{"id":2,"date":"2016-04-24T13:26:08","date_gmt":"2016-04-24T13:26:08","guid":{"rendered":"http:\/\/qufaculty.qu.edu.qa\/k-khan\/?page_id=2"},"modified":"2026-01-25T15:16:02","modified_gmt":"2026-01-25T15:16:02","slug":"research-activities","status":"publish","type":"page","link":"http:\/\/qufaculty.qu.edu.qa\/k-khan\/research-activities\/","title":{"rendered":"Publications"},"content":{"rendered":"\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container\">\n<p><a href=\"https:\/\/scholar.google.com\/citations?user=YoU2yEsAAAAJ&amp;hl=en\">My Google Scholar<\/a><\/p>\n<p>ORCID ID: 0000-0002-8848-0760;<\/p>\n<p><strong>Three U.S. Patents\u00a0 (Granted)<\/strong><strong>:<\/strong><\/p>\n<ul>\n<li><strong>Granted Patent (2022)<\/strong>: U.S. Patent and Trademark Office.<br \/>Patent No. 11,228,616 B2.<br \/>Title: <em>Method and Systems for Monitoring Network Security.<\/em><\/li>\n<li><strong>Granted Patent (2021)<\/strong>: U. S. Patent and Trademark Office.<br \/>Patent No. 11,146, 583 B2.<br \/>Title: <em>Threat-Specific Security Risk Evaluation for Networked Systems<\/em><\/li>\n<li><strong>Granted Patent (2020)<\/strong>: U. S. Patent and Trademark Office.<br \/>Patent No: 10,713,355 B2.<br \/>Title: <em>Method and Systems for Adaptive Security in Cloud-based Services<\/em>.<\/li>\n<\/ul>\n<p><strong>Four Books published in the U.S.:<\/strong><\/p>\n<ol>\n<li><strong>Khan, K<\/strong>.: <em>Developing and Evaluating Security-Aware Software Systems.<\/em> Information Science Reference, PA, USA, ISBN-10: 1466624825, ISBN-13: 978-1466624825, Total pages, 422, 2013.<\/li>\n<li><strong>Khan, K.<\/strong>: <em>Security-Aware Systems Applications and Software Development Methods<\/em>, Information Science Reference, PA, USA, ISBN 978-1-4666-1580-9, ISBN 978-1-4666-1581-6 (ebook), ISBN 978-1-4666-1582-3, 2012, Total pages, 416.<\/li>\n<li><strong>Khan, K<\/strong>.: <em>Managing Web Services Quality: Measuring Outcome and Effectiveness<\/em>. Information Science Reference, PA, USA, October 2008. ISBN-10: 1605660426, ISBN- 13: 978-1605660424. Total pages, 318.<\/li>\n<li><strong>Khan, K<\/strong>., Zhang, Y.: <em>Managing Corporate Information Systems Evolution and Maintenance<\/em>. \u00a02005, ISBN: 1-59140-367-7, Total pages, 376.<\/li>\n<\/ol>\n<p><strong>Papers in refereed journals\/magazines\/books<\/strong> :<\/p>\n<ol>\n<li>A. Khandakar, D. Michelson, F. Shafi, M. Ahamed, M. Ayari, <strong>K. Khan<\/strong>, P. Suganthan, &#8220;An Explainable Attention-Augmented LSTM Model for Robust Real-Time Detection of Driving Behavior Patterns and Road Anomalies in Smart Transportation Networks,&#8221; IEEE Trans. on Instrumentation and Measurement, Vol. 95, 2025 (<strong>Impact Factor 5.9, Q1<\/strong>).<\/li>\n<li>A. Khandakar, et al., <strong>K. Khan<\/strong>, \u201dHarnessing Smartphone Sensors for Enhanced Road Safety: A Comprehensive Dataset and Review\u201d <em>Scientific Data<\/em>, Vol. 12(1), Springer Nature,2025. (<strong>Impact Factor 9.55, Q1<\/strong>)<\/li>\n<li>\n<p class=\"p1\">A. Muhanad, I. Abuelezz, R. Haris, <strong>K. Khan<\/strong>, R. Ali, \u201dPersonality traits as predictors of vulnerability to persuasion in social engineering amongst risk-aware targets,\u201d Computing Journal, Vol. 107 (8), 168, Springer, 2025, (<strong>Impact Factor 2.8, Q1<\/strong>)<\/p>\n<\/li>\n<li>T. Supti, A. A Yankouskaya, M Barhmagi, A Nhlabatsi, <strong>K. Khan<\/strong>, R. Ali, &#8220;Digital Dependency and Security Risk: Investigating the Connections between Fear of Missing Out, Problematic Social media Use, and Vulnerability perceptions,&#8221; <em>Journal of Technology in Behavioral Science<\/em>, <em>Springer<\/em> International Publishing, 2005.\u00a0 (I<strong>mpact Factor 2.58, Q1<\/strong>)<\/li>\n<li>R. Haris, M. Barhamgi, A. Badawy, A. Nhlabatsi, <strong>K. Khan<\/strong>, &#8220;Enhancing Security and Performance in Live VM Migration: A Machine Learning\u2010Driven Framework With Selective Encryption for Enhanced Security and Performance in Cloud Computing,&#8221; <em>Expert Systems <\/em>journal, Vol. 42 (2), 2025. (<strong>Impact Factor, 3.3, Q2<\/strong>)<\/li>\n<li>A. Muhanad, T. Supti, I. Abuelezz, A. Yankouskaya, <strong>K. Khan<\/strong>, M. Barhamgi, Ar. Nhlabatsi, R. Ali, &#8220;Does security attitude really predict susceptibility to persuasion tactics in social engineering attempts?&#8221;, <em>Information &amp; Computer Security<\/em> journal, Emerald Publishing Limited, 2025. (<strong>Impact Factor 3.65, Q2<\/strong>)<\/li>\n<li>\n<p class=\"p1\">I. Abuelezz, M. Barhamgi, S. Alshakhsi, A. Yankouskaya, A. Nhlabatsi, <strong>K. Khan<\/strong>, R. Ali, &#8221;How do gender and age similarities with a potential social engineer influence one&#8217;s trust and willingness to take security risks?\u201d<em>International Journal of Information Security<\/em>, Springer Nature, Vol. 24, 2025 (<strong>Impact Factor 3.2, Q1<\/strong>).<\/p>\n<\/li>\n<li>\n<p class=\"p1\">T. Supti, <strong>K. Khan<\/strong>, et al. \u201dExamining the Role of Self-Construal on Cybersecurity Attitudes and Perceptions of Vulnerability,\u201d Journal of Applied Security Research, 2025, pp. 1-27 (<strong>Impact Factor 1.1, Q3<\/strong>).<\/p>\n<\/li>\n<li>Abuelezz, I., Barhamgi, M., Nhlabatsi, A., <strong>Khan, K.<\/strong>, Ali, R., &#8220;When Deciding to Trust a Potential Social Engineer, does their Age, Gender, Ethnic Similarity, and Appearance Formality Matter?&#8221;<em>\u00a0 Social Science Research Network (SSRN) Electronic journal, Elsevier<\/em>, January 2024. https:\/\/ssrn.com\/abstract=476585<\/li>\n<li>Haris, R., Barhamgi, M., Nhlabatsi, A., <strong>Khan, K<\/strong>., &#8220;Optimizing pre-copy live virtual machine migration in cloud computing using machine learning-based prediction model&#8221; Springer, <em>Computing<\/em> Journal, 2024 (<strong>Impact factor 3.3, Q1<\/strong>)\u00a0<\/li>\n<li>Haris, R., <strong>Khan, K.<\/strong>, Barhamgi, M., Nhlabatsi, A., \u201dA machine learning-based optimization approach for pre-copy live virtual machine migration,\u201d <em>Journal of Cluster Computing<\/em>, Springer, 2024, Vol. 27 (2), pp. 1293-1312 (<strong>Impact Factor 3.6, Q1<\/strong>).<\/li>\n<li>Abuelezz, I., Barhamgi, M., Nhlabatsi, A., <strong>Khan, K.,<\/strong> Ali, R., \u201dHow demographic and appearance cues of a potential social engineer influence trust perception and risk-taking among targets?\u201d Journal of Information &amp; Computer Security, Emerald, 2024.<\/li>\n<li>Elnour, M., Noorizadeh, M., Shakerpour, M., Meskin, N., <strong>Khan, K.<\/strong>, Jain, R., \u201dA Machine Learning Based Framework For Real-time Detection and Mitigation of Sensor False Data Injection Cyber-Physical Attacks in Industrial Control Systems,\u201d <em>IEEE Access<\/em>, August 2023 (<strong>Impact Factor 3.47, Q1<\/strong>)<\/li>\n<li>Fernandez, R., Xheng, P., Nhlabatsi, A., <strong>Khan, K.<\/strong>, Fetais, N. &#8220;Effective Collaboration in the Management of Access Control Policies: A Survey of Tools,&#8221; IEEE Access, Vol. (11), 2023, pp. 13929-13947\u00a0(<strong>Impact Factor 4.47, Q1<\/strong>)\n<div class=\"layoutArea\">\n<div class=\"column\">\u00a0<\/div>\n<\/div>\n<\/li>\n<li>Haris, R., <strong>Khan, K<\/strong>., Nhlabatsi, A.,\u00a0 Khan, &#8220;Live Migration of Virtual Machine Memory Content in Networked Systems: A review,&#8221; Elsevier <em>Computer Networks<\/em>, 2022 (<strong>Impact Factor 4.47, Q1<\/strong>)<\/li>\n<li>Zolanvari, M., Zebo, Y., <strong>Khan, K.<\/strong>, Jain, R., Meskin, N., &#8220;TRUST XAI: Model -Agnostic Explanations for AI with a Case Study on IIoT Security,&#8221; <em>IEEE Internet of Things<\/em>, 2021 (<strong>Impact Factor 11.75, Q1)<\/strong><\/li>\n<li>Nhlabatsi, A., <strong>Khan, K.<\/strong>, Hong, J., Kim, D., Fetais, N., \u201cQuantifying Satisfaction of Security Requirements of Cloud Software Systems,\u201d <em>IEEE Trans. on Cloud Computing<\/em>, 2021 (<strong>Impact Factor 7.92, Q1<\/strong>).<\/li>\n<li>Nhlabatsi, A., Hong, J., Kim, D., \u00a0Fernandez, R., Hussein, A., Fetais, N., <strong>Khan, K.<\/strong>, &#8220;Threat-specific Security Risk Evaluation in the Cloud&#8221;, <em>IEEE Transactions on Cloud Computing, 2021<\/em>\u00a0(<strong>Impact Factor 7.92, Q1<\/strong>).<\/li>\n<li>M. Elnour, N. Meskin, <strong>K. Khan,<\/strong> R. Jain, &#8220;Application of Data-Driven Attack Detection Framework for Secure Operation in Smart Building&#8221;, <em>J. of Sustainable Cities and Society<\/em>, Elsevier, 2021 (<strong>Impact Factor 7.58, Q1<\/strong>).\u00a0<\/li>\n<li><strong>Khan, K.<\/strong>, Salleh, M, \u201cUnderstanding the Impact of Emotions on the Quality of Software Artifacts,\u201d <em>IEEE Access<\/em>, 2021 (<strong>Impact<\/strong> <strong>Factor 4.64, Q1<\/strong>)<\/li>\n<li>Zolanvari, M., Jain, R., <strong>Khan, K.