Bilal Khan, PhD

Professor

  • 420 Citations
  • 11 h-Index
19982019
If you made any changes in Pure, your changes will be visible here soon.

Research Output 1998 2019

Filter
Conference contribution
2018

Emergence of pecking order in social Cognitive Radio societies

Wisniewska, A., Shattal, M. A., Khan, B., Al-Fuqaha, A. & Dombrowski, K., Jul 6 2018, INFOCOM 2018 - IEEE Conference on Computer Communications Workshops. Institute of Electrical and Electronics Engineers Inc., p. 305-311 7 p. (INFOCOM 2018 - IEEE Conference on Computer Communications Workshops).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cognitive Radio
Cognitive radio
Social Structure
Likely
Paradigm
2017
2 Citations (Scopus)

Evolution of bio-socially inspired strategies in support of dynamic spectrum access

Shattal, M. A., Al-Fuqaha, A., Khan, B., Dombrowski, K. & Wisniewska, A., Jun 29 2017, 2017 IEEE International Conference on Communications Workshops, ICC Workshops 2017. Papadias, C. B. & Jamalipour, A. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 289-295 7 p. 7962672. (2017 IEEE International Conference on Communications Workshops, ICC Workshops 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Channel capacity
Cognitive radio
Animals
Experiments
2 Citations (Scopus)

When brands fight over bands: Sociality in the cognitive radio ecosystem

Wisniewska, A., Khan, B., Al-Fuqaha, A., Dombrowski, K. & Shattal, M. A., Jul 28 2017, 2017 IEEE International Conference on Communications, ICC 2017. Debbah, M., Gesbert, D. & Mellouk, A. (eds.). Institute of Electrical and Electronics Engineers Inc., 7997383. (IEEE International Conference on Communications).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cognitive radio
Ecosystems
Costs
Trajectories
2016
3 Citations (Scopus)

Social deference and hunger as mechanisms for starvation avoidance in cognitive radio societies

Wisniewska, A., Khan, B., Al-Fuqaha, A., Dombrowski, K. & Shattal, M. A., Sep 26 2016, 2016 International Wireless Communications and Mobile Computing Conference, IWCMC 2016. Institute of Electrical and Electronics Engineers Inc., p. 1063-1068 6 p. 7577206. (2016 International Wireless Communications and Mobile Computing Conference, IWCMC 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cognitive radio
Ecosystems
Resource allocation
Costs
Communication
2015
3 Citations (Scopus)

Malware biodiversity using static analysis

Seideman, J. D., Khan, B. & Vargas, A. C., Jan 1 2015, Future Network Systems and Security - 1st International Conference, FNSS 2015, Proceedings. Piramuthu, S., Zhou, W. & Doss, R. (eds.). Springer Verlag, p. 139-155 17 p. (Communications in Computer and Information Science; vol. 523).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Biodiversity
Static analysis
Malware
Ecosystems
2014
7 Citations (Scopus)

Contention-sensing and dynamic spectrum co-use in secondary user Cognitive Radio societies

Wisniewska, A. & Khan, B., Sep 22 2014, IWCMC 2014 - 10th International Wireless Communications and Mobile Computing Conference. Institute of Electrical and Electronics Engineers Inc., p. 157-162 6 p. 6906349. (IWCMC 2014 - 10th International Wireless Communications and Mobile Computing Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cognitive radio
Scavenging
Experiments
Throughput
5 Citations (Scopus)

Identifying malware genera using the Jensen-Shannon distance between system call traces

Seideman, J. D., Khan, B. & Vargas, A. C., Dec 29 2014, Proceedings of the 9th IEEE International Conference on Malicious and Unwanted Software, MALCON 2014. Institute of Electrical and Electronics Engineers Inc., p. 1-7 7 p. 6999409. (Proceedings of the 9th IEEE International Conference on Malicious and Unwanted Software, MALCON 2014).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Computer systems
Malware
Taxonomies
Grouping
Organism
2013

An evaluation of the risk impact of device heterogeneity on critical care delivery

Saad, M. K., Khan, B. & Ben Brahim, G., Aug 19 2013, 2013 5th International Conference on Modeling, Simulation and Applied Optimization, ICMSAO 2013. 6552648. (2013 5th International Conference on Modeling, Simulation and Applied Optimization, ICMSAO 2013).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Unit
Data integration
Evaluation
Scheduling algorithms
Infrastructure
1 Citation (Scopus)

Determining vulnerability resolution time by examining malware proliferation rates

