No photo of Bilal Khan

Bilal Khan, PhD

  • Phone402-472-3631
  • Source: Scopus
  • Calculated based on no. of publications stored in Pure and citations from Scopus
19982021

Research activity per year

If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution

Search results

  • 2021

    Evaluation of a bio-socially inspired secure DSA scheme using testbed-calibrated hybrid simulations

    Wisniewska, A., Ghose, N. & Khan, B., 2021, 2021 IEEE 12th Annual Information Technology, Electronics and Mobile Communication Conference, IEMCON 2021. Chakrabarti, S. & Paul, R. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 934-939 6 p. (2021 IEEE 12th Annual Information Technology, Electronics and Mobile Communication Conference, IEMCON 2021).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2019

    Towards a smart(er) social science using high-dimensional continuous-time trajectories from the open dynamic interaction networks (odin) platform

    Khan, B., Dombrowski, K., Bellam, A., Sayeras, G. F., Pi, K., Crawford, D., Habecker, P. & Jauernig, M., Aug 2019, Proceedings - 2019 IEEE SmartWorld, Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Internet of People and Smart City Innovation, SmartWorld/UIC/ATC/SCALCOM/IOP/SCI 2019. Institute of Electrical and Electronics Engineers Inc., p. 37-44 8 p. 9060269. (Proceedings - 2019 IEEE SmartWorld, Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Internet of People and Smart City Innovation, SmartWorld/UIC/ATC/SCALCOM/IOP/SCI 2019).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • 2018

    Emergence of pecking order in social Cognitive Radio societies

    Wisniewska, A., Shattal, M. A., Khan, B., Al-Fuqaha, A. & Dombrowski, K., Jul 6 2018, INFOCOM 2018 - IEEE Conference on Computer Communications Workshops. Institute of Electrical and Electronics Engineers Inc., p. 305-311 7 p. (INFOCOM 2018 - IEEE Conference on Computer Communications Workshops).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • 2017

    Evolution of bio-socially inspired strategies in support of dynamic spectrum access

    Shattal, M. A., Al-Fuqaha, A., Khan, B., Dombrowski, K. & Wisniewska, A., Jun 29 2017, 2017 IEEE International Conference on Communications Workshops, ICC Workshops 2017. Papadias, C. B. & Jamalipour, A. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 289-295 7 p. 7962672. (2017 IEEE International Conference on Communications Workshops, ICC Workshops 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • When brands fight over bands: Sociality in the cognitive radio ecosystem

    Wisniewska, A., Khan, B., Al-Fuqaha, A., Dombrowski, K. & Shattal, M. A., Jul 28 2017, 2017 IEEE International Conference on Communications, ICC 2017. Debbah, M., Gesbert, D. & Mellouk, A. (eds.). Institute of Electrical and Electronics Engineers Inc., 7997383. (IEEE International Conference on Communications).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • 2016

    Social deference and hunger as mechanisms for starvation avoidance in cognitive radio societies

    Wisniewska, A., Khan, B., Al-Fuqaha, A., Dombrowski, K. & Shattal, M. A., Sep 26 2016, 2016 International Wireless Communications and Mobile Computing Conference, IWCMC 2016. Institute of Electrical and Electronics Engineers Inc., p. 1063-1068 6 p. 7577206. (2016 International Wireless Communications and Mobile Computing Conference, IWCMC 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • 2015

    Malware biodiversity using static analysis

    Seideman, J. D., Khan, B. & Vargas, A. C., 2015, Future Network Systems and Security - 1st International Conference, FNSS 2015, Proceedings. Piramuthu, S., Zhou, W. & Doss, R. (eds.). Springer Verlag, p. 139-155 17 p. (Communications in Computer and Information Science; vol. 523).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • 2014

    Contention-sensing and dynamic spectrum co-use in secondary user Cognitive Radio societies

    Wisniewska, A. & Khan, B., Sep 22 2014, IWCMC 2014 - 10th International Wireless Communications and Mobile Computing Conference. Institute of Electrical and Electronics Engineers Inc., p. 157-162 6 p. 6906349. (IWCMC 2014 - 10th International Wireless Communications and Mobile Computing Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Scopus citations
  • Identifying malware genera using the Jensen-Shannon distance between system call traces

