Al-Sakib Khan Pathan

(আল-সাকিব খান পাঠান)


Ph.D.+MS in Comp. Engg. (Kyung Hee University, South Korea)

B.Sc. in CS & IT (Islamic University of Technology, Bangladesh)

IEEE Senior Member

Google Scholar Profile

Editor-in-Chief (Deputy), International Journal of Computers and Applications, Taylor & Francis

Associate Professor

Department of Computer Science and Engineering

Southeast University

Room: 1204 (Level 12)

Phone: (Office) +8809821590 Ex. 115  (Mobile) +8801756084583

A.R. Tower, 24, Kemal Ataturk Avenue, Banani, Dhaka-1213

BANGLADESH


E-Mails: sakib.pathan @ gmail.com, sakib.pathan1 @ gmail.com, spathan @ ieee.org

______________________________________________________________________________________________________________________________

Al-Qur'an in 57:5
- For HIM (Allah) is the Kingdom of the heavens and the earth. And towards Allah is the return of all affairs. [Translated Meaning]
Al-Qur'an in 20:114 - (Rabbi Zidni 'ilma) - "Oh My Lord! Increase Me In My Knowledge" [Translated Meaning]


After being a Muslim, always Seek refuge in Allah from 8 things,

 

It is narrated in many ahadeeth that the Prophet (sallallahu 'alayhi wa sallam) would consistently make this du'aa, and many of the Companions heard him repeat it over and over.

 

اللهم إني أعوذ بك من الهم والحزن ، والعجز والكسل والبخل والجبن ، وضلع الدين وغلبة الرجال

 

Transliteration: Allahumma inni a’udhu bika minal-hammi wal-huzni wal-’ajazi wal-kasli wal-bukhli wal-jubni wa dala’id-dayni wa ghalabatir-rijal.

 

English Translation: O Allah, I take refuge in You from (1) anxiety and (2) sorrow, (3) weakness and (4) laziness, (5) miserliness and (6) cowardice, (7) the burden of debts and (8) from being overpowered by men.

 

(1) anxiety (Arabic: Al-Hamm) - to be worried about the future

(2) sorrow (Arabic: Al-Hazan) - to be in grief about the past

(3) weakness (Arabic: Al-'Ajaz) - incapability in doing something good

(4) laziness (Arabic: Al-Kasl) - being lackadaisical

(5) miserliness (Arabic: Al-Bukhl) - being stingy in spending in good

(6) cowardice (Arabic: Al-Jubn) - being afraid of standing for the truth

(7) the burden of debt (Arabic: Dala'a ad-dayn) - tendency for debt to sway people from righteousness or being heavily in debt and unable to pay back

(8) from being overpowered by men (Arabic: Ghalabah - to be overpowered) - (ghalabatir-rijal) being overpowered by someone unjustly


Some Recent and Upcoming events that I am involved in ...


A new term, "Crowd Associated Network (CrAN)" is coined in our work, which will appear in IEEE COMMAG. See more here:   *News

https://sites.google.com/site/spathansite/cran


My recent INTERVIEW with the European Alliance for Innovation (EAI)  *News

http://blog.eai.eu/finding-the-common-ground-for-smart-grids-and-iot/


Invited Talk


"How to Build Customer Trust in Cloud Computing Model?", at National Conference on Electronics and ICT, Atomic Energy Center, Dhaka, Bangladesh, 20 April, 2017


Recent Journal Special Issues, Books


Guest Editor, CFP - Special Collection on SECURITY MECHANISMS AND DATA ACCESS PROTOCOLS IN INNOVATIVE WIRELESS NETWORKS, IJDSN, SAGE Publications [Submission Deadline: July 24, 2017]

Guest Editor, CFP - Feature Topic on ADVANCED INDUSTRIAL WIRELESS SENSOR NETWORKS AND INTELLIGENT IOT, IEEE Communications Magazine [Submission Deadline: July 01, 2017]

Guest Editor, CFP - Special Section on HEALTH INFORMATICS FOR THE DEVELOPING WORLD, IEEE ACCESS  [Submission Deadline: July 01, 2017]

Guest Editor, CFP - SI on SECURITY FOR SMART GRID AND INTERNET OF THINGS APPLICATIONS, IJITST, Inderscience [Extended Submission Deadline: April 30, 2017]

Guest Editor, CFP - SI on SMART GRID IOT, Mobile Networks & Applications (MONET) journal, Springer [SELECTED PAPERS From SGIOT 2017 Conference + few from open call that expired already]


Editor, CFC - Book: "CROWD ASSISTED NETWORKING AND COMPUTING", CRC Press, Taylor & Francis, USA [Proposal Submission Deadline: June 30, 2017]


Guest Editor, CFP - SI on INTELLIGENT COMPUTING AND ADAPTIVE SYSTEMS, Innovations in Systems and Software Engineering (A NASA Journal), Springer


Editor, Book: "A COMPREHENSIVE GUIDE TO IPTV DELIVERY NETWORKS", Wiley [To Appear]

Special Issue on: "WIRELESS NETWORK TECHNOLOGIES AND APPLICATIONS", IJHPCN, Inderscience [To Appear]


Feature Topic: "IMPACT OF NEXT-GENERATION MOBILE TECHNOLOGIES ON IOT-CLOUD CONVERGENCE", IEEE Communications Magazine [Click to Access]

Special Issue on "ADVANCES IN VEHICULAR AND UNDERWATER COMMUNICATION NETWORKS", IJAHUC, Inderscience [Click to Access]


Recent Conferences, Workshop, Seminars


General Chair, SGIoT 2017,  July 11–13, 2017 - Sault Ste. Marie, Ontario, Canada

General Co-Chair, ICCT 2017, December 22-23, 2017 - Jaipur, India [Submission Deadline: July 15, 2017]

General Co-Chair, CASE 2017, May 8-11, 2017 - Irbid, Jordan


Program Co-Chair, EICM 2017 with MobiSPC 2017, July 24-26, 2017 - Leuven, Belgium


