- Abuelezz, I., Barhamgi, M., Nhlabatsi, A., Khan, K., Ali, R., ”How demographic and appearance cues of a potential social engineer influence trust perception and risk-taking among targets?” Journal of Information & Computer Security, Emerald, 2024.
- Elnour, M., Noorizadeh, M., Shakerpour, M., Meskin, N., Khan, K., Jain, R., ”A Machine Learning Based Framework For Real-time Detection and Mitigation of Sensor False Data Injection Cyber-Physical Attacks in Industrial Control Systems,” IEEE Access, August 2023 (Impact Factor 3.47, Q1)
- Fernandez, R., Xheng, P., Nhlabatsi, A., Khan, K., Fetais, N. “Effective Collaboration in the Management of Access Control Policies: A Survey of Tools,” IEEE Access, Vol. (11), 2023, pp. 13929-13947 (Impact Factor 4.47, Q1)
- Haris, R., Khan, K., Nhlabatsi, A., Khan, “Live Migration of Virtual Machine Memory Content in Networked Systems: A review,” Elsevier Computer Networks, 2022 (Impact Factor 4.47, Q1)
- Zolanvari, M., Zebo, Y., Khan, K., Jain, R., Meskin, N., “TRUST XAI: Model -Agnostic Explanations for AI with a Case Study on IIoT Security,” IEEE Internet of Things, 2021 (Impact Factor 11.75, Q1)
- Nhlabatsi, A., Khan, K., Hong, J., Kim, D., Fetais, N., “Quantifying Satisfaction of Security Requirements of Cloud Software Systems,” IEEE Trans. on Cloud Computing, 2021 (Impact Factor 7.92, Q1).
- Nhlabatsi, A., Hong, J., Kim, D., Fernandez, R., Hussein, A., Fetais, N., Khan, K., “Threat-specific Security Risk Evaluation in the Cloud”, IEEE Transactions on Cloud Computing, 2021 (Impact Factor 7.92, Q1).
- M. Elnour, N. Meskin, K. Khan, R. Jain, “Application of Data-Driven Attack Detection Framework for Secure Operation in Smart Building”, J. of Sustainable Cities and Society, Elsevier, 2021 (Impact Factor 7.58, Q1).
- Khan, K., Salleh, M, “Understanding the Impact of Emotions on the Quality of Software Artifacts,” IEEE Access, 2021 (Impact Factor 4.64, Q1)
- Zolanvari, M., Jain, R., Khan, K., ”Flow-based Intrusion Detection Algorithm for SCADA Systems: A Real-Time Approach,” IET Cyber-Physical Systems: Theory & Applications, Wiley, 2021 (Q3)
- M. Elnour, N. Meskin, K. Khan, R. Jain, “A Dual-Isolation-Forests-Based Attack Detection Framework for Industrial Control Systems,” IEEE Access, February 2020. (IF 4.64, Q1)
- D. Bhamare, M. Zolanvari, A. Erbad, R. Jain, K. Khan, N. Meskin, “Cybersecurity for industrial control systems: A survey,” Computers & Security, Elsevier, Vol. 89, Feb. 2020. (IF 3.062, Q1)
- K. Khan, “The Dynamics of Cyberspace and National Power: Continuity and Change,” National Defence College E-Journal, Vol. 1(1), Oct. 2020, pp. 50-67.
- Zolanvari, M., Teixeira, M., Gupta, L., Khan, K., Jain, R., “Machine Learning-based Network VulnerabilityAnalysis of Industrial Internet of Things,” IEEE Internet of Things, 2019. (IF 9.51, Q1)
- Hong, J., Nhlabatsi, A., Kim, D., Fernandez, R., Fetais, N., Khan, K., “Systematic Identification of Threats in the Cloud: A Survey,” J. of Computer Networks, Elsevier, Vol. 150, February 2019. pp. 46-69. (IF 3.03, Q1).
- Wang, Y., Khan, K., “Matrix Barcode Based Secure Authentication without Trusting Third
Party,” IEEE IT Professional, Vol. 21(3), 2019. (IF 1.618)
- Hong, J., Enoch, S., Nhlabatsi, A., Kim, D., Fetais, N., Khan, K., “Dynamic Security Metrics for Measuring the Effectiveness of Moving Target Defense,”, Journal of Computers & Security, Elsevier, Vol 79: 33-52, 2018 (IF 3.06 in 2020).
- Hu, Jinwei, Khan, K., Zhang, Y., Bai, Y., Li, R, “Role Updating in Information Systems using Model Checking”, Journal of Knowledge and Information Systems, Springer, Vol. 51(1), 2017, pp. 187-234. (IF 2.39 in 2018).
- Asuncion, V., Khan, K., Alhazbi, S., Erradi, A., “Reasoning About Policies in Security-Aware Service,” International Journal of Cooperative Information Systems, Vol. 25 (1): 1650003, 2016, (IF 1.00)
- Wang, Y., Malluhi, Q., Khan, K., “Garbled Computation in Cloud”, Future Generation Computer Systems, Elsevier, 62: 54-65, 2016 (IF 4.63).
