Khan, Burhan Ul Islam
58  results:
Search for persons X
?
9

Internet of Things—The Concept, Inherent Security Challenge..:

, In: Smart Network Inspired Paradigm and Approaches in IoT Applications,
 
?
10

Critical Challenges in Access Management Schemes for Smartp..:

, In: Smart Network Inspired Paradigm and Approaches in IoT Applications,
 
?
11

An Adaptive and Viable Face Identification for Android Mobi..:

, In: Handbook of Multimedia Information Security: Techniques and Applications,
 
?
12

JIR2TA: Joint Invocation of Resource-Based Thresholding and..:

, In: Proceedings of SAI Intelligent Systems Conference (IntelliSys) 2016; Lecture Notes in Networks and Systems,
 
?
13

Predictive Classification Framework for Software Demand Usi..:

, In: Lecture Notes in Networks and Systems; Software Engineering Methods in Systems and Network Systems,
Firdose, Salma ; Islam Khan, Burhan Ul - p. 183-195 , 2024
 
?
14

Bayesian Signaling Game Based Efficient Security Model for ..:

, In: Lecture Notes in Networks and Systems; Advances in Information and Communication,
 
?
15

RAED: Response analysis of educational data for leveraging ..:

, In: 2015 IEEE Conference on e-Learning, e-Management and e-Services (IC3e),
 
1-15