<\/strong>, \u201dFlow-based Intrusion Detection Algorithm for SCADA Systems: A Real-Time Approach,\u201d \u00a0<em>IET Cyber-Physical Systems: Theory &amp; Applications<\/em>, Wiley, 2021 (<strong>Q3<\/strong>)<\/li>\n<li>M. Elnour, N. Meskin, <strong>K. Khan,<\/strong> R. Jain, &#8220;A Dual-Isolation-Forests-Based Attack Detection Framework for Industrial Control Systems,&#8221; <em>IEEE Access<\/em>, February 2020. (<strong>IF 4.64, Q1<\/strong>)<\/li>\n<li>D. Bhamare, M. Zolanvari, A. Erbad, R. Jain, <strong>K.<\/strong>\u00a0<strong>Khan<\/strong>, N. Meskin, &#8220;Cybersecurity for industrial control systems: A survey,&#8221; <em>Computers &amp; Security,<\/em> Elsevier, Vol. 89, Feb. 2020. (<strong>IF 3.062, Q1<\/strong>)<\/li>\n<li><strong>K. Khan<\/strong>, &#8220;The Dynamics of Cyberspace and National Power: Continuity and Change,&#8221; <em>National Defence College E-Journal<\/em>, Vol. 1(1), Oct. 2020, pp. 50-67.<\/li>\n<li>Zolanvari, M., Teixeira, M., Gupta, L., <strong>Khan, K.<\/strong>, Jain, R., &#8220;Machine Learning-based Network VulnerabilityAnalysis of Industrial Internet of Things,&#8221; <em>IEEE Internet of Things<\/em>, 2019. (<strong>IF 9.51, Q1<\/strong>)<\/li>\n<li>Hong, J., Nhlabatsi, A., Kim, D., Fernandez, R., Fetais, N., <strong>Khan, K<\/strong>., &#8220;Systematic Identification of Threats in the Cloud: A Survey,&#8221; <em>J. of Computer Networks<\/em>, Elsevier, Vol. 150, February 2019. pp. 46-69. (<strong>IF 3.03, Q1<\/strong>).<\/li>\n<li>Wang, Y.,\u00a0<strong>Khan, K.,<\/strong>\u00a0\u201cMatrix Barcode Based Secure Authentication without Trusting Third \u2028Party,\u201d \u00a0<em>IEEE IT Professional<\/em>, Vol. 21(3), 2019. (<strong>IF 1.618<\/strong>)<\/li>\n<li>Hong, J., Enoch, S., Nhlabatsi, A., Kim, D., Fetais, N., <strong>Khan, K.<\/strong>, &#8220;Dynamic Security Metrics for Measuring the Effectiveness of Moving Target Defense,&#8221;, <em>Journal of Computers &amp; Security<\/em>, Elsevier, Vol 79: 33-52, 2018 (<strong>IF 3.06 <\/strong>in 2020).\n<div class=\"layoutArea\">\n<div class=\"column\">\u00a0<\/div>\n<\/div>\n<\/li>\n<li>Hu, Jinwei, <strong>Khan, K.<\/strong>, Zhang, Y., Bai, Y., Li, R, &#8220;Role Updating in Information Systems using Model Checking&#8221;, <em>Journal of Knowledge and Information Systems<\/em>, Springer, \u00a0Vol. 51(1), 2017, pp. 187-234. (<strong>IF 2.39 <\/strong>in 2018).<\/li>\n<li>Asuncion, V., <strong>Khan, K<\/strong>., Alhazbi, S., Erradi, A., &#8220;Reasoning About Policies in Security-Aware Service,&#8221; <em>International Journal of Cooperative Information Systems<\/em>, \u00a0 Vol. 25 (1): 1650003,\u00a02016, (<strong>IF 1.00<\/strong>)<\/li>\n<li>Wang, Y., Malluhi, Q., <strong>Khan, K.<\/strong>, \u201cGarbled Computation in Cloud\u201d, <em>Future Generation Computer Systems<\/em>, Elsevier, 62: 54-65, 2016 (<strong>IF 4.63<\/strong>).<\/li>\n<li>Nhlabatsi, A., Tun, T., Khan, N., Yu, Y., Bandara, A., <strong>Khan, K.<\/strong>, Nuseibeh, B., \u201cWhy Can\u2019t I do that?: Tracing Adaptive Security Decision\u201d, E<em>AI Endorsed Transaction on Self-Adaptive Systems, European Alliance for Innovation<\/em>, Vol. 1(1), 2015, pp.1-16.<\/li>\n<li><strong>Khan, K.<\/strong>, Malluhi, Q., \u201cTrust in Cloud Services: Providing more Control to Clients\u201d, <em>IEEE Computer<\/em>, vol. 46(7):94-96, July 2013, pp.94-96 (<strong>IF 1.94<\/strong>)<\/li>\n<li><strong>Khan, K.<\/strong>, Malluhi, Q. \u201cRole of Contextual Properties in Enterprise Service Migration to Cloud\u201d, <em>Journal of Concurrency and Computation: Practice and Experience<\/em>, Wiley &amp; Sons, 2013, Vol. 25:2455-2470. (<strong>IF 1.16<\/strong>)<\/li>\n<li><strong>Khan, K.<\/strong>, Erradi, A., Alhazbi, S., Han, J., \u201cAddressing Security Compatibility for Multi-Tenant Cloud Services\u201d, <em>IJCAT<\/em>, 47(4): 370-378 (2013)<\/li>\n<li><strong>Khan, K.<\/strong>, Malluhi, Q., \u201cPrivacy and Confidentiality in Cloud Computing\u201d, a book chapter, Chapter 14 in Scalable Computing and Communications: Theory and Practice, (S. Khan, L. Wang, and A. Zomaya, Eds.), Wiley, New Jersey, 2012, pp. 277-288.<\/li>\n<li><strong>Khan, K.<\/strong>, \u201cState of Sharing Clinical Information in a Healthcare System in the Gulf\u201d, <em>International Journal of Reliable and Quality E-Healthcare<\/em>, Vol.1(3), 2012, pp. 27-42.<\/li>\n<li>Bai, Y., <strong>Khan, K.<\/strong>, \u201cSecure Information System Using Modal Logic Technique\u201d, <em>International Journal of Secure Software Engineering<\/em>, Vol. 2(2), April-June, 2011, pp. 65-76.<\/li>\n<li><strong>Khan, K.