Publicity Co-Chair, SigTelCom 2018, January 29-31, 2018 - Ho Chi Minh City, Vietnam [Submission Deadline: June 30, 2017]


Publicity Chair, PICom 2017, November 6-10, 2017 - Orlando, USA [Submission Deadline: May 10, 2017]

Publicity Co-Chair, EUSPN 2017, September 18-20, 2017 - Lund, Sweden [Submission Deadline: May 01, 2017]

Publicity Co-Chair, INISCOM 2017, September 4-6, 2017 - Thu Dau Mot, Vietnam [Submission Deadline: April 30, 2017]

Publicity Co-Chair, SmartWorld 2017, August 4-8, 2017 - San Francisco, Bay Area, USA



Program Committee Member in:


ICT-DM’2017, December 11-13, 2017 - Münster, Germany
IEEE GLOBECOM 2017 CSSMA, December 4-8, 2017 - Singapore
IEEE GLOBECOM 2017 MWN, December 4-8, 2017 - Singapore
IEEE GLOBECOM 2017 AHSN, December
4-8, 2017 - Singapore

WINSYS 2017, July 26-28, 2017 - Madrid, Spain

BIGDATA4HEALTH 2017, July 17, 2017, Philadelphia, USA

IEEE ICC 2017 MWN, May 21-25, 2017 - Paris, France

IEEE ICC 2017 AHSN, May 21-25, 2017 - Paris, France

ISNCC 2017, May 17-19, 2017 - Marrakech, Morocco

ICT 2017, May 03-05, 2017 - Limassol, Cyprus

IEEE INFOCOM-IECCO 2017, May 01-04 - Atlanta, GA, USA

IEEE INFOCOM-SCAN 2017, May 01-04 - Atlanta, GA, USA

Cybersecurity Symposium: ITNG 2017, April 10-12, 2017 - Las Vegas, Nevada, USA



BOOKS [Authored/Edited/(Authored + Edited) volumes]

https://sites.google.com/site/spathansite/Home/K25747-v1.jpg

** SPECIAL  NOTE **

 

For free download of the SOURCE CODES of the book, Practical Cryptography: Algorithms and Implementations Using C++, kindly check:

https://sites.google.com/site/spathansite/praccrypt

________________________________________________________________________________________


Biography


Al-Sakib Khan Pathan received PhD degree in Computer Engineering in 2009 from Kyung Hee University, South Korea and B.Sc. degree in Computer Science and Information Technology from Islamic University of Technology (IUT), Bangladesh in 2003. He is currently an Associate Professor at the Computer Science and Engineering department, Southeast University, Bangladesh. Previously, he was with the Computer Science department at IIUM, Malaysia during 2010-2015 and with the BRAC University, Bangladesh during 2009-2010. He also worked as a Researcher at Networking Lab, Kyung Hee University, South Korea from September 2005 to August 2009 where he completed his MS leading to PhD. His research interests include wireless sensor networks, network security, cloud computing, and e-services technologies. Currently he is also working on some multidisciplinary issues. He is a recipient of several awards/best paper awards and has several notable publications in these areas. He has served as a Chair, Organizing Committee Member, and Technical Program Committee (TPC) member in numerous international conferences/workshops like INFOCOM, GLOBECOM, ICC, LCN, GreenCom, AINA, WCNC, HPCS, ICA3PP, IWCMC, VTC, HPCC, etc. He was awarded the IEEE Outstanding Leadership Award and Certificate of Appreciation for his role in IEEE GreenCom’13 conference. He is currently serving on various editorial positions like Deputy Editor-in-Chief of International Journal of Computers and Applications, Taylor & Francis, Associate Technical Editor of IEEE Communications Magazine, Editor of Ad Hoc and Sensor Wireless Networks, Old City Publishing, and International Journal of Sensor Networks, Inderscience Publishers, Associate Editor of International Journal of Computational Science and Engineering, Inderscience, Area Editor of International Journal of Communication Networks and Information Security, Guest Editor of many special issues of top-ranked journals, and Editor/Author of 15 published books. One of his books has been included twice in Intel Corporation’s Recommended Reading List for Developers, 2nd half 2013 and 1st half of 2014; 3 books were included in IEEE Communications Society’s (IEEE ComSoc) Best Readings in Communications and Information Systems Security, 2013, 2 other books were indexed with all the titles (chapters) in Elsevier’s acclaimed abstract and citation database, Scopus, in February 2015 and a seventh book is translated to simplified Chinese language from English version. Also, 2 of his journal papers and 1 conference paper were included under different categories in IEEE Communications Society's (IEEE ComSoc) Best Readings Topics on Communications and Information Systems Security, 2013. He also serves as a referee of many prestigious journals. He received some awards for his reviewing activities like: one of the most active reviewers of IAJIT three times, in 2012, 2014, and 2015; Elsevier Outstanding Reviewer of Elsevier Computer Networks (July 2015) and Elsevier JNCA (November 2015), just to mention a few. He is a Senior Member of the Institute of Electrical and Electronics Engineers (IEEE), USA.

Research Interests

  • Wireless Sensor Network Security
  • Cryptography
  • Wireless Network Routing
  • Security issues in Networking
  • E-Services Technologies

  • Internet and Web Application

Journal Editorial Services (Partial list - Present and Past)

  • Editor-in-Chief, International Journal of Communication Networks and Information Security (IJCNIS), KUST, Pakistan, 20 February 2016-23 September, 2016 (Past)

  • Editor-in-Chief, International Journal on Internet and Distributed Systems (IJIDS), January 2013-June 2014 (Past)

  • Editor-in-Chief, International Journal on Internet and Distributed Computing Systems (IJIDCS), September 2010-2013 (Past)

Reviewer/Referee for Journals (Partial list - Past and Present)