Seideman, J. D., Khan, B. & Ben Brahim, G., Sep 16 2013, 2013 9th International Wireless Communications and Mobile Computing Conference, IWCMC 2013. p. 1678-1682 5 p. 6583808. (2013 9th International Wireless Communications and Mobile Computing Conference, IWCMC 2013).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Computer operating systems
Dynamic analysis
Repair
Computer systems
Malware
1 Citation (Scopus)

Optimizing agent placement for flow reconstruction of DDoS attacks

Demir, Ö., Khan, B., Ben Brahim, G. & Al-Fuqaha, A., Sep 16 2013, 2013 9th International Wireless Communications and Mobile Computing Conference, IWCMC 2013. p. 83-89 7 p. 6583539. (2013 9th International Wireless Communications and Mobile Computing Conference, IWCMC 2013).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Internet
Denial-of-service attack
Concretes
2011
4 Citations (Scopus)

Finding DDoS attack sources: Searchlight localization algorithm for network tomography

Demir, O. & Khan, B., Sep 12 2011, IWCMC 2011 - 7th International Wireless Communications and Mobile Computing Conference. p. 418-423 6 p. 5982570. (IWCMC 2011 - 7th International Wireless Communications and Mobile Computing Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Searchlights
Tomography
Internet
Internet service providers
life-span
2010
18 Citations (Scopus)

A dynamic route optimization mechanism for AODV in MANETs

Bilgin, Z. & Khan, B., Aug 13 2010, 2010 IEEE International Conference on Communications, ICC 2010. 5502381. (IEEE International Conference on Communications).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Traffic control
Routing protocols
Repair
Experiments

Having one's cake and eating it too: Better routes and lower control traffic for AODV

Bilgin, Z. & Khan, B., Sep 28 2010, 9th IFIP Annual Mediterranean Ad Hoc Networking Workshop, MED-HOC-NET 2010. 5546847. (9th IFIP Annual Mediterranean Ad Hoc Networking Workshop, MED-HOC-NET 2010).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Traffic control
Routing protocols
Network protocols
Experiments
4 Citations (Scopus)

Only the short die old: Route optimization in MANETs by dynamic subconnection shrinking

Bilgin, Z., Khan, B. & Al-Fuqaha, A., Aug 6 2010, IWCMC 2010 - Proceedings of the 6th International Wireless Communications and Mobile Computing Conference. p. 681-685 5 p. (IWCMC 2010 - Proceedings of the 6th International Wireless Communications and Mobile Computing Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Repair
Traffic control
Routing protocols
Energy utilization
3 Citations (Scopus)

Quantifying distributed system stability through simulation: A case study of an agent-based system for flow reconstruction of DDoS attacks

Demir, O. & Khan, B., Apr 21 2010, ISMS 2010 - UKSim/AMSS 1st International Conference on Intelligent Systems, Modelling and Simulation. p. 312-317 6 p. 5416074. (ISMS 2010 - UKSim/AMSS 1st International Conference on Intelligent Systems, Modelling and Simulation).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Agent-based Systems
Denial of Service
System stability
Distributed Systems
Attack
1 Citation (Scopus)

Reconstruction of malicious internet flows

Demir, O., Khan, B. & Al-Fuqaha, A., Aug 6 2010, IWCMC 2010 - Proceedings of the 6th International Wireless Communications and Mobile Computing Conference. p. 1182-1187 6 p. (IWCMC 2010 - Proceedings of the 6th International Wireless Communications and Mobile Computing Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Internet
Intrusion detection
Flow structure
Trajectories
Topology
2 Citations (Scopus)

Using connection expansion to reduce control traffic in MANETs

Bilgin, Z., Khan, B. & Al-Fuqaha, A., Aug 6 2010, IWCMC 2010 - Proceedings of the 6th International Wireless Communications and Mobile Computing Conference. p. 534-538 5 p. (IWCMC 2010 - Proceedings of the 6th International Wireless Communications and Mobile Computing Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Traffic control
Routing protocols
Degradation
2009

Balancing power: Tradeoffs between connection lifetime and control traffic in MANETS

Bilgin, Z. & Khan, B., Nov 30 2009, Proceedings of the 2009 ACM International Wireless Communications and Mobile Computing Conference, IWCMC 2009. p. 883-887 5 p. (Proceedings of the 2009 ACM International Wireless Communications and Mobile Computing Conference, IWCMC 2009).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Traffic control
Wireless ad hoc networks
Experiments
3 Citations (Scopus)

Bayesian-based game theoretic model to guarantee cooperativeness in hybrid RF/FSO mesh networks

Awwad, O., Al-Fuqaha, A., Khan, B., Benhaddou, D., Guizani, M. & Rayes, A., Dec 1 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference. 5426114. (GLOBECOM - IEEE Global Telecommunications Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Space optics
Costs

