default search action
Zeeshan Shafi Khan
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j10]El-Sayed M. El-Kenawy, Seyedali Mirjalili, Sherif S. M. Ghoneim, Marwa Metwally Eid, Mohammed El-Said, Zeeshan Shafi Khan, Abdelhameed Ibrahim:
Advanced Ensemble Model for Solar Radiation Forecasting Using Sine Cosine Algorithm and Newton's Laws. IEEE Access 9: 115750-115765 (2021)
2010 – 2019
- 2019
- [c8]Ibrahim Ahmed I. AlMallohi, Ahmed Saad M. Alotaibi, Rahaf Alghafees, Farzana Azam, Zeeshan Shafi Khan:
Multivariable based checkpoints to mitigate the long range attack in proof-of-stake based blockchains. HP3C 2019: 118-122 - 2016
- [j9]Anwar Ghani, Syed Husnain Abbas Naqvi, Muhammad Sher, Zeeshan Shafi Khan, Imran Khan, Muhammad Saqlain:
Energy efficient communication in body area networks using collaborative communication in Rayleigh fading channel. Telecommun. Syst. 63(3): 357-370 (2016) - 2014
- [j8]Farzana Azam, Zeeshan Shafi Khan, Muhammad Sher, Khaled Alghathbar, Muhammad Khurram Khan:
Attack containment in mobile ad-hoc networks through fair distribution of processing resources. Telecommun. Syst. 55(1): 93-103 (2014) - 2013
- [j7]Aneel Rahim, Muhammad Sher, Zeeshan Shafi Khan, Fahad Bin Muhaya:
Editorial "Secure Multimedia Communication in Vehicular Adhoc Network". Multim. Tools Appl. 66(2): 161-164 (2013) - [j6]Aneel Rahim, Zeeshan Shafi Khan:
Editorial. Telecommun. Syst. 52(4): 2147-2148 (2013) - 2011
- [c7]Zeeshan Shafi Khan, Muhammad Sher, Khalid Rashid:
Presence Based Secure Instant Messaging Mechanism for IP Multimedia Subsystem. ICCSA (5) 2011: 447-457 - [c6]M. Zubair Rafique, Zeeshan Shafi Khan, Muhammad Khurram Khan, Khaled Alghathbar:
Securing IP-Multimedia Subsystem (IMS) against Anomalous Message Exploits by Using Machine Learning Algorithms. ITNG 2011: 559-563 - 2010
- [j5]Zeeshan Shafi Khan, Khalid Rashid, Fahad Bin Muhaya, Qutbuddin, Aneel Rahim:
Realization of Call-Back Authentication (CBA) for secure web to cellular phone SMS communication. Comput. Math. Appl. 60(2): 198-208 (2010) - [j4]Aneel Rahim, Zeeshan Shafi Khan, Fahad Bin Muhaya, Muhammad Sher, Muhammad Khurram Khan:
Information Sharing in Vehicular AdHoc Network. Int. J. Comput. Commun. Control 5(5): 892-899 (2010) - [j3]Aneel Rahim, Fahad Bin Muhaya, Zeeshan Shafi Khan, M. A. Ansari, Muhammad Sher:
Enhanced Relevance-Based Approach for Network Controls. Informatica (Slovenia) 34(2): 223-226 (2010) - [j2]Aneel Rahim, Zeeshan Shafi Khan, Fahad T. Bin Muhaya, Muhammad Sher, Tai-Hoon Kim:
Sensor Based Framework for Secure Multimedia Communication in VANET. Sensors 10(11): 10146-10154 (2010) - [c5]Zeeshan Shafi Khan, Khaled Alghathbar, Muhammad Sher, Khalid Rashid:
Issues of Security and Network Load in Presence - A Survey. FGIT-SecTech/DRBC 2010: 224-230 - [c4]Zeeshan Shafi Khan, Nabila Akram, Khaled Alghathbar, Muhammad Sher, Rashid Mehmood:
Secure single packet IP Traceback mechanism to identify the source. ICITST 2010: 1-5 - [c3]Mohannmad Waqar, Zeeshan Shafi Khan:
Web 2.0 content extraction. ICITST 2010: 1-3 - [c2]Aneel Rahim, Zeeshan Shafi Khan, Fahad Bin Muhaya:
Performance Evaluation of Video Streaming in Vehicular Adhoc Network. ISA 2010: 220-224 - [c1]Syed Sherjeel Ahmad Gilani, Muhammad Zubair, Zeeshan Shafi Khan:
Receiver Based Traffic Control Mechanism to Protect Low Capacity Network in Infrastructure Based Wireless Mesh Network. ISA 2010: 225-232
2000 – 2009
- 2009
- [j1]Zeeshan Shafi Khan, Muhammad Sher, Khalid Rashid, Aneel Rahim:
A Three-Layer Secure Architecture for IP Multimedia Subsystem-Based Instant Messaging. Inf. Secur. J. A Glob. Perspect. 18(3): 139-148 (2009)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:09 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint