List of Publications

YEAR 2015

 

Refereed International Journal Papers/Magazines

 

[J28] Tarem Ahmed, Al-Sakib Khan Pathan, and Supriyo Shafkat Ahmed, "Learning Algorithms for Anomaly Detection from Images", International Journal of System Dynamics Applications, IGI Global. [To Appear]

 

[J27] Imran Yusof and Al-Sakib Khan Pathan, “Mitigating Cross-Site Scripting Attack by Implementing Content Security Policy”, Computer, IEEE. [To Appear]

 

[J26] Matin Saad Abdullah, Al-Sakib Khan Pathan, and Imad Fakhri Al Shaikhli, "A Web and Software-based Approach Blending Social Networks for Online Qur’anic Arabic Learning", International Arab Journal of Information Technology. [To Appear]

 

[J25] Houssem Mansouri, Nadjib Badache, Makhlouf Aliouat, and Al-Sakib Khan Pathan, “A New Efficient Checkpointing Algorithm for Distributed Mobile Computing”, Journal of Control Engineering and Applied Informatics, Vol.17, No.2 2015, pp. 43-54.

 

[J24] Al-Sakib Khan Pathan and Mohssen M. Z. E. Mohammed, “Building Customer Trust in Cloud Computing with an ICT-enabled Global Regulatory Body”, Wireless Personal Communications, Springer, DOI: 10.1007/s11277-015-2729-z.

 

[J23] Djallel Eddine Boubiche, Sabrina Boubiche, Homero Toral-Cruz, Al-Sakib Khan Pathan, Azzedine Bilami, Samir Athmani, “SDAW: Secure Data Aggregation Watermarking-based Scheme in Homogeneous WSNs”, Telecommunication Systems, Springer, DOI: 10.1007/s11235-015-0047-0.

 

[J22] Saiful Azad, Khandaker Tabin Hasan, Dip Nandi, and Al-Sakib Khan Pathan, "A High-Throughput Routing Metric for Multi-Hop Underwater Acoustic Networks", Computers and Electrical Engineering, Volume 44, Elsevier, May 2015, DOI:10.1016/j.compeleceng.2015.03.020, pp. 24-33.

 

[J21] Dieynaba Mall, Karim Konaté, and Al-Sakib Khan Pathan, "Key Revocation in Wireless Sensor Networks – A Survey on a Less-addressed yet Vital Issue", International Journal of Ad Hoc and Ubiquitous Computing, Inderscience Publishers, Vol. 18, Nos. 1/2, 2015, pp. 3-22.

 

Editorial Articles in International Journals

 

[E16] Al-Sakib Khan Pathan, Xianglin Wei, Homero Toral Cruz, and Luca Caviglione, “Preface: Security and Trust Issues in Peer-to-Peer Networks”, Guest Editorial of the Special Issue of International Journal of Computational Science and Engineering, Inderscience Publishers. [To Appear]

 

[E15] M. Shamim Hossain, Al-Sakib Khan Pathan, Stefan Goebel, Shawon M. Rahman, and Manzur Murshed, “Advances in Multimedia Sensor Networks for Health-Care and Related Applications”, Guest Editorial of the Special Issue of International Journal of Distributed Sensor Networks, vol. 2015, Article ID 596096, Hindawi Publishing Corporation, 2 pages, 2015. DOI:10.1155/2015/596096.

 

[E14] Al-Sakib Khan Pathan, Zubair Muhammad Fadlullah, Mostafa M. Fouda, Muhammad Mostafa Monowar, and Philip Korn, “Information integrity in smart grid systems”, Guest Editorial of the Special Issue of Information Systems, Elsevier, DOI:10.1016/j.is.2015.05.002, 2015.


[E13] Al-Sakib Khan Pathan, Muhammad Mostafa Monowar, Hani Alzaid, and Mohammad Asadul Hoque, “Understanding Converged Networks, Technologies and Applications”, Guest Editorial of the Special Issue on Converged Networks, Technologies and Applications of International Journal of Computational Science and Engineering, Inderscience Publishers, Vol. 10, No. 3, pp. 231-233.

 

[E12] Neeraj Kumar, Al-Sakib Khan Pathan, Elias P. Duarte Jr., and Riaz Ahmed Shaikh, "Editorial: Critical Applications in Vehicular Ad Hoc/Sensor Networks", Guest Editorial of the Special Issue on Critical Applications in Vehicular Ad Hoc/Sensor Networks of Telecommunication Systems, Volume 58, Issue 4, April 2015, Springer, DOI: 10.1007/s11235-014-9876-5, pp 275-277.

 

Refereed International Conference Papers

 

[C20] Houssem Mansouri, Nadjib Badache, Makhlouf Aliouat, and Al-Sakib Khan Pathan, “Adaptive Fault Tolerant Checkpointing Algorithm for Cluster Based Mobile Ad Hoc Networks”, International Conference on Advanced Wireless, Information, and Communication Technologies (AWICT 2015), September 20-23, 2015, Sousse, Tunisia. [Accepted]

 

[C19] Houssem Mansouri, Nadjib Badache, Makhlouf Aliouat, and Al-Sakib Khan Pathan, "A Non-Blocking Coordinated Checkpointing Algorithm for Message-Passing Systems", International Conference on Intelligent Information Processing, Security and Advanced Communication (IPAC 2015), ACM, November 23-25, 2015, Algeria. [To Appear]

 

Books

 

[B10] Al-Sakib Khan Pathan. Securing Cyber Physical Systems. (edited and contributed volume), ISBN: 9781498700986, CRC Press, Taylor & Francis Group, USA. [To Appear]

 

Book Chapters

 

[BC12] Matin Saad Abdullah and Al-Sakib Khan Pathan, “Teaching and Learning Qur’anic Arabic Utilizing Adaptive and Intelligent Systems for Collaborative Online Learning”, Handbook of Applied Learning Theory and Design in Modern Education (Edited by Elena Railean, Gabriela Walker, Liz Jackson, and Atilla Elci), IGI Global, USA. [To Appear]

 

[BC11] Al-Sakib Khan Pathan and Imran Yusof, “Tackling Cross-Site Scripting (XSS) Attacks in the Cyberspace”, Securing Cyber Physical Systems (Edited by Al-Sakib Khan Pathan), ISBN: 9781498700986, CRC Press, Taylor & Francis Group, USA. [To Appear]

 

YEAR 2014

 

Refereed International Journal Papers

 

[J20] Mohamed Guerroumi, Al-Sakib Khan Pathan, Nadjib Badache, and Samira Moussaoui, “On the Medium Access Control Protocols Suitable for Wireless Sensor Networks – A Survey”, International Journal of Communication Networks and Information Security, Vol. 6, No. 2, 2014, pp. 89-103.

 

[J19] Al-kindy Athman Abdalla and Al-Sakib Khan Pathan, “On Protecting Data Storage in Mobile Cloud Computing Paradigm”, IETE Technical Review, Volume 31, Issue 1, 2014, DOI:10.1080/02564602.2014.891382, pp. 82-91. (This paper is recognized as the "Most Read article" during the period, May 2014-June 2015)

 

[J18] Wafaa Mustafa Abduallah, Abdul Monem S. Rahma, and Al-Sakib Khan Pathan, "Mix Column Transform based on Irreducible Polynomial Mathematics for Color Image Steganography: A Novel Approach", Computers and Electrical Engineering, Volume 40, Issue 4, 2014, Elsevier, DOI: 10.1016/j.compeleceng.2014.02.007, pp. 1390-1404.

 

[J17] Shazana Md Zin, Nor Badrul Anuar, Miss Laiha Mat Kiah, and Al-Sakib Khan Pathan, “Routing Protocol Design for Secure WSN: Review and Open Research Issues”, Journal of Network and Computer Applications, Volume 41, 2014, Elsevier, DOI: 10.1016/j.jnca.2014.02.008, pp. 517–530.

 

[J16] Al-Sakib Khan Pathan and Diallo Abdoulaye Kindy, “Lethality of SQL Injection against Current and Future Internet-Technologies”, International Journal of Computational Science and Engineering, Vol. 9, No. 4, 2014, Inderscience Publishers, pp. 386-394.

 

[J15] Tarem Ahmed, Supriyo Ahmed, and Al-Sakib Khan Pathan, “Automated Surveillance in Distributed, Visual Networks: An Empirical Comparison of Recent Algorithms”, International Journal of Control and Automation, SERSC Publisher, Vol.7, No.3, 2014, DOI: 10.14257/ijca.2014.7.3.37, pp.389-400.

 

Editorial Articles in International Journals

 

[E11] Al-Sakib Khan Pathan, “On the Boundaries of Trust and Security in Computing and Communications Systems”, International Journal of Trust Management in Computing and Communications, Vol. 2, No. 1, 2014, Inderscience Publishers, pp. 1-6.

 

[E10] Mohammad Mehedi Hassan, Al-Sakib Khan Pathan, Eui-Nam Huh, and Jemal Abawajy, "Emerging Sensor-Cloud Technology for Pervasive Services and Applications", Guest Editorial of the Special Issue of International Journal of Distributed Sensor Networks, Volume 2014, Article ID 610106, DOI:10.1155/2014/610106, Hindawi Publishing Corporation, 2 pages.


