Al-Sakib Khan Pathan

(আল-সাকিব খান পাঠান)

Ph.D.+MS in Computer Engineering (Kyung Hee University, South Korea)

B.Sc. in Computer Science and IT (Islamic University of Technology, Bangladesh)


IEEE Senior Member

Google Scholar Profile , Scopus Profile

Editor-in-Chief, International Journal of Computers and Applications, Taylor & Francis, UK

Editor-in-Chief, Journal of Cyber Security Technology, Taylor & Francis, UK


Professor, Department of Computer Science and Engineering

      United International University (UIU), Bangladesh

      Room: 733(B) [Level 7]

      United City, Madani Avenue, Badda, Dhaka 1212, Bangladesh

      UIU Faculty Webpage: https://cse.uiu.ac.bd/faculty/al-sakib-khan-pathan/ 

PhD Co-Supervisor (External), Department of Computer Sciences, 

      Faculty of Sciences, University Ferhat Abbas Setif 1, Algeria

Senior Research Fellow , Center for Cybersecurity, New Jersey City University (NJCU), USA

Research Fellow, INTI International University, Malaysia


LinkedIn Profile: https://www.linkedin.com/in/al-sakib-khan-pathan-6173838/ 

{sakib.pathan, sakib.pathan1}@gmail.com, spathan @ ieee.org

Al-Qur'an in 57:5 - "For HIM (Allah) is the Kingdom of the heavens and the earth. And towards Allah is the return of all affairs." [Translated Meaning]Al-Qur'an in 96:5 - "Teacheth man that which he knew not." [Translated Meaning]Al-Qur'an in 20:114 - (Rabbi Zidni 'ilma) - "Oh My Lord! Increase Me In My Knowledge." [Translated Meaning]

After being a Muslim, always Seek refuge in Allah from 8 things,


It is narrated in many ahadeeth that the Prophet (sallallahu 'alayhi wa sallam) would consistently make this du'aa, and many of the Companions heard him repeat it over and over.

 

اللهم إني أعوذ بك من الهم والحزن ، والعجز والكسل والبخل والجبن ، وضلع الدين وغلبة الرجال

 

Transliteration: Allahumma inni a’udhu bika minal-hammi wal-huzni wal-’ajazi wal-kasli wal-bukhli wal-jubni wa dala’id-dayni wa ghalabatir-rijal.

 

English Translation: O Allah, I take refuge in You from (1) anxiety and (2) sorrow, (3) weakness and (4) laziness, (5) miserliness and (6) cowardice, (7) the burden of debts and (8) from being overpowered by men.

 

(1) anxiety (Arabic: Al-Hamm) - to be worried about the future

(2) sorrow (Arabic: Al-Hazan) - to be in grief about the past

(3) weakness (Arabic: Al-'Ajaz) - incapability in doing something good

(4) laziness (Arabic: Al-Kasl) - being lackadaisical

(5) miserliness (Arabic: Al-Bukhl) - being stingy in spending in good

(6) cowardice (Arabic: Al-Jubn) - being afraid of standing for the truth

(7) the burden of debt (Arabic: Dala'a ad-dayn) - tendency for debt to sway people from righteousness or being heavily in debt and unable to pay back

(8) from being overpowered by men (Arabic: Ghalabah - to be overpowered) - (ghalabatir-rijal) being overpowered by someone unjustly

__________________________________________________________________________________________________________________



*NEWS* Delivered Keynote Speech titled, "An Overview of Internet of Energy (IoE) and its Security Challenges", International Conference on Automation & Computation (IEEE AutoCom24), Dehradun, Uttarakhand, India, 14-16, March, 2024. [ONLINE] (Posted: 15 March, 2024)



Some Recent and Upcoming events that I am involved in ...


Recent/Upcoming Journal Special Issues, Books


Guest Editor, CFP: Topical Collection on : "Dependable and Reliable Datasets for Explainable Artificial Intelligence and Cyber Security Research", Discover Data, Springer. [Submission Deadline (Extended): 26 July, 2024]


Guest Editor, CFP: Special Issue on Cognitive AI for Intelligent Computing and Communications, Connection Science, Taylor & Francis. [Submission Deadline: 31 May, 2024]


Guest Editor, CFP: Special Issue on Recent Advances and Future Trends in Distributed Systems and Internet of Things, International Journal of Web Research, USC, Iran.


Guest Editor, Special issue on : "Intelligent System Design and Optimisation for Next Generation Smart Applications", International Journal of Embedded Systems, Inderscience Publishers (To Appear)



*NEW* Guest Editor, Special issue on intelligent anomaly/novelty detection to enhance IoT and AIoT, Digital Communications and Networks Journal, KeAi Publishing, 2024: https://www.sciencedirect.com/journal/digital-communications-and-networks/vol/10/issue/1#article-19

*NEW* Editor, BOOK: Combatting Cyberbullying in Digital Media with Artificial Intelligence, CRC Press, Taylor & Francis, USA, December 2023.



Recent/Upcoming Conferences, Workshop, Seminars


Chairing or Organizing:


Steering Committee Chair, EAI SGIoT 2024, 23-24 November, 2024 - TaiChung, Taiwan [Submission Deadline: 05 August 2024]


Technical Program Committee Chair, ICT-DM 2024, 19-21 November, 2024 - Setif, Algeria [Submission Deadline: 30 April, 2024]

Program Chair, EAI WiCON 2024, 15-16 November, 2024 - Perth, Australia [Submission Deadline: 15 August, 2024]


Publicity Chair, IEEE NextG-WiSec with IEEE ICC 2024, 9-13 June 2024 - Denver, CO, USA

Publicity Chair, ET-Edge'24 with IEEE/ACM CCGRID, May 6-9, 2024 - Philadelphia, USA

Publicity Chair, IEEE CCNC STP-CPS, 6–9 January, 2024 - Las Vegas, NV, USA


International Liaison Committee Member, FOCUS 2024, 26-27 November 2024 - Kuala Lumpur, Malaysia 


Publications Chair, EAI WiCON 2024, 15-16 November, 2024 - Perth, Australia [Submission Deadline: 15 August, 2024]


Technical Program Committee Member in:


IEEE Globecom 2024 CSM, IoTSN, 8-12 December 2024 - Cape Town, South Africa

IEEE ICUFN 2024, July 2-5, 2024 - Budapest, Hungary

IEEE ICC 2024 - IoTSN and CSM Symposiums, 9-13 June, 2024 - Denver, CO, USA

IEEE ICC 2024 APATN, 9-13 June, 2024 - Denver, CO, USA

IEEE IWCMC 2024, 27-31 May 2024 - Ayia Napa, Cyprus

IEEE ICMLCN 2024, 5-8 May 2024 - Stockholm, Sweden

IEEE PAIS 2024, 24‐25 April, 2024 - University of El Oued, Algeria

IEEE WCNC 2024, 21-24 April, 2024 - Dubai, United Arab Emirates

IEEE ICNC 2024, 19-22 February, 2024 - Big Island, Hawaii, USA

ICOIN 2024, 17-19 January, 2024 - Ho Chi Minh City, Vietnam

IEEE ICCE 2024, 6-8 January, 2024 - Las Vegas, NV, USA



BOOKS [Authored/Edited/(Authored+Edited) volumes] - Link to Books Page or BOTTOM of this page.

________________________________________________________________________________________


** SPECIAL  NOTE **


++ 1 ++ For free download of the SOURCE CODES of the book, Practical Cryptography: Algorithms and Implementations Using C++, kindly check: https://sites.google.com/site/spathansite/praccrypt


++ 2 ++ The book entitled, Cybersecurity Fundamentals: A Real World Perspective, ISBN-13: 978-0367476489, CRC Press, USA has been approved as textbook for some courses in some universities in the USA, Saudi Arabia, and Bangladesh, August 2020. This book could be used as a textbook for courses like: "Introduction to Computer & Network Security", "Intrusion Detection & Prevention Systems", "Cryptography and Network Security", etc.


PowerPoint presentation slides/lecture materials are available on T&F website from Nov. 6, 2020. Please go to the publisher's site (https://www.routledge.com/9780367472504) and look at the menu under the cover image. You should see an option which says “Support Material” which contains a link to the Instructor Resources Hub. The slides will be hosted on here, and anyone who is an instructor can request access to them.


++ 3 ++ The Book, "A Deeper Perspective on the Fundamentals of Digital Communication, Security, and Privacy Protocols", ISBN 9781032292878 has been approved as a recommended reference book for 6 courses at NJCU, USA. 30 June, 2022. Also, it has been featured on FEMA Region 2 Higher Education Quarterly Newsletter (https://content.govdelivery.com/accounts/USDHSFEMA/bulletins/3337c2a and https://content.govdelivery.com/landing_pages/39464/b4cd1dd6bd26758f5666df6324b69ec8), Federal Emergency Management Agency (FEMA), USA, 9 December 2022.


________________________________________________________________________________________


Biography


Al-Sakib Khan Pathan is a Professor at Computer Science and Engineering department, United International University (UIU), Bangladesh. He is also serving as a PhD Co-supervisor (external) at Computer Sciences Department, University Ferhat Abbas Setif 1, Algeria. He received PhD degree in Computer Engineering in 2009 from Kyung Hee University, South Korea and B.Sc. degree in Computer Science and Information Technology from Islamic University of Technology (IUT), Bangladesh in 2003. In his academic career so far, he worked as a faculty member in various capacities in various institutions like at the CSE Department of Independent University, Bangladesh (IUB) during 2020-2021, Southeast University, Bangladesh during 2015-2020, Computer Science department, International Islamic University Malaysia (IIUM), Malaysia during 2010-2015; at BRACU, Bangladesh during 2009-2010, and at NSU, Bangladesh during 2004-2005. He served as a Guest Professor at the Department of Technical and Vocational Education, Islamic University of Technology, Bangladesh in 2018.  He also worked as a Researcher at Networking Lab, Kyung Hee University, South Korea from September 2005 to August 2009 where he completed his MS leading to PhD. His research interests include wireless sensor networks, network security, cloud computing, and e-services technologies. Currently he is also working on some multidisciplinary issues. He is a recipient of several awards/best paper awards and has several notable publications in these areas. So far, he has delivered at least 38 Keynotes and Invited speeches at various international conferences and events. 


He was named on the List of Top 2% Scientists of the World in 2020, 2021, 2023 by Stanford University, USA. He has served as a General Chair, Organizing Committee Member, and Technical Program Committee (TPC) member in numerous top-ranked international conferences/workshops like INFOCOM, CCGRID, GLOBECOM, ICC, LCN, GreenCom, AINA, WCNC, HPCS, ICA3PP, IWCMC, VTC, HPCC, SGIoT, etc. He was awarded the IEEE Outstanding Leadership Award for his role in IEEE GreenCom’13 conference and IEEE Outstanding Service Awards twice in recognition and appreciation of the service and outstanding contributions to the IEEE IRI’20 and IRI’21. He is currently serving as the Editor-in-Chief of International Journal of Computers and Applications and Journal of Cyber Security Technology, Taylor & Francis, UK; Editor of Ad Hoc and Sensor Wireless Networks, Old City Publishing, International Journal of Sensor Networks, Inderscience Publishers, and Malaysian Journal of Computer Science, Associate Editor of Connection Science, Taylor & Francis, UK, International Journal of Computational Science and Engineering, Inderscience, Guest Editor of many special issues of top-ranked journals, and Editor/Author of 35 books. One of his books has been included twice in Intel Corporation’s Recommended Reading List for Developers, 2nd half 2013 and 1st half of 2014; 3 books were included in IEEE Communications Society’s (IEEE ComSoc) Best Readings in Communications and Information Systems Security, 2013, several other books were indexed with all the titles (chapters) in Elsevier’s acclaimed abstract and citation database, Scopus and in Web of Science (WoS), Book Citation Index, Clarivate Analytics, at least one has been approved as a textbook at NJCU, USA in 2020, one is among the Top Used resources on SpringerLink in 2020 for UN’s Sustainable Development Goal 7 (SDG7) - Affordable and Clean Energy and one book has been translated to simplified Chinese language from English version. Also, 2 of his journal papers and 1 conference paper were included under different categories in IEEE Communications Society's (IEEE ComSoc) Best Readings Topics on Communications and Information Systems Security, 2013. He also serves as a referee of many prestigious journals. He received some awards for his reviewing activities like: one of the most active reviewers of IAJIT several times; Elsevier Outstanding Reviewer for Computer Networks, Ad Hoc Networks, FGCS, and JNCA in multiple years. He is currently a Research fellow at INTI International University, Malaysia and a Senior Research Fellow of Center for Cybersecurity, New Jersey City University (NJCU), USA. He is a Senior Member of the Institute of Electrical and Electronics Engineers (IEEE), USA.


Research Interests


Journal Editorial Services (Partial list - Present and Past)




Reviewer/Referee for Journals (Partial list - Past and Present)



Notable Awards and Recognition (Partial list)




Talks/Presentations (Partial list)


- Keynote Speech, "Cryptocurrency – The Expectation and Reality for Digital Transactions", Confluence-2024: 14th International Conference on Cloud Computing, Data Science & Engineering, 18-19 January 2024, Amity University, Noida (New Delhi NCR), India.

- Keynote Speech, "Utilizing Advanced Computing and Communication Technologies for Greening the EV Recharging and Billing Systems", International Conference on Intelligent Systems, Advanced Computing and Communication (ISACC-2023), 03-04 February 2023, Assam University, Silchar, Assam, India, 4 February 2023. 

- Invited Speaker, "How to make your research more impactful?”, Research Seminar Series, 02 November, 2022, UIU, Bangladesh.

- Keynote Speech: "Recognizing FDIA as a Critical Issue in the Field of Cybersecurity", The International Conference on Information, Communication & Cybersecurity (ICI2C'21), November 10-11, 2021, Khouribga, Morocco [VIRTUAL due to COVID-19 pandemic]

- Expert Talk as a Resource Person, “Fundamentals of Computer Network Security”, International Faculty Development Program during 05 July-10 July, 2021, organized by Chandigarh University, Punjab, India, 09 July, 2021. [Online event due to COVID-19 pandemic]

- Eminent Speaker, “Writing and Publishing (Scientific and Technical) Books and Book Chapters”, International STTP on Research Writing & Design, Galgotias University, 12 March 2021, Greater Noida, Uttar Pradesh, India. [Online event due to COVID-19 pandemic]

- Expert Speaker, Topic Title: “Key Factors to Know for Quality Publications”, Joint One Week Virtual Workshop with ICT Academy (an initiative of the Govt. of India) on Learning Practical Research Skills and Techniques (an Innovative, Integrated Approach) Series 2, Galgotias University, India, 11 August 2020.

- Expert Webinar/Talk, Talk Title: “Need and Importance of Cyber Security in Real World Environment”, 4th Annual International Faculty Development Program 2020 (IFDP 2020), organized by Chandigarh University, India, 7 July, 2020.

- Keynote Speech: "Can we rely on Blockchain?", 2nd ICCT 2019, 29 September, 2019, Manipal University Jaipur, Rajasthan, India.

- Invited Talk: "Things to know about Cyber Attacks when using Cyberspace", Maulana Abul Kalam Azad University of Technology, 13 February, 2019, Nadia, West Bengal, India.

- Invited Talk: "Basics of Security and Cryptography", Maulana Abul Kalam Azad University of Technology, 13 Feb, 2019, Nadia, West Bengal, India.

- Keynote Speech: "Are We Aware of Simple Yet Deceiving Cyber Attacks?" 5th ICMC 2019, 9 February, 2019, Bhubaneswar, Odisha, India.

- Keynote Speaker: Talk Title: “The state-of-the-art wireless body area sensor networks - Issues and Challenges”, at the 7th IEEE International Conference on Advances in Computing, Communications and Informatics (ICACCI-2018), Bangalore, India, 21 September, 2018.

- Invited Talk: "The State-of-the-Art Wireless Body Area Sensor Networks - Issues and Challenges", at Software and Informatics Research Centre (SIRC), University of Ontario Institute of Technology (UOIT), Oshawa, Canada, 12 July, 2018.

- Welcome Speech as the General Chair: 2nd EAI International Conference on Smart Grid and Internet of Things (SGIoT 2018), in Niagara Falls, Canada, July 11, 2018.

- Keynote Speaker: Talk Title: “Defending against Common Cyber Attacks: Phishing and Cross-Site Scripting”, at 13th IEEE International Symposium on Programming and Systems (ISPS 2018), Algiers, Algeria, April 24-26, 2018.

- Invited Lecture: "Human Factors and Content Security Policy in Tackling Common Cyber Attacks", Training program for Polytechnic teachers in Bangladesh on "Cyber Security and Ethics: Knowledge, Skills and Pedagogy", held at Islamic University of Technology (IUT), Bangladesh, 13 April, 2018.

- Invited Speech: “Social Engineering Attack – Even the Smart People Can Get Deceived”, in Recent Trends in Cyber Security, Plenary Session in the Conference: Accountability in Bangladesh: Issues & Debates, Independent University, Bangladesh (IUB), 29 March, 2018.

- Keynote Speech: "Understanding Quality", Workshop on Team Building, BBA Seminar Hall, Southeast University, Dhaka, Bangladesh, 10 August, 2017.

- Welcome Speech as the General Chair: 1st EAI International Conference on Smart Grid Assisted Internet of Things (SGIoT 2017), in Sault Ste. Marie, Canada, July 11-13, 2017.

Invited Talk: "How to Build Customer Trust in Cloud Computing Model?", at National Conference on Electronics and ICT, Atomic Energy Center, Dhaka, Bangladesh, 20 April, 2017.

- Invited Talk: "Mitigating Cross-Site Scripting Attacks with a Content Security Policy", International Conference on Communication and Computing System (ICCCS'16), Gurgaon, India, September 9-11, 2016.