Scheduling cooperative emergency response (or how the Meek shall overcome the Greedy)

Dottin, C. & Khan, B., Nov 30 2009, Proceedings of the 2009 ACM International Wireless Communications and Mobile Computing Conference, IWCMC 2009. p. 598-602 5 p. (Proceedings of the 2009 ACM International Wireless Communications and Mobile Computing Conference, IWCMC 2009).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Scheduling
Costs
1 Citation (Scopus)

Using a secure permutational covert channel to detect local and wide area interposition attacks

Paduch, J., Levy, J. & Khan, B., Nov 30 2009, Proceedings of the 2009 ACM International Wireless Communications and Mobile Computing Conference, IWCMC 2009. p. 79-83 5 p. (Proceedings of the 2009 ACM International Wireless Communications and Mobile Computing Conference, IWCMC 2009).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Local area networks
Wide area networks
2008
2 Citations (Scopus)

A model for cooperative mobility and budgeted QoS in MANETs with heterogenous autonomy requirements

Brahim, G., Al-Fuqaha, A., Guizani, M. & Khan, B., Dec 1 2008, 2008 IEEE Global Telecommunications Conference, GLOBECOM 2008. p. 399-403 5 p. 4697859. (GLOBECOM - IEEE Global Telecommunications Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Mobile ad hoc networks
Quality of service
Communication
Costs
Experiments

Increasing connection lifetimes through dynamic distribution of budgeted power

Bilgin, Z. & Khan, B., Oct 6 2008, IWCMC 2008 - International Wireless Communications and Mobile Computing Conference. p. 500-504 5 p. 4599986. (IWCMC 2008 - International Wireless Communications and Mobile Computing Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Bit error rate
3 Citations (Scopus)

Superimposing permutational covert channels onto reliable stream protocols

Levy, J., Paduch, J. & Khan, B., Dec 1 2008, 3rd International Conference on Malicious and Unwanted Software, MALWARE 2008. p. 49-56 8 p. 4690857. (3rd International Conference on Malicious and Unwanted Software, MALWARE 2008).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Network layers
Network protocols
2007
1 Citation (Scopus)

A new fuzzy-based cooperative movement model in support of qos in wireless ad-hoc network

Brahim, G. B., Al-Fuqaha, A., Kountanis, D. & Khan, B., Dec 14 2007, IWCMC 2007: Proceedings of the 2007 International Wireless Communications and Mobile Computing Conference. p. 158-163 6 p. (IWCMC 2007: Proceedings of the 2007 International Wireless Communications and Mobile Computing Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Wireless ad hoc networks
Cognitive radio
Communication
Channel estimation
Planning
1 Citation (Scopus)

Hiding your wares: Transparently retrofitting memory confidentiality into legacy applications

Levy, J. & Khan, B., Dec 1 2007, 2007 IEEE International Conference on Communications, ICC'07. p. 1368-1372 5 p. 4288901. (IEEE International Conference on Communications).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Retrofitting
Data storage equipment
Cryptography
Computer hardware
Shims

Multigrid techniques for movement planning in manets with cooperative mobility

Brahim, G. B., Al-Fuqaha, A. & Khan, B., Dec 14 2007, IWCMC 2007: Proceedings of the 2007 International Wireless Communications and Mobile Computing Conference. p. 197-201 5 p. (IWCMC 2007: Proceedings of the 2007 International Wireless Communications and Mobile Computing Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Mobile ad hoc networks
Planning
Communication
Bit error rate
Costs
3 Citations (Scopus)

Petrifying worm cultures: Scalable detection and immunization in untrusted environments

Sandin, J. O. & Khan, B., Dec 1 2007, 2007 IEEE International Conference on Communications, ICC'07. p. 1423-1428 6 p. 4288910. (IEEE International Conference on Communications).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Immunization
Scalability
Peer to peer networks
Maintainability
Fault tolerance

Surrendering autonomy: Can cooperative mobility help?

Brahim, G. B., Khan, B., Al-Fuqaha, A., Guizani, M. & Kountanis, D., Dec 1 2007, Euro-Par 2007 Parallel Processing - 13th International Euro-Par Conference, Proceedings. p. 901-910 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4641 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cost-Benefit Analysis
Mobility Model
Software
Network Modeling
Simulation Experiment

Using MILP for optimal movement planning in MANETs with cooperative mobility

Brahimi, G., Awwad, O., Al-Fuqaha, A., Khan, B., Kountanisi, D. & Guizani, M., Dec 1 2007, IEEE GLOBECOM 2007 - 2007 IEEE Global Telecommunications Conference, Proceedings. p. 1201-1205 5 p. 4411141. (GLOBECOM - IEEE Global Telecommunications Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Mobile ad hoc networks
Linear programming
Planning
Bit error rate
Communication
2006
14 Citations (Scopus)

A non-commutative generalization of ElGamal key exchange using polycyclic groups

Kahrobaei, D. & Khan, B., Dec 1 2006, IEEE GLOBECOM 2006 - 2006 Global Telecommunications Conference. 4150920. (GLOBECOM - IEEE Global Telecommunications Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
5 Citations (Scopus)

Budgeting power: Packet duplication and bit error rate reduction in wireless ad-hoc networks

Brahim, G. B. & Khan, B., Dec 1 2006, IWCMC 2006 - Proceedings of the 2006 International Wireless Communications and Mobile Computing Conference. p. 293-298 6 p. (IWCMC 2006 - Proceedings of the 2006 International Wireless Communications and Mobile Computing Conference; vol. 2006).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Budget control
Wireless ad hoc networks
Bit error rate
Overlay networks
Electric power utilization

Harnessing the parity of multiple errors in end-to-end MAC schemes

Brahim, G. B., Khan, B., Al-Fuqaha, A. & Guizani, M., Dec 1 2006, IEEE GLOBECOM 2006 - 2006 Global Telecommunications Conference. 4151131. (GLOBECOM - IEEE Global Telecommunications Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Experiments
4 Citations (Scopus)

Minimizing wireless connection BER through the dynamic distribution of budgeted power

Khan, B., Brahim, G. B., Al-Fuqaha, A. & Guizani, M., Dec 1 2006, IEEE GLOBECOM 2006 - 2006 Global Telecommunications Conference. 4151605. (GLOBECOM - IEEE Global Telecommunications Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Bit error rate
Experiments
6 Citations (Scopus)

Using energy-efficient overlays to reduce packet error rates in wireless ad-hoc networks

Brahm, G. B., Khan, B., Al-Fuqaha, A., Guizani, M. & Rayes, A., Dec 1 2006, 2006 IEEE International Conference on Communications, ICC 2006. p. 3717-3722 6 p. 4025051. (IEEE International Conference on Communications; vol. 8).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Wireless ad hoc networks
Overlay networks
Electric power utilization
2004

The buck stops here: Trust management in multi-agent systems with accountability

Khan, B., Kleiner, D. D. & Talmage, D., Dec 1 2004, 2004 IEEE 1st Symposium on Multi-Agent Security and Survivability. p. 46-54 9 p. (2004 IEEE 1st Symposium on Multi-Agent Security and Survivability).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Multi agent systems
2002
1 Citation (Scopus)

Minimizing Communication Costs in Hierarchical Multi-Agent Systems

Bhutani, K. R. & Khan, B., Dec 1 2002, Proceedings of the 6th Joint Conference on Information Sciences, JCIS 2002. Caulfield, J. H., Chen, S. H., Cheng, H. D., Duro, R., Caufield, J. H., Chen, S. H., Cheng, H. D., Duro, R. & Honavar, V. (eds.). p. 1435-1442 8 p. (Proceedings of the Joint Conference on Information Sciences; vol. 6).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Intelligent agents
Network management
Multi agent systems
Communication
Costs
2001
4 Citations (Scopus)

Introducing ProuST: The PNNI routing and simulation toolkit

Khan, B., Talmage, D., Mountcastle, S., Battou, A. & Marsh, S., Dec 1 2001, 2001 IEEE Workshop on High Performance Switching and Routing. p. 335-341 7 p. (2001 IEEE Workshop on High Performance Switching and Routing).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Automatic teller machines
Switches
Network performance
Computer hardware
Availability

Towards an agent-based distributed hierarchical network management system for all-optical networks

Khan, B., Kleiner, D. D. & Talmage, D., Jan 1 2001, Mobile Agents for Telecommunication Applications - 3rd International Workshop, MATA 2001, Proceedings. Pierre, S. & Glitho, R. (eds.). Springer Verlag, p. 103-113 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 2164).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

All-optical Networks
Hierarchical Networks
Distributed Networks
Network Management
Network management
1998
14 Citations (Scopus)

Routing through networks with hierarchical topology aggregation

Awerbuch, B., Du, Y., Khan, B. & Shavitt, Y., Jan 1 1998, Proceedings - 3rd IEEE Symposium on Computers and Communications, ISCC 1998. Institute of Electrical and Electronics Engineers Inc., p. 406-412 7 p. 702556. (Proceedings - 3rd IEEE Symposium on Computers and Communications, ISCC 1998).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Agglomeration
Topology
Automatic teller machines
Cost functions
Scalability