Zobrazeno 1 - 10
of 76
pro vyhledávání: '"Adnan Shahid Khan"'
Autor:
Sehrish Aqeel, Sajid Ullah Khan, Adnan Shahid Khan, Meshal Alharbi, Sajid Shah, Mohammed EL Affendi, Naveed Ahmad
Publikováno v:
Scientific Reports, Vol 14, Iss 1, Pp 1-19 (2024)
Abstract With the urge to secure and protect digital assets, there is a need to emphasize the immediacy of taking measures to ensure robust security due to the enhancement of cyber security. Different advanced methods, like encryption schemes, are vu
Externí odkaz:
https://doaj.org/article/58306128d0be493faf330b97e970e74b
Autor:
Irshad Ahmed Abbasi, Saeed Ullah Jan, Abdulrahman Saad Alqahtani, Adnan Shahid Khan, Fahad Algarni
Publikováno v:
PLoS ONE, Vol 19, Iss 1, p e0294429 (2024)
Cloud computing is vital in various applications, such as healthcare, transportation, governance, and mobile computing. When using a public cloud server, it is mandatory to be secured from all known threats because a minor attacker's disturbance seve
Externí odkaz:
https://doaj.org/article/ddbfd8c9d9e941a4a5536956e774332c
Publikováno v:
IEEE Access, Vol 11, Pp 123295-123313 (2023)
Violence detection holds immense significance in ensuring public safety, security, and law enforcement in various domains. With the increasing availability of video data from surveillance cameras and social media platforms, the need for accurate and
Externí odkaz:
https://doaj.org/article/5c1c447e6d754c2383610f388f35533e
Autor:
Adnan Shahid Khan, Mohd Izzat Bin Yahya, Kartinah Bt Zen, Johari Bin Abdullah, Rozeha Binti A. Rashid, Yasir Javed, Nayeem Ahmad Khan, Ahmed M. Mostafa
Publikováno v:
IEEE Access, Vol 11, Pp 20524-20541 (2023)
Cell-Free mMIMO is a part of technology that will be integrated with future 6G ultra-dense cellular networks to ensure unlimited wireless connectivity and ubiquitous latency-sensitive services. Cell-Free gained researchers’ interest as it offers ub
Externí odkaz:
https://doaj.org/article/c66022ddd49c4893a66d578a932b80c5
Publikováno v:
IEEE Access, Vol 10, Pp 95321-95343 (2022)
Perfect forward secrecy, cross-verification, and robust mutual authentication guarantee secure communication through unfavorable and unsafe channels. The speedy development in wireless communication and drone-assisted networking technology has misera
Externí odkaz:
https://doaj.org/article/85dcfafe41334b0887953936ea18d01f
Autor:
Adnan Shahid Khan, Yasir Javed, Rashad Mahmood Saqib, Zeeshan Ahmad, Johari Abdullah, Kartinah Zen, Irshad Ahmed Abbasi, Nayeem Ahmad Khan
Publikováno v:
IEEE Access, Vol 10, Pp 31273-31288 (2022)
With increased interest in 6G (6th Generation) cellular networks that can support intelligently small-cell communication will result in effective device-to-device (D2D) communication. High throughput requirement in 5G/6G cellular technology requires
Externí odkaz:
https://doaj.org/article/4040088e19f34f5e94ec95709cddb92e
Publikováno v:
IEEE Access, Vol 9, Pp 87079-87093 (2021)
The dynamics of computer networks have changed rapidly over the past few years due to a tremendous increase in the volume of the connected devices and the corresponding applications. This growth in the network’s size and our dependence on it for al
Externí odkaz:
https://doaj.org/article/482d90b93c82461db3e88684678b03d5
Autor:
Adnan Shahid Khan, Muhammad Ali Sattar, Kashif Nisar, Ag Asri Ag Ibrahim, Noralifah Binti Annuar, Johari bin Abdullah, Shuaib Karim Memon
Publikováno v:
Applied Sciences, Vol 13, Iss 1, p 277 (2022)
This paper demonstrates a broad exploration of existing authentication and secure communication of unmanned aerial vehicles (UAVs) in a ‘6G network’. We begin with an overview of existing surveys that deal with UAV authentication in 6G and beyond
Externí odkaz:
https://doaj.org/article/93b290aaee444b4b92e26604817a1043
Autor:
Jamil Asim, Adnan Shahid Khan, Rashad Mahmood Saqib, Johari Abdullah, Zeeshan Ahmad, Shehla Honey, Shehroz Afzal, Malak S. Alqahtani, Mohamed Abbas
Publikováno v:
Applied Sciences, Vol 12, Iss 7, p 3551 (2022)
There are continued advances in the internet and communication fields regarding the deployment of 5G-based applications. It is expected that by 2030, 6G applications will emerge as a continued evolution of the mobile network. Blockchain technology is
Externí odkaz:
https://doaj.org/article/4bcce6397dce427a8da040acf91783e3
Publikováno v:
IEEE Access, Vol 10, Pp 105496-105496 (2022)
In the above article [1], the following corrections are necessary: Section II, preliminaries, subsection E Adversary Model – This model is based on [2], suppose the proposed protocol is denoted by $\prod $ , entities involved are Mobile-Device (M),
Externí odkaz:
https://doaj.org/article/e6445d6a6e134ca8ac55fe963c3c0dac