Bilal Khan, PhD

  • 454 Citations
  • 11 h-Index
19982020

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

Filter
Conference contribution
2019

Towards a smart(er) social science using high-dimensional continuous-time trajectories from the open dynamic interaction networks (odin) platform

Khan, B., Dombrowski, K., Bellam, A., Sayeras, G. F., Pi, K., Crawford, D., Habecker, P. & Jauernig, M., Aug 2019, Proceedings - 2019 IEEE SmartWorld, Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Internet of People and Smart City Innovation, SmartWorld/UIC/ATC/SCALCOM/IOP/SCI 2019. Institute of Electrical and Electronics Engineers Inc., p. 37-44 8 p. 9060269. (Proceedings - 2019 IEEE SmartWorld, Ubiquitous Intelligence and Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Internet of People and Smart City Innovation, SmartWorld/UIC/ATC/SCALCOM/IOP/SCI 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2018

Emergence of pecking order in social Cognitive Radio societies

Wisniewska, A., Shattal, M. A., Khan, B., Al-Fuqaha, A. & Dombrowski, K., Jul 6 2018, INFOCOM 2018 - IEEE Conference on Computer Communications Workshops. Institute of Electrical and Electronics Engineers Inc., p. 305-311 7 p. (INFOCOM 2018 - IEEE Conference on Computer Communications Workshops).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2017

Evolution of bio-socially inspired strategies in support of dynamic spectrum access

Shattal, M. A., Al-Fuqaha, A., Khan, B., Dombrowski, K. & Wisniewska, A., Jun 29 2017, 2017 IEEE International Conference on Communications Workshops, ICC Workshops 2017. Papadias, C. B. & Jamalipour, A. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 289-295 7 p. 7962672. (2017 IEEE International Conference on Communications Workshops, ICC Workshops 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

When brands fight over bands: Sociality in the cognitive radio ecosystem

Wisniewska, A., Khan, B., Al-Fuqaha, A., Dombrowski, K. & Shattal, M. A., Jul 28 2017, 2017 IEEE International Conference on Communications, ICC 2017. Debbah, M., Gesbert, D. & Mellouk, A. (eds.). Institute of Electrical and Electronics Engineers Inc., 7997383. (IEEE International Conference on Communications).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations
2016

Social deference and hunger as mechanisms for starvation avoidance in cognitive radio societies

Wisniewska, A., Khan, B., Al-Fuqaha, A., Dombrowski, K. & Shattal, M. A., Sep 26 2016, 2016 International Wireless Communications and Mobile Computing Conference, IWCMC 2016. Institute of Electrical and Electronics Engineers Inc., p. 1063-1068 6 p. 7577206. (2016 International Wireless Communications and Mobile Computing Conference, IWCMC 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations
2015

Malware biodiversity using static analysis

Seideman, J. D., Khan, B. & Vargas, A. C., 2015, Future Network Systems and Security - 1st International Conference, FNSS 2015, Proceedings. Piramuthu, S., Zhou, W. & Doss, R. (eds.). Springer Verlag, p. 139-155 17 p. (Communications in Computer and Information Science; vol. 523).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations
2014

Contention-sensing and dynamic spectrum co-use in secondary user Cognitive Radio societies

Wisniewska, A. & Khan, B., Sep 22 2014, IWCMC 2014 - 10th International Wireless Communications and Mobile Computing Conference. Institute of Electrical and Electronics Engineers Inc., p. 157-162 6 p. 6906349. (IWCMC 2014 - 10th International Wireless Communications and Mobile Computing Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Scopus citations

Identifying malware genera using the Jensen-Shannon distance between system call traces

Seideman, J. D., Khan, B. & Vargas, A. C., Dec 29 2014, Proceedings of the 9th IEEE International Conference on Malicious and Unwanted Software, MALCON 2014. Institute of Electrical and Electronics Engineers Inc., p. 1-7 7 p. 6999409. (Proceedings of the 9th IEEE International Conference on Malicious and Unwanted Software, MALCON 2014).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Scopus citations
2013