[E09] Al-Sakib Khan Pathan and Muhammad Mostafa Monowar, “Preface: Future Trends in Security Issues in Internet and Web Applications”, Guest Editorial of the Special Issue of International Journal of Computational Science and Engineering, Vol. 9, No. 4, 2014, Inderscience Publishers, pp. 275-277.

 

[E08] Al-Sakib Khan Pathan, Rashid Saeed, Mohamed Ali Feki, and Nguyen H. Tran, “Integration of IoT with Future Internet”, Guest Editorial of the Special Issue on Integration of IoT with Future Internet, Journal of Internet Technology, Volume 15, No.2, March 2014, pp.145-147.

 

[E07] Hyung Seok Kim, Waleed Ejaz, Khalid Al-Begain, Al-Sakib Khan Pathan, and Najam ul Hasan, “Advances in Cognitive Radio Sensor Networks”, Special Issue of International Journal of Distributed Sensor Networks, DOI: 10.1155/2014/631624, Volume 2014, Article ID 631624, 3 pages, Hindawi Publishing Corporation, 2014.

 

[E06] Al-Sakib Khan Pathan, Zubair Muhammad Fadlullah, Mostafa M. Fouda, and Hae Young Lee, "Defending against Wireless Network Intrusion", Guest Editorial of the Special Issue on Wireless Network Intrusion of Journal of Computer and System Sciences, Elsevier, DOI: 10.1016/j.jcss.2013.06.006, Volume 80, Issue 3, 2014, pp. 499-501.

 

Refereed International Conference Papers

 

[C18] A. Babu Karuppiah, J. Dalfiah, K. Yuvashri, S. Rajaram, and Al-Sakib Khan Pathan, “Energy-Efficient Sybil Node Detection Algorithm for Wireless Sensor Networks”, 3rd International Conference on Eco-Friendly Computing and Communication Systems (ICECCS 2014), December 18-21, 2014, Mangalore, India, pp. 95-98.

 

[C17] Mohssen M. Z. E. Mohammed and Al-Sakib Khan Pathan, "International Center for Monitoring Cloud Computing Providers (ICMCCP) for Ensuring Trusted Clouds", The 11th IEEE International Conference on Autonomic and Trusted Computing (ATC-2014), December 9-12, 2014, Ayodya Resort, Bali, Indonesia, pp. 571-576.

 

[C16] Imran Yusof and Al-Sakib Khan Pathan, “Preventing Persistent Cross-Site Scripting (XSS) Attack By Applying Pattern Filtering Approach”, The 5th International Conference on Information and Communication Technology for the Muslim World (ICT4M 2014), November 17-19 2014, Kuching, Sarawak, Malaysia.

 

[C15] Md. Rafiqul Islam, M.A.E. Shakib, Md. Azizur Rahaman, Md. Obaidur Rahman, and Al-Sakib Khan Pathan, "A Neighbour Discovery Approach for Cognitive Radio Network Using Tower of Hanoi (ToH) Sequence Based Channel Rendezvous", The 5th International Conference on Information and Communication Technology for the Muslim World (ICT4M 2014), November 17-19 2014, Kuching, Sarawak, Malaysia.

 

[C14] Tarem Ahmed, Al-Sakib Khan Pathan, and Supriyo Ahmed, “Adaptive Algorithms for Automated Intruder Detection in Surveillance Networks”, ICACCI 2014 Doctoral Consortium; 3rd International Conference on Advances in Computing, Communications & Informatics (ICACCI 2014), September 24-27, 2014, Delhi, India, pp. 2775-2780.

 

[C13] Dieynaba Mall, Karim Konaté, and Al-Sakib Khan Pathan, “SECRET: A Secure and Efficient Certificate Revocation Scheme for Mobile Ad Hoc Networks”, International Symposium on Biometric and Security Technologies 2014 (ISBAST'14), August 26-27, 2014, Kuala Lumpur, Malaysia, pp. 137-143.

 

Books

 

[B09] Saiful Azad and Al-Sakib Khan Pathan. Practical Cryptography: Algorithms and Implementations using C++. (edited and contributed volume), ISBN: 978-1-48-222889-2, CRC Press, Taylor & Francis Group, USA, November 2014.

 

[B08] Al-Sakib Khan Pathan, Muhammad Mostafa Monowar, and Shafiullah Khan. Simulation Technologies in Networking and Communications: Selecting the Best Tool for the Test. (edited volume), ISBN 9781482225495, CRC Press, Taylor & Francis Group, USA, November 2014.

 

[B07] Al-Sakib Khan Pathan. The State of the Art in Intrusion Prevention and Detection. (edited and contributed volume), ISBN 9781482203516, CRC Press, Taylor & Francis Group, USA, January 2014.