- Keynote Speech: "Mitigating Cross-Site Scripting Attacks with a Content Security Policy", Technical-Talk event organized by IEEE Student Branch, University of Dhaka, Bangladesh, 17 April 17, 2016,

- Keynote Speech: "Building Customer Trust in Cloud Computing Model", ICACCE-2015, Dehradun, India, 1-2 May, 2015.

- Paper Presentation: "A Neighbour Discovery Approach for Cognitive Radio Network Using Tower of Hanoi (ToH) Sequence Based Channel Rendezvous", ICT4M 2014, Kuching, Malaysia, 17-18 November, 2014.

- Paper Presentation: "SECRET: A Secure and Efficient Certificate Revocation Scheme for Mobile Ad Hoc Networks", ISBAST 2014, Kuala Lumpur, Malaysia, 26 August, 2014.

- Keynote Speech: "Computer Science and IT Today: Research Issues and Publication Tips", ICIECC 2014, Madurai, India, 10 April, 2014.

- Keynote Speech: "Wireless Sensor Network Security: Current Status and Future Trends", Thapar University, Patiala, Punjab, India, 4 October, 2013.

- Seminar Presentation: "The Need-to-Know Issues for Publishing Books and Book Chapters", Springer eBooks Seminar, IIUM, Kuala Lumpur, Malaysia, 20 September 2013.

- Paper Presentation: "On the Key Revocation Schemes in Wireless Sensor Networks", IEEE GreenCom 2013, Beijing, China, 21 August 2013.

- Paper Presentation: "Usability Improvements for Touch-Screen Mobile Flight Booking Application: A Case Study", ACSAT 2012, Kuala Lumpur, Malaysia, 27 November 2012.

- Paper Presentation: "An Efficient Detection Model of Selective Forwarding Attacks in Wireless Mesh Networks", 5th IDCS 2012, Wu Yi Shan, China, 21 November 2012.

- Guest Lecture: "Wireless Network Security: 3G, 4G, Wireless PAN/LAN/MAN", CICT, Universiti Teknologi Malaysia (UTM), Skudai, Johor, Malaysia, 23 May 2012.



Courses I Teach at UIU CSE (in different semesters)


Postgraduate Course(s)


- Ad-hoc and Sensor Networks

- Advanced Mobile Communication


Undergraduate Course(s)


- Computer Networks

- Discrete Mathematics

- Final Year Design Project - I


___________________________


List of Publications

___________________________



Books


[B35] Kutub Thakur, Helen G. Barker, and Al-Sakib Khan Pathan, Artificial Intelligence and Large Language Models: An Introduction to the Technological Future. (authored volume), ISBN 9781032754802, Chapman & Hall, Taylor & Francis, USA. (To Appear)

[B34] Mohamed Lahby, Al-Sakib Khan Pathan, and Yassine Maleh, Combatting Cyberbullying in Digital Media with Artificial Intelligence to other Futuristic Technologies. (edited volume), ISBN: 9781032491882, Chapman & Hall, Taylor and Francis, USA, December 2023.  (Indexed in Elsevier’s acclaimed abstract and citation database, Scopus, 2024)

[B33] Kutub Thakur, Al-Sakib Khan Pathan, and Sadia Ismat, Emerging ICT Technologies and Cybersecurity: From AI and ML to other Futuristic Technologies. (authored volume), ISBN: 978-3-031-27764-1, Springer, 2023.

[B32] Kutub Thakur, Abu Kamruzzaman, and Al-Sakib Khan Pathan, A Deeper Perspective on the Fundamentals of Digital Communication, Security, Privacy Protocols. (authored volume) ISBN 9781032292878, CRC Press, Taylor & Francis, USA, 2022. (This book has been approved as a recommended reference book for 6 courses at NJCU, USA. Also, it has been featured on FEMA Region 2 Higher Education Quarterly Newsletter: https://content.govdelivery.com/accounts/USDHSFEMA/bulletins/3337c2a , Federal Emergency Management Agency (FEMA), USA, 9 December 2022.)

[B31] Al-Sakib Khan Pathan, Towards a Wireless Connected World: Achievements and New Technologies. (edited volume), ISBN: 978-3-031-04320-8, Springer Nature, 2022. (Indexed in Elsevier’s acclaimed abstract and citation database, Scopus, 2023)

[B30] Mohiuddin Ahmed, Sheikh Rabiul Islam, Adnan Anwar, Nour Moustafa, Al-Sakib Khan Pathan. Explainable Artificial Intelligence for Cyber Security. (edited volume), ISBN 978-3-030-96629-4, Part of the book series: Studies in Computational Intelligence (SCI, volume 1025), Springer Nature, 2022. (Indexed in Elsevier’s acclaimed abstract and citation database, Scopus, 2023)

[B29] Huilong Jin, Chungang Liu, Al-Sakib Khan Pathan, Zubair Md. Fadlullah, Salimur Choudhury. Cognitive Radio Oriented Wireless Networks and Wireless Internet. (edited volume), ISBN 978-3-030-98001-6, LNICST Volume 427, Springer International Publishing, 2022.

[B28] Mohamed Lahby, Al-Sakib Khan Pathan, Yassine Maleh, and Wael Mohamed Shaher Yafooz. Combating Fake News With Computational Intelligence Techniques. (edited volume), ISBN 978-3-030-90087-8, Part of the book series: Studies in Computational Intelligence (SCI, volume 1001), Springer, 2022. (Indexed in Elsevier’s acclaimed abstract and citation database, Scopus, 2023)

[B27] Kutub Thakur and Al-Sakib Khan Pathan. Securing Mobile Devices and Technology. (authored volume), ISBN 9781032136127, CRC Press, Taylor & Francis, USA, 2022.

[B26] Al-Sakib Khan Pathan. Securing Social Networks in Cyberspace. (edited and contributed volume), ISBN 9780367681739, CRC Press, Taylor & Francis, USA, 2021.

[B25] Uttam Ghosh, Mamoun Alazab, Ali Kashif Bashir, and Al-Sakib Khan Pathan. Deep Learning for Internet of Things Infrastructure. (edited volume), ISBN-13: 978-0367457334, CRC Press, Taylor & Francis, USA, 2021.

[B24] Uttam Ghosh, Yassine Maleh, Mamoun Alazab, and Al-Sakib Khan Pathan. Machine Intelligence and Data Analytics for Sustainable Future Smart Cities. (edited volume), ISBN 978-3-030-72064-3, Part of the book series: Studies in Computational Intelligence (SCI, volume 971), Springer International Publishing, 2021. (Indexed in Elsevier’s acclaimed abstract and citation database, Scopus, 2023)

[B23] Uttam Ghosh, Danda B Rawat, Raja Datta, and Al-Sakib Khan Pathan. Internet of Things and Secure Smart Environments: Successes and Pitfalls. (edited volume), ISBN 9780367266394, Chapman & Hall/CRC Big Data Series, USA, November 2020.

[B22] Zubair Md Fadlullah and Al-Sakib Khan Pathan. Combating Security Challenges in the Age of Big Data - Powered by State-of-the-Art Artificial Intelligence Techniques. (edited volume), ISBN 978-3-030-35642-2, Part of the book series: Advanced Sciences and Technologies for Security Applications (ASTSA), Springer, May 2020. (Indexed in Elsevier’s acclaimed abstract and citation database, Scopus, 2023)

[B21] Kutub Thakur and Al-Sakib Khan Pathan. Cybersecurity Fundamentals: A Real World Perspective. (authored volume), ISBN-13: 978-0367476489, CRC Press, USA, May 2020. (This book has been approved as a textbook for some courses at NJCU, USA)

[B20] Mohiuddin Ahmed, Abu S.S.M Barkat Ullah, and Al-Sakib Khan Pathan. Security Analytics for Internet of Everything. (edited volume), ISBN13: 9780367440923, CRC Press, USA, February 2020.

[B19] Al-Sakib Khan Pathan, Zubair Md. Fadlullah, and Mohamed Guerroumi. Smart Grid and Internet of Things. (edited volume), ISBN: 978-3-030-05927-9, LNICST Volume 256, Springer, 2019. (This book is indexed with all the titles (chapters) in Elsevier’s acclaimed abstract and citation database, Scopus, January 2019 + Among the Top used publications on SpringerLink that concern one or more of the United Nations Sustainable Development Goals (SDGs) 2020, SDG7 Affordable and Clean Energy)

[B18] Mohiuddin Ahmed and Al-Sakib Khan Pathan. Data Analytics: Concepts, Techniques, and Applications. (edited volume), ISBN-13: 978-1138500815, CRC Press, Taylor & Francis Group, USA, October 2018.

[B17] Al-Sakib Khan Pathan. Crowd Assisted Networking and Computing. (edited volume), ISBN-13: 978-1138294769, CRC Press, Taylor & Francis Group, USA, September 2018.

[B16] Suliman Mohamed Fati, Saiful Azad, and Al-Sakib Khan Pathan. IPTV Delivery Networks: Next Generation Architectures for Live and Video-on-Demand Services. (edited volume), ISBN: 978-1-119-39791-5, Wiley, USA, May 2018.

[B15] Mubashir Husain Rehmani and Al-Sakib Khan Pathan. Emerging Communication Technologies Based on Wireless Sensor Networks: Current Research and Future Applications. (edited volume), ISBN: 9781498724852, CRC Press, Taylor & Francis Group, USA, 2016. (This book is indexed with all the titles (chapters) in Elsevier’s acclaimed abstract and citation database, Scopus, 2016 and also in Web of Science (WoS), Book Citation Index, Clarivate Analytics)

[B14] Al-Sakib Khan Pathan. Securing Cyber-Physical Systems. (edited and contributed volume), ISBN: 9781498700986, CRC Press, Taylor & Francis Group, USA, 2015. (This book is indexed with all the titles (chapters) in Elsevier’s acclaimed abstract and citation database, Scopus, 2015 and also in Web of Science (WoS), Book Citation Index, Clarivate Analytics)

[B13] Al-Sakib Khan Pathan, Muhammad Mostafa Monowar, and Zubair Md. Fadlullah. (Translators: Qiu Shuang, Liu Yinghua, Wang Lingfang). 下一代融合网络理论与实践. [Title in Chinese] (edited and contributed volume), ISBN: 9787111483595, China Machine Press, China, 2015. (Translated [Simplified Chinese] version of the book entitled, “Building Next-Generation Converged Networks: Theory and Practice”, CRC Press, USA, 2013)

[B12] Saiful Azad and Al-Sakib Khan Pathan. Practical Cryptography: Algorithms and Implementations using C++. (edited and contributed volume), ISBN: 978-1-48-222889-2, CRC Press, Taylor & Francis Group, USA, November 2014. (This book is indexed with all the titles (chapters) in Elsevier’s acclaimed abstract and citation database, Scopus, 2014)

[B11] Al-Sakib Khan Pathan, Muhammad Mostafa Monowar, and Shafiullah Khan. Simulation Technologies in Networking and Communications: Selecting the Best Tool for the Test. (edited volume), ISBN 9781482225495, CRC Press, Taylor & Francis Group, USA, November 2014. (This book is indexed with all the titles (chapters) in Elsevier’s acclaimed abstract and citation database, Scopus, 2014)

[B10] Al-Sakib Khan Pathan. The State of the Art in Intrusion Prevention and Detection. (edited and contributed volume), ISBN 9781482203516, CRC Press, Taylor & Francis Group, USA, January 2014.

[B09] Mohssen Mohammed and Al-Sakib Khan Pathan. Automatic Defense against Zero-day Polymorphic Worms in Communication Networks. (authored volume), ISBN 9781466557277, CRC Press, Taylor & Francis Group, USA, 2013. (This book was included in IEEE Communications Society's (IEEE ComSoc) Best Readings in Communications and Information Systems Security, September 2013.  It is also indexed in Web of Science (WoS), Book Citation Index, Clarivate Analytics)

[B08] Shafiullah Khan and Al-Sakib Khan Pathan. Wireless Networks and Security: Issues, Challenges and Research Trends. (edited volume), ISBN: 978-3-642-36168-5, Series: Signals and Communication Technology, Springer, 2013. (This book was included in IEEE Communications Society's (IEEE ComSoc) Best Readings in Communications and Information Systems Security, September 2013 + One of the top 25% most downloaded eBooks in the relevant Springer eBook Collection in 2013 - a total of 5830 chapter downloads in 2013)

[B07] Al-Sakib Khan Pathan, Muhammad Mostafa Monowar, and Zubair Md. Fadlullah. Building Next-Generation Converged Networks: Theory and Practice. (edited and contributed volume), ISBN: 9781466507616, CRC Press, Taylor & Francis Group, USA, January, 2013. (This book got international attention to get published with a translated version in Simplified Chinese language after a deal between CRC Press, USA and China Machine Press, July 2013 + got indexed in Scopus and Web of Science, Book Citation Index, Clarivate Analytics)

[B06] Shafiullah Khan, Al-Sakib Khan Pathan, and Nabil A. Alrajeh. Wireless Sensor Networks: Current Status and Future Trends. (edited and contributed volume), ISBN: 9781466506060, Auerbach Publications, CRC Press, Taylor & Francis Group, USA, 2012. (This book was included twice in the Intel Corporation's Recommended Reading List for Developers, 2nd half, 2013 and 1st half, 2014. It is also indexed in Web of Science (WoS), Book Citation Index, Clarivate Analytics)

[B05] Jemal Abawajy, Mukaddim Pathan, Mustafizur Rahman, Al-Sakib Khan Pathan, and Mustafa Mat Deris. Network and Traffic Engineering in Emerging Distributed Computing Applications. (edited volume), ISBN: 9781466618886, IGI Global, USA, 2012. (This book is indexed with all the titles (chapters) in Elsevier’s acclaimed abstract and citation database, Scopus, February 2015)

[B04] Jemal Abawajy, Mukaddim Pathan, Mustafizur Rahman, Al-Sakib Khan Pathan, and Mustafa Mat Deris. Internet and Distributed Computing Advancements: Theoretical Frameworks and Practical Applications. (edited volume), ISBN: 9781466601611, IGI Global, USA, February 2012.

[B03] Al-Sakib Khan Pathan. Securing WSN with Lightweight Resource-Efficient Schemes: Security From the Bootstrapping Phase. (authored volume), ISBN: 978-3-8465-1681-2, Lambert Academic Publishing, LAP LAMBERT Academic Publishing, VDM Verlag, Germany, September, 2011.

[B02] Al-Sakib Khan Pathan, Mukaddim Pathan, and Hae Young Lee. Advancements in Distributed Computing and Internet Technologies: Trends and Issues. (edited and contributed volume), ISBN13: 9781613501108, IGI Global, USA, 2011. (This book is indexed with all the titles (chapters) in Elsevier’s acclaimed abstract and citation database, Scopus, February 2015 and also in Web of Science (WoS), Book Citation Index, Clarivate Analytics.)

[B01] Al-Sakib Khan Pathan. Security of Self-Organizing Networks: MANET, WSN, WMN, VANET. (edited and contributed volume), ISBN: 978-1-4398-1919-7, Auerbach Publications, CRC Press, Taylor & Francis Group, USA, 2010. (This book was included in IEEE Communications Society's (IEEE ComSoc) Best Readings in Communications and Information Systems Security, September 2013)


Book Chapters


[BC32] A.F.M. Suaib Akhter, Tawsif Zaman Arnob, Ekra Binta Noor, Selman Hizal, and Al-Sakib Khan Pathan “An Edge-Supported Blockchain-Based Secure Authentication Method and a Cryptocurrency-Based Billing System for P2P Charging of Electric Vehicles,” in Signatures of Maturity in Cryptocurrency Market (Edited by Stanisław Drożdż, Jarosław Kwapień and Marcin Wątorek), ISBN 978-3-0365-8574-1, MDPI, 2023, pp. 121-139. (This chapter was re-printed in this volume from Entropy journal’s special issue, as a reference material by MDPI for greater visibility)

[BC31] Rachida Hireche, Houssem Mansouri, and Al-Sakib Khan Pathan, “Fault Tolerance and Security Management in IoMT,” Towards a Wireless Connected World: Achievements and New Technologies. (Edited by Al-Sakib Khan Pathan), ISBN: 978-3-031-04320-8, Springer, 2022, pp. 65-104.

[BC30] Md. Tanvir Hasan, Md Redwan Hossain, and Al-Sakib Khan Pathan, "Protecting Regular and Social Network Users in a Wireless Network by Detecting Rogue Access Point: Limitations and Countermeasures," Securing Social Network in Cyberspace (Edited by Al-Sakib Khan Pathan), CRC Press, USA, 2021, pp. 255-275.

[BC29] Houssem Mansouri and Al-Sakib Khan Pathan, "A Review of Checkpointing and Rollback Recovery Protocols for Mobile Distributed Computing Systems," Internet of Things and Secure Smart Environments: Successes and Pitfalls (Edited by Uttam Ghosh, Danda B Rawat, Raja Datta, and Al-Sakib Khan Pathan), ISBN 9780367266394, Chapman and Hall/CRC, USA, 2020, pp. 111-146.

[BC28] Uttam Ghosh, Pushpita Chatterjee, and Al-Sakib Khan Pathan, "On the Secure Routing Protocols, Selfishness Mitigation, and Trust in Mobile Ad Hoc Networks," Combating Security Challenges in the Age of Big Data - Powered by State-of-the-Art Artificial Intelligence Techniques (Edited by Zubair Md Fadlullah and Al-Sakib Khan Pathan), Springer, 2020, pp. 87-104.