    Seideman, J. D., Khan, B. & Vargas, A. C., Dec 29 2014, Proceedings of the 9th IEEE International Conference on Malicious and Unwanted Software, MALCON 2014. Institute of Electrical and Electronics Engineers Inc., p. 1-7 7 p. 6999409. (Proceedings of the 9th IEEE International Conference on Malicious and Unwanted Software, MALCON 2014).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Scopus citations
  • 2013

    An evaluation of the risk impact of device heterogeneity on critical care delivery

    Saad, M. K., Khan, B. & Ben Brahim, G., 2013, 2013 5th International Conference on Modeling, Simulation and Applied Optimization, ICMSAO 2013. 6552648. (2013 5th International Conference on Modeling, Simulation and Applied Optimization, ICMSAO 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Determining vulnerability resolution time by examining malware proliferation rates

    Seideman, J. D., Khan, B. & Ben Brahim, G., 2013, 2013 9th International Wireless Communications and Mobile Computing Conference, IWCMC 2013. p. 1678-1682 5 p. 6583808. (2013 9th International Wireless Communications and Mobile Computing Conference, IWCMC 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Optimizing agent placement for flow reconstruction of DDoS attacks

    Demir, Ö., Khan, B., Ben Brahim, G. & Al-Fuqaha, A., 2013, 2013 9th International Wireless Communications and Mobile Computing Conference, IWCMC 2013. p. 83-89 7 p. 6583539. (2013 9th International Wireless Communications and Mobile Computing Conference, IWCMC 2013).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • 2011

    Finding DDoS attack sources: Searchlight localization algorithm for network tomography

    Demir, O. & Khan, B., 2011, IWCMC 2011 - 7th International Wireless Communications and Mobile Computing Conference. p. 418-423 6 p. 5982570. (IWCMC 2011 - 7th International Wireless Communications and Mobile Computing Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • 2010

    A dynamic route optimization mechanism for AODV in MANETs

    Bilgin, Z. & Khan, B., 2010, 2010 IEEE International Conference on Communications, ICC 2010. 5502381. (IEEE International Conference on Communications).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    21 Scopus citations
  • Having one's cake and eating it too: Better routes and lower control traffic for AODV

    Bilgin, Z. & Khan, B., 2010, 9th IFIP Annual Mediterranean Ad Hoc Networking Workshop, MED-HOC-NET 2010. 5546847. (9th IFIP Annual Mediterranean Ad Hoc Networking Workshop, MED-HOC-NET 2010).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Only the short die old: Route optimization in MANETs by dynamic subconnection shrinking

    Bilgin, Z., Khan, B. & Al-Fuqaha, A., 2010, IWCMC 2010 - Proceedings of the 6th International Wireless Communications and Mobile Computing Conference. p. 681-685 5 p. (IWCMC 2010 - Proceedings of the 6th International Wireless Communications and Mobile Computing Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • Quantifying distributed system stability through simulation: A case study of an agent-based system for flow reconstruction of DDoS attacks

    Demir, O. & Khan, B., 2010, ISMS 2010 - UKSim/AMSS 1st International Conference on Intelligent Systems, Modelling and Simulation. p. 312-317 6 p. 5416074. (ISMS 2010 - UKSim/AMSS 1st International Conference on Intelligent Systems, Modelling and Simulation).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • Reconstruction of malicious internet flows

    Demir, O., Khan, B. & Al-Fuqaha, A., 2010, IWCMC 2010 - Proceedings of the 6th International Wireless Communications and Mobile Computing Conference. p. 1182-1187 6 p. (IWCMC 2010 - Proceedings of the 6th International Wireless Communications and Mobile Computing Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Using connection expansion to reduce control traffic in MANETs

    Bilgin, Z., Khan, B. & Al-Fuqaha, A., 2010, IWCMC 2010 - Proceedings of the 6th International Wireless Communications and Mobile Computing Conference. p. 534-538 5 p. (IWCMC 2010 - Proceedings of the 6th International Wireless Communications and Mobile Computing Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • 2009

    Balancing power: Tradeoffs between connection lifetime and control traffic in MANETS

    Bilgin, Z. & Khan, B., 2009, Proceedings of the 2009 ACM International Wireless Communications and Mobile Computing Conference, IWCMC 2009. p. 883-887 5 p. (Proceedings of the 2009 ACM International Wireless Communications and Mobile Computing Conference, IWCMC 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Bayesian-based game theoretic model to guarantee cooperativeness in hybrid RF/FSO mesh networks

    Awwad, O., Al-Fuqaha, A., Khan, B., Benhaddou, D., Guizani, M. & Rayes, A., 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference. 5426114. (GLOBECOM - IEEE Global Telecommunications Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Scopus citations
  • Scheduling cooperative emergency response (or how the Meek shall overcome the Greedy)

    Dottin, C. & Khan, B., 2009, Proceedings of the 2009 ACM International Wireless Communications and Mobile Computing Conference, IWCMC 2009. p. 598-602 5 p. (Proceedings of the 2009 ACM International Wireless Communications and Mobile Computing Conference, IWCMC 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Using a secure permutational covert channel to detect local and wide area interposition attacks

    Paduch, J., Levy, J. & Khan, B., 2009, Proceedings of the 2009 ACM International Wireless Communications and Mobile Computing Conference, IWCMC 2009. p. 79-83 5 p. (Proceedings of the 2009 ACM International Wireless Communications and Mobile Computing Conference, IWCMC 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • 2008

    A model for cooperative mobility and budgeted QoS in MANETs with heterogenous autonomy requirements

    Brahim, G., Al-Fuqaha, A., Guizani, M. & Khan, B., 2008, 2008 IEEE Global Telecommunications Conference, GLOBECOM 2008. p. 399-403 5 p. 4697859. (GLOBECOM - IEEE Global Telecommunications Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • Increasing connection lifetimes through dynamic distribution of budgeted power

    Bilgin, Z. & Khan, B., 2008, IWCMC 2008 - International Wireless Communications and Mobile Computing Conference. p. 500-504 5 p. 4599986. (IWCMC 2008 - International Wireless Communications and Mobile Computing Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Superimposing permutational covert channels onto reliable stream protocols

    Levy, J., Paduch, J. & Khan, B., 2008, 3rd International Conference on Malicious and Unwanted Software, MALWARE 2008. p. 49-56 8 p. 4690857. (3rd International Conference on Malicious and Unwanted Software, MALWARE 2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • 2007

    A new fuzzy-based cooperative movement model in support of qos in wireless ad-hoc network

    Brahim, G. B., Al-Fuqaha, A., Kountanis, D. & Khan, B., 2007, IWCMC 2007: Proceedings of the 2007 International Wireless Communications and Mobile Computing Conference. p. 158-163 6 p. (IWCMC 2007: Proceedings of the 2007 International Wireless Communications and Mobile Computing Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Hiding your wares: Transparently retrofitting memory confidentiality into legacy applications

    Levy, J. & Khan, B., 2007, 2007 IEEE International Conference on Communications, ICC'07. p. 1368-1372 5 p. 4288901. (IEEE International Conference on Communications).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Multigrid techniques for movement planning in manets with cooperative mobility

    Brahim, G. B., Al-Fuqaha, A. & Khan, B., 2007, IWCMC 2007: Proceedings of the 2007 International Wireless Communications and Mobile Computing Conference. p. 197-201 5 p. (IWCMC 2007: Proceedings of the 2007 International Wireless Communications and Mobile Computing Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Petrifying worm cultures: Scalable detection and immunization in untrusted environments

    Sandin, J. O. & Khan, B., 2007, 2007 IEEE International Conference on Communications, ICC'07. p. 1423-1428 6 p. 4288910. (IEEE International Conference on Communications).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • Surrendering autonomy: Can cooperative mobility help?