 

Book Chapters

 

[BC10] Al-Sakib Khan Pathan, “Basics of Security and Cryptography”, Practical Cryptography: Algorithms and Implementations using C++ (Edited by Saiful Azad and Al-Sakib Khan Pathan), ISBN: 978-1-48-222889-2, CRC Press, Taylor & Francis Group, USA, pp. 1-10.

 

[BC09] Al-Sakib Khan Pathan and Tarem Ahmed, "An Innovative Approach of Blending Security Features in Energy-Efficient Routing for a Crowded Network of Wireless Sensors", The State of the Art in Intrusion Prevention and Detection (Edited by Al-Sakib Khan Pathan), ISBN: 9781482203516, CRC Press, Taylor & Francis Group, USA, January 2014, pp. 449-472.

[BC08] Mohssen Mohammed and Al-Sakib Khan Pathan, "Using Routers and Honeypots in Combination for Collecting Internet Worm Attacks", The State of the Art in Intrusion Prevention and Detection (Edited by Al-Sakib Khan Pathan), ISBN: 9781482203516, CRC Press, Taylor & Francis Group, USA, January 2014, pp. 47-84.

 

YEAR 2013

 

Refereed International Journal Papers

 

[J14] Al-Sakib Khan Pathan, "Fi-Wi Network for Future Cloud", International Journal of Applied Research on Information Technology and Computing, Volume 4, Issue 3, December 2013, pp. 122-132.

 

[J13] Mohamed Guerroumi, Al-Sakib Khan Pathan, Nadjib Badache, and Samira Moussaoui, “Strengths and Weaknesses of Prominent Data Dissemination Techniques in Wireless Sensor Networks”, International Journal of Communication Networks and Information Security, Vol. 5, No. 3, pp. 158-177.

 

[J12] Sherali Zeadally, Al-Sakib Khan Pathan, Cristina Alcaraz, and Mohamad Badra, "Towards Privacy Protection in Smart Grid", Wireless Personal Communications, Springer, DOI 10.1007/s11277-012-0939-1, Volume 73, Issue 1, November 2013, pp 23-50. (This article was included in IEEE Communications Society's (IEEE ComSoc) Best Readings Topics on Communications and Information Systems Security, 2013 under the category of “Privacy”)

 

[J11] Diallo Abdoulaye Kindy and Al-Sakib Khan Pathan, “A Detailed Survey on various aspects of SQL Injection in Web Applications: Vulnerabilities, Innovative Attacks and Remedies”, International Journal of Communication Networks and Information Security, Vol. 5, No. 2, August 2013, pp. 80-92.

 

[J10] Abror Abduvaliyev, Al-Sakib Khan Pathan, Jianying Zhou, Rodrigo Roman, and Wai-Choong Wong, "On the Vital Areas of Intrusion Detection Systems in Wireless Sensor Networks", IEEE Communications Surveys & Tutorials, DOI: 10.1109/SURV.2012.121912.00006, Volume: 15, Issue: 3, Third Quarter 2013, pp. 1223-1237. (This article was included in IEEE Communications Society's (IEEE ComSoc) Best Readings Topics on Communications and Information Systems Security, 2013 under the category of “Intrusion Detection Systems”)

 

[J09] Homero Toral-Cruz, Al-Sakib Khan Pathan, and Julio C. Ramírez Pacheco, "Accurate Modeling of VoIP Traffic QoS Parameters in Current and Future Networks with Multifractal and Markov Models", Mathematical and Computer Modelling Journal, Elsevier, DOI: 10.1016/j.mcm.2011.12.007, Volume 57, Issues 11–12, June 2013, pp. 2832-2845.

 

[J08] Al-Sakib Khan Pathan, Wafaa Mustafa Abduallah, Shapla Khanam, and Habibullah Yusuf Saleem, "A Pay-and-Stay Model for Tackling Intruders in Hybrid Wireless Mesh Networks", SIMULATION: Transactions of The Society for Modeling and Simulation International, DOI: 10.1177/0037549712467827, Volume 89, Issue 5, May 2013, pp. 616-633.

 

[J07] Tarem Ahmed, Xianglin Wei, Supriyo Ahmed, and Al-Sakib Khan Pathan, "Efficient and Effective Automated Surveillance Agents using Kernel Tricks", SIMULATION: Transactions of The Society for Modeling and Simulation International, DOI: 10.1177/0037549712460908, Volume 89, Issue 5, May 2013, pp. 562-577.

 

[J06] Feyza Gündüz and Al-Sakib Khan Pathan, "On the Key Factors of Usability in Small-sized Mobile Touch-Screen Application”, International Journal of Multimedia and Ubiquitous Engineering, SERSC Publisher, Vol. 8, No. 3, May 2013, pp. 115-137.

 

[J05] Harry Tin Win and Al-Sakib Khan Pathan, "On the Issues and Challenges of Fiber-Wireless (Fi-Wi) Networks", Journal of Engineering, Hindawi Publishing Corporation, Volume 2013, Article ID 645745, pp. 1-11.