- Nhlabatsi, A., Tun, T., Khan, N., Yu, Y., Bandara, A., Khan, K., Nuseibeh, B., “Why Can’t I do that?: Tracing Adaptive Security Decision”, EAI Endorsed Transaction on Self-Adaptive Systems, European Alliance for Innovation, Vol. 1(1), 2015, pp.1-16.
- Khan, K., Malluhi, Q., “Trust in Cloud Services: Providing more Control to Clients”, IEEE Computer, vol. 46(7):94-96, July 2013, pp.94-96 (IF 1.94)
- Khan, K., Malluhi, Q. “Role of Contextual Properties in Enterprise Service Migration to Cloud”, Journal of Concurrency and Computation: Practice and Experience, Wiley & Sons, 2013, Vol. 25:2455-2470. (IF 1.16)
- Khan, K., Erradi, A., Alhazbi, S., Han, J., “Addressing Security Compatibility for Multi-Tenant Cloud Services”, IJCAT, 47(4): 370-378 (2013)
- Khan, K., Malluhi, Q., “Privacy and Confidentiality in Cloud Computing”, a book chapter, Chapter 14 in Scalable Computing and Communications: Theory and Practice, (S. Khan, L. Wang, and A. Zomaya, Eds.), Wiley, New Jersey, 2012, pp. 277-288.
- Khan, K., “State of Sharing Clinical Information in a Healthcare System in the Gulf”, International Journal of Reliable and Quality E-Healthcare, Vol.1(3), 2012, pp. 27-42.
- Bai, Y., Khan, K., “Secure Information System Using Modal Logic Technique”, International Journal of Secure Software Engineering, Vol. 2(2), April-June, 2011, pp. 65-76.
- Khan, K., Malluhi, Q., “Establishing Trust in Cloud Computing”, IEEE IT Professional, September/October, Vol. 12(5), 2010. (IF 1.61)
- Khan, K., et al., “Assessing User-Centric Quality of Web-Based Systems”, International Journal of Software Engineering, Vol. 3 (1):3-28, January 2010.
- Khan, K., Han, J., “Tool Support for Secure Software Integration”, International Journal of Secure Software Engineering, April-June 2010, pp. 36-56
- Khan, K., Gangavarapu, N., “Addressing Cloud Computing in Enterprise Architecture”, Cutter IT Journal, Cutter Consortium, MA, Vol. 22(11), November 2009, pp. 27-33.
- Khan, K., “Security Dynamics in Cloud Computing”, Cutter IT Journal, MA, Vol 22(6/7), June/July 2009, pp. 38-43.
- Khan, K. with Samaka, M., “Wireless Networks”, a book chapter, In Wiley Encyclopedia of Computer Science and Engineering, edited by Benjamin Wah, 2009, Wiley and Sons, USA, ISBN: 978-0471383932
- Khan, K., “A Decision Support System for Selecting Secure Web Services”, A book chapter in the Encyclopedia of Decision Making and Decision Support Technologies, edited by Adam & Humphreys, Information Science Reference, PA, USA, 2008, pp. 211-217
- Khan, K., “Security-Aware Service Specification for Healthcare Information Systems”, A book chapter, Encyclopedia of Healthcare Systems, Edited by Wickramasinghe & Geisler, Information Science Reference, PA, USA, 2008, pp.1236-1240.
- Khan, K., “Revisiting Timed Open Book Assessment”, The Educational Reform Journal, 5th Edition, Qatar University, pp. 5-7, 2007.
- Khan, K., Kapurubandara, M., Chadha, U., “Incorporating Business Requirements and Constraints in Database Conceptual Model”, Australian Computer Science Communications, Australian Computer Society, 26(6):59-64, 2004.
- Khan, K.,“Integrating Security Properties with Systems Design Artefacts”, a chapter in Con- structing the Infrastructure for the Knowledge Economy: Methods and Tools, Theory and Prac- tice, edited by H. Linger et al., Kluwer Academic/Plenum Publishers, 2004, pp. 367-377.
- Khan, K., Han, J., “Composing Security-Aware Software”, IEEE Software, 19(1):34-41, 2002. (IF 2.04)
- Chapin, N., Hale, J., Khan, K., et al., “Types of Software Maintenance and Evolution”, European Journal of Software Maintenance and Evolution: Research and Practice, John Wiley and Sons, 13(1):3-29, 2001. (IF 1.4)
- Khan, K., Lo, B., Skramstad, T., “Tasks and Methods for Software Maintenance: A Process Oriented Framework”, Australian Journal of Information Systems, 9(1):51-60, September 2001.
- Rahim, M., Khan, K., Selamat, M., “Adoption versus Abandonment of CASE Tools: Lessons from Two Organisations”, Journal of Information Technology and People, special issue, MCB University press, UK, 10(4):316-329, 1997. (Invited paper).
- Khan, K., Rashid, M., Lo, B., “A Task-Oriented Software Maintenance Model”, Malaysian Journal of Computer Science, 9(2):36-42, December, 1996. (IF 0.6)
- Khan, K. , Skramstad, T., “Data Structures for Extracting and Preserving Low-Level Program Information”, Malaysian Journal of Computer Science, 8(2):66-79, December 1995. (IF 0.6)