    Brahim, G. B., Khan, B., Al-Fuqaha, A., Guizani, M. & Kountanis, D., 2007, Euro-Par 2007 Parallel Processing - 13th International Euro-Par Conference, Proceedings. Springer Verlag, p. 901-910 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4641 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Using MILP for optimal movement planning in MANETs with cooperative mobility

    Brahimi, G., Awwad, O., Al-Fuqaha, A., Khan, B., Kountanisi, D. & Guizani, M., 2007, IEEE GLOBECOM 2007 - 2007 IEEE Global Telecommunications Conference, Proceedings. p. 1201-1205 5 p. 4411141. (GLOBECOM - IEEE Global Telecommunications Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2006

    A non-commutative generalization of ElGamal key exchange using polycyclic groups

    Kahrobaei, D. & Khan, B., 2006, IEEE GLOBECOM 2006 - 2006 Global Telecommunications Conference. 4150920. (GLOBECOM - IEEE Global Telecommunications Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    21 Scopus citations
  • Budgeting power: Packet duplication and bit error rate reduction in wireless ad-hoc networks

    Brahim, G. B. & Khan, B., 2006, IWCMC 2006 - Proceedings of the 2006 International Wireless Communications and Mobile Computing Conference. p. 293-298 6 p. (IWCMC 2006 - Proceedings of the 2006 International Wireless Communications and Mobile Computing Conference; vol. 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Scopus citations
  • Harnessing the parity of multiple errors in end-to-end MAC schemes

    Brahim, G. B., Khan, B., Al-Fuqaha, A. & Guizani, M., 2006, IEEE GLOBECOM 2006 - 2006 Global Telecommunications Conference. 4151131. (GLOBECOM - IEEE Global Telecommunications Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Minimizing wireless connection BER through the dynamic distribution of budgeted power

    Khan, B., Brahim, G. B., Al-Fuqaha, A. & Guizani, M., 2006, IEEE GLOBECOM 2006 - 2006 Global Telecommunications Conference. 4151605. (GLOBECOM - IEEE Global Telecommunications Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • Using energy-efficient overlays to reduce packet error rates in wireless ad-hoc networks

    Brahm, G. B., Khan, B., Al-Fuqaha, A., Guizani, M. & Rayes, A., 2006, 2006 IEEE International Conference on Communications, ICC 2006. p. 3717-3722 6 p. 4025051. (IEEE International Conference on Communications; vol. 8).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Scopus citations
  • 2004

    The buck stops here: Trust management in multi-agent systems with accountability

    Khan, B., Kleiner, D. D. & Talmage, D., 2004, 2004 IEEE 1st Symposium on Multi-Agent Security and Survivability. p. 46-54 9 p. (2004 IEEE 1st Symposium on Multi-Agent Security and Survivability).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2002

    Minimizing Communication Costs in Hierarchical Multi-Agent Systems

    Bhutani, K. R. & Khan, B., 2002, Proceedings of the 6th Joint Conference on Information Sciences, JCIS 2002. Caulfield, J. H., Chen, S. H., Cheng, H. D., Duro, R., Caufield, J. H., Chen, S. H., Cheng, H. D., Duro, R. & Honavar, V. (eds.). p. 1435-1442 8 p. (Proceedings of the Joint Conference on Information Sciences; vol. 6).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • 2001

    Introducing ProuST: The PNNI routing and simulation toolkit

    Khan, B., Talmage, D., Mountcastle, S., Battou, A. & Marsh, S., 2001, 2001 IEEE Workshop on High Performance Switching and Routing. p. 335-341 7 p. (2001 IEEE Workshop on High Performance Switching and Routing).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • Towards an agent-based distributed hierarchical network management system for all-optical networks

    Khan, B., Kleiner, D. D. & Talmage, D., 2001, Mobile Agents for Telecommunication Applications - 3rd International Workshop, MATA 2001, Proceedings. Pierre, S. & Glitho, R. (eds.). Springer Verlag, p. 103-113 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2164).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 1998

    Routing through networks with hierarchical topology aggregation

    Awerbuch, B., Du, Y., Khan, B. & Shavitt, Y., 1998, Proceedings - 3rd IEEE Symposium on Computers and Communications, ISCC 1998. Institute of Electrical and Electronics Engineers Inc., p. 406-412 7 p. 702556. (Proceedings - 3rd IEEE Symposium on Computers and Communications, ISCC 1998).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    17 Scopus citations
Your message has successfully been sent.
Your message was not sent due to an error.