 

[J04] Xianglin Wei, Jianhua Fan, Ming Chen, Tarem Ahmed, and Al-Sakib Khan Pathan, "SMART: A Subspace based Malicious Peers Detection algorithm for P2P Systems", International Journal of Communication Networks and Information Security, Vol. 5, No. 1, April 2013, pp. 1-9.

 

[J03] Wafaa Mustafa Abduallah, Abdul Monem S. Rahma, and Al-Sakib Khan Pathan, "A New Data Hiding Technique Based on Irreducible Polynomials", Journal of Emerging Technologies in Web Intelligence, Academy Publisher, Volume 5, No. 1, 2013, pp. 45-51.

 

Editorial Articles in International Journals

 

[E05] Guangjie Han, Lei Shu, Al-Sakib Khan Pathan, Joel Rodrigues, and Abdelhamid Mellouk, "Wireless Sensor Networks based on Environmental Energy Harvesting", Special Issue of International Journal of Distributed Sensor Networks, DOI: 10.1155/2013/816063, Volume 2013, Article ID 816063, 2 pages, Hindawi Publishing Corporation, 2013.

 

[E04] Al-Sakib Khan Pathan, "When the Cloud Computing Becomes Mobile!", International Journal of Internet and Distributed Systems, Scientific Research Publishing Inc., DOI: 10.4236/ijids.2013.13003, Volume 1, Number 3, August 2013, p. 17.

 

[E03] Lei Shu, Athanasios V. Vasilakos, Jaime Lloret, and Al-Sakib Khan Pathan, “Guest Editorial: Special Issue on Recent Advance on Mobile Sensor Systems”, Telecommunication Systems, Springer, DOI: 10.1007/s11235-011-9560-y, Volume 52, Issue 4, April 2013, pp 2407-2409.

 

[E02] Al-Sakib Khan Pathan, "Tackling the Threats of Internet Worms", International Journal on Internet and Distributed Computing Systems, Volume 3, Number 1, 2013, pp. i-ii.

 

Papers in Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST) Volume

 

[LNT01] Wafaa Mustafa Abduallah, Abdul Monem S. Rahma, and Al-Sakib Khan Pathan, “Reversible Data Hiding Scheme based on 3-Least Significant Bits and Mix Column Transform”, 4th International Workshop on Applications and Techniques in Information Security (ATIS), 26 September 2013 with the 9th International Conference on Security and Privacy in Communication Networks (SecureComm 2013), September 25-27, 2013, Sydney, Australia, (Zia, T., Zomaya, A., Varadharajan, V., and Mao, M. (Eds.)), Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST), Springer, Volume 0127, Springer, 2013, pp. 405-417.

 

Refereed International Conference Papers

 

[C12] Mohssen M. Z. E. Mohammed, H. Anthony Chan, Neco Ventura and Al-Sakib Khan Pathan, "An Automated Signature Generation Method for Zero-day Polymorphic Worms Based on Multilayer Perceptron Model", 2nd International Conference on Advanced Computer Science Applications and Technologies – ACSAT2013, December 22-24, 2013, Kuching, Sarawak, Malaysia, pp. 450-455.

 

[C11] Wafaa Mustafa Abduallah, Abdul Monem S. Rahma, and Al-Sakib Khan Pathan, "Data Hiding within Color Images based on MCT with X-OR Operations", 2nd International Conference on Advanced Computer Science Applications and Technologies – ACSAT2013, December 22-24, 2013, Kuching, Sarawak, Malaysia, pp. 19-24. (Invited Paper)

 

[C10] Tarem Ahmed, Supriyo Ahmed, and Al-Sakib Khan Pathan, “Automated Surveillance in Distributed, Wireless Visual Networks: A Comparative Study”, Workshop on Mobile and Wireless 2013 Second (Mobile2013SE), December 11-13, 2013, Jeju National University International Center, Jeju Island, Korea; Advanced Science and Technology Letters, Volume 42 (Mobile and Wireless 2013), DOI: 10.14257/astl.2013.42.01, pp.1-4. (Invited Paper)

 

[C09] Dieynaba Mall, Karim Konaté, and Al-Sakib Khan Pathan, "On the Key Revocation Schemes in Wireless Sensor Networks", The 2013 IEEE International Conference on Green Computing and Communications (GreenCom 2013): Security, Privacy, and Trust Computing, August 20-23, Beijing, China, 2013, pp. 290-297.