<\/strong>, Malluhi, Q., \u201cEstablishing Trust in Cloud Computing\u201d, IEEE <em>IT Professional<\/em>, September\/October, Vol. 12(5), 2010. (<strong>IF 1.61<\/strong>)<\/li>\n<li><strong>Khan, K.<\/strong>, et al., \u201cAssessing User-Centric Quality of Web-Based Systems\u201d, <em>International Journal of Software Engineering<\/em>, Vol. 3 (1):3-28, January 2010.<\/li>\n<li><strong>Khan, K.<\/strong>, Han, J., \u201cTool Support for Secure Software Integration\u201d, <em>International Journal of Secure Software Engineering<\/em>, April-June 2010, pp. 36-56<\/li>\n<li><strong>Khan, K.<\/strong>, Gangavarapu, N., \u201cAddressing Cloud Computing in Enterprise Architecture\u201d, <em>Cutter IT Journal<\/em>, Cutter Consortium, MA, Vol. 22(11), November 2009, pp. 27-33.<\/li>\n<li><strong>Khan, K.<\/strong>, \u201cSecurity Dynamics in Cloud Computing\u201d, <em>Cutter IT Journal<\/em>, MA, Vol 22(6\/7), June\/July 2009, pp. 38-43.<\/li>\n<li><strong>Khan, K.<\/strong> with Samaka, M., \u201cWireless Networks\u201d, a book chapter, In Wiley Encyclopedia of Computer Science and Engineering, edited by Benjamin Wah, 2009, Wiley and Sons, USA, ISBN: 978-0471383932<\/li>\n<li><strong>Khan, K.,<\/strong> \u201cA Decision Support System for Selecting Secure Web Services\u201d, A book chapter in the Encyclopedia of Decision Making and Decision Support Technologies, edited by Adam &amp; Humphreys, Information Science Reference, PA, USA, 2008, pp. 211-217<\/li>\n<li><strong>Khan, K.<\/strong>, \u201cSecurity-Aware Service Specification for Healthcare Information Systems\u201d, A book chapter, Encyclopedia of Healthcare Systems, Edited by Wickramasinghe &amp; Geisler, Information Science Reference, PA, USA, 2008, pp.1236-1240.<\/li>\n<li><strong>Khan, K.<\/strong>, \u201cRevisiting Timed Open Book Assessment\u201d, <em>The Educational Reform Journal<\/em>, 5th Edition, Qatar University, pp. 5-7, 2007.<\/li>\n<li><strong>Khan, K.<\/strong>, Kapurubandara, M., Chadha, U., \u201cIncorporating Business Requirements and Constraints in Database Conceptual Model\u201d, <em>Australian Computer Science Communications<\/em>, Australian Computer Society, 26(6):59-64, 2004.<\/li>\n<li><strong>Khan, K<\/strong>.,\u201cIntegrating Security Properties with Systems Design Artefacts\u201d, a chapter in Con- structing the Infrastructure for the Knowledge Economy: Methods and Tools, Theory and Prac- tice, edited by H. Linger et al., Kluwer Academic\/Plenum Publishers, 2004, pp. 367-377.<\/li>\n<li><strong>Khan, K.<\/strong>, Han, J., \u201cComposing Security-Aware Software\u201d,<em> IEEE Software<\/em>, 19(1):34-41, 2002. (<strong>IF 2.04)<\/strong><\/li>\n<li>Chapin, N., Hale, J., <strong>Khan, K.,<\/strong> et al., \u201cTypes of Software Maintenance and Evolution\u201d,<em> European Journal of Software Maintenance and Evolution: Research and Practice<\/em>, John Wiley and Sons, 13(1):3-29, 2001. <strong>(IF 1.4<\/strong>)<\/li>\n<li><strong>Khan, K.,<\/strong> Lo, B., Skramstad, T., \u201cTasks and Methods for Software Maintenance: A Process Oriented Framework\u201d, <em>Australian Journal of Information Systems<\/em>, 9(1):51-60, September 2001.<\/li>\n<li>Rahim, M., <strong>Khan, K.<\/strong>, Selamat, M., \u201cAdoption versus Abandonment of CASE Tools: Lessons from Two Organisations\u201d, <em>Journal of Information Technology and People<\/em>, special issue, MCB University press, UK, 10(4):316-329, 1997. (Invited paper).<\/li>\n<li><strong>Khan, K.<\/strong>, Rashid, M., Lo, B., \u201cA Task-Oriented Software Maintenance Model\u201d, <em>Malaysian Journal of Computer Science<\/em>, 9(2):36-42, December, 1996. (<strong>IF 0.6<\/strong>)<\/li>\n<li><strong>Khan, K.<\/strong> , Skramstad, T., \u201cData Structures for Extracting and Preserving Low-Level Program Information\u201d, <em>Malaysian Journal of Computer Science<\/em>, 8(2):66-79, December 1995. (<strong>IF 0.6<\/strong>)<\/li>\n<\/ol>\n<p><strong>Conference Proceedings\u00a0<\/strong><\/p>\n<ol>\n<li>A Muhanad, A Yankouskaya, K Khan, M Barhamgi, R Ali, &#8220;On People\u2019s Susceptibility to Persuasive Techniques in Social Engineering: Is It About the Technique or Their Readiness to Be Persuaded?&#8221; Proc. of the International Conference on Persuasive Technology, pp. 232-246<\/li>\n<li>Amina Mollazehi, Israa Abuelezz, Mahmoud Barhamgi, Khaled Khan, Raian Ali, &#8220;Do Caldini&#8217;s Persuasion Principles Still Influence Trust and Risk-Taking When Social Engineering is Knowingly Possible?&#8221; International Conference on Research Challenges in Information Science, Springer Nature, Switzerland, 2024, pp. 273-288.