[BC27] Uttam Ghosh, Pushpita Chatterjee, Raja Datta, Al-Sakib Khan Pathan, and Danda B. Rawat, "Secure Addressing Protocols for Mobile Ad hoc Networks," Security Analytics for Internet of Everything (Edited by Mohiuddin Ahmed, Abu Barkat, and Al-Sakib Khan Pathan), ISBN13: 9780367440923, CRC Press, USA, February 2020, pp. 193-212.

[BC26] Salva Daneshgadeh, Tarem Ahmed, and Al-Sakib Khan Pathan, "The Kernel-based Online Anomaly Detection Algorithm: Detailed Derivation and Development," Security Analytics for Internet of Everything (Edited by Mohiuddin Ahmed, Abu Barkat, and Al-Sakib Khan Pathan), ISBN13: 9780367440923, CRC Press, USA, February 2020, pp. 155-192.

[BC25] Shuvra Sarker, Kakon Roy, Farzana Afroz, and Al-Sakib Khan Pathan, "On the Opportunities, Applications, and Challenges of Internet of Things," Decentralised Internet of Things: A Blockchain Perspective (Edited by Ayoub Khan, Tabrez Quasim, Fahad Algarni, and Abdullah Alharthi), ISBN: 978-3-030-38676-4, Springer, 2020, pp. 231-254.

[BC24] Homero Toral-Cruz, Al-Sakib Khan Pathan, and Julio C. Ramírez Pacheco, “Accurate Modeling of VoIP Traffic in Modern Communication Networks,” Modeling and Simulation of Complex Networks (Edited by Muaz A. Niazi), e-ISBN: 9781785613562, Institution of Engineering & Technology (IET), February 2019, pp. 175-208.

[BC23] Rahat Ali Khan and Al-Sakib Khan Pathan, "An Introduction to Mobile Crowdsensing," Crowd Assisted Networking and Computing (edited by Al-Sakib Khan Pathan), ISBN-13: 978-1138294769, CRC Press, Taylor & Francis Group, USA, September 2018, pp. 1-22.

[BC22] Rami Haidar Ahmed and Al-Sakib Khan Pathan, "A Study on M2M (Machine to Machine) System and Communication: Its Security, Threats, and Intrusion Detection System," The Internet of Things: Breakthroughs in Research and Practice, ISBN13: 9781522518327, IGI Global, USA, Feb. 14, 2017, pp. 205-240. (This chapter was re-printed in this volume as a reference material by IGI Global for greater visibility)

[BC21] Tarem Ahmed, Al-Sakib Khan Pathan, and Supriyo Shafkat Ahmed, “Learning Algorithms for Anomaly Detection from Images,” Biometrics: Concepts, Methodologies, Tools, and Applications, ISBN13: 9781522509837, Information Resources Management Association (USA), IGI Global, August 2016, pp. 281-308. (This paper was re-printed as a chapter in this volume as a reference material by IGI Global for greater visibility)

[BC20] Rami Haidar Ahmad and Al-Sakib Khan Pathan, “A Study on M2M (Machine to Machine) System and Communication: Its Security, Threats, and Intrusion Detection System,” Security Solutions and Applied Cryptography in Smart Grid Communications (Edited by Mohamed Amine Ferrag and Ahmed Ahmim), ISBN13: 9781522518297, IGI Global, USA, 2016, pp. 179-214.

[BC19] Matin Saad Abdullah and Al-Sakib Khan Pathan, “Teaching and Learning Qur’anic Arabic Utilizing Adaptive and Intelligent Systems for Collaborative Online Learning,” Handbook of Applied Learning Theory and Design in Modern Education (Edited by Elena Railean, Gabriela Walker, Liz Jackson, and Atilla Elci), IGI Global, USA, 2015, pp. 165-186.

[BC18] Al-Sakib Khan Pathan and Imran Yusof, “Tackling Cross-Site Scripting (XSS) Attacks in the Cyberspace,” Securing Cyber-Physical Systems (Edited by Al-Sakib Khan Pathan), ISBN: 9781498700986, CRC Press, Taylor & Francis Group, USA, 2015, pp. 331-348.

[BC17] Al-Sakib Khan Pathan, “Basics of Security and Cryptography,” Practical Cryptography: Algorithms and Implementations using C++ (Edited by Saiful Azad and Al-Sakib Khan Pathan), ISBN: 978-1-48-222889-2, CRC Press, Taylor & Francis Group, USA, pp. 1-10.

[BC16] Al-Sakib Khan Pathan and Tarem Ahmed, "An Innovative Approach of Blending Security Features in Energy-Efficient Routing for a Crowded Network of Wireless Sensors," The State of the Art in Intrusion Prevention and Detection (Edited by Al-Sakib Khan Pathan), ISBN: 9781482203516, CRC Press, Taylor & Francis Group, USA, January 2014, pp. 449-472.

[BC15] Mohssen Mohammed and Al-Sakib Khan Pathan, "Using Routers and Honeypots in Combination for Collecting Internet Worm Attacks," The State of the Art in Intrusion Prevention and Detection (Edited by Al-Sakib Khan Pathan), ISBN: 9781482203516, CRC Press, Taylor & Francis Group, USA, January 2014, pp. 47-84

[BC14] Al-Sakib Khan Pathan, "Analyzing Trust and Security in Computing and Communications Systems," Managing Trust in Cyberspace (Edited by Sabu M. Thampi, Bharat Bhargava, and Pradeep Atrey), ISBN 9781466568440, Chapman and Hall/CRC Press, USA, 2013, pp. 1-11.

[BC13] Al-Sakib Khan Pathan, Shapla Khanam, Habibullah Yusuf Saleem, and Wafaa Mustafa Abduallah, “Tackling Intruders in Wireless Mesh Networks,” Distributed Network Intelligence, Security and Applications (Edited by Qurban A Memon), ISBN 9781466559578, CRC Press, Taylor & Francis Group, USA, 2013, pp. 167-190.

[BC12] Abdelgadir Tageldin Abdelgadir and Al-Sakib Khan Pathan, "A Pragmatic Approach of Performance Evaluation of MPI-OpenMP on a 12 nodes Multi-core Cluster," Building Next-Generation Converged Networks: Theory and Practice (Edited by Al-Sakib Khan Pathan, Muhammad Mostafa Monowar, and Zubair Md. Fadlullah), ISBN: 9781466507616, CRC Press, Taylor & Francis Group, USA, 2013, 437-450.

[BC11] Homero Toral-Cruz, Julio Cesar Ramirez-Pacheco, Pablo Velarde-Alvarado, and Al-Sakib Khan Pathan, “VoIP in Next Generation Converged Networks,” Building Next-Generation Converged Networks: Theory and Practice (Edited by Al-Sakib Khan Pathan, Muhammad Mostafa Monowar, and Zubair Md. Fadlullah), ISBN: 9781466507616, CRC Press, Taylor & Francis Group, USA, 2013, pp. 337-360.

[BC10] Diallo Abdoulaye Kindy and Al-Sakib Khan Pathan, “A Walk through SQL Injection: Vulnerabilities, Attacks, and Countermeasures in Current and Future Networks,” Building Next-Generation Converged Networks: Theory and Practice (Edited by Al-Sakib Khan Pathan, Muhammad Mostafa Monowar, and Zubair Md. Fadlullah), ISBN: 9781466507616, CRC Press, Taylor & Francis Group, USA, 2013, pp. 171-197.

[BC09] Mostafa M. Fouda, Zubair Md. Fadlullah, Al-Sakib Khan Pathan, and Nei Kato, "Peer-to-Peer Video-On-Demand in Future Internet," Building Next-Generation Converged Networks: Theory and Practice (Edited by Al-Sakib Khan Pathan, Muhammad Mostafa Monowar, and Zubair Md. Fadlullah), ISBN: 9781466507616, CRC Press, Taylor & Francis Group, USA, 2013, pp. 119-134.

[BC08] Al-Sakib Khan Pathan, “Security Management in Heterogeneous Distributed Sensor Networks,” IT Policy and Ethics: Concepts, Methodologies, Tools, and Applications, ISBN13: 9781466629196, Information Resources Management Association (USA), IGI Global Publishers, USA, February 2013, pp. 773-793. (This chapter was re-printed in this volume as a reference material by IGI Global for greater visibility)

[BC07] Abror Abduvaliyev, Al-Sakib Khan Pathan, Jianying Zhou, Rodrigo Roman, and Wai-Choong Wong, "Intrusion Detection and Prevention in Wireless Sensor Networks," Wireless Sensor Networks: Current Status and Future Trends (Edited by Shafiullah Khan, Al-Sakib Khan Pathan, and Nabil A. Alrajeh), ISBN 9781466506060, Auerbach Publications, CRC Press, Taylor & Francis Group, USA, 2012, pp. 487-510.

[BC06] Al-Sakib Khan Pathan, “Security Management in Heterogeneous Distributed Sensor Networks,” Ubiquitous Multimedia and Mobile Agents: Models and Implementations. (Edited by Susmit Bagchi), ISBN: 9781613501078, IGI Global Publishers, USA, 2011, pp. 274-294.

[BC05] Kai Lin, Lei Shu, Lei Wang, and AI-Sakib Khan Pathan, "Data gathering with Multi-attribute Fusion in Wireless Sensor Networks," Advancements in Distributed Computing and Internet Technologies: Trends and Issues (Edited by Al-Sakib Khan Pathan, Mukaddim Pathan, and Hae Young Lee), ISBN: 978-1-61350-110-8, IGI Global Publishers, USA, 2011, pp. 159-181.

[BC04] Al-Sakib Khan Pathan, “Major Works on the Necessity and Implementations of PKC in WSN A Beginner’s Note,” Security of Self-Organizing Networks: MANET, WSN, WMN, VANET. (Edited by Al-Sakib Khan Pathan), ISBN: 978-1-4398-1919-7, Auerbach Publications, CRC Press, Taylor & Francis Group, USA, 2010, pp. 525-544.

[BC03] Al-Sakib Khan Pathan, "Denial of Service in Wireless Sensor Networks: Issues and Challenges," Advances in Communications and Media Research, Vol. 6 (Edited by Anthony V. Stavros), ISBN: 978-1-60876-576-8, Nova Science Publishers, Inc., USA, 2010. [Invited Short Communication]

[BC02] Al-Sakib Khan Pathan and Choong Seon Hong, "Security Attacks and Challenges in Wireless Sensor Networks," Encyclopedia On Ad Hoc And Ubiquitous Computing: Theory and Design of Wireless Ad Hoc, Sensor, and Mesh Networks, (Edited by Dharma P. Agrawal and Bin Xie), World Scientific Publishing, ISBN 978-981-283-348-8, September 2009, pp. 397-426. [Invited Book Chapter]

[BC01] Al-Sakib Khan Pathan and Choong Seon Hong, "Routing in Mobile Ad Hoc Networks," Guide to Wireless Ad Hoc Networks, Springer London, (Edited by Sudip Misra, Isaac Woungang, and Subhas Chandra Misra), DOI: 10.1007/978-1-84800-328-6_4, ISBN: 978-1-84800-327-9, 2009, pp. 59-96.


Refereed International Journal Papers/Magazines (some Open Access Papers' links are given)


[J82] Owais Nazir, Aruna Malik, Samayveer Singh, and Al-Sakib Khan Pathan, “Multi Speaker Text-to-Speech Synthesis Using Generalized End-to-End Loss Function,” Multimedia Tools and Applications, Springer, DOI: 10.1007/s11042-024-18121-2, 2024. (To Appear)

[J81] Shiwen Zhang, Biao Hu, Wei Liang, Kuan-Ching Li, and Al-Sakib Khan Pathan, “A Trajectory Privacy-Preserving Scheme Based on Transition Matrix and Caching for IIoT,” IEEE Internet of Things Journal, Volume: 11, Issue: 4, IEEE, 2024, pp. 5745-5756, DOI: 10.1109/JIOT.2023.3308073.

[J80] Chahrazed Benrebbouh, Houssem Mansouri, Sarra Cherbal, and Al-Sakib Khan Pathan, “Enhanced Secure and Efficient Mutual Authentication Protocol in IoT-based Energy Internet using Blockchain,” Peer-to-Peer Networking and Applications, Springer, 2023, DOI: 10.1007/s12083-023-01580-z.

[J79] Dezhi Han, HongXu Zhou, Tien-Hsiung Weng, Zhongdai Wu, Bing Han, Kuan-Ching Li, and Al-Sakib Khan Pathan, “LMCA: A Lightweight Anomaly Network Traffic Detection Model Integrating Adjusted MobileNet and Coordinate Attention mechanism for IoT,” Telecommunication Systems, 84, Springer, pp. 549–564, DOI: 10.1007/s11235-023-01059-5.

[J78] Muhammet Ali Karabulut, A. F. M. Shahen Shah, Haci Ilhan, Al-Sakib Khan Pathan, and Mohammed Atiquzzaman, “Inspecting VANET from Various Critical Angles – A Systematic Review,” Ad Hoc Networks, Elsevier, Volume 150, 103281, November 2023.

[J77] Chahrazed Benrebbouh, Houssem Mansouri, Sarra Cherbal, and Al-Sakib Khan Pathan, “A Lightweight Security Scheme to Defend Against Quantum Attack in IoT-based Energy Internet,” International Journal of Sensor Networks, Inderscience Publishers, Vol. 43, No. 1, DOI: 10.1504/IJSNET.2023.133813, 2023, pp. 13-26.

[J76] Mohiuddin Ahmed, A.F.M. Suaib Akhter, A.N.M. Bazlur Rashid, and Al-Sakib Khan Pathan, “A Dependable and Secure Consensus Algorithm for Blockchain Assisted Microservice Architecture,” Computers and Electrical Engineering, Volume 109, Part B, Elsevier, August 2023, 108762, DOI: 10.1016/j.compeleceng.2023.108762.

[J75] Md. Al-Masrur Khan, Seong-Hoon Kee, Al-Sakib Khan Pathan, and Abdullah-Al Nahid, "Image Processing Techniques for Concrete Crack Detection: A Scientometrics Literature Review," Remote Sensing, 15(9), 2400, MDPI, 2023, DOI:10.3390/rs15092400.

[J74] A. F. M. Shahen Shah, Muhammet Ali Karabulut, A.F.M. Suaib Akhter, Nazifa Mustari, Al-Sakib Khan Pathan, Khaled Rabie, Thokozani Shongwe, "On the Vital Aspects and Characteristics of Cryptocurrency – A Survey," IEEE Access, Volume 11, 2023, DOI: 10.1109/ACCESS.2023.3240103, pp. 9451-9468.

[J73] Saifur Rahman Sabuj, Mohammad Saadman Alam, Majumder Haider, Md Akbar Hossain, and Al-Sakib Khan Pathan, “Low Altitude Satellite Constellation for Futuristic Aerial-Ground Communications,” Computer Modeling in Engineering & Sciences, Volume 136, Number 2, Tech Science Press, 2023, pp. 1053-1089, DOI: 10.32604/cmes.2023.024078.

[J72] A.F.M. Suaib Akhter, Tawsif Zaman Arnob, Ekra Binta Noor, Selman Hizal, and Al-Sakib Khan Pathan, "An Edge-Supported Blockchain-Based Secure Authentication Method and a Cryptocurrency-Based Billing System for P2P Charging of Electric Vehicles," Entropy, MDPI, 24(11), 1644, 2022, DOI: 10.3390/e24111644.

[J71] A.F.M. Suaib Akhter, Mohiuddin Ahmed, Adnan Anwar, A F M Shahen Shah, Al-Sakib Khan Pathan, and Ahmet Zengin, “Blockchain in Vehicular Ad hoc Networks: Applications, Challenges and Solutions,” International Journal of Sensor Networks, Vol. 40, No. 2, Inderscience Publishers, 2022, pp. 94-130.

[J70] Rachida Hireche, Houssem Mansouri, and Al-Sakib Khan Pathan, “Security and Privacy Management in Internet of Medical Things (IoMT): A Synthesis,” Journal of Cybersecurity and Privacy, MDPI, 2022, 2(3), pp. 640-661, DOI:10.3390/jcp2030033.

[J69] Alaa H. Abdulaal, A. F. M. Shahen Shah, and Al-Sakib Khan Pathan, "NM-LEACH: A Novel Modified LEACH Protocol to Improve Performance in WSN," International Journal of Communication Networks and Information Security, Vol. 14, No. 1, April 2022, pp. 1-10.

[J68] Mounya Smara, Makhlouf Aliouat, Saad Harous, and Al-Sakib Khan Pathan, “Robustness Improvement of Component-based Cloud Computing Systems,” The Journal of Supercomputing, Volume 78, Springer, 2022, DOI: 10.1007/s11227-021-04054-2, pp. 4977–5009.

[J67] A.N.M. Bazlur Rashid, Mohiuddin Ahmed, and Al-Sakib Khan Pathan, "Infrequent Pattern Detection for Reliable Network Traffic Analysis using Robust Evolutionary Computation," Sensors, 21(9), 3005, MDPI, 2021, DOI: 10.3390/s21093005.

[J66] Shaik Shakeel Ahamad and Al-Sakib Khan Pathan, "A Formally Verified Authentication Protocol in Secure Framework for Mobile Healthcare During COVID-19-like Pandemic," Connection Science, Taylor & Francis, Volume 33, Issue 3, 2021, DOI: 10.1080/09540091.2020.1854180.

[J65] Abdul Hamid, Monsur Alam, Hafsina Sheherin, and Al-Sakib Khan Pathan, "Cyber Security Concerns in Social Networking Service," International Journal of Communication Networks and Information Security, Vol. 12, No. 2, August 2020, pp. 198-212.

[J64] Mohiuddin Ahmed and Al-Sakib Khan Pathan, "False Data Injection Attack (FDIA): An Overview and New Metrics for Fair Evaluation of its Countermeasure," Complex Adaptive Systems Modeling, Springer Open, 8, Article number: 4, 2020, DOI:10.1186/s40294-020-00070-w.

[J63] Mohiuddin Ahmed and Al-Sakib Khan Pathan, "The Blockchain: Can it be trusted?," IEEE Computer, Volume: 53, Issue: 4, April 2020, pp. 31-35.

[J62] Mohiuddin Ahmed and Al-Sakib Khan Pathan, "Deep Learning for Collective Anomaly Detection," International Journal of Computational Science and Engineering, Vol. 21, No. 1, Inderscience Publishers, 2020, pp. 137-145.

[J61] Houssem Mansouri and Al-Sakib Khan Pathan, “Checkpointing distributed computing systems: an optimization approach,” International Journal of High Performance Computing and Networking, Vol. 15, Nos. 3/4, Inderscience Publishers, 2019, pp. 202-209.

[J60] Kalpana Murugan and Al-Sakib Khan Pathan, "A Routing Algorithm for Extending Mobile Sensor Network’s Lifetime using Connectivity and Target Coverage," International Journal of Communication Networks and Information Security, Vol. 11, No. 2, August 2019, pp. 290-296.

[J59] Shaik Shakeel Ahamad and Al-Sakib Khan Pathan, “Trusted Service Manager (TSM) based Privacy Preserving and Secure Mobile Commerce Framework with Formal Verification,” Complex Adaptive Systems Modeling, Springer Open, 7:3, 2019.

[J58] Leila Kheroua, Samira Moussaoui, Mohamed Guerroumi, and Al-Sakib Khan Pathan, "Two energy and time-efficient data dissemination protocols for large scale wireless sensor networks," Telecommunication Systems, Springer, Volume 70, Issue 1, January 2019, pp. 81-96.

[J57] Mohamed Guerroumi and Al-Sakib Khan Pathan, "Hybrid Data Dissemination Protocol (HDDP) for Wireless Sensor Networks," Wireless Networks, Springer, Volume 24, Issue 5, July 2018, pp. 1739–1754.

[J56] Ali Safaa Sadiq, Basem Alkazemi, Seyedali Mirjalili, A. Noraziah, Suleman Khan, Ihsan Ali, Al-Sakib Khan Pathan, Kayhan Zrar Ghafoor, "An Efficient IDS Using Hybrid Magnetic Swarm Optimization in WANETs," IEEE Access, Volume 6, 2018, pp. 29041-29053.

[J55] Rahat Ali Khan and Al-Sakib Khan Pathan, "The State of the Art Wireless Body Area Sensor Networks – A Survey," International Journal of Distributed Sensor Networks, SAGE publications, Volume 14(4), 2018, DOI: 10.1177/1550147718768994.

[J54] Kutub Thakur, Juan Shan, and Al-Sakib Khan Pathan, “Innovations of Phishing Defense: The Mechanism, Measurement and Defense Strategies,” International Journal of Communication Networks and Information Security, Vol. 10, No. 1, April 2018, pp. 19-27.

[J53] Houssem Mansouri, Nadjib Badache, Makhlouf Aliouat, and Al-Sakib Khan Pathan, “Checkpointing distributed application running on mobile ad hoc networks,” International Journal of High Performance Computing and Networking, Inderscience Publishers, Vol. 11, No. 2, 2018, pp. 95-107.

[J52] Dilara Ireen Swarna, Saiful Azad, Al-Sakib Khan Pathan, and Arafatur Rahman, “Finding a suitable hop-to-hop busty traffic transmission approach for Underwater Acoustic Networks: handshake-based vs handshake-free MAC protocols,” International Journal of Ad Hoc and Ubiquitous Computing, Inderscience Publishers, Vol. 27, No. 3, 2018, pp. 222-231.

[J51] Mohamed Guerroumi, Al-Sakib Khan Pathan, Abdelouahid Derhab, Nadjib Badache, and Samira Moussaoui, “MMSMAC: A Multi-mode Medium Access Control Protocol for Wireless Sensor Networks with Latency and Energy-Awareness,” Wireless Personal Communications, Volume 96, Issue 4, October 2017, Springer, pp. 4973-5010, DOI: 10.1007/s11277-016-3726-6.

[J50] Saiful Azad, Arafatur Rahman, A. Taufiq Asyhari, and Al-Sakib Khan Pathan, “Crowd Associated Network: Exploiting over Smart Garbage Management System,” IEEE Communications Magazine, Volume: 55, Issue: 7, 2017, pp. 186-192.

[J49] Mounya Smara, Makhlouf Aliouat, Al-Sakib Khan Pathan, Zibouda Aliouat, "Acceptance Test for Fault Detection in Component-based Cloud Computing and Systems," Future Generation Computer Systems, Elsevier, Volume 70, May 2017, pp. 74-93, DOI: 10.1016/j.future.2016.06.030.

[J48] Matin Saad Abdullah, Al-Sakib Khan Pathan, and Imad Fakhri Al Shaikhli, “A Web and Software-based Approach Blending Social Networks for Online Qur’anic Arabic Learning,” The International Arab Journal of Information Technology, Vol. 14, No. 1, January 2017, pp. 80-90.

[J47] Malak Abdullah I. Almarshad, Mohssen M. Z. E. Mohammed, and Al-Sakib Khan Pathan, “Detecting Zero-day Polymorphic Worms with Jaccard Similarity Algorithm,” International Journal of Communication Networks and Information Security, Vol. 8, No. 3, December 2016, pp. 203-214.

[J46] N.M. Masoodhu Banu, S. Sujatha, and Al-Sakib Khan Pathan, “Skip Block based Distributed Source Coding for Hyperspectral Image Compression,” Multimedia Tools and Applications (2015), Volume 75, Issue 18, September 2016, pp 11267-11289, Springer US, DOI: 10.1007/s11042-015-2852-6.

[J45] Kalpana Murugan and Al-Sakib Khan Pathan, “Prolonging the Lifetime of Wireless Sensor Networks using Secondary Sink Nodes,” Telecommunication Systems, Volume 62, Issue 2, June 2016, Springer US, pp. 347-361, DOI: 10.1007/s11235-015-0079-5.

[J44] Djallel Eddine Boubiche, Sabrina Boubiche, Homero Toral-Cruz, Al-Sakib Khan Pathan, Azzedine Bilami, Samir Athmani, “SDAW: Secure Data Aggregation Watermarking-based Scheme in Homogeneous WSNs,” Telecommunication Systems, Volume 62, Issue 2, June 2016, Springer US, pp. 277-288, DOI:10.1007/s11235-015-0047-0.

[J43] Imran Yusof and Al-Sakib Khan Pathan, “Mitigating Cross-Site Scripting Attacks with a Content Security Policy,” IEEE Computer, Volume: 49, Issue: 3, March 2016, pp. 56-63.

[J42] Tarem Ahmed, Al-Sakib Khan Pathan, and Supriyo Shafkat Ahmed, "Learning Algorithms for Anomaly Detection from Images," International Journal of System Dynamics Applications, IGI Global, Volume 4, Issue 3, July - September 2015, pp. 43-69.

[J41] Houssem Mansouri, Nadjib Badache, Makhlouf Aliouat, and Al-Sakib Khan Pathan, “A New Efficient Checkpointing Algorithm for Distributed Mobile Computing,” Journal of Control Engineering and Applied Informatics, Vol.17, No.2, 2015, pp. 43-54.

[J40] Al-Sakib Khan Pathan and Mohssen M. Z. E. Mohammed, “Building Customer Trust in Cloud Computing with an ICT-enabled Global Regulatory Body,” Wireless Personal Communications, Volume 85, Issue 1, November 2015, pp. 77-99, Springer, DOI: 10.1007/s11277-015-2729-z.

[J39] Saiful Azad, Khandaker Tabin Hasan, Dip Nandi, and Al-Sakib Khan Pathan, "A High-Throughput Routing Metric for Multi-Hop Underwater Acoustic Networks," Computers and Electrical Engineering, Volume 44, Elsevier, May 2015, DOI:10.1016/j.compeleceng.2015.03.020, pp. 24-33.

[J38] Dieynaba Mall, Karim Konaté, and Al-Sakib Khan Pathan, "Key Revocation in Wireless Sensor Networks – A Survey on a Less-addressed yet Vital Issue," International Journal of Ad Hoc and Ubiquitous Computing, Inderscience Publishers, Vol. 18, Nos. 1/2, 2015, pp. 3-22.

[J37] Mohamed Guerroumi, Al-Sakib Khan Pathan, Nadjib Badache, and Samira Moussaoui, “On the Medium Access Control Protocols Suitable for Wireless Sensor Networks – A Survey,” International Journal of Communication Networks and Information Security, Vol. 6, No. 2, 2014, pp. 89-103.

[J36] Al-kindy Athman Abdalla, and Al-Sakib Khan Pathan, “On Protecting Data Storage in Mobile Cloud Computing Paradigm,” IETE Technical Review, Volume 31, Issue 1, 2014, DOI:10.1080/02564602.2014.891382, pp. 82-91. (This paper is recognized as the "Most Read article" during the period, May 2014-January 2016)

[J35] Wafaa Mustafa Abduallah, Abdul Monem S. Rahma, and Al-Sakib Khan Pathan, "Mix Column Transform based on Irreducible Polynomial Mathematics for Color Image Steganography: A Novel Approach," Computers and Electrical Engineering, Volume 40, Issue 4, 2014, Elsevier, DOI: 10.1016/j.compeleceng.2014.02.007, pp. 1390-1404.

[J34] Shazana Md Zin, Nor Badrul Anuar, Miss Laiha Mat Kiah, and Al-Sakib Khan Pathan, “Routing Protocol Design for Secure WSN: Review and Open Research Issues,” Journal of Network and Computer Applications, Volume 41, 2014, Elsevier, DOI: 10.1016/j.jnca.2014.02.008, pp. 517–530.

[J33] Al-Sakib Khan Pathan and Diallo Abdoulaye Kindy, “Lethality of SQL Injection against Current and Future Internet-Technologies,” International Journal of Computational Science and Engineering, Vol. 9, No. 4, 2014, Inderscience Publishers, pp. 386-394.

[J32] Tarem Ahmed, Supriyo Ahmed, and Al-Sakib Khan Pathan, “Automated Surveillance in Distributed, Visual Networks: An Empirical Comparison of Recent Algorithms,” International Journal of Control and Automation, SERSC Publisher, Vol.7, No.3, 2014, DOI: 10.14257/ijca.2014.7.3.37, pp.389-400.

[J31] Al-Sakib Khan Pathan, "Fi-Wi Network for Future Cloud," International Journal of Applied Research on Information Technology and Computing, Volume 4, Issue 3, December 2013, pp. 122-132.

[J30] Mohamed Guerroumi, Al-Sakib Khan Pathan, Nadjib Badache, and Samira Moussaoui, “Strengths and Weaknesses of Prominent Data Dissemination Techniques in Wireless Sensor Networks,” International Journal of Communication Networks and Information Security, Vol. 5, No. 3, 2013, pp. 158-177.

[J29] Sherali Zeadally, Al-Sakib Khan Pathan, Cristina Alcaraz, and Mohamad Badra, "Towards Privacy Protection in Smart Grid," Wireless Personal Communications, Springer, DOI 10.1007/s11277-012-0939-1, Volume 73, Issue 1, November 2013, pp 23-50. (This article was included in IEEE Communications Society's (IEEE ComSoc) Best Readings Topics on Communications and Information Systems Security, 2013 under the category of “Privacy”)

[J28] Diallo Abdoulaye Kindy and Al-Sakib Khan Pathan, “A Detailed Survey on various aspects of SQL Injection in Web Applications: Vulnerabilities, Innovative Attacks and Remedies,” International Journal of Communication Networks and Information Security, Vol. 5, No. 2, August 2013, pp. 80-92.

[J27] Abror Abduvaliyev, Al-Sakib Khan Pathan, Jianying Zhou, Rodrigo Roman, and Wai-Choong Wong, "On the Vital Areas of Intrusion Detection Systems in Wireless Sensor Networks," IEEE Communications Surveys & Tutorials, DOI: 10.1109/SURV.2012.121912.00006, Volume: 15, Issue: 3, Third Quarter 2013, pp. 1223-1237. (This article was included in IEEE Communications Society's (IEEE ComSoc) Best Readings Topics on Communications and Information Systems Security, 2013 under the category of “Intrusion Detection Systems”)

[J26] Homero Toral-Cruz, Al-Sakib Khan Pathan, and Julio C. Ramírez Pacheco, "Accurate Modeling of VoIP Traffic QoS Parameters in Current and Future Networks with Multifractal and Markov Models," Mathematical and Computer Modelling, Elsevier, DOI: 10.1016/j.mcm.2011.12.007, Volume 57, Issues 11–12, June 2013, pp. 2832-2845.

[J25] Feyza Gündüz and Al-Sakib Khan Pathan, "On the Key Factors of Usability in Small-sized Mobile Touch-Screen Application,” International Journal of Multimedia and Ubiquitous Engineering, SERSC Publisher, Vol. 8, No. 3, May 2013, pp. 115-137.

[J24] Harry Tin Win and Al-Sakib Khan Pathan, "On the Issues and Challenges of Fiber-Wireless (Fi-Wi) Networks," Journal of Engineering, Hindawi Publishing Corporation, Volume 2013, Article ID 645745, pp. 1-11.

[J23] Xianglin Wei, Jianhua Fan, Ming Chen, Tarem Ahmed, and Al-Sakib Khan Pathan, "SMART: A Subspace based Malicious Peers Detection algorithm for P2P Systems," International Journal of Communication Networks and Information Security, Vol. 5, No. 1, April 2013, pp. 1-9.

[J22] Wafaa Mustafa Abduallah, Abdul Monem S. Rahma, and Al-Sakib Khan Pathan, "A New Data Hiding Technique Based on Irreducible Polynomials," Journal of Emerging Technologies in Web Intelligence, Academy Publisher, Volume 5, No. 1, 2013, pp. 45-51.

[J21] Al-Sakib Khan Pathan, Wafaa Mustafa Abduallah, Shapla Khanam, and Habibullah Yusuf Saleem, "A Pay-and-Stay Model for Tackling Intruders in Hybrid Wireless Mesh Networks," SIMULATION: Transactions of The Society for Modeling and Simulation International, DOI: 10.1177/0037549712467827, Volume 89, Issue 5, May 2013, pp. 616-633.

[J20] Tarem Ahmed, Xianglin Wei, Supriyo Ahmed, and Al-Sakib Khan Pathan, "Efficient and Effective Automated Surveillance Agents using Kernel Tricks," SIMULATION: Transactions of The Society for Modeling and Simulation International, DOI: 10.1177/0037549712460908, Volume 89, Issue 5, May 2013, pp. 562-577.

[J19] Hassen Mohammed Alsafi, Wafaa Mustafa Abduallah, and Al-Sakib Khan Pathan, "IDPS: An Integrated Intrusion Handling Model for Cloud Computing Environment," International Journal of Computing & Information Technology, Volume 4, Number 1, Jan-June 2012, pp. 1-16.

[J18] Tarem Ahmed, Xianglin Wei, Supriyo Ahmed, and Al-Sakib Khan Pathan, "Automated Intruder Detection from Image Sequences using Minimum Volume Sets," International Journal of Communication Networks and Information Security, Volume 4, Number 1, April 2012, pp. 11-17.

[J17] Muhammad Mostafa Monowar, Md. Obaidur Rahman, Al-Sakib Khan Pathan, and Choong Seon Hong, “Prioritized Heterogeneous Traffic-oriented Congestion Control Protocol for Wireless Sensor Network,” The International Arab Journal of Information Technology, Volume 9, No.1, January 2012, pp. 39-48.

[J16] Mohammad Moshee Uddin, Al-Sakib Khan Pathan, Mohiuddin Ahmed, and Shariq Haseeb, “Experimental Analysis of MIPL Based Mobile IPv6 Using Single vs Dual Interface with Practical Test-Beds,” International Journal of Applied Research on Information Technology and Computing, Volume 2, Issue 3, December 2011, pp. 61-79 .

[J15] Abdelgadir Tageldin Abdelgadir, Mohiuddin Ahmed, Al-Sakib Khan Pathan, Ariff Abdullah, and Shariq Haseeb, "Performance Analysis of a Highly Available Home Agent in Mobile Networks," American Journal of Applied Sciences, Volume 8, Issue 12, DOI: 10.3844/ajassp.2011.1388.1397, Science Publications, USA, 2011, pp. 1388-1397.

[J14] Al-Sakib Khan Pathan, Muhammad Mostafa Monowar, Jinfang Jiang, Lei Shu, and Guangjie Han, "An Efficient Approach of Secure Group Association Management in Densely Deployed Heterogeneous Distributed Sensor Network," Security and Communication Networks, Wiley InterScience, DOI: 10.1002/sec.277, Volume 4, Issue 9, August 2011, pp. 1013–1026.

[J13] Nazmus Saquib, Md. Sabbir Rahman Sakib, and Al-Sakib Khan Pathan, "ViSim: A User-Friendly Graphical Simulation Tool for Performance Analysis of MANET Routing Protocols," Mathematical and Computer Modelling, Elsevier, Volume 53, Issues 11-12, June 2011, pp. 2204-2218.

[J12] Khadija Rasul, Nujhat Nuerie, and Al-Sakib Khan Pathan, “Securing Wireless Sensor Networks with An Efficient B+ Tree-Based Key Management Scheme,” International Journal of Communication Networks and Information Security, Volume 2, Number 3, December 2010, pp. 162-168.