  • IEEE Transactions on Dependable and Secure Computing

  • IEEE Transactions on Vehicular Technology

  • IEEE Transactions on Industrial Informatics

  • IEEE Transactions on Parallel and Distributed Systems

  • IEEE Communications Magazine

  • IEEE Communications Letters

  • IEEE Transactions on Information Technology in BioMedicine

  • ACM Transactions on Sensor Networks
  • Journal of Communications and Networks

  • Computer Networks, Elsevier

  • Computer Communications, Elsevier

  • Computers & Security, Elsevier

  • Computer Standards and Interfaces, Elsevier

  • Computers & Electrical Engineering, Elsevier

  • Ad Hoc Networks, Elsevier

  • Wireless Networks, Springer

  • The Computer Journal, Oxford Journals

  • Sensors, MDPI Publishing

  • Journal of High Speed Networks, IOS Press

  • EURASIP Journal on Wireless Communications and Networking

  • International Journal of Communication Systems, Wiley

  • The International Arab Journal of Information Technology

  • International Journal of Information Security, Springer

Notable Awards and Recognition

Research Activities

 

Currently, I am reading and working on a wide range of topics, some of which are multi-disciplinary in nature. The research topics include general network security and services, secure protocols, key management issues, Internet of Things (IoT), Cyber-Physical Systems (CPS), Software Defined Network, Smart Grid, Crowd Associated Network (CrAN), Online Qur'anic Arabic learning, and Checkpointing algorithms for networks. 


You may visit the old website of my research group: NDC Lab ( Networking and Distributed Computing Laboratory ) .

 

Talks/Presentations (Selected)


Invited Talk, "How to Build Customer Trust in Cloud Computing Model?", at National Conference on Electronics and ICT, Atomic Energy Center, Dhaka, Bangladesh, 20 April, 2017
- Invited Talk, "Mitigating Cross-Site Scripting Attacks with a Content Security Policy", International Conference on Communication and Computing System (ICCCS'16), Gurgaon, India, September 9-11, 2016

- Keynote Speech, "Mitigating Cross-Site Scripting Attacks with a Content Security Policy", Technical-Talk event organized by IEEE Student Branch, University of Dhaka, Bangladesh, 17 April 17, 2016

- Keynote Speech: "Building Customer Trust in Cloud Computing Model", ICACCE-2015, Dehradun, India, 1-2 May, 2015.

- Paper Presentation: "A Neighbour Discovery Approach for Cognitive Radio Network Using Tower of Hanoi (ToH) Sequence Based Channel Rendezvous", ICT4M 2014, Kuching, Malaysia, 17-18 November, 2014.

- Paper Presentation: "SECRET: A Secure and Efficient Certificate Revocation Scheme for Mobile Ad Hoc Networks", ISBAST 2014, Kuala Lumpur, Malaysia, 26 August, 2014.

- Keynote Speech: "Computer Science and IT Today: Research Issues and Publication Tips", ICIECC 2014, Madurai, India, 10 April, 2014.

- Keynote Speech: "Wireless Sensor Network Security: Current Status and Future Trends", Thapar University, Patiala, Punjab, India, 4 October, 2013.

- Seminar Presentation: "The Need-to-Know Issues for Publishing Books and Book Chapters", Springer eBooks Seminar, IIUM, Kuala Lumpur, Malaysia, 20 September 2013.

- Paper Presentation: "On the Key Revocation Schemes in Wireless Sensor Networks", IEEE GreenCom 2013, Beijing, China, 21 August 2013.

- Paper Presentation: "Usability Improvements for Touch-Screen Mobile Flight Booking Application: A Case Study", ACSAT 2012, Kuala Lumpur, Malaysia, 27 November 2012.

- Paper Presentation: "An Efficient Detection Model of Selective Forwarding Attacks in Wireless Mesh Networks", 5th IDCS 2012, Wu Yi Shan, China, 21 November 2012.

- Guest Lecture: "Wireless Network Security: 3G, 4G, Wireless PAN/LAN/MAN", CICT, Universiti Teknologi Malaysia (UTM), Skudai, Johor, Malaysia, 23 May 2012.


Courses I Teach/Taught at SEU


- Cryptography & Network Security (CSE4037)

- Programming Language II (Java) (CSE2015)

- Information System Design & Software Engineering (CSE3035)

- System Analysis & Design (CSE334)

- Software Engineering (CSE414)

 

Some useful links I was associated with ...

 

WSN Security and Security Map for Wireless Sensor Networks:

 

http://www.wsn-security.info/index.htm

http://www.wsn-security.info/Security_Map.htm

http://www.wsn-security.info/About_us.htm


Frequently Asked Questions (FAQs) to me ...

 

Question: Why do you bring your religious views with your academic identity?

 

Answer: Well, not always! However, on the webpage, I have written things related to my faith as a reminder of what I should and would do. Because, that view regulates my conducts, be that in an academic task, in personal task, or whatever in life. If you are the scrutinizer of me, you can question my action based on those rules that I claim to follow. The rules are fixed with evidences and records and I, as a son of Adam am faulty, often prone to violating rules. Every person is a slave (required to give service) in earth: either to his own desire, or to his wife, or to his "love", or to his family, or to his job, or to his business, or to someone else whose views would seem to be better (that go with own sense and intellect) in setting own moral compass. When one may choose to be subordinate to any of these things and thinks that he is self-respecting himself, I decided to be a slave of Allah, The Most High, The Only One Unique Almighty, before whom there is none and after whom there is none. There is nothing like unto Him and He is self-sufficient - yes, that's the limit of the intellect to describe Him but He is only known in the way of revelation how He revealed Himself to the righteous human beings. My academic identity comes under the identity of being a Muslim (who submits his will to the Will of Allah).

 

Question: Those who follow Islam or any other religion and a set of rules and regulations are nitwits and disrespect themselves. Don't you think so?

 

Answer: Islam is not like "any other religion". Learn it in better way. Time may permit you or not to learn and that "time" (which is also a creation), none does control except Allah, who has full control to stop the lifetime of you or me or whoever the creation is, at any time. There is no exact measuring scale of your and my wit but if you compare the earthy accomplishments to judge it, I may not score less! Self-respect is a part of Islamic faith and pride is not. Those who follow only own desires disrespect many others; those who follow only others' views often disrespect themselves; those who respect both own and others' views based on a particular issue, may find a fine line to respect themselves and respect others. Your way of life is for you, and my way of life is for me.