An evaluation of the risk impact of device heterogeneity on critical care delivery

Saad, M. K., Khan, B. & Ben Brahim, G., 2013, 2013 5th International Conference on Modeling, Simulation and Applied Optimization, ICMSAO 2013. 6552648. (2013 5th International Conference on Modeling, Simulation and Applied Optimization, ICMSAO 2013).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Determining vulnerability resolution time by examining malware proliferation rates

Seideman, J. D., Khan, B. & Ben Brahim, G., 2013, 2013 9th International Wireless Communications and Mobile Computing Conference, IWCMC 2013. p. 1678-1682 5 p. 6583808. (2013 9th International Wireless Communications and Mobile Computing Conference, IWCMC 2013).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Optimizing agent placement for flow reconstruction of DDoS attacks

Demir, Ö., Khan, B., Ben Brahim, G. & Al-Fuqaha, A., 2013, 2013 9th International Wireless Communications and Mobile Computing Conference, IWCMC 2013. p. 83-89 7 p. 6583539. (2013 9th International Wireless Communications and Mobile Computing Conference, IWCMC 2013).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations
2011

Finding DDoS attack sources: Searchlight localization algorithm for network tomography

Demir, O. & Khan, B., 2011, IWCMC 2011 - 7th International Wireless Communications and Mobile Computing Conference. p. 418-423 6 p. 5982570. (IWCMC 2011 - 7th International Wireless Communications and Mobile Computing Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations
2010

A dynamic route optimization mechanism for AODV in MANETs

Bilgin, Z. & Khan, B., 2010, 2010 IEEE International Conference on Communications, ICC 2010. 5502381. (IEEE International Conference on Communications).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

18 Scopus citations

Having one's cake and eating it too: Better routes and lower control traffic for AODV

Bilgin, Z. & Khan, B., 2010, 9th IFIP Annual Mediterranean Ad Hoc Networking Workshop, MED-HOC-NET 2010. 5546847. (9th IFIP Annual Mediterranean Ad Hoc Networking Workshop, MED-HOC-NET 2010).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Only the short die old: Route optimization in MANETs by dynamic subconnection shrinking

Bilgin, Z., Khan, B. & Al-Fuqaha, A., 2010, IWCMC 2010 - Proceedings of the 6th International Wireless Communications and Mobile Computing Conference. p. 681-685 5 p. (IWCMC 2010 - Proceedings of the 6th International Wireless Communications and Mobile Computing Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

Quantifying distributed system stability through simulation: A case study of an agent-based system for flow reconstruction of DDoS attacks

Demir, O. & Khan, B., 2010, ISMS 2010 - UKSim/AMSS 1st International Conference on Intelligent Systems, Modelling and Simulation. p. 312-317 6 p. 5416074. (ISMS 2010 - UKSim/AMSS 1st International Conference on Intelligent Systems, Modelling and Simulation).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Reconstruction of malicious internet flows

Demir, O., Khan, B. & Al-Fuqaha, A., 2010, IWCMC 2010 - Proceedings of the 6th International Wireless Communications and Mobile Computing Conference. p. 1182-1187 6 p. (IWCMC 2010 - Proceedings of the 6th International Wireless Communications and Mobile Computing Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Using connection expansion to reduce control traffic in MANETs

Bilgin, Z., Khan, B. & Al-Fuqaha, A., 2010, IWCMC 2010 - Proceedings of the 6th International Wireless Communications and Mobile Computing Conference. p. 534-538 5 p. (IWCMC 2010 - Proceedings of the 6th International Wireless Communications and Mobile Computing Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations
2009

Balancing power: Tradeoffs between connection lifetime and control traffic in MANETS

Bilgin, Z. & Khan, B., 2009, Proceedings of the 2009 ACM International Wireless Communications and Mobile Computing Conference, IWCMC 2009. p. 883-887 5 p. (Proceedings of the 2009 ACM International Wireless Communications and Mobile Computing Conference, IWCMC 2009).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Bayesian-based game theoretic model to guarantee cooperativeness in hybrid RF/FSO mesh networks