 

[C08] Matin Saad Abdullah and Al-Sakib Khan Pathan, "Learning Qur’anic Arabic through Interactive Web-Based Software: A Pragmatic Approach in Language for Specific Purpose", The 4th International Conference on Information and Communication Technology for the Muslim World (ICT4M 2013), March 25-27, 2013, Rabat, Morocco, pp. 1-6. (CD Proceedings)

 

Books

 

[B06] Mohssen Mohammed and Al-Sakib Khan Pathan. Automatic Defense against Zero-day Polymorphic Worms in Communication Networks. (authored volume), ISBN 9781466557277, CRC Press, Taylor & Francis Group, USA, May 2013. (This book was included in IEEE Communications Society's (IEEE ComSoc) Best Readings in Communications and Information Systems Security, September 2013)

 

[B05] Shafiullah Khan and Al-Sakib Khan Pathan. Wireless Networks and Security: Issues, Challenges and Research Trends. (edited volume), ISBN: 978-3-642-36168-5, Series: Signals and Communication Technology, Springer, February 2013. (This book was included in IEEE Communications Society's (IEEE ComSoc) Best Readings in Communications and Information Systems Security, September 2013 + One of the top 25% most downloaded eBooks in the relevant Springer eBook Collection in 2013 - a total of 5830 chapter downloads in 2013)

 

[B04] Al-Sakib Khan Pathan, Muhammad Mostafa Monowar, and Zubair Md. Fadlullah. Building Next-Generation Converged Networks: Theory and Practice. (edited and contributed volume), ISBN: 9781466507616, CRC Press, Taylor & Francis Group, USA, January, 2013. (This book got international attention to get published with a translated version in Simplified Chinese language after a deal between CRC Press, USA and China Machine Press, July 2013.)

 

Book Chapters

 

[BC07] Al-Sakib Khan Pathan, "Analyzing Trust and Security in Computing and Communications Systems", Managing Trust in Cyberspace (Edited by Sabu M. Thampi, Bharat Bhargava, and Pradeep Atrey), ISBN 9781466568440, Chapman and Hall/CRC Press, USA, 2013, pp. 1-11.

 

[BC06] Al-Sakib Khan Pathan, Shapla Khanam, Habibullah Yusuf Saleem, and Wafaa Mustafa Abduallah, “Tackling Intruders in Wireless Mesh Networks”, Distributed Network Intelligence, Security and Applications (Edited by Qurban A Memon), ISBN 9781466559578, CRC Press, Taylor & Francis Group, USA, 2013, pp. 167-190.

 

[BC05] Abdelgadir Tageldin Abdelgadir and Al-Sakib Khan Pathan, "A Pragmatic Approach of Performance Evaluation of MPI-OpenMP on a 12 nodes Multi-core Cluster", Building Next-Generation Converged Networks: Theory and Practice (Edited by Al-Sakib Khan Pathan, Muhammad Mostafa Monowar, and Zubair Md. Fadlullah), ISBN: 9781466507616, CRC Press, Taylor & Francis Group, USA, 2013, pp. 437-450.

 

[BC04] Homero Toral-Cruz, Julio Cesar Ramirez-Pacheco, Pablo Velarde-Alvarado, Al-Sakib Khan Pathan, “VoIP in Next Generation Converged Networks”, Building Next-Generation Converged Networks: Theory and Practice (Edited by Al-Sakib Khan Pathan, Muhammad Mostafa Monowar, and Zubair Md. Fadlullah), ISBN: 9781466507616, CRC Press, Taylor & Francis Group, USA, 2013, pp. 337-360.

 

[BC03] Diallo Abdoulaye Kindy and Al-Sakib Khan Pathan, “A Walk through SQL Injection: Vulnerabilities, Attacks, and Countermeasures in Current and Future Networks”, Building Next-Generation Converged Networks: Theory and Practice (Edited by Al-Sakib Khan Pathan, Muhammad Mostafa Monowar, and Zubair Md. Fadlullah), ISBN: 9781466507616, CRC Press, Taylor & Francis Group, USA, 2013, pp. 171-197.

 

[BC02] Mostafa M. Fouda, Zubair Md. Fadlullah, Al-Sakib Khan Pathan, and Nei Kato, "Peer-to-Peer Video-On-Demand in Future Internet", Building Next-Generation Converged Networks: Theory and Practice (Edited by Al-Sakib Khan Pathan, Muhammad Mostafa Monowar, and Zubair Md. Fadlullah), ISBN: 9781466507616, CRC Press, Taylor & Francis Group, USA, 2013, pp. 119-134.