 

Question: Where's the proof of your Allah's existence?

 

Answer: The proof is in the core of my heart (intellect) - I am convinced fully with the proof. This does not need to be proved to others and cannot be proven. I am convinced that Allah created me and I will rise after death for judgment of my deeds just like you are convinced that you need a proof to accept this kind of matter where you can neither disprove you will rise after death On the Day of Judgment to answer to Almighty about all your deeds. If this is no valid answer to your query, then the question is also not a valid question to me. People willingly believe what they want to believe.

 

------------------------------------------------------------------

Last Updated: April 22, 2017 by Al-Sakib Khan Pathan

___________________________________________________________________________________________________________________________________________________
List of Publications

___________________________________________________________________________________________________________________________________________________

NDC Lab related Publications (OLD WEBSITE during IIUM period):

http://staff.iium.edu.my/sakib/ndclab/publications.html

 



Editorial/Guest Editorial Articles in Refereed International Journals
 

[JE23] Al-Sakib Khan Pathan, “Wireless Network Technologies and Applications”, Guest Editorial of the Special Issue of International Journal of High Performance Computing and Networking, Inderscience Publishers. (To Appear)

[JE22] M. Shamim Hossain, Changsheng Xu, Ying Li, Al-Sakib Khan Pathan, Josu Bilbao, Wenjun Zeng, Abdulmotaleb El Saddik, “Impact of Next-Generation Mobile Technologies on IoT-Cloud Convergence”, Guest Editorial of the Special Issue of IEEE Communications Magazine, Volume: 55, Issue: 1, January 2017, pp. 18-19.

[JE21] Sabu M. Thampi, Joel J. P. C. Rodrigues, and Al-Sakib Khan Pathan, “Advances in Vehicular and Underwater Communication Networks”, Guest Editorial of the Special Issue of International Journal of Ad Hoc and Ubiquitous Computing, Vol. 24, Nos. 1/2, Inderscience Publishers, 2017, pp. 1-3.

[JE20] Al-Sakib Khan Pathan, Xianglin Wei, Homero Toral Cruz, and Luca Caviglione, “Preface: Security and Trust Issues in Peer-to-Peer Networks”, Guest Editorial of the Special Issue of International Journal of Computational Science and Engineering, Vol.13, No. 2, Inderscience Publishers, 2016, pp. 109-110.

[JE19] M. Shamim Hossain, Al-Sakib Khan Pathan, Stefan Goebel, Shawon M. Rahman, and Manzur Murshed, “Advances in Multimedia Sensor Networks for Health-Care and Related Applications”, Guest Editorial of the Special Issue of International Journal of Distributed Sensor Networks, vol. 2015, Article ID 596096, Hindawi Publishing Corporation, 2 pages, 2015. DOI:10.1155/2015/596096.

[JE18] Al-Sakib Khan Pathan, Zubair Muhammad Fadlullah, Mostafa M. Fouda, Muhammad Mostafa Monowar, and Philip Korn, “Information integrity in smart grid systems”, Guest Editorial of the Special Issue of Information Systems, Elsevier, DOI:10.1016/j.is.2015.05.002, 2015.

[JE17] Al-Sakib Khan Pathan, Muhammad Mostafa Monowar, Hani Alzaid, and Mohammad Asadul Hoque, “Understanding Converged Networks, Technologies and Applications”, Guest Editorial of the Special Issue on Converged Networks, Technologies and Applications of International Journal of Computational Science and Engineering, Vol. 10, No. 3, 2015, Inderscience Publishers, pp. 231-233.

[JE16] Neeraj Kumar, Al-Sakib Khan Pathan, Elias P. Duarte Jr., and Riaz Ahmed Shaikh, "Editorial: Critical Applications in Vehicular Ad Hoc/Sensor Networks", Guest Editorial of the Special Issue on Critical Applications in Vehicular Ad Hoc/Sensor Networks of Telecommunication Systems, Volume 58, Issue 4, April 2015, Springer, DOI: 10.1007/s11235-014-9876-5, pp 275-277.  

[JE15] Al-Sakib Khan Pathan, “On the Boundaries of Trust and Security in Computing and Communications Systems”, International Journal of Trust Management in Computing and Communications, Vol. 2, No. 1, 2014, Inderscience Publishers, pp. 1-6.

[JE14] Mohammad Mehedi Hassan, Al-Sakib Khan Pathan, Eui-Nam Huh, and Jemal Abawajy, "Emerging Sensor-Cloud Technology for Pervasive Services and Applications", Guest Editorial of the Special Issue of International Journal of Distributed Sensor Networks, Volume 2014, Article ID 610106, DOI:10.1155/2014/610106, Hindawi Publishing Corporation, 2 pages.

[JE13] Al-Sakib Khan Pathan and Muhammad Mostafa Monowar, “Preface: Future Trends in Security Issues in Internet and Web Applications”, Guest Editorial of the Special Issue of International Journal of Computational Science and Engineering, Vol. 9, No. 4, 2014, Inderscience Publishers, pp. 275-277.

[JE12] Al-Sakib Khan Pathan, Rashid A. Saeed, Mohamed Ali Feki, and Nguyen H. Tran, “Guest Editorial: Special Issue on Integration of IoT with Future Internet”, Guest Editorial of the Special Issue on Integration of IoT with Future Internet, Journal of Internet Technology, Volume 15, No.2, March 2014, pp.145-147.  

[JE11] Hyung Seok Kim, Waleed Ejaz, Khalid Al-Begain, Al-Sakib Khan Pathan, and Najam ul Hasan, “Advances in Cognitive Radio Sensor Networks”, Special Issue of International Journal of Distributed Sensor Networks, DOI: 10.1155/2014/631624, Volume 2014, Article ID 631624, 3 pages, Hindawi Publishing Corporation, 2014.

[JE10] Al-Sakib Khan Pathan, Zubair Muhammad Fadlullah, Mostafa M. Fouda, and Hae Young Lee, "Defending against Wireless Network Intrusion", Guest Editorial of the Special Issue on Wireless Network Intrusion of Journal of Computer and System Sciences, Elsevier, DOI: 10.1016/j.jcss.2013.06.006, Volume 80, Issue 3, 2014, pp. 499-501.

