Bilal Khan, PhD

Professor

  • 427 Citations
  • 11 h-Index
19982019
If you made any changes in Pure, your changes will be visible here soon.

Research Output 1998 2019

1998
14 Citations (Scopus)

Routing through networks with hierarchical topology aggregation

Awerbuch, B., Du, Y., Khan, B. & Shavitt, Y., Jan 1 1998, Proceedings - 3rd IEEE Symposium on Computers and Communications, ISCC 1998. Institute of Electrical and Electronics Engineers Inc., p. 406-412 7 p. 702556. (Proceedings - 3rd IEEE Symposium on Computers and Communications, ISCC 1998).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Agglomeration
Topology
Automatic teller machines
Cost functions
Scalability
21 Citations (Scopus)

Routing through networks with hierarchical topology aggregation

Awerbuch, B., Du, Y., Khan, B. & Shavitt, Y., Dec 1 1998, In : Journal of High Speed Networks. 7, 1, p. 57-73 17 p.

Research output: Contribution to journalArticle

Agglomeration
Topology
Automatic teller machines
Routing algorithms
Cost functions
1999

PNNI and the optimal design of high-speed ATM networks

Battou, A., Khan, B. & Mountcastle, S., Dec 1 1999, In : Informatica (Ljubljana). 23, 4, p. 565-573 9 p.

Research output: Contribution to journalArticle

ATM Networks
High-speed Networks
Asynchronous transfer mode
Routing protocols
Performance Indicators

PNNI and the optimal design of high-speed ATM networks

Battou, A., Khan, B. & Mountcastle, S., Sep 1 1999, In : Informatica (Ljubljana). 23, 3, p. 359-367 9 p.

Research output: Contribution to journalArticle

ATM Networks
High-speed Networks
Asynchronous transfer mode
Routing protocols
Performance Indicators
2000
3 Citations (Scopus)

Introducing SEAN: Signaling entity for ATM networks

Mountcastle, S., Talmage, D., Khan, B., Marsh, S., Battou, A. & Lee, D. C., Dec 1 2000, p. 532-537. 6 p.

Research output: Contribution to conferencePaper

airborne thematic mapper
Asynchronous transfer mode
Automatic teller machines
Network protocols
Application programming interfaces (API)
6 Citations (Scopus)

Two Approaches for Aggregation of Peer Group Topology in Hierarchical PNNI Networks

Bhutani, K. R., Battou, A. & Khan, B., Jan 1 2000, In : Intelligent Automation and Soft Computing. 6, 2, p. 125-134 10 p.

Research output: Contribution to journalArticle

Hierarchical Networks
Aggregation
Agglomeration
Topology
Vertex of a graph
2001
1 Citation (Scopus)

A control plane for wavelength routing networks

Battou, A., Khan, B., Dardy, H. & Guizani, M., Dec 1 2001, p. 1450-1454. 5 p.

Research output: Contribution to conferencePaper

Network routing
Optical switches
Fiber optic networks
routing
wavelength
4 Citations (Scopus)

Introducing ProuST: The PNNI routing and simulation toolkit

Khan, B., Talmage, D., Mountcastle, S., Battou, A. & Marsh, S., Dec 1 2001, 2001 IEEE Workshop on High Performance Switching and Routing. p. 335-341 7 p. (2001 IEEE Workshop on High Performance Switching and Routing).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Automatic teller machines
Switches
Network performance
Computer hardware
Availability
1 Citation (Scopus)

Optiprism: A distributed hierarchical network management system for all-optical networks

Khan, B., Kleiner, D. D. & Talmage, D., Dec 1 2001, p. 1531-1535. 5 p.

Research output: Contribution to conferencePaper

Network management
Fiber optic networks
Managers
advanced technology
Demonstrations

Towards an agent-based distributed hierarchical network management system for all-optical networks

Khan, B., Kleiner, D. D. & Talmage, D., Jan 1 2001, Mobile Agents for Telecommunication Applications - 3rd International Workshop, MATA 2001, Proceedings. Pierre, S. & Glitho, R. (eds.). Springer Verlag, p. 103-113 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2164).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

All-optical Networks
Hierarchical Networks
Distributed Networks
Network Management
Network management
5 Citations (Scopus)

TRON: The Toolkit for Routing in Optical Networks

Brahim, G. B., Khan, B., Battou, A., Guizani, M. & Chaudhry, G., Dec 1 2001, p. 1445-1449. 5 p.