[J11] Mohammad Ziaur Rahman and Al-Sakib Khan Pathan, "A Case Study - Establishing Redundant Access Networks in the Telecommunication Sector of a Developing Country," International Journal of Information Technology, Communications, and Convergence, Inderscience Publishers, Volume 1, No. 1, 2010, pp. 108-126.

[J10] Mohammad Ziaur Rahman and Al-Sakib Khan Pathan, "A Case Study: Submarine Cable in Bangladesh - Its Prospects, Present Status, and Challenges Ahead," International Journal of Applied Research on Information Technology and Computing, Volume 1, Number 2, May-August 2010, pp. 209-223.

[J09] Al-Sakib Khan Pathan, "A Review and Cryptanalysis of Similar Timestamp-Based Password Authentication Schemes Using Smart Cards," International Journal of Communication Networks and Information Security, Volume 2, Number 1, April 2010, pp. 15-20.

[J08] Al-Sakib Khan Pathan and Choong Seon Hong, "Weakly connected dominating set-based secure clustering and operation in distributed sensor networks," International Journal of Communication Networks and Distributed Systems, DOI: 10.1504/IJCNDS.2009.026825, Inderscience Publishers, Volume 3, Number 2, 2009, pp. 175-195. (Conference version appeared in HPCC 2006)

[J07] Md. Mokammel Haque, Al-Sakib Khan Pathan, Choong Seon Hong, and Eui-Nam Huh, "An Asymmetric Key-Based Security Architecture for Wireless Sensor Networks," KSII Transactions on Internet and Information Systems, DOI: 10.3837/tiis.2008.05.004, Volume 2, Number 5, October 2008, pp. 265-279. (Conference version appeared in IEEE MILCOM 2007) [Open Access] (One of the top 10 downloaded papers in May-June 2009)

[J06] Al-Sakib Khan Pathan and Choong Seon Hong, "SERP: Secure Energy-efficient Routing Protocol for Densely Deployed Wireless Sensor Networks," Annals of Telecommunications, DOI: 10.1007/s12243-008-0042-5, Volume 63, Numbers 9-10, October 2008, pp. 529-541. (Conference version appeared in ISPA 2007)

[J05] Al-Sakib Khan Pathan, Muhammad Mostafa Monowar, Md. Forhad Rabbi, Muhammad Mahbub Alam, and Choong Seon Hong, "NAMP: Neighbor Aware Multicast Routing Protocol for Mobile Ad Hoc Networks," The International Arab Journal of Information Technology, Vol. 5, No. 1, January 2008, pp. 102-107. (Conference version appeared in IEEE E-Tech 2004)

[J04] Al-Sakib Khan Pathan and Choong Seon Hong, "A Security Enhanced Timestamp-Based Password Authentication Scheme Using Smart Cards," IEICE Transactions on Information and Systems, Volume E90-D, No. 11, November, 2007, pp. 1885-1888. (Conference version appeared in IEEE ICACT 2007)

[J03] Tran Thanh Dai, Al-Sakib Khan Pathan, and Choong Seon Hong, "A Resource-Optimal Key Pre-distribution Scheme with Improved Security for Wireless Sensor Networks," The 9th Asia-Pacific Network Operations and Management Symposium (APNOMS 2006), Busan, Korea, (Y.-T. Kim and M. Takano Eds.), Lecture Notes in Computer Science (LNCS), Volume 4238, Springer-Verlag 2006, pp. 546-549. (acceptance rate: 26.7%)

[J02] Al-Sakib Khan Pathan and Choong Seon Hong, "A Key-Predistribution-Based Weakly Connected Dominating Set for Secure Clustering in DSN," The 2006 International Conference on High Performance Computing and Communications (HPCC 2006), Munich, Germany, (M. Gerndt and D. Kranzlmüller Eds.), Lecture Notes in Computer Science (LNCS), Volume 4208, Springer-Verlag 2006, pp. 270-279. (acceptance rate: 29%)

[J01] Al-Sakib Khan Pathan and Humayun Kadir Islam, "A Study on the Key Factors for Effective E-Learning," Asian Journal of Information Technology, Volume 4 Number 1, 2005, pp. 49-52.


Papers in other Lecture Notes in Computer Science (LNCS) Volumes (non-SCIE)


[LN08] Shapla Khanam, Habibullah Saleem, and Al-Sakib Khan Pathan, "An Efficient Detection Model of Selective Forwarding Attacks in Wireless Mesh Networks," Proceedings of IDCS 2012, 21-23 November 2012, Wu Yi Shan, Fujian, China, (Y. Xiang et al. (Eds.)) Lecture Notes in Computer Science (LNCS), Volume 7646, Springer-Verlag 2012, pp. 1–14, 2012.

[LN07] Abdelgadir Tageldin Abdelgadir, Al-Sakib Khan Pathan, Mohiuddin Ahmed, "On the Performance of MPI-OpenMP on a 12 nodes Multi-core Cluster," Proceedings of ICA3PP 2011 Workshops (IDCS Workshop), October 24-26, 2011, Melbourne, Australia, (Y. Xiang et al. (Eds.)): ICA3PP 2011, Part II, Lecture Notes in Computer Science (LNCS), Volume 7017, Springer-Verlag 2011, pp. 225–234, 2011.

[LN06] Homero Toral-Cruz, Al-Sakib Khan Pathan, and Julio C. Ramírez-Pacheco, "Modeling QoS Parameters of VoIP Traffic with Multifractal and Markov Models," Proceedings of ICA3PP 2011 Workshops (IDCS Workshop), October 24-26, 2011, Melbourne, Australia, (Y. Xiang et al. (Eds.)): ICA3PP 2011, Part II, Lecture Notes in Computer Science (LNCS), Volume 7017, Springer-Verlag 2011, pp. 255–265, 2011.

[LN05] Md. Sabbir Rahman Sakib, Nazmus Saquib, and Al-Sakib Khan Pathan, "A New Visual Simulation Tool for Performance Evaluation of MANET Routing Protocols," The 2010 International Symposium on Frontiers of Parallel and Distributed Computing (FPDC 2010) In conjunction with The 10th ICA3PP 2010, 23 May, 2010, Busan, Korea, (C.-H. Hsu et al. (Eds.)): ICA3PP 2010, Part II, Lecture Notes in Computer Science (LNCS), Volume 6082, Springer-Verlag 2010, pp. 208–217. [Invited Paper]

[LN04] Al-Sakib Khan Pathan, Jae Hyun Ryu, Md. Mokammel Haque, and Choong Seon Hong, "Security Management in Wireless Sensor Networks with a Public Key Based Scheme," The 10th Asia-Pacific Network Operations and Management Symposium (APNOMS 2007), 10-12 October, 2007, Sapporo, Japan, (Shingo Ata and Choong Seon Hong (Eds.)) Lecture Notes in Computer Science (LNCS), Volume 4773, Springer-Verlag 2007, pp. 503-506. (acceptance rate: 48.4%)

[LN03] Al-Sakib Khan Pathan and Choong Seon Hong, "A Secure Energy-Efficient Routing Protocol for WSN," The Fifth International Symposium on Parallel and Distributed Processing and Applications (ISPA 2007), August 29-31, Niagara Falls, Ontario, Canada, (Ivan Stojmenovic, Ruppa K. Thulasiram, Laurence T. Yang, Weijia Jia, Minyi Guo and Rodrigo F. de Mello (Eds.)), Lecture Notes in Computer Science (LNCS), Volume 4742, Springer-Verlag 2007, pp. 407-418. (acceptance rate: 34%)

[LN02] Al-Sakib Khan Pathan and Choong Seon Hong, "Securing Sensor Reports in Wireless Sensor Networks," European Conference on Parallel and Distributed Computing (Euro-Par 2007), August 28-31, Rennes, France, (A.-M. Kermarrec, L. Bougé, and T. Priol (Eds.)), Lecture Notes in Computer Science (LNCS), Volume 4641, Springer-Verlag 2007, pp. 881-890. (acceptance rate: 27%)

[LN01] Al-Sakib Khan Pathan, Tran Thanh Dai, and Choong Seon Hong, "A Key Management Scheme with Encoding and Improved Security for Wireless Sensor Networks," The 2006 International Conference on Distributed Computing and Internet Technology (ICDCIT 2006), December 20-23, Bhubaneswar, India, (S. Madria, K. Claypool, R. Kannan, and P. Uppuluri (Eds.)), Lecture Notes in Computer Science (LNCS), Volume 4317, Springer-Verlag 2006, pp. 102-115. (acceptance rate: 12%)


Papers in Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST) Volume


[LNT01] Wafaa Mustafa Abduallah, Abdul Monem S. Rahma, and Al-Sakib Khan Pathan, “Reversible Data Hiding Scheme based on 3-Least Significant Bits and Mix Column Transform,” 4th International Workshop on Applications and Techniques in Information Security (ATIS), 26 September 2013 with the 9th International Conference on Security and Privacy in Communication Networks (SecureComm 2013), September 25-27, 2013, Sydney, Australia, (Zia, T., Zomaya, A., Varadharajan, V., and Mao, M. (Eds.)), Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST), Volume 0127, Springer, 2013, pp. 405-417.


Editorial Articles in Refereed International Journals


[JE42] Fadi Al-Turjman, Al-Sakib Khan Pathan, and Fa Zhu, "Intelligent System Design and Optimisation for Next Generation Smart Applications," International Journal of Embedded Systems, Inderscience, 2024. (To Appear)

[JE41] Al-Sakib Khan Pathan, "Editor-in-chief’s foreword," International Journal of Computers and Applications, Volume ??, Issue ?, Taylor & Francis, 2024, pp. ??-??, DOI: 10.1080/1206212X.2024.2314926. (To Appear)

[JE40] Al-Sakib Khan Pathan, “Why Do Some IT Freelancers in Certain Countries Prefer Digital Payment with Cryptocurrency Despite it Being Illegal?,” International Journal of Computers and Applications, Volume 45, Issue 4, Taylor & Francis, 2023, pp. 285-287, DOI: 10.1080/1206212X.2023.2193778.

[JE39] Uttam Ghosh, Deepak Tosh, Nawab Muhammad Faseeh Qureshi, Ali Kashif Bashir, Al-Sakib Khan Pathan, and Zhaolong Ning, "Cyber-Physical Systems: Prospects, Challenges and Role in Software-Defined Networking and Blockchains," Future Internet, MDPI, 2022; 14(12): 382. https://doi.org/10.3390/fi14120382.

[JE38] Al-Sakib Khan Pathan, “On the Scale of Cyberspace and Cybersecurity,” International Journal of Computers and Applications, Volume 44, Issue 9, Taylor & Francis, 2022, DOI: 10.1080/1206212X.2022.2125185, pp. 805–806.

[JE37] Al-Sakib Khan Pathan, "COVID-19 Pandemic, Information and Communications Technology (ICT) and the Digital Divide," International Journal of Computers and Applications, Volume 44, Issue 1, Taylor & Francis, 2022, DOI: 10.1080/1206212X.2022.2020022, pp. 1-2.

[JE36] Al-Sakib Khan Pathan, Zubair Md. Fadlullah, Salimur Choudhury, and Mohamed Guerroumi, “Internet of Things for smart living,” Special Issue of Wireless Networks, Springer, 2019, DOI: 10.1007/s11276-019-01970-3. 27, 2021, pp. 4293–4295.

[JE35] Mubashir Husain Rehmani, Alan Davy, Brendan Jennings, Zeeshan Kaleem, Akhilesh Thyagaturu, Hassnaa Moustafa, and Al-Sakib Khan Pathan, "Software Defined Networks for Energy Internet and Smart Grid Communication," Guest Editorial of the Special Section of IEEE Access, Volume 9, 13 May 2021, pp. 69139-69142.

[JE34] Zubair Fadlullah, Mostafa M. Fouda, Al-Sakib Khan Pathan, Nidal Nasser, Abderrahim Benslimane, and Ying-Dar Lin, "Smart IoT Solutions For Combating COVID-19 Pandemic," Guest Editorial of the Special Issue of IEEE Internet of Things Magazine, Vol: 3, Issue: 3, Sep 2020, pp. 10-11.

[JE33] Al-Sakib Khan Pathan, “Access to information vs blocking of information during COVID-19 pandemic: a governance dilemma in the era of crowdsourcing based on ICT,” International Journal of Computers and Applications, 42:6, 2020, pp. 531-532, DOI: 10.1080/1206212X.2020.1767396.

[JE32] Fadi Al-Turjman, Ahmed Kama, Mubashir Husain Rehmani, Ayman Radwan, and Al-Sakib Khan Pathan, "Editorial: The Green Internet of Things (G-IoT)," Wireless Communications and Mobile Computing, Volume 2019, Article ID 6059343, Hindawi Publishing Corporation, 2 pages, DOI: 10.1155/2019/6059343.

[JE31] Al-Sakib Khan Pathan, "Technological Advancements and Innovations are Often Detrimental for Concerned Technology Companies," International Journal of Computers and Applications, Volume: 40, Issue: 04, DOI: 10.1080/1206212X.2018.1515412, 2018, pp. 189-191. (This is the most read editorial article for this journal during 2019-present)

[JE30] Junaid Chaudhry, Al-Sakib Khan Pathan, Mubashir Husain Rehmani, and Ali Kashif, "Threats to critical infrastructure from AI and human intelligence," Special Issue on Cyber Threats Against Critical Infrastructure and Their Countermeasures, Journal of Supercomputing, Volume 74, Issue 10, Springer, October 2018, pp. 4865–4866, DOI: 10.1007/s11227-018-2614-0.

[JE29] Al-Sakib Khan Pathan, Saiful Azad, Rasib Khan, and Luca Caviglione, "Security Mechanisms and Data Access Protocols in Innovative Wireless Networks," Special Issue of International Journal of Distributed Sensor Networks, Vol. 14(9), SAGE publications, September 2018, DOI: 10.1177/1550147718801476.

[JE28] Zubair Md. Fadlullah, Al-Sakib Khan Pathan, and Karan Singh, "Smart Grid Internet of Things," Guest Editorial of the Special Issue of ACM/Springer Mobile Networks and Applications, Volume 23, Issue 4, August 2018, pp. 879–880, DOI: 10.1007/s11036-017-0954-2.

[JE27] Al-Sakib Khan Pathan and Zubair Md. Fadlullah, "The Vastness of Applications of Computers and Computing Devices," Foreword from the Editors-in-Chief, International Journal of Computers and Applications, Taylor & Francis, Vol. 40, no. 2, 2018, pp. 61-62.

[JE26] Djallel Eddine Boubiche, Al-Sakib Khan Pathan, Jaime Lloret, Huiyu Zhou, Seongik Hong, Syed Obaid Amin, Mohamed Ali Feki, "Advanced Industrial Wireless Sensor Networks and Intelligent IoT," Guest Editorial of the Special Issue of IEEE Communications Magazine, February 2018, pp. 14-15.

[JE25] Al-Sakib Khan Pathan, “Wireless Network Technologies and Applications,” Guest Editorial of the Special Issue of International Journal of High Performance Computing and Networking, Inderscience Publishers, Vol. 11, No. 2, 2018, pp. 93-94.

[JE24] Junaid Qadir, Muhammad Mujeeb-U-Rahman, Mubashir Husain Rehmani, Al-Sakib Khan Pathan, Muhammad Ali Imran, Amir Hussain, Rajib Rana, and Bin Luo, "IEEE Access Special Section Editorial: Health Informatics For The Developing World," Guest Editorial of the Special Issue of IEEE ACCESS, Volume: 5, Issue:1, 2017, pp. 27818-27823, DOI: 10.1109/ACCESS.2017.2783118.

[JE23] Al-Sakib Khan Pathan, Yudong Zhang, Sambit Bakshi, Patrick Siarry, Pankaj Kumar Sa, Nabendu Chaki, and Agostino Cortesi, “Introduction to Special Issue on ‘Intelligent Computing and Adaptive Systems’,” Innovations in Systems and Software Engineering: A NASA Journal, Springer, 2017, DOI 10.1007/s11334-017-0307-0.

[JE22] M. Shamim Hossain, Changsheng Xu, Ying Li, Al-Sakib Khan Pathan, Josu Bilbao, Wenjun Zeng, and Abdulmotaleb El Saddik, “Impact of Next-Generation Mobile Technologies on IoT-Cloud Convergence,” Guest Editorial of the Special Issue of IEEE Communications Magazine, Volume: 55, Issue: 1, January 2017, pp. 18-19.

[JE21] Sabu M. Thampi, Joel J. P. C. Rodrigues, and Al-Sakib Khan Pathan, “Advances in Vehicular and Underwater Communication Networks,” Guest Editorial of the Special Issue of International Journal of Ad Hoc and Ubiquitous Computing, Vol. 24, Nos. 1/2, Inderscience Publishers, 2017, pp. 1-3.

[JE20] Al-Sakib Khan Pathan, Xianglin Wei, Homero Toral Cruz, and Luca Caviglione, “Preface: Security and Trust Issues in Peer-to-Peer Networks,” Guest Editorial of the Special Issue of International Journal of Computational Science and Engineering, Vol.13, No. 2, Inderscience Publishers, 2016, pp. 109-110.

[JE19] M. Shamim Hossain, Al-Sakib Khan Pathan, Stefan Goebel, Shawon M. Rahman, and Manzur Murshed, “Advances in Multimedia Sensor Networks for Health-Care and Related Applications,” Guest Editorial of the Special Issue of International Journal of Distributed Sensor Networks, vol. 2015, Article ID 596096, Hindawi Publishing Corporation, 2 pages, 2015. DOI:10.1155/2015/596096.

[JE18] Al-Sakib Khan Pathan, Zubair Muhammad Fadlullah, Mostafa M. Fouda, Muhammad Mostafa Monowar, and Philip Korn, “Information integrity in smart grid systems,” Guest Editorial of the Special Issue of Information Systems, Elsevier, DOI:10.1016/j.is.2015.05.002, 2015.