[JE09] Guangjie Han, Lei Shu, Al-Sakib Khan Pathan, Joel Rodrigues, and Abdelhamid Mellouk, "Wireless Sensor Networks based on Environmental Energy Harvesting", Special Issue of International Journal of Distributed Sensor Networks, DOI: 10.1155/2013/816063, Volume 2013, Article ID 816063, 2 pages, Hindawi Publishing Corporation, 2013.

[JE08] Al-Sakib Khan Pathan, "When the Cloud Computing Becomes Mobile!", International Journal of Internet and Distributed Systems, Scientific Research Publishing Inc., DOI: 10.4236/ijids.2013.13003, Volume 1, Number 3, August 2013, p. 17.

[JE07] Al-Sakib Khan Pathan, “Tackling the Threats of Internet Worms”, (Editor-in-Chief’s Foreword) International Journal on Internet and Distributed Computing Systems, Volume 3, Number 1, 2013, pp. i-ii.

[JE06] Lei Shu, Athanasios V. Vasilakos, Jaime Lloret, and Al-Sakib Khan Pathan, “Guest Editorial: Special Issue on Recent Advance on Mobile Sensor Systems”, Telecommunication Systems, Springer, DOI: 10.1007/s11235-011-9560-y, Volume 52, Issue 4, April 2013, pp 2407-2409.

[JE05] Al-Sakib Khan Pathan, “Multi-Dimensional Networking and Distributed Computing Services”, (Editor-in-Chief’s Foreword) International Journal on Internet and Distributed Computing Systems, Volume 2, Number 1, 2012, pp. i-ii.

[JE04] Syed Obaid Amin, Al-Sakib Khan Pathan, and Syed M. Rahman, “Editorial: Recent Advances in Next-Generation and Resource-Constrained Converged Networks”, Special Issue of International Journal of Communication Networks and Distributed Systems (IJCNDS), (with), Vol. 8, Nos. 1/2, 2012.

[JE03] Al-Sakib Khan Pathan, “Internet and Distributed Computing Knowledge in Today’s World”, (Editor-in-Chief’s Foreword) International Journal on Internet and Distributed Computing Systems, Volume 1, Issue 1, June 1, 2011, p. i.

[JE02] Sudip Misra, N. Balakrishnan, and Al-Sakib Khan Pathan, “Preface: Recent advances in simulation and mathematical modeling of wireless networks”, Special Issue of Mathematical and Computer Modelling Journal, Elsevier (with Sudip Misra and N. Balakrishnan), Volume 53, Issues 11-12, June 2011, pp. 2057-2058.

[JE01] Jemal H. Abawajy, Mukaddim Pathan, Al-Sakib Khan Pathan, Mustafizur Rahman, “Network Management in Distributed Systems”, Guest Editorial of the Special Issue of Scalable Computing: Practice and Experience (SCPE), Volume 11 Nr 4, 2010.
 



Books

 

[B15] Mubashir Husain Rehmani and Al-Sakib Khan Pathan. Emerging Communication Technologies Based on Wireless Sensor Networks: Current Research and Future Applications. (edited volume), ISBN: 9781498724852, CRC Press, Taylor & Francis Group, USA, 2016.

[B14] Al-Sakib Khan Pathan. Securing Cyber-Physical Systems. (edited and contributed volume), ISBN: 9781498700986, CRC Press, Taylor & Francis Group, USA, 2015.

[B13] Al-Sakib Khan Pathan, Muhammad Mostafa Monowar, and Zubair Md. Fadlullah. (Translators: Qiu Shuang, Liu Yinghua, Wang Lingfang). 下一代融合网络理论与实践. [Title in Chinese] (edited and contributed volume), ISBN: 9787111483595, China Machine Press, China, 2015. (Translated [Simplified Chinese] version of the book entitled, “Building Next-Generation Converged Networks: Theory and Practice”, CRC Press, USA, 2013)

[B12] Saiful Azad and Al-Sakib Khan Pathan. Practical Cryptography: Algorithms and Implementations using C++. (edited and contributed volume), ISBN: 978-1-48-222889-2, CRC Press, Taylor & Francis Group, USA, November 2014.

[B11] Al-Sakib Khan Pathan, Muhammad Mostafa Monowar, and Shafiullah Khan. Simulation Technologies in Networking and Communications: Selecting the Best Tool for the Test. (edited volume), ISBN 9781482225495, CRC Press, Taylor & Francis Group, USA, November 2014.

[B10] Al-Sakib Khan Pathan. The State of the Art in Intrusion Prevention and Detection. (edited and contributed volume), ISBN 9781482203516, CRC Press, Taylor & Francis Group, USA, January 2014.

[B09] Mohssen Mohammed and Al-Sakib Khan Pathan. Automatic Defense against Zero-day Polymorphic Worms in Communication Networks. (authored volume), ISBN 9781466557277, CRC Press, Taylor & Francis Group, USA, 2013. (This book was included in IEEE Communications Society's (IEEE ComSoc) Best Readings in Communications and Information Systems Security, September 2013)

[B08] Shafiullah Khan and Al-Sakib Khan Pathan. Wireless Networks and Security: Issues, Challenges and Research Trends. (edited volume), ISBN: 978-3-642-36168-5, Series: Signals and Communication Technology, Springer, 2013. (This book was included in IEEE Communications Society's (IEEE ComSoc) Best Readings in Communications and Information Systems Security, September 2013 + One of the top 25% most downloaded eBooks in the relevant Springer eBook Collection in 2013 - a total of 5830 chapter downloads in 2013)

[B07] Al-Sakib Khan Pathan, Muhammad Mostafa Monowar, and Zubair Md. Fadlullah. Building Next-Generation Converged Networks: Theory and Practice. (edited and contributed volume), ISBN: 9781466507616, CRC Press, Taylor & Francis Group, USA, January, 2013. (This book got international attention to get published with a translated version in Simplified Chinese language after a deal between CRC Press, USA and China Machine Press, July 2013.)