Research output: Contribution to conferencePaper

Fiber optic networks
routing
Routing protocols
software
Internet
2002
3 Citations (Scopus)

CASiNO: Component Architecture for simulating network objects

Battou, A., Khan, B., Lee, D. C., Marsh, S., Mountcastle, S. & Talmage, D., Sep 1 2002, In : Software - Practice and Experience. 32, 11, p. 1099-1128 30 p.

Research output: Contribution to journalArticle

Simulators
Network protocols
1 Citation (Scopus)

Minimizing Communication Costs in Hierarchical Multi-Agent Systems

Bhutani, K. R. & Khan, B., Dec 1 2002, Proceedings of the 6th Joint Conference on Information Sciences, JCIS 2002. Caulfield, J. H., Chen, S. H., Cheng, H. D., Duro, R., Caufield, J. H., Chen, S. H., Cheng, H. D., Duro, R. & Honavar, V. (eds.). p. 1435-1442 8 p. (Proceedings of the Joint Conference on Information Sciences; vol. 6).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Intelligent agents
Network management
Multi agent systems
Communication
Costs

SEAN for modeling and simulating ATM signaling

Battou, A., Marsh, S., Khan, B., Mountcastle, S., Talmadge, D. & Lee, D. C., Apr 2002, In : SIMULATION. 78, 4, p. 231-238 8 p.

Research output: Contribution to journalArticle

ATM Networks
Asynchronous transfer mode
Automatic teller machines
Modeling
Object-oriented
2003
2 Citations (Scopus)

A metric on the set of connected simple graphs of given order

Bhutani, K. R. & Khan, B., Dec 1 2003, In : Aequationes Mathematicae. 66, 3, p. 232-240 9 p.

Research output: Contribution to journalArticle

Computer networks
Simple Graph
Connected graph
Metric
Metric space
1 Citation (Scopus)

Optimal distribution of a hierarchy of network management agents

Bhutani, K. R. & Khan, B., Feb 1 2003, In : Information Sciences. 149, 4, p. 235-248 14 p.

Research output: Contribution to journalArticle

Network Management
Communication Cost
Network management
Intelligent agents
Cost Model
2004

The buck stops here: Trust management in multi-agent systems with accountability

Khan, B., Kleiner, D. D. & Talmage, D., Dec 1 2004, 2004 IEEE 1st Symposium on Multi-Agent Security and Survivability. p. 46-54 9 p. (2004 IEEE 1st Symposium on Multi-Agent Security and Survivability).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Multi agent systems
3 Citations (Scopus)

The effect of wavelength advertisement on the performance of an optical routing protocol

Khan, B., Kleiner, D. D., Talmage, D. & Battou, A., Dec 1 2004, p. 1985-1988. 4 p.

Research output: Contribution to conferencePaper

Routing protocols
Wavelength
Availability
Switches
Blocking probability
2005

Distance between graphs using graph labelings

Bhutani, K. R. & Khan, B., Oct 1 2005, In : Ars Combinatoria. 77, p. 45-52 8 p.

Research output: Contribution to journalArticle

Graph Labeling
Graph in graph theory
Labeling
Communication Networks
Bandwidth
2006
14 Citations (Scopus)

A non-commutative generalization of ElGamal key exchange using polycyclic groups

Kahrobaei, D. & Khan, B., Dec 1 2006, IEEE GLOBECOM 2006 - 2006 Global Telecommunications Conference. 4150920. (GLOBECOM - IEEE Global Telecommunications Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
5 Citations (Scopus)

Budgeting power: Packet duplication and bit error rate reduction in wireless ad-hoc networks

Brahim, G. B. & Khan, B., Dec 1 2006, IWCMC 2006 - Proceedings of the 2006 International Wireless Communications and Mobile Computing Conference. p. 293-298 6 p. (IWCMC 2006 - Proceedings of the 2006 International Wireless Communications and Mobile Computing Conference; vol. 2006).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Budget control
Wireless ad hoc networks
Bit error rate
Overlay networks
Electric power utilization

Harnessing the parity of multiple errors in end-to-end MAC schemes

Brahim, G. B., Khan, B., Al-Fuqaha, A. & Guizani, M., Dec 1 2006, IEEE GLOBECOM 2006 - 2006 Global Telecommunications Conference. 4151131. (GLOBECOM - IEEE Global Telecommunications Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Experiments
4 Citations (Scopus)

Minimizing wireless connection BER through the dynamic distribution of budgeted power

Khan, B., Brahim, G. B., Al-Fuqaha, A. & Guizani, M., Dec 1 2006, IEEE GLOBECOM 2006 - 2006 Global Telecommunications Conference. 4151605. (GLOBECOM - IEEE Global Telecommunications Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Bit error rate
Experiments
6 Citations (Scopus)

Using energy-efficient overlays to reduce packet error rates in wireless ad-hoc networks

Brahm, G. B., Khan, B., Al-Fuqaha, A., Guizani, M. & Rayes, A., Dec 1 2006, 2006 IEEE International Conference on Communications, ICC 2006. p. 3717-3722 6 p. 4025051. (IEEE International Conference on Communications; vol. 8).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Wireless ad hoc networks
Overlay networks
Electric power utilization
2007
1 Citation (Scopus)

A new fuzzy-based cooperative movement model in support of qos in wireless ad-hoc network

Brahim, G. B., Al-Fuqaha, A., Kountanis, D. & Khan, B., Dec 14 2007, IWCMC 2007: Proceedings of the 2007 International Wireless Communications and Mobile Computing Conference. p. 158-163 6 p. (IWCMC 2007: Proceedings of the 2007 International Wireless Communications and Mobile Computing Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Wireless ad hoc networks
Cognitive radio
Communication
Channel estimation
Planning
1 Citation (Scopus)

Hiding your wares: Transparently retrofitting memory confidentiality into legacy applications

Levy, J. & Khan, B., Dec 1 2007, 2007 IEEE International Conference on Communications, ICC'07. p. 1368-1372 5 p. 4288901. (IEEE International Conference on Communications).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Retrofitting
Data storage equipment
Cryptography
Computer hardware
Shims

Multigrid techniques for movement planning in manets with cooperative mobility

Brahim, G. B., Al-Fuqaha, A. & Khan, B., Dec 14 2007, IWCMC 2007: Proceedings of the 2007 International Wireless Communications and Mobile Computing Conference. p. 197-201 5 p. (IWCMC 2007: Proceedings of the 2007 International Wireless Communications and Mobile Computing Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Mobile ad hoc networks
Planning
Communication
Bit error rate
Costs
5 Citations (Scopus)

On positive theories of groups with regular free length functions

Khan, B., Myasnikov, A. G. & Serbin, D. E., Feb 1 2007, In : International Journal of Algebra and Computation. 17, 1, p. 1-26 26 p.

Research output: Contribution to journalArticle

Infinite Words
Cancellation
Diagram
3 Citations (Scopus)

Petrifying worm cultures: Scalable detection and immunization in untrusted environments

Sandin, J. O. & Khan, B., Dec 1 2007, 2007 IEEE International Conference on Communications, ICC'07. p. 1423-1428 6 p. 4288910. (IEEE International Conference on Communications).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Immunization
Scalability
Peer to peer networks
Maintainability
Fault tolerance

Surrendering autonomy: Can cooperative mobility help?