Awwad, O., Al-Fuqaha, A., Khan, B., Benhaddou, D., Guizani, M. & Rayes, A., 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference. 5426114. (GLOBECOM - IEEE Global Telecommunications Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Scheduling cooperative emergency response (or how the Meek shall overcome the Greedy)

Dottin, C. & Khan, B., 2009, Proceedings of the 2009 ACM International Wireless Communications and Mobile Computing Conference, IWCMC 2009. p. 598-602 5 p. (Proceedings of the 2009 ACM International Wireless Communications and Mobile Computing Conference, IWCMC 2009).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Using a secure permutational covert channel to detect local and wide area interposition attacks

Paduch, J., Levy, J. & Khan, B., 2009, Proceedings of the 2009 ACM International Wireless Communications and Mobile Computing Conference, IWCMC 2009. p. 79-83 5 p. (Proceedings of the 2009 ACM International Wireless Communications and Mobile Computing Conference, IWCMC 2009).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations
2008

A model for cooperative mobility and budgeted QoS in MANETs with heterogenous autonomy requirements

Brahim, G., Al-Fuqaha, A., Guizani, M. & Khan, B., 2008, 2008 IEEE Global Telecommunications Conference, GLOBECOM 2008. p. 399-403 5 p. 4697859. (GLOBECOM - IEEE Global Telecommunications Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

Increasing connection lifetimes through dynamic distribution of budgeted power

Bilgin, Z. & Khan, B., 2008, IWCMC 2008 - International Wireless Communications and Mobile Computing Conference. p. 500-504 5 p. 4599986. (IWCMC 2008 - International Wireless Communications and Mobile Computing Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Superimposing permutational covert channels onto reliable stream protocols

Levy, J., Paduch, J. & Khan, B., 2008, 3rd International Conference on Malicious and Unwanted Software, MALWARE 2008. p. 49-56 8 p. 4690857. (3rd International Conference on Malicious and Unwanted Software, MALWARE 2008).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations
2007

A new fuzzy-based cooperative movement model in support of qos in wireless ad-hoc network

Brahim, G. B., Al-Fuqaha, A., Kountanis, D. & Khan, B., 2007, IWCMC 2007: Proceedings of the 2007 International Wireless Communications and Mobile Computing Conference. p. 158-163 6 p. (IWCMC 2007: Proceedings of the 2007 International Wireless Communications and Mobile Computing Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Hiding your wares: Transparently retrofitting memory confidentiality into legacy applications

Levy, J. & Khan, B., 2007, 2007 IEEE International Conference on Communications, ICC'07. p. 1368-1372 5 p. 4288901. (IEEE International Conference on Communications).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Multigrid techniques for movement planning in manets with cooperative mobility

Brahim, G. B., Al-Fuqaha, A. & Khan, B., 2007, IWCMC 2007: Proceedings of the 2007 International Wireless Communications and Mobile Computing Conference. p. 197-201 5 p. (IWCMC 2007: Proceedings of the 2007 International Wireless Communications and Mobile Computing Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Petrifying worm cultures: Scalable detection and immunization in untrusted environments

Sandin, J. O. & Khan, B., 2007, 2007 IEEE International Conference on Communications, ICC'07. p. 1423-1428 6 p. 4288910. (IEEE International Conference on Communications).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Surrendering autonomy: Can cooperative mobility help?

