fbpx
Top

Faculty Profile

  /  Faculty Profile

Dr Abdul Nasir Khan

Tenured Associate Professor
Area of Interest: Network Security
Email: [email protected]
Phone: (92)992-383591-5
 
Academics/ Degrees
  • Doctor of Philosophy University of Malaya, Kuala Lumpur, Malaysia Major: Network Security 2014
  • Master of Sciences (CGPA 3.8/4.0) COMSATS Institute of Information Technology, Abbottabad  Major: Computer Science  2008.
  • Master of Computer Science (CGPA 3.1/4.0COMSATS Institute of Information Technology, Abbottabad Major:Computer Science 2005.
  • Master of Sciences (1st Division) University of Peshawar Major: Computer Science 2003.
 
Journal Publications
1. AN Khan,F.G Khan A lightweight and compromise‐resilient authentication scheme for IoTs, Transactions on Emerging Telecommunications Technologies, 2022
2. E. Mustafa,J.Shujah,T. Maqsood,S. Mustafa,F. Rehman,AN Khan,S.K.Zaman,Ali Imran Jehangiri,Sadia Din Joint wireless power transfer and task offloading in mobile edge computing: a survey, Cluster Computing, 2021
3. Muhammad Amir Khan,I.A.Khan,Ahmad Din,W.Jadoon,R.Jadoon,F.G Khan,AN Khan,Usman Ali Khan Towards a Complete Set of Gym Exercises Detection Using Smartphone Sensors, Scientific Programming, 2020
4. I.A.Khan,Ahmad Din,W.Jadoon,F.G Khan,AN Khan,R.Jadoon Towards a Complete Set of Gym Exercises Detection Using Smartphone Sensors, Scientific Programming, 2020
5. I.A.Khan,J.Shujah,AN Khan Resource-based direct manipulation: a user-centric visual interface for operational customization of future smart appliances, Telecommunication Systems, 2020
6. AN Khan,I.A.Khan A lightweight and compromise‐resilient authentication scheme for IoTs, Transactions on Emerging Telecommunication Technologies, 2019
7. T. Khalid,MAK Abbassi,M Zuraiz,AN Khan,Dr. Mazhar Ali,R.Wasim,JJPC Rodrigues,Mudassar Aslam A survey on privacy and access control schemes in fog computing, International Journal of Communication Systems, 2019
8. T. Khalid,AN Khan,Dr. Mazhar Ali,A. Adeel,A. R. Khan,J.Shujah A fog-based security framework for intelligent traffic light control system, Multimedia Tools and Applications, 2019
9. Adil Adeel,Dr. Mazhar Ali,AN Khan,Tauqeer Khalid,F. Rehman,Yaser Jararweh,J.Shujah A multi-attack resilient lightweight IoT authenticationscheme, Transactions on Emerging Telecommunications Technologies, 2019
10. Anum Khurshid,AN Khan,F.G Khan,Dr. Mazhar Ali,J.Shujah,Atta Ur Rehman Khan Secure‐CamFlow: A device‐oriented security model to assist information flow control systems in cloud environments for IoTs, Concurrency and Computation Practice and Experience, 2019
11. Daniyal Sakhawat,AN Khan,Mudassar Aslam,Anthony T Chronopoulos Agent-based ARP Cache Poisoning Detection (AACPD) in Switched LAN Environments, IET Networks Journal, 2018
12. AN Khan,Dr. Mazhar Ali,F.G Khan,I.A.Khan,W.Jadoon A comparative study and workload distribution model for re‐encryption schemes in a mobile cloud computing environment , Journal of Communication Systems, Wiley, 2017, 2017
13. AN Khan,J.Shujah,S. Mustafa Computation offloading Cost Estimation in Mobile Cloud Application Models, Wireless Personal Communication, Springer, 2017, 2017
14. F.G Khan,AN Khan Introducing ToPe-FFT; an OpenCL based FFT Library targeting GPUs, Concurrency and Computation: Practice and Experience by wiley, 2017
15. S.K.Zaman,A. R. Khan,S. R. Malik,AN Khan,T. Maqsood,S. A. Madani Performance analysis and formal verification of task scheduling heuristics for makespan optimization and workflow distribution in Large-scale Computing Systems, Computer Systems Science & Engineering, 2017
16. F.G Khan,AN Khan,W.Jadoon,I.A.Khan An optimized magnetostatic field solver on GPU using open computing language, Concurrency and Computation practice and experience, 2017
17. F.G Khan,AN Khan A Comparison of Proxy Re-Encryption Schemes – A Survey, International Journal of Computer Science and Information Security (IJCSIS), 2016
18. AN Khan,MLM Kiah,Dr. Mazhar Ali,S. Shamshir,A. R. Khan A Cloud-Manager-Based Re-Encryption Scheme for Mobile Users in Cloud Environment: a Hybrid Approach, Journal of Grid Computing, 2015
19. A. R. Khan,Mazliza Othman,AN Khan,S. A. Abid,S.Madani MobiByte: An Application Development Model for Mobile Cloud Computing, Journal of Grid Computing , 2015
20. Shahaboddin Shamshirband,Mazhar Ali,AN Khan,A. R. Khan,M. L. Mat Kiah A Cloud-Manager-Based Re-Encryption Scheme for Mobile Users in Cloud Environment: a Hybrid Approach, December 2015, 2015
21. Feng Xia,AN Khan,Mazliza Othman Context-Aware Mobile Cloud Computing & Its Challenges, IEEE Cloud Computing, 2015
22. AN Khan, M. L. Mat Kiah,Mazhar Ali,S.Madani,A. R. Khan,Shahaboddin Shamshirband BSS: block-based sharing scheme for secure data storage services in mobile cloud environment, Journal of Supercomputing (Tier 2), 2014
23. Nor Badrul Anuar,M. L. Mat Kiah, Vala Ali Rohania,Dalibor Petkovicb,Sanjay Misrac,AN Khan,Shahaboddin Shamshirband Co-FAIS: Cooperative fuzzy artificial immune system for detecting intrusion in wireless sensor networks, Journal of Network and Computer Applications (Tier 1), 2014
24. AN Khan,Dr. Mazhar Ali Incremental proxy re-encryption scheme for mobile cloud computing environment, Journal of Super Computing, 2014
25. AN Khan,M. L. Mat Kiah,Mazhar Ali,S.Madani,Atta ur Rehman Khan,Shahaboddin Shamshirband Incremental Proxy Re-encryption Scheme for Mobile Cloud Computing Environment, Journal of Supercomputing (Tier 2), 2014
26. Dr. Atta UR Rehman,Dr. Mazhar Ali,AN Khan Pirax: framework for application piracy control in mobile cloud environment, Journal of Super Computing, 2014
27. AN Khan,Samee U. Khan, M.L. Mat Kiah,S.Madani Towards secure mobile cloud computing: A survey, Future Generation Computer Systems (Tier 1), 2013
28. AN Khan,M. L. Mat Kiah,S.Madani,Atta ur Rehman Khan,Mazhar Ali Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing, Journal of Supercomputing (Tier 2), 2013
29. AN Khan,Dr. Mazhar Ali Enhanced dynamic credential generation scheme for protection of user identity in mobile-cloud computing, Journal of Super Computing, 2013
30. AN Khan,S.Khan,Kalim Qureshi An Intelligent Approach of Sniffer Detection, The International Arab Journal of Information Technology (Tier 4), 2012
31. AN Khan,S.Khan,Kalim Qureshi Enhanced Switched Network Sniffer Detection Technique Based on IP Packet Routing, Information Security Journal: A Global Perspective, 2009
 