Brahim, G. B., Khan, B., Al-Fuqaha, A., Guizani, M. & Kountanis, D., Dec 1 2007, Euro-Par 2007 Parallel Processing - 13th International Euro-Par Conference, Proceedings. p. 901-910 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4641 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cost-Benefit Analysis
Mobility Model
Software
Network Modeling
Simulation Experiment

Using MILP for optimal movement planning in MANETs with cooperative mobility

Brahimi, G., Awwad, O., Al-Fuqaha, A., Khan, B., Kountanisi, D. & Guizani, M., Dec 1 2007, IEEE GLOBECOM 2007 - 2007 IEEE Global Telecommunications Conference, Proceedings. p. 1201-1205 5 p. 4411141. (GLOBECOM - IEEE Global Telecommunications Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Mobile ad hoc networks
Linear programming
Planning
Bit error rate
Communication
2008
2 Citations (Scopus)

A model for cooperative mobility and budgeted QoS in MANETs with heterogenous autonomy requirements

Brahim, G., Al-Fuqaha, A., Guizani, M. & Khan, B., Dec 1 2008, 2008 IEEE Global Telecommunications Conference, GLOBECOM 2008. p. 399-403 5 p. 4697859. (GLOBECOM - IEEE Global Telecommunications Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Mobile ad hoc networks
Quality of service
Communication
Costs
Experiments

Increasing connection lifetimes through dynamic distribution of budgeted power

Bilgin, Z. & Khan, B., Oct 6 2008, IWCMC 2008 - International Wireless Communications and Mobile Computing Conference. p. 500-504 5 p. 4599986. (IWCMC 2008 - International Wireless Communications and Mobile Computing Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Bit error rate
46 Citations (Scopus)

Opportunistic channel selection strategy for better QoS in cooperative networks with cognitive radio capabilities

Al-Fuqaha, A., Khan, B., Rayes, A., Guizani, M., Awwad, O. & Ben Brahim, G., Jan 1 2008, In : IEEE Journal on Selected Areas in Communications. 26, 1, p. 156-167 12 p.

Research output: Contribution to journalArticle

Cognitive radio
Quality of service
Communication
Channel estimation
Bit error rate
3 Citations (Scopus)

Superimposing permutational covert channels onto reliable stream protocols

Levy, J., Paduch, J. & Khan, B., Dec 1 2008, 3rd International Conference on Malicious and Unwanted Software, MALWARE 2008. p. 49-56 8 p. 4690857. (3rd International Conference on Malicious and Unwanted Software, MALWARE 2008).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Network layers
Network protocols
7 Citations (Scopus)

Weak many vs. strong few: Reducing BER through packet duplication in power-budgeted wireless connections

Brahim, G. B., Khan, B., Al-Fuqaha, A. & Guizani, M., Dec 1 2008, In : International Journal of Sensor Networks. 4, 3, p. 145-154 10 p.

Research output: Contribution to journalArticle

Overlay networks
Wireless ad hoc networks
Electric power utilization
2009

Balancing power: Tradeoffs between connection lifetime and control traffic in MANETS

Bilgin, Z. & Khan, B., Nov 30 2009, Proceedings of the 2009 ACM International Wireless Communications and Mobile Computing Conference, IWCMC 2009. p. 883-887 5 p. (Proceedings of the 2009 ACM International Wireless Communications and Mobile Computing Conference, IWCMC 2009).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Traffic control
Wireless ad hoc networks
Experiments
3 Citations (Scopus)

Bayesian-based game theoretic model to guarantee cooperativeness in hybrid RF/FSO mesh networks

Awwad, O., Al-Fuqaha, A., Khan, B., Benhaddou, D., Guizani, M. & Rayes, A., Dec 1 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference. 5426114. (GLOBECOM - IEEE Global Telecommunications Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Space optics
Costs

Scheduling cooperative emergency response (or how the Meek shall overcome the Greedy)

Dottin, C. & Khan, B., Nov 30 2009, Proceedings of the 2009 ACM International Wireless Communications and Mobile Computing Conference, IWCMC 2009. p. 598-602 5 p. (Proceedings of the 2009 ACM International Wireless Communications and Mobile Computing Conference, IWCMC 2009).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Scheduling
Costs
1 Citation (Scopus)

Using a secure permutational covert channel to detect local and wide area interposition attacks

Paduch, J., Levy, J. & Khan, B., Nov 30 2009, Proceedings of the 2009 ACM International Wireless Communications and Mobile Computing Conference, IWCMC 2009. p. 79-83 5 p. (Proceedings of the 2009 ACM International Wireless Communications and Mobile Computing Conference, IWCMC 2009).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Local area networks
Wide area networks
2010
18 Citations (Scopus)