\u00a0<\/li>\n<li>Muhanad, A., Abuelezz, I., Khan, K., Ali, R., On How Cialdini\u2019s Persuasion Principles Influence Individuals in the Context of Social Engineering: A Qualitative Study,\u201d The International Web Information Systems Engineering (WISE) Conference, 2024.<\/li>\n<li>Abughazaleh, F., Abuelezz, I., Khan, K., Ali, R., \u201dNeed for Affect and Need for Cognition vs. Cybersecurity Attitude,\u201d The International Web Information Systems Engineering (WISE) Conference, 2024.<\/li>\n<li>\n<div class=\"page\" title=\"Page 11\">\n<div class=\"layoutArea\">\n<div class=\"column\">\u00a0<\/div>\n<\/div>\n<\/div>\n<\/li>\n<li>M. Elnour, N. Meskin, K. Khan, R. Jain, S. Zaidi, H. Siddiqui,&#8220;Full-Scale Seawater Reverse Osmosis Desalination Plant Simulator,&#8221; 21st International Federation for Automatic Control (IFAC) World Congress, Berlin, 2020.<\/li>\n<li>Enoch, S., Hong, J., Ge, M., Khan, K., Kim, D., \u201cMulti-Objective Security Hardening Op- timisation for Dynamic Networks,\u201d IEEE International Conference on Communication (ICC), Shanghai, 22-24 May, 2019.<\/li>\n<li>An, S., Eom, T., Park, J., Hong, J., Nhlabatsi, A., Fetais, N., Khan, K., \u00a0Kim, D. &#8220;<em>CloudSafe: A Tool for an Automated Security Analysis for Cloud Computing,<\/em>&#8221; IEEE TrustCom, New Zealand, (2019)<\/li>\n<li>Khan, K., Shaheen, M., Wang, Y., &#8220;<em>Using Sparse Matrices to Prevent Information Leakage in Cloud Computing,<\/em>&#8221; IEEE 6th International Conference on Future Internet of Things and Cloud (FiCloud), Barcelona, 2018.<\/li>\n<li>Nhlabatsi, A., et al., Khan, K., &#8220;<em>A Threat-Specific Security Risk Assessment Framework for the Cloud<\/em>,&#8221; 18th IEEE International Conference on Software Quality, Reliability, and Security (QRS 2018), Lisbon.<\/li>\n<li>Hong, J., Yusuf, S., Kim, D., Khan, K.,&#8221;<em>Stateless Security Risk Assessment for Dynamic Networks<\/em>,&#8221; \u00a0IEEE\/IFIP International Conference on Dependable Systems and Networks, June 2018, Luxemburg.<\/li>\n<li>Tun, T., Yang, M., Bandara, A., Yu, Y., Nhlabatsi, A., Khan, K., Nuseibeh, B., &#8220;<em>Requirements and Specifications for Adaptive Security: Concepts and Analysis,<\/em>&#8221; ACM\/IEEE International Symposium on Software Engineering for Adaptive and Self-Managing Systems (SEAMS), Gottenburg, Sweden, May 28-29, 2018.<\/li>\n<li>Khan, K., Jiang, Z., &#8220;<em>Managing Client-Specific Customised Functions in Multi-tenant Software-as-a-Service<\/em>,&#8221; IEEE Proceedings of the Int&#8217;l Conference on Software Quality, Reliability, and Security, Prague, 2017, pp. 108-113.<\/li>\n<li>Khan, K., Nhlabatsi, A., &#8220;<em>Identifying Common Behavioural Traits of Lone-Wolves in Recent Terrorist Attacks in Europe<\/em>,&#8221; 19th International Conference on Counter Terrorism and Human Security, Zurich, 27&#8211;28, 2017, \u00a0Vol. 11(7), pp. 1710-1713.<\/li>\n<li>Khan, K., Nhlabatsi, A., Khan, N., \u201c<em>A Process Model for Customization of Software in Multi- Tenant SaaS Model<\/em>,\u201d ACM\/IEEE Conference on Utility and Cloud Computing, Cyprus, December 2015.<\/li>\n<li>Khan, K., Shaheen, M., \u201c<em>Data Obfuscation for Privacy and Confidentiality in Cloud Computing<\/em>,\u201d IEEE Proc. of the Int\u2019l Conference on Quality, Reliability and Security, Vancouver, 2015.<\/li>\n<li>Nhlabatsi, A., Yu, Y., Zisman, A., Tun, T., Khan, N., Bandara, A., Khan, K., Nuseibeh, B., \u201c<em>Managing security control assumptions using causal traceability<\/em>,\u201d IEEE Proc. of the Sym. on Software and Systems Traceability, 2015, pp. 43-49.<\/li>\n<li>Ryu, S, Erradi, A., Khan, K., Alhazbi, S., Benatallah, B., \u201c<em>Message Content-Aware Evolution of Trust Negotiation Protocols in Cloud Collaboration<\/em>\u201d, accepted, ICSOC, 2014, Paris.<\/li>\n<li>Khan, K., Shaheen, M., \u201c<em>Empowering Users of Cloud Computing on Data Confidentiality<\/em>,\u201d IEEE CloudNet, Luxemburg, October, 2014, pp. 272-274.<\/li>\n<li>Asuncion, V., Khan, K., Erradi, A., Alhazbi, S., \u201c<em>Reasoning about Security Policies of Services using Answer Set Programming<\/em>\u201d, IEEE SCC, 2014, Alaska.<\/li>\n<li>Nhlabatsi, A., Tun, T., Khan, N., Yu, Y., Bandra, A., Khan, K., Nuseibeh, B., \u201c<em>Traceability for Adaptive Information Security in the Cloud<\/em>\u201d, IEEE Cloud, 2014, Alaska.<\/li>\n<li>Khan, K., Shaheen, M., \u201c<em>Secure Cloud Services: Matrix multiplication revisited<\/em>\u201d, 16th IEEE Conf. on Computational Science and Engineering, Sydney, Dec., 2013, pp. 9-14.<\/li>\n<li>Caprin, E., Zhang, Y., Khan, K., \u201c<em>Social Access Control Language (SocACL)<\/em>\u201d, ACM proceedings of the 6th International Conference on Security of Information and Networks (SIN), Aksaray, Turkey, pp. 261-265, Nov. 26-28, 2013.<\/li>\n<li>Khan, K., Bai, Y., \u201c<em>Client-Enabled Automatic Verification of Health Regulatory Compliance in Cloud Computing<\/em>\u201d, Proceedings of the IEEE HealthCom\u201913, Lisbon, October 9-12, 2013.<\/li>\n<li>Bai, Y., Khan, K., \u201c<em>Program Completion as Constraint Satisfaction: Tight Logic Programs Revisited<\/em>\u201d, Proc. of the 2013 International Conference on Artificial Intelligence, July 22-25, Las Vegas, pp. 274\u2013280<\/li>\n<li>Alhazbi, S., Khan, Khaled, Erradi, A., \u201c<em>Preference based Semantic Matching of Web Service Security Policies<\/em>\u201d, Proceedings of the IEEE ICEEE\u20192013, Sousse, June 2013.<\/li>\n<li>Hu, J., Khan, K., Bai, Y., Zhang, Y., \u201c<em>Compliance Checking for Usage-Constrained Credentials in Trust Negotiation Systems<\/em>\u201d, Information Security Conference (ISC 2012), Passau, Germany, Sept 19-21, 2012.<\/li>\n<li>Hu, J., Khan, K., Bai, Y., Zhang, Y., \u201c<em>Constraint-Enhanced Role Engineering via Answer Set Programming<\/em>\u201d, ACM proceedings of the ASIACCS 12, May 24, 2012, Seoul, Korea<\/li>\n<li>Hu, J., Khan, K., Zhang, Y., \u201c<em>Tracking and Constraining Authorization Provenance<\/em>\u201d, 25th IEA\/AIE 2012, Dalian, June 9-12, 2012, Springer Proceedings Lecture Notes in Computer Science, Vol. 7345, pp. 669-678<\/li>\n<li>Khan, K., Erradi, A., Alhazbi, S., Han, J.,\u201c<em>Modeling Security Importance and Preferences of Software Services<\/em>\u201d, 3rd IEEE International Conference on Software Engineering and Service Science (ICSESS), Beijing, June 2012, pp. 300-303.<\/li>\n<li>Malluhi, Q., Khan, K., \u201c Cloud Computing without Seeing\u201d, ACM Proceedings of the First International Workshop on Security and Privacy Preserving in e-Societies(SeceS \u201911), 2011, pp 42-44<\/li>\n<li>Khan, K., Erradi, A., Alhazbi, S., Han, J., \u201cSecurity Oriented Service Composition:A Frame- work\u201d , 8th International Conference on Innovations in Information Technology (Innovations\u201912), UAE, March 2012, pp. 48-53.<\/li>\n<li>Bai, Y., Khan, K., \u201cA Modal Logic For Information System Security\u201d, Proceedings of the Australian Information Security Conference, Perth, 2011.<\/li>\n<li>Khan, K., Malluhi, Q., \u201cIdentifying Contextual Properties of Software Architecture in Cloud Computing\u201d, Proceedings of the 9th IEEE International Conference on Dependable, Autonomic and Secure Computing, December 12-14, 2011, Sydney, IEEE Computer Society Press, Los Alamitos, Calif., pp. 561-568.<\/li>\n<li>Khan, K., \u201cProfile Based Security Assurances for Service Software\u201d, Springer Lecture Notes in Business Information Processing, Vol. 82, 2011.<\/li>\n<li>Khan, K., Malluhi, Q., \u201cSecurity-Aware Service Composition for End users of Small Enter- prises\u201d, 9th International Conference on Software Methodologies, Tools, and Techniques (SOMeT), Japan, September 2010, pp. 257-267.<\/li>\n<li>Khan, K. with Jiang, Z., Guo, X. and Gangavarapu, N., \u201cKnowledge-based Algorithms to Optimise e-Learning Outcome\u201d, Proceedings of the 2009 International Conference on Frontiers in Education: Computer Science and Computer Engineering, Las Vegas, Nevada, USA (July 13-16, 2009)<\/li>\n<li>Khan, K., Han, J., \u201cSpecifying Security Goals of Component Based Systems : An End-User Perspective\u201d, Proceedings of the 7th IEEE International Conference on Composition-Based Soft- ware Systems, Madrid, February 2008, IEEE Computer Society Press, Los Alamitos, Calif., pp. 101-109.<\/li>\n<li>Khan, K., Tan, C., \u201cSecCom: A Prototype for Integrating Security-Aware Components\u201d, Springer Lecture Notes on Business Information Processing, 2009, pp. 393-404.<\/li>\n<li>Khan, K., \u201cAssessing Quality of Web Based Systems\u201d, Proceedings of the 6th ACS\/IEEE Inter- national Conference on Computer Systems and Applications (AICCSA-08), Doha, April 2008<\/li>\n<li>Khan, K., \u201cSelecting Web Services with Security Assurances: A managerial perspective\u201d, Pro- ceedings of 11th Pacific Asia Conference on Information Systems (PACIS), New Zealand, July 2007<\/li>\n<li>Goerge, D., Khan, K.,\u201cPrioritizing and Partitioning of Business Requirements for Incremental Web Development\u201d, Proc. IMB 2006, Sydney February 14-17, 2006.