Follow
Navid Ali Khan
Navid Ali Khan
Senior Lecturer, Taylor's University
Verified email at taylors.edu.my
Title
Cited by
Cited by
Year
Ten deadly cyber security threats amid COVID-19 pandemic
NA Khan, SN Brohi, N Zaman
Authorea Preprints, 2023
1902023
Smart traffic monitoring system using unmanned aerial vehicles (UAVs)
NA Khan, NZ Jhanjhi, SN Brohi, RSA Usmani, A Nayyar
Computer Communications 157, 434-443, 2020
1642020
Emerging use of UAV’s: secure communication protocol issues and challenges
NA Khan, NZ Jhanjhi, SN Brohi, A Nayyar
Drones in smart-cities, 37-55, 2020
952020
UAV’s applications, architecture, security issues and attack scenarios: A survey
NA Khan, SN Brohi, NZ Jhanjhi
Intelligent Computing and Innovation on Data Science: Proceedings of ICTIDS …, 2020
822020
5G and IoT based reporting and accident detection (RAD) system to deliver first aid box using unmanned aerial vehicle
MH Alkinani, AA Almazroi, NZ Jhanjhi, NA Khan
Sensors 21 (20), 6905, 2021
432021
A secure communication protocol for unmanned aerial vehicles
NA Khan, NZ Jhanjhi, SN Brohi, AA Almazroi, AA Almazroi
CMC-COMPUTERS MATERIALS & CONTINUA 70 (1), 601-618, 2022
352022
Rank and wormhole attack detection model for RPL-based internet of things using machine learning
F Zahra, NZ Jhanjhi, SN Brohi, NA Khan, M Masud, MA AlZain
Sensors 22 (18), 6765, 2022
212022
Metaverse: Virtual Meditation
SR Sindiramutty, NZ Jhanjhi, SK Ray, H Jazri, NA Khan, L Gaur
Metaverse Applications for Intelligent Healthcare, 93-158, 2024
132024
Ddos attack detection approaches in on software defined network
S Muzafar, NZ Jhanjhi, NA Khan, F Ashfaq
2022 14th International conference on mathematics, actuarial science …, 2022
132022
Metaverse: Virtual Gyms and Sports
SR Sindiramutty, NZ Jhanjhi, SK Ray, H Jazri, NA Khan, L Gaur, A Gharib, ...
Metaverse Applications for Intelligent Healthcare, 24-92, 2024
122024
Enhancing sentiment analysis via random majority under-sampling with reduced time complexity for classifying tweet reviews
SN Almuayqil, M Humayun, NZ Jhanjhi, MF Almufareh, NA Khan
Electronics 11 (21), 3624, 2022
102022
E-Government Privacy and Security Challenges in the Context of Internet of Things
RMA Ujjan, NA Khan, L Gaur
Cybersecurity Measures for E-Government Frameworks, 22-42, 2022
92022
Proposing an algorithm for UAVs interoperability: MAVLink to STANAG 4586 for securing communication
NA Khan, NZ Jhanjhi, SN Brohi, ZA Almusaylim
Intelligent Computing and Innovation on Data Science: Proceedings of ICTIDS …, 2021
92021
Protocol-specific and sensor network-inherited attack detection in IoT using machine learning
F Zahra, NZ Jhanjhi, NA Khan, SN Brohi, M Masud, S Aljahdali
Applied Sciences 12 (22), 11598, 2022
82022
Using Dual Attention BiLSTM to Predict Vehicle Lane Changing Maneuvers on Highway Dataset
F Ashfaq, RM Ghoniem, NZ Jhanjhi, NA Khan, AD Algarni
Systems 11 (4), 196, 2023
72023
Explainable AI in Healthcare Application
SR Sindiramutty, WJ Tee, S Balakrishnan, S Kaur, R Thangaveloo, ...
Advances in Explainable AI Applications for Smart Cities, 123-176, 2024
62024
Explainable AI for Cybersecurity
SR Sindiramutty, CE Tan, SP Lau, R Thangaveloo, AH Gharib, ...
Advances in Explainable AI Applications for Smart Cities, 31-97, 2024
62024
Chapter Three-Emerging use of UAV’s: secure communication protocol issues and challenges, Editor (s): Fadi Al-Turjman, Drones in Smart-Cities
NA Khan, NZ Jhanjhi, SN Brohi, A Nayyar
Elsevier, 2020
52020
Applications of Blockchain Technology in Supply Chain Management
SR Sindiramutty, NZ Jhanjhi, CE Tan, NA Khan, AH Gharib, KJ Yun
Cybersecurity Measures for Logistics Industry Framework, 248-304, 2024
32024
Securing the Digital Supply Chain Cyber Threats and Vulnerabilities
SR Sindiramutty, NZ Jhanjhi, CE Tan, NA Khan, B Shah, L Gaur
Cybersecurity Measures for Logistics Industry Framework, 156-223, 2024
32024
The system can't perform the operation now. Try again later.
Articles 1–20