Brahim, G. B., Khan, B., Al-Fuqaha, A., Guizani, M. & Kountanis, D., 2007, Euro-Par 2007 Parallel Processing - 13th International Euro-Par Conference, Proceedings. Springer Verlag, p. 901-910 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4641 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Using MILP for optimal movement planning in MANETs with cooperative mobility

Brahimi, G., Awwad, O., Al-Fuqaha, A., Khan, B., Kountanisi, D. & Guizani, M., 2007, IEEE GLOBECOM 2007 - 2007 IEEE Global Telecommunications Conference, Proceedings. p. 1201-1205 5 p. 4411141. (GLOBECOM - IEEE Global Telecommunications Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2006

A non-commutative generalization of ElGamal key exchange using polycyclic groups

Kahrobaei, D. & Khan, B., 2006, IEEE GLOBECOM 2006 - 2006 Global Telecommunications Conference. 4150920. (GLOBECOM - IEEE Global Telecommunications Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

14 Scopus citations

Budgeting power: Packet duplication and bit error rate reduction in wireless ad-hoc networks

Brahim, G. B. & Khan, B., 2006, IWCMC 2006 - Proceedings of the 2006 International Wireless Communications and Mobile Computing Conference. p. 293-298 6 p. (IWCMC 2006 - Proceedings of the 2006 International Wireless Communications and Mobile Computing Conference; vol. 2006).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

Harnessing the parity of multiple errors in end-to-end MAC schemes

Brahim, G. B., Khan, B., Al-Fuqaha, A. & Guizani, M., 2006, IEEE GLOBECOM 2006 - 2006 Global Telecommunications Conference. 4151131. (GLOBECOM - IEEE Global Telecommunications Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Minimizing wireless connection BER through the dynamic distribution of budgeted power

Khan, B., Brahim, G. B., Al-Fuqaha, A. & Guizani, M., 2006, IEEE GLOBECOM 2006 - 2006 Global Telecommunications Conference. 4151605. (GLOBECOM - IEEE Global Telecommunications Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

Using energy-efficient overlays to reduce packet error rates in wireless ad-hoc networks

Brahm, G. B., Khan, B., Al-Fuqaha, A., Guizani, M. & Rayes, A., 2006, 2006 IEEE International Conference on Communications, ICC 2006. p. 3717-3722 6 p. 4025051. (IEEE International Conference on Communications; vol. 8).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Scopus citations
2004

The buck stops here: Trust management in multi-agent systems with accountability

Khan, B., Kleiner, D. D. & Talmage, D., 2004, 2004 IEEE 1st Symposium on Multi-Agent Security and Survivability. p. 46-54 9 p. (2004 IEEE 1st Symposium on Multi-Agent Security and Survivability).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2002

Minimizing Communication Costs in Hierarchical Multi-Agent Systems

Bhutani, K. R. & Khan, B., 2002, Proceedings of the 6th Joint Conference on Information Sciences, JCIS 2002. Caulfield, J. H., Chen, S. H., Cheng, H. D., Duro, R., Caufield, J. H., Chen, S. H., Cheng, H. D., Duro, R. & Honavar, V. (eds.). p. 1435-1442 8 p. (Proceedings of the Joint Conference on Information Sciences; vol. 6).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations
2001

Introducing ProuST: The PNNI routing and simulation toolkit

Khan, B., Talmage, D., Mountcastle, S., Battou, A. & Marsh, S., 2001, 2001 IEEE Workshop on High Performance Switching and Routing. p. 335-341 7 p. (2001 IEEE Workshop on High Performance Switching and Routing).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Scopus citations

Towards an agent-based distributed hierarchical network management system for all-optical networks

Khan, B., Kleiner, D. D. & Talmage, D., 2001, Mobile Agents for Telecommunication Applications - 3rd International Workshop, MATA 2001, Proceedings. Pierre, S. & Glitho, R. (eds.). Springer Verlag, p. 103-113 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2164).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1998

Routing through networks with hierarchical topology aggregation

Awerbuch, B., Du, Y., Khan, B. & Shavitt, Y., 1998, Proceedings - 3rd IEEE Symposium on Computers and Communications, ISCC 1998. Institute of Electrical and Electronics Engineers Inc., p. 406-412 7 p. 702556. (Proceedings - 3rd IEEE Symposium on Computers and Communications, ISCC 1998).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

14 Scopus citations