<\/li>\n<li>Han, J., Kowalczyk, R., Khan, K., \u201cSecurity Oriented Service Composition and Evolution\u201d, IEEE Asia Pacific Software Engineering Conference, Banglore, December, 2006,IEEE Computer Society Press, Los Alamitos, Calif. pp 71-78.<\/li>\n<li>Khan, K., Han, J., \u201cAssessing Security Properties of Software Components: A Software Engi- neer\u2019s Perspective\u201d, Proceedings of the Conference on Australian Software Engineering Confer- ence, Sydney, 18-20 April 2006, IEEE Computer Society, Los Alamitos, Calif., pp. 199-210<\/li>\n<li>Khan, K., Han, J. \u201cDeriving Systems Level Security Properties of Component Based Compos- ite Systems\u201d, Proceedings of the Conference on Australian Software Engineering Conference, Brisbane, IEEE Computer Society Press, Los Alamitos, Calif., 29 March &#8211; 1 April 2005, pp. 334-343.<\/li>\n<li>Khan, K., Han, J., \u201cA Process Framework for Characterising Security properties of Component- Based Software Systems\u201d, IEEE Australian Software Engineering Conference, IEEE Computer Society, Los Alamitos, Calf., 2004, pp. 358-367.<\/li>\n<li>Khan, K., Han, J., \u201cA Security Characterisation Framework for Trustworthy Component Based Software Systems\u201d, Proc. IEEE COMPSAC 2003, Dallas, November 2003, IEEE Computer Society, Los Alamitos, Calf., pp. 164-169.<\/li>\n<li>Khan, K., Han, J., Zheng, Y., \u201cA Framework for an Active Interface to Characterise Compo- sitional Security Contracts of Software Components\u201d, Australian Software Engineering Confer- ence, Canberra, IEEE Computer Society Press, Los Alamitos, Calf., 2001, pp. 117-126.<\/li>\n<li>Khan, K.,Han, J., Zheng, Y., \u201cSecurity Characterisation of Software Components and Their Composition\u201d, 36th International Conference on Technology of Object-Oriented Languages and Systems (TOOLS\u201900), IEEE Computer Society Press, Los Alamitos, Calf., 2000, China, pp. 240-249.<\/li>\n<li>Khan, K., Han, J., Zheng, Y., \u201cCharacterising User Data Protection of Software Components\u201d, Proceedings Australian Software Engineering Conference (ASWEC\u201900), 2000 Canberra, Aus- tralia, IEEE Computer Society press, Los Alamitos, Calf., 2000, pp. 3-11<\/li>\n<li>Eenoo, C., Hylooz, O., Khan, K.,\u201cAddressing Non-Functional Properties in Software Architec- ture using ADL\u201d, Proc. of the 6th Australasian Workshop on Software and System Architectures, Brisbane, Australia, March 29 2005, pp. 6-12.<\/li>\n<li>Khan, K., Gangavarapu, N., \u201cEvolution of Security Properties &#8211; a must\u201d, Proc. International Conference on Software Engineering and Research, published by CSREA (Computer Science Research Education and Application) Press, Las Vegas, 2004.<\/li>\n<li>Tran, T., Khan, K., Lan, Y., \u201cA Framework for Transforming Artefacts from Data Flow Dia- grams to UML\u201d, IASTED International Conference on Software Engineering, Innsbruck, Austria, 18-22 February 2004, pp. 123-128<\/li>\n<li>Lilburne, B., Devkota, P., Khan, K., \u201cMeasuring Quality Metrics for Web Applications\u201d, 2004 IRMA International Conference, Idea Group Inc., , New Orleans, May 23-26 2004.<\/li>\n<li>Khan, K. \u201cIntegrating Security Properties with Systems Design Artefacts\u201d, Proc. International Conference on Information Systems Development, Melbourne, 2003.<\/li>\n<li>Khan, K., Lan, Y., \u201cRecreating Design Artefacts of Information Systems for System Evolution and Maintenance\u201d, 2003 International IRMA Conference, Philadelphia, May, 2003, pp. 843-845.<\/li>\n<li>Lan, Y., Khan, K., \u201cMeasuring the Readiness of Globalisation: a metrics based approach\u201d, 2003 International IRMA Conference, Philadelphia, May 2003, pp. 723-726.<\/li>\n<li>Khan, K., \u201cIdentifying Ilities at the Software Architectural Level\u201d, International Conference on Software Engineering and Research, , Las Vegas, 2002.<\/li>\n<li>Khan, K., Han, J., Zheng, Y., \u201cSpecifying Security Requirements and Assurances of Software Components\u201d, 5th Australian Workshop on Requirements Engineering, , Brisbane, December 8-9, 2000.<\/li>\n<li>Khan, K., Han, J., Zheng, Y., \u201cA Scenario Based Security Characterisation of Software Compo- nents\u201d, 3rd Australian Workshop on Software Architectures, Sydney, Sponsored by IEEE NSW Computer Society chapter, Nov. 19-20, 2000, pp. 55-64<\/li>\n<li>Khan, K., Lo, B., et al.,\u201cSoftware Maintenance Process: Tasks and Methods\u201d, 11th Australasian Conference on Information Systems (ACIS), Brisbane, Dec. 6-8, 2000.