[B06] Shafiullah Khan, Al-Sakib Khan Pathan, and Nabil A. Alrajeh. Wireless Sensor Networks: Current Status and Future Trends. (edited and contributed volume), ISBN: 9781466506060, Auerbach Publications, CRC Press, Taylor & Francis Group, USA, 2012. (This book was included twice in the Intel Corporation's Recommended Reading List for Developers, 2nd half, 2013 and 1st half, 2014)

[B05] Jemal Abawajy, Mukaddim Pathan, Mustafizur Rahman, Al-Sakib Khan Pathan, and Mustafa Mat Deris. Network and Traffic Engineering in Emerging Distributed Computing Applications. (edited volume), ISBN: 9781466618886, IGI Global, USA, 2012. (This book is indexed with all the titles (chapters) in Elsevier’s acclaimed abstract and citation database, Scopus, February 2015)

[B04] Jemal Abawajy, Mukaddim Pathan, Mustafizur Rahman, Al-Sakib Khan Pathan, and Mustafa Mat Deris. Internet and Distributed Computing Advancements: Theoretical Frameworks and Practical Applications. (edited volume), ISBN: 9781466601611, IGI Global, USA, February 2012.

[B03] Al-Sakib Khan Pathan. Securing WSN with Lightweight Resource-Efficient Schemes: Security From the Bootstrapping Phase. (authored volume), ISBN: 978-3-8465-1681-2, Lambert Academic Publishing, LAP LAMBERT Academic Publishing, VDM Verlag, Germany, September, 2011.

[B02] Al-Sakib Khan Pathan, Mukaddim Pathan, and Hae Young Lee. Advancements in Distributed Computing and Internet Technologies: Trends and Issues. (edited and contributed volume), IGI Global, USA, 2011. (This book is indexed with all the titles (chapters) in Elsevier’s acclaimed abstract and citation database, Scopus, February 2015)

[B01] Al-Sakib Khan Pathan. Security of Self-Organizing Networks: MANET, WSN, WMN, VANET. (edited and contributed volume), ISBN: 978-1-4398-1919-7, Auerbach Publications, CRC Press, Taylor & Francis Group, USA, 2010. (This book was included in IEEE Communications Society's (IEEE ComSoc) Best Readings in Communications and Information Systems Security, September 2013)

 



Book Chapters
 

[BC19] Rami Haidar Ahmad and Al-Sakib Khan Pathan, “A Study on M2M (Machine to Machine) System and Communication: Its Security, Threats, and Intrusion Detection System”, Security Solutions and Applied Cryptography in Smart Grid Communications (Edited by Mohamed Amine Ferrag and Ahmed Ahmim), ISBN13: 9781522518297, IGI Global, USA, 2016, pp. 179-214.

[BC18] Matin Saad Abdullah and Al-Sakib Khan Pathan, “Teaching and Learning Qur’anic Arabic Utilizing Adaptive and Intelligent Systems for Collaborative Online Learning”, Handbook of Applied Learning Theory and Design in Modern Education (Edited by Elena Railean, Gabriela Walker, Liz Jackson, and Atilla Elci), IGI Global, USA, 2015, pp. 165-186.

[BC17] Al-Sakib Khan Pathan and Imran Yusof, “Tackling Cross-Site Scripting (XSS) Attacks in the Cyberspace”, Securing Cyber-Physical Systems (Edited by Al-Sakib Khan Pathan), ISBN: 9781498700986, CRC Press, Taylor & Francis Group, USA, 2015, pp. 331-348.

[BC16] Al-Sakib Khan Pathan, “Basics of Security and Cryptography”, Practical Cryptography: Algorithms and Implementations using C++ (Edited by Saiful Azad and Al-Sakib Khan Pathan), ISBN: 978-1-48-222889-2, CRC Press, Taylor & Francis Group, USA, pp. 1-10.

[BC15] Al-Sakib Khan Pathan and Tarem Ahmed, "An Innovative Approach of Blending Security Features in Energy-Efficient Routing for a Crowded Network of Wireless Sensors", The State of the Art in Intrusion Prevention and Detection (Edited by Al-Sakib Khan Pathan), ISBN: 9781482203516, CRC Press, Taylor & Francis Group, USA, January 2014, pp. 449-472.

[BC14] Mohssen Mohammed and Al-Sakib Khan Pathan, "Using Routers and Honeypots in Combination for Collecting Internet Worm Attacks ", The State of the Art in Intrusion Prevention and Detection (Edited by Al-Sakib Khan Pathan), ISBN: 9781482203516, CRC Press, Taylor & Francis Group, USA, January 2014, pp. 47-84

[BC13] Al-Sakib Khan Pathan, "Analyzing Trust and Security in Computing and Communications Systems", Managing Trust in Cyberspace (Edited by Sabu M. Thampi, Bharat Bhargava, and Pradeep Atrey), ISBN 9781466568440, Chapman and Hall/CRC Press, USA, 2013, pp. 1-11.

[BC12] Al-Sakib Khan Pathan, Shapla Khanam, Habibullah Yusuf Saleem, and Wafaa Mustafa Abduallah, “Tackling Intruders in Wireless Mesh Networks”, Distributed Network Intelligence, Security and Applications (Edited by Qurban A Memon), ISBN 9781466559578, CRC Press, Taylor & Francis Group, USA, 2013, pp. 167-190.

[BC11] Abdelgadir Tageldin Abdelgadir and Al-Sakib Khan Pathan, "A Pragmatic Approach of Performance Evaluation of MPI-OpenMP on a 12 nodes Multi-core Cluster", Building Next-Generation Converged Networks: Theory and Practice (Edited by Al-Sakib Khan Pathan, Muhammad Mostafa Monowar, and Zubair Md. Fadlullah), ISBN: 9781466507616, CRC Press, Taylor & Francis Group, USA, 2013, 437-450.