 
BOOKS AND BOOK CHAPTERS
1. AN Khan,Atta ur Rehman Khan High Performance Computing on Mobile Devices, , 2016
 
Profile/Bio

 

S#

Post

Start Date

End Date

Organization

1

Programmer (Internship)

18 September, 2005

18 December, 2005

Eycon Solution (Software House)

2

Programmer (Internship)

10 May, 2006

31 August, 2006

COMSATS IT Center (Software House)

3

Lecturer (Visiting)

1st Jan, 2007

29 Feb, 2008

Government Post Graduate Collage Mandian, Abbottabad

4

Lecturer (Visiting)

Feb. 2008

Sept. 2008

COMSATS University Islamabad, Abbottabad Campus

5

Lecturer (Permanent)

Oct. 2008

Jun. 2014

COMSATS University Islamabad, Abbottabad Campus

6

Assistant Professor (TTS)

Jul. 2014

April 2022

COMSATS University Islamabad, Abbottabad Campus

7

Tenured Associate Professor

Aril 2022

Till Date

COMSATS University Islamabad, Abbottabad Campus

 
Associations

 
Research Interests
  • Cloud Computing
  • Fog Computing
  • Mobile Cloud Computing
  • IoTs
  • Network Security
 
Awards

Ø  Won the scholarship for MS(CS) from COMSATS, Abbottabad.

Ø  Won the scholarship for Phd from Bright Spark Unit of University of Malaya, Kuala Lumpur, Malaysia.

Ø  Won the Best Paper Award in PGReS, University of Malaya, Kuala Lumpur, Malaysia

 
Students Supervised

#

 Student Name

   Thesis Title

MS/PhD

Supervisor / Co-Supervisor

Status with date:

Registered/Completed

1

Faiza Aurang Zeb

Privacy Aware and Interoperable Patient Data Storage and Searching using Blockchain

MS

Supervisor

Completed

2

Imtiaz Ali Shah

Machine Learning Based Malware Detection in Internet of Battlefield Thing (IoBT)

MS

Supervisor

Completed

3

 

Maham Nasir

Reversible Date Hiding Based on Linear Prediction and Bit-Plane Slicing

MS

Co-Supervisor

Completed

4

Bushra Mohsin

Automated security audit and assessment of fog network

MS

Co-Supervisor

Completed

5

Muhammad Faisal Aziz

Lightweight and Compromise-Resilient Authentication Protocol for IoT

MS

Supervisor

Completed

6

Adil Adeel

Lightweight Authentication Schemes for IoTs

MS

Co-Supervisor

Completed

7

Shad Mohammad

Bots Detection in Social Media

MS

Co-Supervisor

Completed

8

Tauqeer Khalid

A Fog-based Security Framework for Intelligent Traffic Light Control System

MS

Supervisor

Completed

9

Anum Khurshid

Device Oriented Security to Assist Information Flow Control Systems in the Cloud Environment

MS

Supervisor

Completed

10

Muhammad Abrar Khan

A Service Discovery and Forwarding Architecture in Fog computing

MS

Supervisor

Completed