<\/li>\n<li>Khan, K., Skramstad, T., \u201cSoftware Clinic: A Different View of Software Maintenance\u201d, Inter- national Conference on Information Systems Analysis and Synthesis (ISAS 2000), International Institute of Informatics and Systemics, Co-sponsored by IEEE Computer Society-Latin America, Orlando, Florida, July 23-36 2000, pp. 508-513.<\/li>\n<li>Skramstad, T., Khan, K., Rashid, M., \u201cConstructing Commercial Off-the- Shelf from Legacy System: A Conceptual Framework\u201d, Australasia Conference on Information Systems (ACIS), Wellington, 1-3 December 1999, Australian Computer Society press, pp. 798-805.<\/li>\n<li>Khan, S, Khan, K., Sarkar, N., \u201cThe State of Library Automation and Resource Sharing: A Developing Country Perspective\u201d, Proc. 9th Int\u2019l Conference of Information Resources Manage- ment Association, Idea Group Publishing, Boston, May, 1998.<\/li>\n<li>Khan, K., Ramakrishnan, M., Lo, B.,\u201cAssessment of Software Maintenance Tools: A Concep- tual Framework\u201d, Proc. Pacific Asia Conference on Information Systems (PACIS\u201997), QUT, Brisbane, 1997, pp. 527-536.<\/li>\n<li>Rashid, M., Rahim, M., Khan, K., et al., \u201cComputer Science and Information Technology in Brunei Darussalam: Trends, Options and the Challenges\u201d, PURIH, A book published in conjunction with the 10th Anniversary of University of Brunei Darussalam Establishment, UBD Press, 1996, pp. 270-284.<\/li>\n<li>Khan, K., \u201cA Generic Model for Software Maintenance\u201d, Proc. Int\u2019l Conf. on Mathematical Modelling, University of Brunei Darussalam, UBD Press, 1995, pp. 263-266.<\/li>\n<li>Selamat, M., Khan, K., Rahim, M., \u201cA Comparative Study of a System Built with SDLC and Prototyping Approaches: Function Points Perspective\u201d, Proc. 6th International Conference of Information Resources Management Association, Idea Group Publishing, Atlanta, 1995, pp. 145-149.<\/li>\n<li>Rahim, M., Selamat, M.,Khan, K., \u201cSuccess and Failure in CASE Tools Adaption: A Tale of Two Organisations\u201d, Proc. Pan Pacific Conference on Information Systems(PACIS), Singapore 1995, pp. 182-190.<\/li>\n<li>Rashid, M., Khan, K., Ghani, A., \u201cSimulation of a Local Area Computer Network Access Scheme for Packet Voice Communication Based on An Approximate Delay Equation\u201d, Conference on Pure and Applied Mathematics, Bahrain, 1995. IEEE Computer Society, Los Alamitos, Calif., pp. 334-343.<\/li>\n<li>Khan, K., Han, J., Zheng, Y.,\u201cSecurity Properties of Software Components\u201d, Proceedings 1999 International Information Security Workshop, Springer Lecture Notes in Computer Science, Vol. 1729, 1999, pp. 52-56.<\/li>\n<li>Skramstad, T., Khan, K.,\u201cAssessment of Reverse Engineering Tools: A MECCA Approach\u201d, Proc. Symposium on Assessment of Software Development Tools, Louisiana, IEEE Computer Society Press, Los Alamitos, Calif., 1992, pp. 120-126.<\/li>\n<li>Skramstad, T., Khan, K.,\u201cA Redefined Software Life Cycle Mode for Improved Maintenance\u201d, Proc. Conf. on Software Maintenance, Florida, IEEE Computer Society Press, Los Alamitos, Calif., 1992, pp. 193-197.<\/li>\n<\/ol>\n<\/div><\/div>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"My Google Scholar ORCID ID: 0000-0002-8848-0760; Three U.S. Patents\u00a0 (Granted): Granted Patent (2022): U.S. Patent and Trademark Office.Patent No. 11,228,616 [...]","protected":false},"author":521,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":[],"_links":{"self":[{"href":"http:\/\/qufaculty.qu.edu.qa\/k-khan\/wp-json\/wp\/v2\/pages\/2"}],"collection":[{"href":"http:\/\/qufaculty.qu.edu.qa\/k-khan\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/qufaculty.qu.edu.qa\/k-khan\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/qufaculty.qu.edu.qa\/k-khan\/wp-json\/wp\/v2\/users\/521"}],"replies":[{"embeddable":true,"href":"http:\/\/qufaculty.qu.edu.qa\/k-khan\/wp-json\/wp\/v2\/comments?post=2"}],"version-history":[{"count":104,"href":"http:\/\/qufaculty.qu.edu.qa\/k-khan\/wp-json\/wp\/v2\/pages\/2\/revisions"}],"predecessor-version":[{"id":394,"href":"http:\/\/qufaculty.qu.edu.qa\/k-khan\/wp-json\/wp\/v2\/pages\/2\/revisions\/394"}],"wp:attachment":[{"href":"http:\/\/qufaculty.qu.edu.qa\/k-khan\/wp-json\/wp\/v2\/media?parent=2"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}