[BC10] Homero Toral-Cruz, Julio Cesar Ramirez-Pacheco, Pablo Velarde-Alvarado, and Al-Sakib Khan Pathan, “VoIP in Next Generation Converged Networks”, Building Next-Generation Converged Networks: Theory and Practice (Edited by Al-Sakib Khan Pathan, Muhammad Mostafa Monowar, and Zubair Md. Fadlullah), ISBN: 9781466507616, CRC Press, Taylor & Francis Group, USA, 2013, pp. 337-360.

[BC09] Diallo Abdoulaye Kindy and Al-Sakib Khan Pathan, “A Walk through SQL Injection: Vulnerabilities, Attacks, and Countermeasures in Current and Future Networks”, Building Next-Generation Converged Networks: Theory and Practice (Edited by Al-Sakib Khan Pathan, Muhammad Mostafa Monowar, and Zubair Md. Fadlullah), ISBN: 9781466507616, CRC Press, Taylor & Francis Group, USA, 2013, pp. 171-197.

[BC08] Mostafa M. Fouda, Zubair Md. Fadlullah, Al-Sakib Khan Pathan, and Nei Kato, "Peer-to-Peer Video-On-Demand in Future Internet", Building Next-Generation Converged Networks: Theory and Practice (Edited by Al-Sakib Khan Pathan, Muhammad Mostafa Monowar, and Zubair Md. Fadlullah), ISBN: 9781466507616, CRC Press, Taylor & Francis Group, USA, 2013, pp. 119-134.

[BC07] Abror Abduvaliyev, Al-Sakib Khan Pathan, Jianying Zhou, Rodrigo Roman, and Wai-Choong Wong, "Intrusion Detection and Prevention in Wireless Sensor Networks", Wireless Sensor Networks: Current Status and Future Trends (Edited by Shafiullah Khan, Al-Sakib Khan Pathan, and Nabil A. Alrajeh), ISBN 9781466506060, Auerbach Publications, CRC Press, Taylor & Francis Group, USA, 2012, pp. 487-510.

[BC06] Al-Sakib Khan Pathan, “Security Management in Heterogeneous Distributed Sensor Networks”, Ubiquitous Multimedia and Mobile Agents: Models and Implementations. (Edited by Susmit Bagchi), ISBN: 9781613501078, IGI Global Publishers, USA, 2011, pp. 274-294.

[BC05] Kai Lin, Lei Shu, Lei Wang, and AI-Sakib Khan Pathan, "Data gathering with Multi-attribute Fusion in Wireless Sensor Networks", Advancements in Distributed Computing and Internet Technologies: Trends and Issues (Edited by Al-Sakib Khan Pathan, Mukaddim Pathan, and Hae Young Lee), ISBN: 978-1-61350-110-8, IGI Global Publishers, USA, 2011, pp. 159-181.

[BC04] Al-Sakib Khan Pathan, “Major Works on the Necessity and Implementations of PKC in WSN A Beginner’s Note”, Security of Self-Organizing Networks: MANET, WSN, WMN, VANET. (Edited by Al-Sakib Khan Pathan), ISBN: 978-1-4398-1919-7, Auerbach Publications, CRC Press, Taylor & Francis Group, USA, 2010, pp. 525-544.

[BC03] Al-Sakib Khan Pathan, "Denial of Service in Wireless Sensor Networks: Issues and Challenges", Advances in Communications and Media Research, Vol. 6 (Edited by Anthony V. Stavros), ISBN: 978-1-60876-576-8, Nova Science Publishers, Inc., USA, 2010. [Invited Short Communication]

[BC02] Al-Sakib Khan Pathan and Choong Seon Hong, "Security Attacks and Challenges in Wireless Sensor Networks", Encyclopedia On Ad Hoc And Ubiquitous Computing: Theory and Design of Wireless Ad Hoc, Sensor, and Mesh Networks, (Edited by Dharma P. Agrawal and Bin Xie), World Scientific Publishing, ISBN 978-981-283-348-8, September 2009, pp. 397-426. [Invited Book Chapter]

[BC01] Al-Sakib Khan Pathan and Choong Seon Hong, "Routing in Mobile Ad Hoc Networks", Guide to Wireless Ad Hoc Networks, Springer London, (Edited by Sudip Misra, Isaac Woungang, and Subhas Chandra Misra), DOI: 10.1007/978-1-84800-328-6_4, ISBN: 978-1-84800-327-9, 2009, pp. 59-96.

 



Refereed International Journal Papers/Magazines
 

[J54] Saiful Azad, Arafatur Rahman, A. Taufiq Asyhari, and Al-Sakib Khan Pathan, “Crowd Associated Network: Exploiting over Smart Garbage Management System”, IEEE Communications Magazine. (To Appear)

[J53] Mohamed Guerroumi and Al-Sakib Khan Pathan, “Hybrid Data Dissemination Protocol (HDDP) for Wireless Sensor Networks”, Wireless Networks, Springer. (To Appear)

[J52] Houssem Mansouri, Nadjib Badache, Makhlouf Aliouat, and Al-Sakib Khan Pathan, “Checkpointing distributed application running on mobile ad hoc networks”, International Journal of High Performance Computing and Networking, Inderscience Publishers. (To Appear)

[J51] Dilara Ireen Swarna, Saiful Azad, Al-Sakib Khan Pathan, and Arafatur Rahman, “Finding a suitable hop-to-hop busty traffic transmission approach for Underwater Acoustic Networks: handshake-based vs handshake-free MAC protocols”, International Journal of Ad Hoc and Ubiquitous Computing, Inderscience Publishers. (To Appear)

[J50] Mounya Smara, Makhlouf Aliouat, Al-Sakib Khan Pathan, Zibouda Aliouat, "Acceptance Test for Fault Detection in Component-based Cloud Computing and Systems", Future Generation Computer Systems, Elsevier, Volume 70, May 2017, pp. 74-93, DOI: 10.1016/j.future.2016.06.030.

[J49] Matin Saad Abdullah, Al-Sakib Khan Pathan, and Imad Fakhri Al Shaikhli, “A Web and Software-based Approach Blending Social Networks for Online Qur’anic Arabic Learning”, The International Arab Journal of Information Technology, Vol. 14, No. 1, January 2017, pp. 80-90.