[JE17] Al-Sakib Khan Pathan, Muhammad Mostafa Monowar, Hani Alzaid, and Mohammad Asadul Hoque, “Understanding Converged Networks, Technologies and Applications,” Guest Editorial of the Special Issue on Converged Networks, Technologies and Applications of International Journal of Computational Science and Engineering, Vol. 10, No. 3, 2015, Inderscience Publishers, pp. 231-233.

[JE16] Neeraj Kumar, Al-Sakib Khan Pathan, Elias P. Duarte Jr., and Riaz Ahmed Shaikh, "Editorial: Critical Applications in Vehicular Ad Hoc/Sensor Networks," Guest Editorial of the Special Issue on Critical Applications in Vehicular Ad Hoc/Sensor Networks of Telecommunication Systems, Volume 58, Issue 4, April 2015, Springer, DOI: 10.1007/s11235-014-9876-5, pp 275-277.  

[JE15] Al-Sakib Khan Pathan, “On the Boundaries of Trust and Security in Computing and Communications Systems,” International Journal of Trust Management in Computing and Communications, Vol. 2, No. 1, 2014, Inderscience Publishers, pp. 1-6.

[JE14] Mohammad Mehedi Hassan, Al-Sakib Khan Pathan, Eui-Nam Huh, and Jemal Abawajy, "Emerging Sensor-Cloud Technology for Pervasive Services and Applications," Guest Editorial of the Special Issue of International Journal of Distributed Sensor Networks, Volume 2014, Article ID 610106, DOI:10.1155/2014/610106, Hindawi Publishing Corporation, 2 pages.

[JE13] Al-Sakib Khan Pathan and Muhammad Mostafa Monowar, “Preface: Future Trends in Security Issues in Internet and Web Applications,” Guest Editorial of the Special Issue of International Journal of Computational Science and Engineering, Vol. 9, No. 4, 2014, Inderscience Publishers, pp. 275-277.

[JE12] Al-Sakib Khan Pathan, Rashid A. Saeed, Mohamed Ali Feki, and Nguyen H. Tran, “Guest Editorial: Special Issue on Integration of IoT with Future Internet,” Guest Editorial of the Special Issue on Integration of IoT with Future Internet, Journal of Internet Technology, Volume 15, No.2, March 2014, pp.145-147.  

[JE11] Hyung Seok Kim, Waleed Ejaz, Khalid Al-Begain, Al-Sakib Khan Pathan, and Najam ul Hasan, “Advances in Cognitive Radio Sensor Networks,” Special Issue of International Journal of Distributed Sensor Networks, DOI: 10.1155/2014/631624, Volume 2014, Article ID 631624, 3 pages, Hindawi Publishing Corporation, 2014.

[JE10] Al-Sakib Khan Pathan, Zubair Muhammad Fadlullah, Mostafa M. Fouda, and Hae Young Lee, "Defending against Wireless Network Intrusion," Guest Editorial of the Special Issue on Wireless Network Intrusion of Journal of Computer and System Sciences, Elsevier, DOI: 10.1016/j.jcss.2013.06.006, Volume 80, Issue 3, 2014, pp. 499-501.

[JE09] Guangjie Han, Lei Shu, Al-Sakib Khan Pathan, Joel Rodrigues, and Abdelhamid Mellouk, "Wireless Sensor Networks based on Environmental Energy Harvesting," Special Issue of International Journal of Distributed Sensor Networks, DOI: 10.1155/2013/816063, Volume 2013, Article ID 816063, 2 pages, Hindawi Publishing Corporation, 2013.

[JE08] Al-Sakib Khan Pathan, "When the Cloud Computing Becomes Mobile!," International Journal of Internet and Distributed Systems, Scientific Research Publishing Inc., DOI: 10.4236/ijids.2013.13003, Volume 1, Number 3, August 2013, p. 17.

[JE07] Al-Sakib Khan Pathan, “Tackling the Threats of Internet Worms,” (Editor-in-Chief’s Foreword) International Journal on Internet and Distributed Computing Systems, Volume 3, Number 1, 2013, pp. i-ii.

[JE06] Lei Shu, Athanasios V. Vasilakos, Jaime Lloret, and Al-Sakib Khan Pathan, “Guest Editorial: Special Issue on Recent Advance on Mobile Sensor Systems,” Telecommunication Systems, Springer, DOI: 10.1007/s11235-011-9560-y, Volume 52, Issue 4, April 2013, pp 2407-2409.

[JE05] Al-Sakib Khan Pathan, “Multi-Dimensional Networking and Distributed Computing Services,” (Editor-in-Chief’s Foreword) International Journal on Internet and Distributed Computing Systems, Volume 2, Number 1, 2012, pp. i-ii.

[JE04] Syed Obaid Amin, Al-Sakib Khan Pathan, and Syed M. Rahman, “Editorial: Recent Advances in Next-Generation and Resource-Constrained Converged Networks,” Special Issue of International Journal of Communication Networks and Distributed Systems (IJCNDS), (with), Vol. 8, Nos. 1/2, 2012.

[JE03] Al-Sakib Khan Pathan, “Internet and Distributed Computing Knowledge in Today’s World,” (Editor-in-Chief’s Foreword) International Journal on Internet and Distributed Computing Systems, Volume 1, Issue 1, June 1, 2011, p. i.

[JE02] Sudip Misra, N. Balakrishnan, and Al-Sakib Khan Pathan, “Preface: Recent advances in simulation and mathematical modeling of wireless networks,” Special Issue of Mathematical and Computer Modelling, Elsevier (with Sudip Misra and N. Balakrishnan), Volume 53, Issues 11-12, June 2011, pp. 2057-2058.

[JE01] Jemal H. Abawajy, Mukaddim Pathan, Al-Sakib Khan Pathan, and Mustafizur Rahman, “Network Management in Distributed Systems,” Guest Editorial of the Special Issue of Scalable Computing: Practice and Experience (SCPE), Volume 11 Nr 4, 2010.


Conference Proceedings Edited


8. Al-Sakib Khan Pathan, Zubair Fadlullah, Mohamed, Guerroumi, The 2nd EAI International Conference on Smart Grid Assisted Internet of Things (SGIoT 2018), Niagara Falls, Ontario, Canada, July, 2018.

7. Al-Sakib Khan Pathan, Zubair Fadlullah, The 1st EAI International Conference on Smart Grid Assisted Internet of Things (SGIoT 2017), Sault Ste. Marie, Ontario, Canada, 2017.

6. Jinsong Wu, Gregorio Martinez Perez, Sabu M. Thampi, Mohammed Atiquzzaman, Stefano Berretti, Joel J. P. C. Rodrigues, Raghuvir Tomar, Ravi Prakash Gorthi, Patrick Siarry, Al-Sakib Khan Pathan, Jie Li, Punam Bedi, Sameep Mehta, Mohamed Habib Kammoun, and Vivek Jain, ICACCI-2016: Proceedings of Fifth International Conference on Computing, Communications and Informatics, Jaipur, India, IEEE, 2016.

5. Latifur Khan, Joarder Kamruzzaman, Al Sakib Khan Pathan, Dependsys 2015: Proceedings of the First International Symposium on Dependability in Sensor, Cloud, and Big Data Systems and Applications, Zhangjiajie, China, Springer Verlag, 2015.

4. Bernady O. Apduhan, Yan Wang, Zhiwen Yu, Huansheng Ning, Al-Sakib Khan Pathan, Mianxiong Dong, Yuqing Sun, Yukikazu Nakamoto, UFirst 2014: Proceedings of the 2014 International Symposium on UbiCom Frontiers - Innovative Research, Systems and Technologies: 11th IEEE International Conference on Ubiquitous Intelligence and Computing and 11th IEEE International Conference on Autonomic and Trusted Computing and 14th IEEE International Conference on Scalable Computing and Communications and Associated Symposia/Workshops, UIC-ATC-ScalCom 2014, Bali, Indonesia, IEEE, 2014.

3. Eunyong Lee, Cho-Li wang, Borgy Waluyo, Al-Sakib Khan Pathan, SanHyun Seo, MUE 2013: Proceedings of FTRA 7th International Conference on Multimedia and Ubiquitous Engineering, Seoul, South Korea, Springer, 2013.

2. Jemal Abawajy, Al-Sakib Khan Pathan, and Mustafizur Rahman, IDCS '10: Proceedings of the 3rd International Workshop on Internet and Distributed Computing Systems, IEEE CS Press, Los Alamitos, CA, USA, IEEE, 2010.

1. Al-Sakib Khan Pathan, Mukaddim Pathan, and Hae Young Lee, IDCS '09: Proceedings of the 2nd International Workshop on Internet and Distributed Computing Systems, IEEE CS Press, Los Alamitos, CA, USA, IEEE, 2009.


Refereed International Conference Papers


[C60] Houssem Mansouri, Rachida Hireche, Chahrazed Benrebbouh, and Al-Sakib Khan Pathan, “A Review of Blockchain in Internet of Medical Things,” International Conference on Cryptology & Network Security with Machine Learning (ICCNSML 2023), 27-29 October, 2023, Kanpur, Uttar Pradesh, India and Hybrid Mode. [Invited Paper]

[C59] Rachida Hireche, Houssem Mansouri, Yasmine Harbi, and Al-Sakib Khan Pathan, “Lightweight Mutual Authentication and Key Agreement Scheme for Wearable Devices in Fog-enabled WBAN,” The 5th International Conference on Pattern Analysis and Intelligent Systems (IEEE PAIS 2023), 25-26 October 2023, Setif, Algeria, DOI: 10.1109/PAIS60821.2023.10322083.

[C58] Mohiuddin Ahmed, Clark Pagutaisidro, Apichart Alexander Pike, Yuting Yang, and Al-Sakib Khan Pathan, "RansomCoin: A New Dataset for Analysing Cryptocurrency Transactions - Addressing a Gap in The Literature," IEEE INFOCOM’23 AidTSP workshop with IEEE International Conference on Computer Communications (IEEE INFOCOM’23), 17-20 May 2023, New York area, USA, DOI: 10.1109/INFOCOMWKSHPS57453.2023.10225797.

[C57] Mohiuddin Ahmed, A.N.M. Bazlur Rashid, and Al-Sakib Khan Pathan, "Ransomware 3.0 – A Weapon for Next Generation Information Warfare," International Conference on Cryptology & Network Security with Machine Learning (ICCNSML 2022), 16-18 December, 2022, Kanpur, Uttar Pradesh, India and Hybrid Mode; In: Roy, B.K., Chaturvedi, A., Tsaban, B., Hasan, S.U. (eds) Algorithms for Intelligent Systems, Springer, Singapore, pp. 397-405, DOI:10.1007/978-981-99-2229-1_33. [Invited Paper]

[C56] Chahrazed Benrebbouh, Houssem Mansouri, Sarra Cherbal, and Al-Sakib Khan Pathan, “Future Security Issues in Internet of Energy,” 4th International Conference on Advanced Science and Engineering (4th ICOASE), September 21-22, 2022, Zakho City and Duhok City, Iraq. [Invited Paper]

[C55] Neha Nandal, Rohit Tanwar, and Al-Sakib Khan Pathan, “Sentiment Analysis based Emotion Extraction for COVID-19 Using Crawled Tweets and Global Statistics for Mental Health,” International Conference on Machine Learning and Data Engineering (ICMLDE 2022), 07-08 September 2022, Dehradun, India; Procedia Computer Science, Volume 218, Elsevier, 2023, pp. 949-958.

[C54] Mohiuddin Ahmed, A.F.M. Suaib Akhter, A.N.M. Bazlur Rashid, Mahdi Fahmideh, Al-Sakib Khan Pathan, and Adnan Anwar, "Blockchain Meets Secured Microservice Architecture: A Trustworthy Consensus Algorithm," 19th International Conference on Wireless Networks and Mobile Systems (WINSYS'22), 11-13 July, 2022, Lisbon, Portugal, pp. 53-60. [Invited Paper]

[C53] Houssem Mansouri and Al-Sakib Khan Pathan, "A Communication-Induced Checkpointing Algorithm for Consistent-Transaction in Distributed Database Systems," Eight International Symposium on Security in Computing and Communications (SSCC 2020), Oct 14-17, 2020, Chennai, India,  Communications in Computer and Information Science (CCIS), Vol 1364, S. M. Thampi et al. (Eds.), Springer, 2021, pp. 21-32. [Invited Paper]

[C52] Houssem Mansouri and Al-Sakib Khan Pathan, “A Resilient Hierarchical Checkpointing Algorithm for Distributed Systems Running on Cluster Federation,” 7th International Symposium on Security in Computing and Communications (SSCC'19), December 18-21, 2019, Trivandrum, Kerala, India, Communications in Computer and Information Science (CCIS), Volume 1208, S. M. Thampi et al. (Eds.), Springer, 2020, pp. 99-110.  [Invited Paper]

[C51] Mohiuddin Ahmed and Al-Sakib Khan Pathan, "Investigating Deep Learning for Collective Anomaly Detection - An Experimental Study," Sixth International Symposium on Security in Computing and Communications (SSCC 2018) with the 7th IEEE ICACCI’18, Sep. 19-22, 2018, Bangalore, India, Communications in Computer and Information Science (CCIS), Volume 969, S. M. Thampi et al. (Eds.), Springer, 2019, pp. 211-219. 99-110. [Invited Paper]

[C50] Zubair Md. Fadlullah, Al-Sakib Khan Pathan, and Haris Gacanin, "On Delay-Sensitive Healthcare Data Analytics at the Network Edge Based on Deep Learning," The 14th International Wireless Communications and Mobile Computing Conference (IWCMC 2018) , June 25-29, 2018, Limassol, Cyprus, pp. 388-393.

[C49] Houssem Mansouri, Al-Sakib Khan Pathan, and Makhlouf Aliouat, “A Snapshot Security Protocol for Radar Network Protection,” 7th Seminar on Detection Systems: Architectures and Technologies (DAT 2017), February 20-22, 2017, Algiers, Algeria, DOI: 10.1109/DAT.2017.7889194.

[C48] Dieynaba Mall, Karim Konaté, and Al-Sakib Khan Pathan, “ECL-EKM: An Enhanced Certificateless Effective Key Management Protocol for Dynamic WSN,” International Conference on Networking, Systems and Security (NSysS 2017), January 5-8, 2017, Dhaka, Bangladesh, pp. 150-155.

[C47] Houssem Mansouri and Al-Sakib Khan Pathan, “An Efficient Minimum-Process Non-Intrusive Snapshot Algorithm for Vehicular Ad Hoc Networks,” 13th ACS/IEEE International Conference on Computer Systems and Applications (AICCSA 2016), November 29-December 2, 2016, Agadir, Morocco. (acceptance rate: 26%)

[C46] Matin Saad Abdullah, M.M. Hafizur Rahman, Al-Sakib Khan Pathan, and Imad Fakhri Al Shaikhli, “A Practical and Interactive Web-based Software for Online Qur’anic Arabic Learning,” International Conference on Information & Communication Technology For the Muslim World (ICT4M’16), November 22-24, 2016, Jakarta, Indonesia, pp. 76-81.

[C45] Mohamed Guerroumi, Abdelouahid Derhab, Al-Sakib Khan Pathan, Nadjib Badache, and Samira Moussaoui, “MMSMAC: A Multi-mode Medium Access Control Protocol for Wireless Sensor Networks,” IEEE Wireless Communications and Networking Conference (IEEE WCNC 2016), April 3-6, 2016, Doha, Qatar.

[C44] Houssem Mansouri, Nadjib Badache, Makhlouf Aliouat, and Al-Sakib Khan Pathan, "A Non-Blocking Coordinated Checkpointing Algorithm for Message-Passing Systems," International Conference on Intelligent Information Processing, Security and Advanced Communication (IPAC 2015), Article No. 34, ACM, November 23-25, 2015, Batna, Algeria.

[C43] Houssem Mansouri, Nadjib Badache, Makhlouf Aliouat, and Al-Sakib Khan Pathan, “Adaptive Fault Tolerant Checkpointing Algorithm for Cluster Based Mobile Ad Hoc Networks,” International Conference on Advanced Wireless, Information, and Communication Technologies (AWICT 2015), September 20-23, 2015, Sousse, Tunisia, Procedia Computer Science, Elsevier, Volume 73, 2015, pp. 40-47.

[C42] A. Babu Karuppiah, J. Dalfiah, K. Yuvashri, S. Rajaram, and Al-Sakib Khan Pathan, “Energy-Efficient Sybil Node Detection Algorithm for Wireless Sensor Networks,” 3rd International Conference on Eco-Friendly Computing and Communication Systems (ICECCS 2014), December 18-21, 2014, Mangalore, India, pp. 95-98.

[C41] Mohssen M. Z. E. Mohammed and Al-Sakib Khan Pathan, "International Center for Monitoring Cloud Computing Providers (ICMCCP) for Ensuring Trusted Clouds," The 11th IEEE International Conference on Autonomic and Trusted Computing (ATC-2014), December 9-12, 2014, Ayodya Resort, Bali, Indonesia, pp. 571-576.

[C40] Imran Yusof and Al-Sakib Khan Pathan, “Preventing Persistent Cross-Site Scripting (XSS) Attack By Applying Pattern Filtering Approach,” The 5th International Conference on Information and Communication Technology for the Muslim World (ICT4M 2014), November 17-19 2014, Kuching, Sarawak, Malaysia.

[C39] Md. Rafiqul Islam, M.A.E. Shakib, Md. Azizur Rahaman, Md. Obaidur Rahman, and Al-Sakib Khan Pathan, "A Neighbour Discovery Approach for Cognitive Radio Network Using Tower of Hanoi (ToH) Sequence Based Channel Rendezvous," The 5th International Conference on Information and Communication Technology for the Muslim World (ICT4M 2014), November 17-19 2014, Kuching, Sarawak, Malaysia.