A dynamic route optimization mechanism for AODV in MANETs

Bilgin, Z. & Khan, B., Aug 13 2010, 2010 IEEE International Conference on Communications, ICC 2010. 5502381. (IEEE International Conference on Communications).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Traffic control
Routing protocols
Repair
Experiments

Having one's cake and eating it too: Better routes and lower control traffic for AODV

Bilgin, Z. & Khan, B., Sep 28 2010, 9th IFIP Annual Mediterranean Ad Hoc Networking Workshop, MED-HOC-NET 2010. 5546847. (9th IFIP Annual Mediterranean Ad Hoc Networking Workshop, MED-HOC-NET 2010).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Traffic control
Routing protocols
Network protocols
Experiments
1 Citation (Scopus)

Lerdahl's tonal pitch space model and associated metric spaces

Randall, R. R. & Khan, B., Nov 1 2010, In : Journal of Mathematics and Music. 4, 3, p. 121-131 11 p.

Research output: Contribution to journalArticle

Metric space
Distance Measure
Chord or secant line
Model
Tonal
26 Citations (Scopus)

Network Modeling and Simulation: A Practical Perspective

Guizani, M., Rayes, A., Khan, B. & Al-Fuqaha, A., Feb 17 2010, John Wiley and Sons.

Research output: Book/ReportBook

Computer networks
Telecommunication networks
Large scale systems
Industry
4 Citations (Scopus)

Only the short die old: Route optimization in MANETs by dynamic subconnection shrinking

Bilgin, Z., Khan, B. & Al-Fuqaha, A., Aug 6 2010, IWCMC 2010 - Proceedings of the 6th International Wireless Communications and Mobile Computing Conference. p. 681-685 5 p. (IWCMC 2010 - Proceedings of the 6th International Wireless Communications and Mobile Computing Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Repair
Traffic control
Routing protocols
Energy utilization
3 Citations (Scopus)

Quantifying distributed system stability through simulation: A case study of an agent-based system for flow reconstruction of DDoS attacks

Demir, O. & Khan, B., Apr 21 2010, ISMS 2010 - UKSim/AMSS 1st International Conference on Intelligent Systems, Modelling and Simulation. p. 312-317 6 p. 5416074. (ISMS 2010 - UKSim/AMSS 1st International Conference on Intelligent Systems, Modelling and Simulation).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Agent-based Systems
Denial of Service
System stability
Distributed Systems
Attack
1 Citation (Scopus)

Reconstruction of malicious internet flows

Demir, O., Khan, B. & Al-Fuqaha, A., Aug 6 2010, IWCMC 2010 - Proceedings of the 6th International Wireless Communications and Mobile Computing Conference. p. 1182-1187 6 p. (IWCMC 2010 - Proceedings of the 6th International Wireless Communications and Mobile Computing Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Internet
Intrusion detection
Flow structure
Trajectories
Topology
2 Citations (Scopus)

Using connection expansion to reduce control traffic in MANETs

Bilgin, Z., Khan, B. & Al-Fuqaha, A., Aug 6 2010, IWCMC 2010 - Proceedings of the 6th International Wireless Communications and Mobile Computing Conference. p. 534-538 5 p. (IWCMC 2010 - Proceedings of the 6th International Wireless Communications and Mobile Computing Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Traffic control
Routing protocols
Degradation
2011

Compression and expansion in graphs using overlays

Khan, B. & Bhutani, K. R., Aug 1 2011, In : Networks. 58, 1, p. 36-42 7 p.

Research output: Contribution to journalArticle

Telecommunication links
Bandwidth
Overlay networks
Computer networks
Disasters
4 Citations (Scopus)

Finding DDoS attack sources: Searchlight localization algorithm for network tomography

Demir, O. & Khan, B., Sep 12 2011, IWCMC 2011 - 7th International Wireless Communications and Mobile Computing Conference. p. 418-423 6 p. 5982570. (IWCMC 2011 - 7th International Wireless Communications and Mobile Computing Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Searchlights
Tomography
Internet
Internet service providers
life-span