 

Peer Reviewed Workshop Papers/Student Posters

 

[WP08] Wafaa Mustafa Abduallah, Al-Sakib Khan Pathan, and Abdulmonem S. Rahma, “Reversible Data Hiding Scheme based on 3-Least Significant Bits and Mix Column Transform”, POSTER presentation in International Islamic University Malaysia (IIUM) KICT Postgraduate Student Colloquium, October 2013, Kuala Lumpur, Malaysia. (This POSTER won the Silver Medal in the event)

 

[WP07] Matin Saad Abdullah and Al-Sakib Khan Pathan, “Teaching and Learning Qur’anic Arabic Utilizing New Technologies and ICT”, POSTER presentation in International Islamic University Malaysia (IIUM) KICT Postgraduate Student Colloquium, October 2013, Kuala Lumpur, Malaysia.

 

[WP06] Tarem Ahmed, Xianglin Wei, Supriyo Ahmed and Al-Sakib Khan Pathan, "Automated Visual Surveillance using Kernel Tricks", POSTER presentation in ENS/INRIA Visual Recognition and Machine Learning (CVML 2013), Summer School, 22-26 July 2013, Paris, France.

 

YEAR 2012

 

Refereed International Journal Papers

 

[J02] Hassen Mohammed Alsafi, Wafaa Mustafa Abduallah, and Al-Sakib Khan Pathan, "IDPS: An Integrated Intrusion Handling Model for Cloud Computing Environment", International Journal of Computing & Information Technology, Volume 4, Number 1, Jan-June 2012, pp. 1-16.

 

[J01] Tarem Ahmed, Xianglin Wei, Supriyo Ahmed, and Al-Sakib Khan Pathan, "Automated Intruder Detection from Image Sequences using Minimum Volume Sets", International Journal of Communication Networks and Information Security, Volume 4, Number 1, April 2012, pp. 11-17.

 

Editorial Article in International Journal

 

[E01] Al-Sakib Khan Pathan, Editor-in-Chief's Foreword: Multi-Dimensional Networking and Distributed Computing Services, International Journal on Internet and Distributed Computing Systems, Volume 2, Number 1, 2012, pp. i-ii.

 

Papers in Lecture Notes in Computer Science (LNCS) Volume

 

[LN03] Shapla Khanam, Habibullah Saleem, and Al-Sakib Khan Pathan, "An Efficient Detection Model of Selective Forwarding Attacks in Wireless Mesh Networks", Proceedings of IDCS 2012, 21-23 November 2012, Wu Yi Shan, Fujian, China, (Y. Xiang et al. (Eds.)) Lecture Notes in Computer Science (LNCS), Volume 7646, Springer-Verlag 2012, pp. 1–14, 2012.

 

Refereed International Conference Papers

 

[C07] Feyza Gündüz and Al-Sakib Khan Pathan, "Usability Improvements for Touch-Screen Mobile Flight Booking Application: A Case Study", International Conference on Advanced Computer Science Applications and Technologies (ACSAT2012), November 26 - 28 2012, Kuala Lumpur, Malaysia, pp. 49-54.

 

[C06] Muhammad Faheem Mohd Ezani, Al-Sakib Khan Pathan, and Shariq Haseeb, "Comparative Analysis of IEEE 802.11g Multimedia Multicast Performance Using RTP with an Implemented Test-bed", The 2012 IEEE Conference on Open Systems (ICOS 2012), October 21 - 24, 2012, Kuala Lumpur, Malaysia, pp. 1-5.

 

[C05] Matin Saad Abdullah and Al-Sakib Khan Pathan, "Using the Web for Critical Learning of Al-Qur’an’s Language: an Exploratory Case Study", World Conference on Islamic Thought 2012 (WCIT'12), September 11 - 12 2012, Perak, Malaysia.

 

[C04] Imad Al Shaikhli, Akram M. Zeki, Rusydi Makarim, and Al-Sakib Khan Pathan, "Protection of Integrity and Ownership of PDF Documents Using Invisible Signature", UKSim 14th International Conference on Computer Modelling and Simulation (UKSim 2012), Cambridge University (Emmanuel College), March 28 - 30, 2012, United Kingdom.

 

[C03] Xianglin Wei, Tarem Ahmed, Ming Chen, and Al-Sakib Khan Pathan, "PeerMate: A Malicious Peer Detection Algorithm for P2P Systems based on MSPCA", International Conference on Computing, Networking and Communications (IEEE ICNC 2012), January 30 - February 2, 2012, Maui, Hawaii, USA, pp.815-819.

 

Books

 

[B03] Shafiullah Khan, Al-Sakib Khan Pathan, and Nabil A. Alrajeh. Wireless Sensor Networks: Current Status and Future Trends. (edited and contributed volume), ISBN: 9781466506060, Auerbach Publications, CRC Press, Taylor & Francis Group, USA, November 2012. (This book was included twice in the Intel Corporation's Recommended Reading List for Developers, 2nd half, 2013 and 1st half, 2014)

 

[B02] Jemal Abawajy, Mukaddim Pathan, Mustafizur Rahman, Al-Sakib Khan Pathan, and Mustafa Mat Deris.  Network and Traffic Engineering in Emerging Distributed Computing Applications. (edited Volume), ISBN: 9781466618886, IGI Global, USA, July 2012. (This book is indexed with all the titles (chapters) in Elsevier’s acclaimed abstract and citation database, Scopus, February 2015)

 

[B01] Jemal Abawajy, Mukaddim Pathan, Mustafizur Rahman, Al-Sakib Khan Pathan, and Mustafa Mat Deris. Internet and Distributed Computing Advancements: Theoretical Frameworks and Practical Applications. (edited Volume), ISBN: 9781466601611, IGI Global, USA, February 2012.

 

Book Chapter

[BC01] Abror Abduvaliyev, Al-Sakib Khan Pathan, Jianying Zhou, Rodrigo Roman, and Wai-Choong Wong, "Intrusion Detection and Prevention in Wireless Sensor Networks", Wireless Sensor Networks: Current Status and Future Trends (Edited by Shafiullah Khan, Al-Sakib Khan Pathan, and Nabil A. Alrajeh), ISBN 9781466506060, Auerbach Publications, CRC Press, Taylor & Francis Group, USA, 2012, pp. 487-510.

 

Peer Reviewed Workshop Papers/Student Posters

 

[WP05] Matin Saad Abdullah and Al-Sakib Khan Patha, “New Technologies for Teaching and Learning Qur’anic Arabic”, POSTER presentation in International Islamic University Malaysia (IIUM) KICT Postgraduate Student Colloquium, December 2012, Kuala Lumpur, Malaysia.

[WP04] Wafaa Mustafa Abduallah, Al-Sakib Khan Pathan, and Abdulmonem S. Rahma (2012b), “New Data Hiding Technique Based on Irreducible Polynomial Mathematics”, POSTER presentation in International Islamic University Malaysia (IIUM) KICT Postgraduate Student Colloquium, December 2012, Kuala Lumpur, Malaysia.

[WP03] Tarem Ahmed and Al-Sakib Khan Pathan (2012b), “An Effective Automated Surveillance System”, POSTER presentation in International Islamic University Malaysia (IIUM) KICT Postgraduate Student Colloquium, December 2012, Kuala Lumpur, Malaysia.

[WP02] Wafaa Mustafa Abduallah, and Al-Sakib Khan Pathan (2012a), “Defending Against Node Capture Attack in WSN”, POSTER presentation in International Islamic University Malaysia (IIUM) KICT Postgraduate Student Colloquium, February 2012, Kuala Lumpur, Malaysia.

[WP01] Tarem Ahmed and Al-Sakib Khan Pathan (2012a), “Towards Automated Surveillance Systems”, POSTER presentation in International Islamic University Malaysia (IIUM) KICT Postgraduate Student Colloquium, February 2012, Kuala Lumpur, Malaysia.

 

YEAR 2011

 

Papers in Lecture Notes in Computer Science (LNCS) Volumes

 

[LN02] Abdelgadir Tageldin Abdelgadir, Al-Sakib Khan Pathan, Mohiuddin Ahmed, "On the Performance of MPI-OpenMP on a 12 nodes Multi-core Cluster", Proceedings of ICA3PP 2011 Workshops (IDCS Workshop), October 24-26, 2011, Melbourne, Australia, (Y. Xiang et al. (Eds.)): ICA3PP 2011, Part II, Lecture Notes in Computer Science (LNCS), Volume 7017, Springer-Verlag 2011, pp. 225–234, 2011.

 

[LN01] Homero Toral-Cruz, Al-Sakib Khan Pathan, Julio C. Ramírez-Pacheco, "Modeling QoS Parameters of VoIP Traffic with Multifractal and Markov Models", Proceedings of ICA3PP 2011 Workshops (IDCS Workshop), October 24-26, 2011, Melbourne, Australia, (Y. Xiang et al. (Eds.)): ICA3PP 2011, Part II, Lecture Notes in Computer Science (LNCS), Volume 7017, Springer-Verlag 2011, pp. 255–265, 2011.

 

Refereed International Conference Papers

 

[C02] Tarem Ahmed, Xianglin Wei, Supriyo Ahmed, and Al-Sakib Khan Pathan, "Intruder Detection in Camera Networks using the One-Class Neighbor Machine", Networking and Electronic Commerce Research Conference 2011 (NAEC 2011), October 13-16, 2011, Riva del Garda, Italy, pp. 115-118.

[C01] Leopoldo Estrada-Vargas, Homero Toral-Cruz, and Al-Sakib Khan Pathan, "A Generator of Cauchy-distributed Time Series with Specific Hurst Index", Networking and Electronic Commerce Research Conference 2011 (NAEC 2011), October 13-16, 2011, Riva del Garda, Italy, pp. 8-14.