[C38] Tarem Ahmed, Al-Sakib Khan Pathan, and Supriyo Ahmed, “Adaptive Algorithms for Automated Intruder Detection in Surveillance Networks,” ICACCI 2014 Doctoral Consortium; 3rd International Conference on Advances in Computing, Communications & Informatics (ICACCI 2014), September 24-27, 2014, Delhi, India, pp. 2775-2780.

[C37] Dieynaba Mall, Karim Konaté, and Al-Sakib Khan Pathan, “SECRET: A Secure and Efficient Certificate Revocation Scheme for Mobile Ad Hoc Networks,” International Symposium on Biometric and Security Technologies 2014 (ISBAST'14), August 26-27, 2014, Kuala Lumpur, Malaysia, pp. 137-143.

[C36] Mohssen M. Z. E. Mohammed, H. Anthony Chan, Neco Ventura and Al-Sakib Khan Pathan, "An Automated Signature Generation Method for Zero-day Polymorphic Worms Based on Multilayer Perceptron Model," 2nd International Conference on Advanced Computer Science Applications and Technologies – ACSAT2013, December 22-24, 2013, Kuching, Sarawak, Malaysia, pp. 450-455.

[C35] Wafaa Mustafa Abduallah, Abdul Monem S. Rahma, and Al-Sakib Khan Pathan, "Data Hiding within Color Images based on MCT with X-OR Operations," 2nd International Conference on Advanced Computer Science Applications and Technologies – ACSAT2013, December 22-24, 2013, Kuching, Sarawak, Malaysia, pp. 19-24. [Invited Paper]

[C34] Tarem Ahmed, Supriyo Ahmed, and Al-Sakib Khan Pathan, “Automated Surveillance in Distributed, Wireless Visual Networks: A Comparative Study,” Workshop on Mobile and Wireless 2013 Second (Mobile2013SE), December 11-13, 2013, Jeju National University International Center, Jeju Island, Korea; Advanced Science and Technology Letters, Volume 42 (Mobile and Wireless 2013), DOI: 10.14257/astl.2013.42.01, pp.1-4. [Invited Paper]

[C33] Dieynaba Mall, Karim Konaté, and Al-Sakib Khan Pathan, "On the Key Revocation Schemes in Wireless Sensor Networks," The 2013 IEEE International Conference on Green Computing and Communications (GreenCom 2013): Security, Privacy, and Trust Computing, August 20-23, 2013, Beijing, China, pp. 290-297.

[C32] Matin Saad Abdullah and Al-Sakib Khan Pathan, "Learning Qur’anic Arabic through Interactive Web-Based Software: A Pragmatic Approach in Language for Specific Purpose," The 4th International Conference on Information and Communication Technology for the Muslim World (ICT4M 2013), March 25-27, 2013, Rabat, Morocco, pp. 1-6. (CD Proceedings)

[C31] Feyza Gündüz and Al-Sakib Khan Pathan, "Usability Improvements for Touch-Screen Mobile Flight Booking Application: A Case Study," International Conference on Advanced Computer Science Applications and Technologies (ACSAT2012), November 26 - 28 2012, Kuala Lumpur, Malaysia, pp. 49-54.

[C30] Muhammad Faheem Mohd Ezani, Al-Sakib Khan Pathan, and Shariq Haseeb, "Comparative Analysis of IEEE 802.11g Multimedia Multicast Performance Using RTP with an Implemented Test-bed," The 2012 IEEE Conference on Open Systems (ICOS 2012), October 21-24, 2012, Kuala Lumpur, Malaysia, pp. 1-5.

[C29] Matin Saad Abdullah and Al-Sakib Khan Pathan, "Using the Web for Critical Learning of Al-Qur’an’s Language: an Exploratory Case Study," World Conference on Islamic Thought 2012 (WCIT'12), September 11-12 2012, Perak, Malaysia.

[C28] Imad Al Shaikhli, Akram M. Zeki, Rusydi Makarim, and Al-Sakib Khan Pathan, "Protection of Integrity and Ownership of PDF Documents Using Invisible Signature," UKSim 14th International Conference on Computer Modelling and Simulation (UKSim2012), Cambridge University (Emmanuel College), 28 - 30 March 2012, United Kingdom.

[C27] Xianglin Wei, Tarem Ahmed, Ming Chen, and Al-Sakib Khan Pathan, "PeerMate: A Malicious Peer Detection Algorithm for P2P Systems based on MSPCA," International Conference on Computing, Networking and Communications (IEEE ICNC 2012), January 30 - February 2, 2012, Maui, Hawaii, USA, pp. 815-819.

[C26] Tarem Ahmed, Xianglin Wei, Supriyo Ahmed, and Al-Sakib Khan Pathan, "Intruder Detection in Camera Networks using the One-Class Neighbor Machine,"  Networking and Electronic Commerce Research Conference 2011 (NAEC 2011), October 13-16, 2011, Riva del Garda, Italy, pp. 115-118. [Invited Paper]

[C25] Leopoldo Estrada-Vargas, Homero Toral-Cruz, and Al-Sakib Khan Pathan, "A Generator of Cauchy-distributed Time Series with Specific Hurst Index,"  Networking and Electronic Commerce Research Conference 2011 (NAEC 2011), October 13-16, 2011, Riva del Garda, Italy, pp. 8-14. [Invited Paper]

[C24] Mohammad Moshee Uddin, Shariq Haseeb, Mohiuddin Ahmed, and Al-Sakib Khan Pathan, "Comprehensive QoS Analysis of MIPL Based Mobile IPv6 Using Single VS. Dual Interfaces," 1st International Conference on Electrical, Control and Computer Engineering 2011 (IEEE InECCE 2011), June 21-22, 2011, Kuantan, Pahang, Malaysia, pp. 388-393.

[C23] Diallo Abdoulaye Kindy and Al-Sakib Khan Pathan, "A Survey on SQL Injection: Vulnerabilities, Attacks, and Prevention Techniques," The 15th IEEE Symposium on Consumer Electronics (IEEE ISCE 2011), June 14-17, 2011, Singapore, p. 77 (digital proceedings).

[C22] Mohammad Moshee Uddin, Al-Sakib Khan Pathan, Shariq Haseeb, and Mohiuddin Ahmed, "A Test-Bed Analysis for Seamless MIPV6 Handover in Heterogeneous Environment," The 15th IEEE Symposium on Consumer Electronics (IEEE ISCE 2011), June 14-17, 2011, Singapore, p. 24 (digital proceedings).

[C21] Abdelgadir Tageldin Abdelgadir, Mohiuddin Ahmed, Al-Sakib Khan Pathan, Ariff Abdullah, Shariq Haseeb, and Omar Al-Mushayt, "Performance Analysis of a Highly Available Home Agent in Mobile Networks," 14th Communications and Networking Symposium (CNS 2011) with SpringSim’11, April 4-7, 2011, Boston, MA, USA, pp. 62-70.

[C20] Khadija Rasul, Nujhat Nuerie, and Al-Sakib Khan Pathan, "An Enhanced Tree-based Key Management Scheme for Secure Communication in Wireless Sensor Network," Proceedings of the 3rd IEEE International Workshop on Internet and Distributed Computing Systems (IDCS'10) in conjunction with the 12th IEEE International Conference on High Performance Computing and Communications (HPCC 2010), September 01-03, 2010, Melbourne, Australia, pp. 671-676.

[C19] Nazmus Saquib, Md. Sabbir Rahman Sakib, and Al-Sakib Khan Pathan, "Demo Abstract: ViSiM, A MANET Routing Simulation Demonstration Tool for Naive Users," The 29th IEEE Conference on Computer Communications (IEEE INFOCOM 2010), San Diego, USA. [Demo Session Paper]

[C18] Al-Sakib Khan Pathan and Choong Seon Hong, "Bilinear-Pairing-Based Remote User Authentication Schemes Using Smart Cards," Proceedings of the Third International Conference on Ubiquitous Information Management and Communication (ACM ICUIMC 2009), ACM SIGKDD and ACM SIGMOD, January 15-16, 2009, SKKU, Suwon, Korea, pp. 366-371.

[C17] Al-Sakib Khan Pathan and Choong Seon Hong, "Feasibility of PKC in Resource-Constrained Wireless Sensor Networks," Proceedings of the IEEE International Workshop on Internet and Distributed Computing Systems (IEEE IDCS'08) in conjunction with 11th IEEE ICCIT'08, December 24, 2008, Khulna, Bangladesh, pp. 13-20. (acceptance rate: 25.45%)

[C16] Muhammad Mostafa Monowar, Md. Obaidur Rahman, Al-Sakib Khan Pathan, and Choong Seon Hong, "Congestion Control Protocol for Wireless Sensor Networks Handling Prioritized Heterogeneous Traffic," Proceedings of the 2nd International Symposium on Security and Multimodality in Pervasive Environments (SMPE'08) Workshop in conjunction with MobiQuitous 2008, July 21-25, 2008, Trinity College Dublin, Ireland, 2008. (acceptance rate: 24%)

[C15] Al-Sakib Khan Pathan and Choong Seon Hong, "Cryptanalysis of Yang-Wang-Chang's Password Authentication Scheme with Smart Cards," Proceedings of the 10th International Conference on Advanced Communication Technology (IEEE ICACT 2008), Volume III, February 17-20, 2008, Phoenix Park, Korea, pp. 1618-1620.

[C14] Md. Mokammel Haque, Al-Sakib Khan Pathan, and Choong Seon Hong, "Securing U-Healthcare Sensor Networks using Public Key Based Scheme," Proceedings of the 10th International Conference on Advanced Communication Technology (IEEE ICACT 2008), Volume II, February 17-20, 2008, Phoenix Park, Korea, pp. 1108-1111.

[C13] Al-Sakib Khan Pathan, Gihyuk Heo, and Choong Seon Hong, "A Secure Lightweight Approach of Node Membership Verification in Dense HDSN," Proceedings of the IEEE Military Communications Conference (IEEE MILCOM 2007), October 29-31, Orlando, Florida, USA, p. 99 (CD).

[C12] Md. Mokammel Haque, Al-Sakib Khan Pathan, Byung Goo Choi, and Choong Seon Hong, "An Efficient PKC-Based Security Architecture for Wireless Sensor Networks," Proceedings of the IEEE Military Communications Conference (IEEE MILCOM 2007), October 29-31, Orlando, Florida, USA, p. 72 (CD). (This article received IEEE Student Travel Grant Award)

[C11] Brian J. d'Auriol, Nguyen Thi Thanh Tuyen, Vo Quoc Hung, Duc Thang, Hassan Jameel, Le Xuan Hung, S.M.K.R. Raazi, Dao Phuong Thuy, Ngo Trong Canh, Adil Mehmood Khan, Sunghyun Kim, Shu Lei, Sakib Pathan, Tran Van Phuong, Sungyoung Lee and Young-Koo Lee, "Embedded Processor Security," Proceedings of the 2007 International Conference on Security and Management (SAM'07), June 25-28, Las Vegas, Nevada, USA, pp. 591-594.

[C10] Al-Sakib Khan Pathan and Choong Seon Hong, "An Improved Timestamp-Based Password Authentication Scheme with Two-Party Verification using Smart Cards," Proceedings of the 9th International Conference on Advanced Communication Technology (IEEE ICACT 2007), Volume I, February 12-14, 2007, Phoenix Park, Korea, pp. 804-809.

[C09] Al-Sakib Khan Pathan, Choong Seon Hong, and Tatsuya Suda, "A Novel and Efficient Bilateral Remote User Authentication Scheme Using Smart Cards," Proceedings of the 2007 IEEE International Conference on Consumer Electronics (IEEE ICCE 2007), January 10-14, Las Vegas, USA, pp. 1-2. (acceptance rate: 41.9%)

[C08] Al-Sakib Khan Pathan and Choong Seon Hong, "Developing an Efficient DMCIS with Next-Generation Wireless Networks," Proceedings of the IEEE Military Communications Conference (IEEE MILCOM 2006), October 23-25, Washington, DC, USA, p. 92 (CD). (This article received IEEE Student Travel Grant Award)

[C07] Al-Sakib Khan Pathan and Choong Seon Hong, "Secure Clustering in DSN with Key Predistribution and WCDS," Proceedings of the IEEE Military Communications Conference (IEEE MILCOM 2006), October 23-25, Washington, DC, USA, p. 93 (CD).

[C06] Al-Sakib Khan Pathan, Tran Thanh Dai, and Choong Seon Hong, "An Efficient LU Decomposition-based Key Pre-distribution Scheme for Ensuring Security in Wireless Sensor Networks," Proceedings of the 2006 IEEE International Conference on Computer and Information Technology (IEEE CIT 2006), September 20-22, Seoul, Korea, 2006, pp. 227-232. (acceptance rate: 40%)

[C05] Al-Sakib Khan Pathan and Choong Seon Hong, and Hyung-Woo Lee, "Towards Developing Smart Environment using Wireless Sensor and Ad Hoc Networks," Accepted as Poster in the International Conference on Computational Science and its Applications 2006, Glasgow, Scotland (UK), ICCSA 2006 (IEE), May 8-11, 2006.

[C04] Al-Sakib Khan Pathan, Hyung-Woo Lee, and Choong Seon Hong, "Security in Wireless Sensor Networks: Issues and Challenges," Proceedings of the 8th International Conference on Advanced Communication Technology (IEEE ICACT 2006), Volume II, 20-22 February, Phoenix Park, Korea, 2006, pp. 1043-1048. (This article was included in IEEE Communications Society's (IEEE ComSoc) Best Readings Topics on Communications and Information Systems Security, 2013 under the category of “Wireless Sensor Networks”)

[C03] Al-Sakib Khan Pathan, Choong Seon Hong, and Hyung-Woo Lee, "Smartening the Environment using Wireless Sensor Networks in a Developing Country," Proceedings of the 8th International Conference on Advanced Communication Technology (IEEE ICACT 2006), Volume I, 20-22 February, Phoenix Park, Korea, 2006, pp. 705-709.

[C02] Al-Sakib Khan Pathan, Humayun Kadir Islam, Sabit Anjum Sayeed, Farruk Ahmed, and Choong Seon Hong, "A Framework for Providing E-Services to the Rural Areas Using Wireless Ad Hoc and Sensor Networks," Proceedings of the First International Conference on Next-Generation Wireless Systems (IEEE ICNEWS 2006), 2-4 January, Dhaka, Bangladesh, 2006, pp. 282-286.

[C01] Al-Sakib Khan Pathan, Md. Mahbub Alam, Md. Mostafa Monowar, and Md. Forhad Rabbi, "An Efficient Routing Protocol for Mobile Ad Hoc Networks with Neighbor Awareness and Multicasting," Proceedings of IEEE E-Tech, pp. 97-100, Karachi, Pakistan, July, 2004.


Papers in National/Domestic Conferences (Bangladesh and Korea)


[D08] Mohammad Ziaur Rahman and Al-Sakib Khan Pathan, "A Case Study - Establishing Redundant Access Networks in the Telecommunication Sector of a Developing Country," Proceedings of Annual Conference and Seminar on “Electronics and Telecommunications for Digital Bangladesh”, 2-3 June 2010, Atomic Energy Centre, Dhaka, Bangladesh.

[D07] Al-Sakib Khan Pathan and Choong Seon Hong, "Cryptanalysis of Improved Password Authentication Scheme with Smart Cards," (Poster) Proceedings of Korea Computer Congress 2008 (KCC 2008), Volume 35, No.1(D), June 30-July 2, 2008, Phoenix Park, Korea, pp. 101-104.

[D06] Md. Mokammel Haque, Al-Sakib Khan Pathan, and Choong Seon Hong, "S-PkSec: An Asymmetric Key Based Security Management Scheme for Sensor Network Operation," Proceedings of KNOM (Korean Network Operations and Management) Conference 2008, (TS6-5), April 24-25, Changwon, Korea.

[D05] Al-Sakib Khan Pathan and Choong Seon Hong, "A Secure and Efficient Way of Node Membership Verification in Wireless Sensor Networks," (Poster) Proceedings of the 27th KIPS Spring Conference, 11-12 May 2007, Seongnam, Korea, pp. 1100-1101.

[D04] Md. Mokammel Haque, Al-Sakib Khan Pathan, and Choong Seon Hong, "An Efficient Public Key Based Security Architecture for Wireless Sensor Networks," (Poster) Proceedings of the 27th KIPS Spring Conference, 11-12 May 2007, Seongnam, Korea, pp. 1098-1099.

[D03] Al-Sakib Khan Pathan and Choong Seon Hong, "An Efficient Scheme for Secure Data Transmission in Wireless Sensor Networks," Proceedings of the 17th Joint Conference on Communication & Information (JCCI 2007), 2-4 May 2007, PyeongChang, Korea, p. 48 (CD). (This article received the IEEE ComSoc Seoul Chapter Best Paper Award)

[D02] Al-Sakib Khan Pathan and Choong Seon Hong, "Attacks on Shen et. al.’s Remote User Authentication Scheme and Defense," Proceedings of the 26th KIPS Fall Conference 2006, November 10-11, Cheongju, Korea, pp. 1589-1592.

[D01] Al-Sakib Khan Pathan and Choong Seon Hong, "An Efficient Bilateral Remote User Authentication Scheme with Smart Cards," Proceedings of the 33rd Korea Information Science Society Fall Conference 2006, October 20-21, Seoul, Korea. pp. 132-134.


Other Conference Papers in the Past


[P5] Al-Sakib Khan Pathan, Md. Mehedi Hassan, and Humayun Kadir Islam, "E-Learning: Can it Help the Education in Bangladesh?," Accepted in the Eleventh International Conference on Distributed Multimedia Systems (DMS 2005), Banff, Canada, 5-7 September, 2005.

[P4] Al-Sakib Khan Pathan, "Where is the Intelligence in Computational Intelligence?," Accepted in the World ENFORMATIKA Joint Conferences (WEC 2005), Istanbul, Turkey, June, 2005.

[P5] Al-Sakib Khan Pathan, Md. Mehedi Hassan, and Humayun Kadir Islam, "E-Learning: Can it Help the Education in Bangladesh?," Accepted in the Eleventh International Conference on Distributed Multimedia Systems (DMS 2005), Banff, Canada, 5-7 September, 2005.

[P3] Humayun Kadir Islam and Al-Sakib Khan Pathan, "Technological Impact on Disaster Management Information System," Accepted in the 2nd International Conference on Information and Communication Technology (ICT 2004), Bangkok, Thailand, November, 2004.

[P2] Al-Sakib Khan Pathan and Humayun Kadir Islam, "A Study on the Key Factors for Effective E-Learning," Accepted in the 3rd International Conference on ICT and Higher Education e-University 2004, Bangkok, Thailand, August, 2004.

[P1] Al-Sakib Khan Pathan, Md. Mahbub Alam, M. Monowar, F. Rabbi, S. Ahmed, and T. H. Khan, "12-Segment Display for the Bengali Numerical Characters," Proceedings of the National Conference on Computer Processing of Bangla (NCCPB-2004), pp. 82-88, Dhaka, Bangladesh, February, 2004.


Peer Reviewed Workshop Papers/Student Posters


[WP09] Wafaa Mustafa Abduallah, Al-Sakib Khan Pathan, and Abdulmonem S. Rahma, “Reversible Data Hiding Scheme based on 3-Least Significant Bits and Mix Column Transfom," POSTER presentation in International Islamic University Malaysia (IIUM) KICT Postgraduate Student Colloquium, October 2013, Kuala Lumpur, Malaysia. (This POSTER won the Silver Medal in the event)

[WP08] Matin Saad Abdullah and Al-Sakib Khan Pathan, “Teaching and Learning Qur’anic Arabic Utilizing New Technologies and ICT,” POSTER presentation in International Islamic University Malaysia (IIUM) KICT Postgraduate Student Colloquium, October 2013, Kuala Lumpur, Malaysia.

[WP07] Tarem Ahmed, Xianglin Wei, Supriyo Ahmed, and Al-Sakib Khan Pathan, “Automated Visual Surveillance using Kernel Tricks,” POSTER presentation in ENS/INRIA Visual Recognition and Machine Learning (CVML 2013), Summer School, 22-26 July 2013, Paris, France.

[WP06] Matin Saad Abdullah and Al-Sakib Khan Patha, “New Technologies for Teaching and Learning Qur’anic Arabic,” POSTER presentation in International Islamic University Malaysia (IIUM) KICT Postgraduate Student Colloquium, December 2012, Kuala Lumpur, Malaysia.

[WP05] Wafaa Mustafa Abduallah, Al-Sakib Khan Pathan, and Abdulmonem S. Rahma (2012b), “New Data Hiding Technique Based on Irreducible Polynomial Mathematics,” POSTER presentation in International Islamic University Malaysia (IIUM) KICT Postgraduate Student Colloquium, December 2012, Kuala Lumpur, Malaysia.

[WP04] Tarem Ahmed and Al-Sakib Khan Pathan (2012b), “An Effective Automated Surveillance System,” POSTER presentation in International Islamic University Malaysia (IIUM) KICT Postgraduate Student Colloquium, December 2012, Kuala Lumpur, Malaysia.

[WP03] Wafaa Mustafa Abduallah, and Al-Sakib Khan Pathan (2012a), “Defending Against Node Capture Attack in WSN,” POSTER presentation in International Islamic University Malaysia (IIUM) KICT Postgraduate Student Colloquium, February 2012, Kuala Lumpur, Malaysia.

[WP02] Tarem Ahmed and Al-Sakib Khan Pathan (2012a), “Towards Automated Surveillance Systems,” POSTER presentation in International Islamic University Malaysia (IIUM) KICT Postgraduate Student Colloquium, February 2012, Kuala Lumpur, Malaysia.

[WP01] Al-Sakib Khan Pathan and Choong Seon Hong, "Secure Group Association Management in Heterogeneous Distributed Sensor Networks," Proceedings of IEEE Seoul Section 2008, 29 November, 2008, Hanyang University, South Korea, pp. 25-32. (IEEE Seoul Section Bronze Paper Award in the IEEE International Student Paper Contest 2008 organized by IEEE Seoul Section, Tokyo Section, Beijing Section, and Japan Council)


Peer-Reviewed Newsletter Article


[NL1] Shaik Shakeel Ahamad and Al-Sakib Khan Pathan, “Security and Privacy-aware Mobile Healthcare Framework During COVID-19-like Pandemic,” Published in Special Issue on “IoT and AHSN for combating COVID-19 pandemic” of Internet of Things, Ad Hoc and Sensor Networks Technical Committee Newsletter (IoT-AHSN TCN), Vol. 1, No. 13, 2020, pp. 11-15.


Significant Talks/Presentations (Partial)


[TP28] Keynote Speech: "Recognizing FDIA as a Critical Issue in the Field of Cybersecurity", The International Conference on Information, Communication & Cybersecurity (ICI2C'21), November 10-11, 2021, Khouribga, Morocco [VIRTUAL due to COVID-19 pandemic]

[TP27] Welcome Speech as the General Chair: EAI WiCON 2021 - 14th EAI International Wireless Internet Conference (WiCON'21), Orillia, Canada (online), November 9, 2021 [VIRTUAL due to COVID-19 pandemic]

[TP26] Expert Talk as a Resource Person, “Fundamentals of Computer Network Security”, International Faculty Development Program during 05 July-10 July, 2021, organized by Chandigarh University, Punjab, India, 09 July, 2021. [Online event due to COVID-19 pandemic]

[TP25] Expert Webinar/Talk, Talk Title: “Need and Importance of Cyber Security in Real World Environment”, 4th Annual International Faculty Development Program 2020 (IFDP 2020), organized by Chandigarh University, India, 7 July, 2020.

[TP24] Keynote Speech: “Can we rely on Blockchain?”, at the 2nd International Conference on Intelligent Communication and Computational Techniques (ICCT 2019), September 29, 2019, Jaipur, Rajasthan, India.

[TP23] Invited Talk: “Things to know about Cyber Attacks when using Cyberspace,” Workshop on “Cryptography and Cyber Security”, at Maulana Abul Kalam Azad University of Technology, 13 February, 2019, Nadia, West Bengal, India.

[TP22] Invited Talk: “Basics of Security and Cryptography”, Workshop on “cryptography and cyber Security”, at Maulana Abul Kalam Azad University of Technology, 13 February, 2019, Nadia, West Bengal, India.

[TP21] Keynote Speech: "Are We Aware of Simple Yet Deceiving Cyber Attacks?", 5th ICMC 2019, Bhubaneswar, Odisha, India, 9 February, 2019.

[TP20] Invited Talk: "The State-of-the-Art Wireless Body Area Sensor Networks - Issues and Challenges", at Software and Informatics Research Centre (SIRC), University of Ontario Institute of Technology, 12 July, 2018, Oshawa, Canada.

[TP19] Welcome Speech as the General Chair: 2nd EAI International Conference on Smart Grid and Internet of Things (SGIoT 2018), July 11, 2018, Niagara Falls, Canada.

[TP18] Keynote Speech: “Defending against Common Cyber Attacks: Phishing and Cross-Site Scripting”, at 13th IEEE International Symposium on Programming and Systems (ISPS 2018), April 24-26, 2018, Algiers, Algeria.

[TP17] Invited Lecture: "Human Factors and Content Security Policy in Tackling Common Cyber Attacks", Training program for teachers (second batch) of the Polytechnic institutes in Bangladesh on "Cyber Security and Ethics: Knowledge, Skills and Pedagogy", 21 April 2018, held at Islamic University of Technology (IUT), Bangladesh under Skills and Training Enhancement Project (STEP) of the Ministry of Education, Bangladesh.

[TP16] Invited Lecture: "Human Factors and Content Security Policy in Tackling Common Cyber Attacks", Training program for teachers (first batch) of the Polytechnic institutes in Bangladesh on "Cyber Security and Ethics: Knowledge, Skills and Pedagogy", 13 April 2018, held at Islamic University of Technology (IUT), Bangladesh under Skills and Training Enhancement Project (STEP) of the Ministry of Education, Bangladesh.

[TP15] Invited Speech: “Social Engineering Attack – Even the Smart People Can Get Deceived”, in Recent Trends in Cyber Security, Plenary Session in the Conference: Accountability in Bangladesh: Issues & Debates, 29 March 2018, Independent University, Bangladesh.

[TP14] Keynote Speech: "Understanding Quality", Workshop on Team Building, BBA Seminar Hall, Southeast University, Dhaka, Bangladesh, 10 August, 2017.

[TP13] Welcome Speech as the General Chair:1st EAI International Conference on Smart Grid Assisted Internet of Things (SGIoT 2017), July 11-13, 2017, Sault Ste. Marie, Canada.

[TP12] Invited Talk: “How to Build Customer Trust in Cloud Computing Model?”, at National Conference on Electronics and ICT, Atomic Energy Center, 20 April, 2017, Dhaka, Bangladesh.

[TP11] Invited Expert Talk: “Mitigating Cross-Site Scripting Attacks with a Content Security Policy”, International Conference on Communication and Computing System (ICCCS’16), September 9-11, 2016, Gurgaon, India.

[TP10] Keynote Speech: “Tech-Talk: Mitigating Cross-Site Scripting Attacks with a Content Security Policy”, Organized by IEEE Student Branch, University of Dhaka, April 17, 2016, Dhaka, Bangladesh.

[TP09] Keynote Speech:“Building Customer Trust in Cloud Computing Model”, as Distinguished Guest and Keynote Speaker in the 2nd IEEE International Conference on Advances in Computing & Communication Engineering (ICACCE-2015), May 1-2, 2015 by Tula’s Institute, 2 May, 2015, Dehradun, Uttarakhand, India.

[TP08] Keynote Speech:“Computer Science and IT Today: Research Issues and Publication Tips”, as Chief Guest and Keynote Speaker in International Conference on Innovations in Electronics, Communication & Computing (ICIECC 2014), 10-11 April, 2014, 10 April, 2014, Madurai, Tamil Nadu, India.

[TP07] Keynote Speech:“Wireless Sensor Network Security: Current status and Future Trends”, as Keynote Speaker in International Conference on “Electronics, Communication and Information Technology” (ICECIT 2013), Oct. 4-5, 2013 held at Thapar University, 04 October 2013, Patiala, Punjab, India.

[TP06] Seminar Presentation:“The Need-to-Know Issues for Publishing Books and Book Chapters”, Springer eBooks Seminar, IIUM, 20 September 2013, Kuala Lumpur, Malaysia.

[TP05] Seminar Presentation:“How to Publish Quality Journal Papers?”, KICT Conference Room, IIUM,20 December, 2012, Kuala Lumpur, Malaysia.

[TP04] Guest Lecture:“Wireless Network Security: 3G, 4G, Wireless PAN/LAN/MAN”, Centre for Information and Communication Technology (CICT), Universiti Teknologi Malaysia (UTM), 23 May 2012, Skudai, Johor, Malaysia.

[TP03] Seminar Presentation:“Energy-Efficient Secure Routing in Heavily Deployed Wireless Sensor Networks”, KICT Research Seminar, IIUM, June 22-23, 2011, Kuala Lumpur, Malaysia.

[TP02] Seminar Presentation:“How to Write Quality Journal Paper & Getting it Published?”, KICT Conference Room, IIUM, 22 October, 2010, Kuala Lumpur, Malaysia.

[TP01] Seminar Presentation:“Introduction to Wireless Sensor Network Security”, BRAC University Seminar series, UB0124, 17 February, 2010, Dhaka, Bangladesh.


Technical Reports


[T5] Nazmus Saquib, Md. Sabbir Rahman Sakib, and Al-Sakib Khan Pathan. ViSim: A User-Friendly Simulation Tool for MANET Routing Protocols. Technical Report, TR-BU-CSE001-Oct09, BRAC University, October, 2009.

[T4] Al-Sakib Khan Pathan. Future Internet Addressing (FI Address). Technical Report 2008N4-SP-NL, Networking Lab, KHU, 11 December, 2008.

[T3] Al-Sakib Khan Pathan and Choong Seon Hong. Security Attacks and Challenges in Wireless Sensor Networks. Technical Report 2008N3-SP-NL, Networking Lab, KHU, 2008.

[T2] Al-Sakib Khan Pathan and Choong Seon Hong. Public Key Cryptography in Resource-Constrained WSN. Technical Report 2008N2-SP-NL, Networking Lab, KHU, 2008.

[T1] Al-Sakib Khan Pathan and Choong Seon Hong. Heterogeneous Distributed Sensor Networks (HDSN). Technical Report 2007N1-SP-NL, Networking Lab, KHU, 2007.


Opinion Piece


- Al-Sakib Khan Pathan, "What is the difference between IoT and CPS (and M2M)?", December 2015.

- Al-Sakib Khan Pathan and San Murugesan, "Trust in Cloud Needs Ensuring Cloud of Trust", November 2015.


Articles in Souvenir Books for International/National Programming Contest Events


[A1] Al-Sakib Khan Pathan, "ICPC and My Research: Is There a Connection? - Some Personal Experience," Souvenir Book of the International Collegiate Programming Contest (ICPC) 2019, Asia Dhaka Regional, 15-16 November, 2019, Dhaka, Bangladesh. pp. 34-36.


Newspaper Article


- Al-Sakib Khan Pathan, "Solution to question paper leak", The Daily Star, Bangladesh. 12:00 AM, August 19, 2014 / LAST MODIFIED: 01:53 AM, March 08, 2015. (http://www.thedailystar.net/solution-to-question-paper-leak-37653)


Patent (Korean)


[PT1] 홍충선, Md Mokammel Haque, Al-Sakib Khan Pathan, 허지혁, "무선 센서 네트워크에서 센서 노드들 사이의 메시지 암호화/복호화 방법", 등록번호 : 특허 제 10-0941764 호, 대한민국 특허청, 2010.02.03 (특허권자: 경희대학교 산학협력단) [ Choong Seon Hong, Md. Mokammel Haque, Al-Sakib Khan Pathan, and Gihyuk Heo, "Message Encryption / Decryption Method Between Sensor Nodes in Wireless Sensor Networks," Registration No.: Patent No. 10-0941764, Republic of Korea Intellectual Property Office, 03/02/2010 (Patent : Industry-Academic Cooperation Foundation, Kyung Hee University) ]


Ph.D. Thesis


"Resource Efficient Security Management in Wireless Sensor Networks", Department of Computer Engineering, Kyung Hee University, South Korea, August, 2009.


B.Sc. Thesis


"Neighbor Aware Multicast Routing Protocol for Mobile Ad Hoc Networks", Department of Computer Science and Information Technology, Islamic University of Technology, Final year thesis project, September, 2003.

---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

Frequently Asked Questions (FAQs) to me ...

 

Question: Why do you bring your religious views with your academic identity?

 

Answer: Well, not always! However, on the webpage, I have written things related to my faith as a reminder of what I should and would do. Because, that view regulates my conducts, be that in an academic task, in personal task, or whatever in life. If you are the scrutinizer of me, you can question my action based on those rules that I claim to follow. The rules are fixed with evidences and records and I, as a son of Adam am faulty, often prone to violating rules. Every person is a slave (required to give service) in earth: either to his own desire, or to his wife, or to his "love", or to his family, or to his job, or to his business, or to someone else whose views would seem to be better (that go with own sense and intellect) in setting own moral compass. When one may choose to be subordinate to any of these things and thinks that he is self-respecting himself, I decided to be a slave of Allah, The Most High, The Only One Unique Almighty, before whom there is none and after whom there is none. There is nothing like unto Him and He is self-sufficient - yes, that's the limit of the intellect to describe Him but He is only known in the way of revelation how He revealed Himself to the righteous human beings. My academic identity comes under the identity of being a Muslim (who submits his will to the Will of Allah).

 

Question: Those who follow Islam or any other religion and a set of rules and regulations are nitwits and disrespect themselves. Don't you think so?

 

Answer: Islam is not like "any other religion". Learn it in better way. Time may permit you or not to learn and that "time" (which is also a creation), none does control except Allah, who has full control to stop the lifetime of you or me or whoever the creation is, at any time. There is no exact measuring scale of your and my wit but if you compare the earthy accomplishments to judge it, I may not score less! Self-respect is a part of Islamic faith and pride is not. Those who follow only own desires disrespect many others; those who follow only others' views often disrespect themselves; those who respect both own and others' views based on a particular issue, may find a fine line to respect themselves and respect others. Your way of life is for you, and my way of life is for me.

 

Question: Where's the proof of your Allah's existence?

 

Answer: The proof is in the core of my heart (intellect) - I am convinced fully with the proof. This does not need to be proved to others and cannot be proven. I am convinced that Allah created me and I will rise after death for judgment of my deeds just like you are convinced that you need a proof to accept this kind of matter where you can neither disprove you will rise after death On the Day of Judgment to answer to Almighty about all your deeds. If this is no valid answer to your query, then the question is also not a valid question to me. People willingly believe what they want to believe.

 

------------------------------------------------------------------

Last Updated: April 10, 2024 by Al-Sakib Khan Pathan




BOOKS of AL-SAKIB KHAN PATHAN