[J48] Malak Abdullah I. Almarshad, Mohssen M. Z. E. Mohammed, and Al-Sakib Khan Pathan, “Detecting Zero-day Polymorphic Worms with Jaccard Similarity Algorithm”, International Journal of Communication Networks and Information Security, Vol. 8, No. 3, December 2016, pp. 203-214.

[J47] Mohamed Guerroumi, Al-Sakib Khan Pathan, Abdelouahid Derhab, Nadjib Badache, and Samira Moussaoui, “MMSMAC: A Multi-mode Medium Access Control Protocol for Wireless Sensor Networks with Latency and Energy-Awareness”, Wireless Personal Communications, Springer, September 2016, DOI 10.1007/s11277-016-3726-6.

[J46] N.M. Masoodhu Banu, S. Sujatha, and Al-Sakib Khan Pathan, “Skip Block based Distributed Source Coding for Hyperspectral Image Compression”, Multimedia Tools and Applications (2015), Volume 75, Issue 18, September 2016, pp 11267-11289, Springer US, DOI: 10.1007/s11042-015-2852-6.

[J45] Kalpana Murugan and Al-Sakib Khan Pathan, “Prolonging the Lifetime of Wireless Sensor Networks using Secondary Sink Nodes”, Telecommunication Systems, Volume 62, Issue 2, June 2016, pp. 347-361, Springer US, DOI: 10.1007/s11235-015-0079-5.

[J44] Djallel Eddine Boubiche, Sabrina Boubiche, Homero Toral-Cruz, Al-Sakib Khan Pathan, Azzedine Bilami, Samir Athmani, “SDAW: Secure Data Aggregation Watermarking-based Scheme in Homogeneous WSNs”, Telecommunication Systems, Volume 62, Issue 2, June 2016, pp. 277-288, Springer US, DOI:10.1007/s11235-015-0047-0.

[J43] Imran Yusof and Al-Sakib Khan Pathan, “Mitigating Cross-Site Scripting Attacks with a Content Security Policy”, IEEE Computer, Volume: 49, Issue: 3, March 2016, pp. 56-63.

[J42] Tarem Ahmed, Al-Sakib Khan Pathan, and Supriyo Shafkat Ahmed, "Learning Algorithms for Anomaly Detection from Images", International Journal of System Dynamics Applications, IGI Global, Volume 4, Issue 3, July - September 2015, pp. 43-69.

[J41] Houssem Mansouri, Nadjib Badache, Makhlouf Aliouat, and Al-Sakib Khan Pathan, “A New Efficient Checkpointing Algorithm for Distributed Mobile Computing”, Journal of Control Engineering and Applied Informatics, Vol.17, No.2, 2015, pp. 43-54.

[J40] Al-Sakib Khan Pathan and Mohssen M. Z. E. Mohammed, “Building Customer Trust in Cloud Computing with an ICT-enabled Global Regulatory Body”, Wireless Personal Communications, Volume 85, Issue 1, November 2015, pp. 77-99, Springer, DOI: 10.1007/s11277-015-2729-z.

[J39] Saiful Azad, Khandaker Tabin Hasan, Dip Nandi, and Al-Sakib Khan Pathan, "A High-Throughput Routing Metric for Multi-Hop Underwater Acoustic Networks", Computers and Electrical Engineering, Volume 44, Elsevier, May 2015, DOI:10.1016/j.compeleceng.2015.03.020, pp. 24-33.

[J38] Dieynaba Mall, Karim Konaté, and Al-Sakib Khan Pathan, "Key Revocation in Wireless Sensor Networks – A Survey on a Less-addressed yet Vital Issue", International Journal of Ad Hoc and Ubiquitous Computing, Inderscience Publishers, Vol. 18, Nos. 1/2, 2015, pp. 3-22.

[J37] Mohamed Guerroumi, Al-Sakib Khan Pathan, Nadjib Badache, and Samira Moussaoui, “On the Medium Access Control Protocols Suitable for Wireless Sensor Networks – A Survey”, International Journal of Communication Networks and Information Security, Vol. 6, No. 2, 2014, pp. 89-103.

[J36] Al-kindy Athman Abdalla, and Al-Sakib Khan Pathan, “On Protecting Data Storage in Mobile Cloud Computing Paradigm”, IETE Technical Review, Volume 31, Issue 1, 2014, DOI:10.1080/02564602.2014.891382, pp. 82-91. (This paper is recognized as the "Most Read article" during the period, May 2014-January 2016)

[J35] Wafaa Mustafa Abduallah, Abdul Monem S. Rahma, and Al-Sakib Khan Pathan, "Mix Column Transform based on Irreducible Polynomial Mathematics for Color Image Steganography: A Novel Approach", Computers and Electrical Engineering, Volume 40, Issue 4, 2014, Elsevier, DOI: 10.1016/j.compeleceng.2014.02.007, pp. 1390-1404.

[J34] Shazana Md Zin, Nor Badrul Anuar, Miss Laiha Mat Kiah, and Al-Sakib Khan Pathan, “Routing Protocol Design for Secure WSN: Review and Open Research Issues”, Journal of Network and Computer Applications, Volume 41, 2014, Elsevier, DOI: 10.1016/j.jnca.2014.02.008, pp. 517–530.

[J33] Al-Sakib Khan Pathan and Diallo Abdoulaye Kindy, “Lethality of SQL Injection against Current and Future Internet-Technologies”, International Journal of Computational Science and Engineering, Vol. 9, No. 4, 2014, Inderscience Publishers, pp. 386-394.

[J32] Tarem Ahmed, Supriyo Ahmed, and Al-Sakib Khan Pathan, “Automated Surveillance in Distributed, Visual Networks: An Empirical Comparison of Recent Algorithms”, International Journal of Control and Automation, SERSC Publisher, Vol.7, No.3, 2014, DOI: 10.14257/ijca.2014.7.3.37, pp.389-400.

[J31] Al-Sakib Khan Pathan, "Fi-Wi Network for Future Cloud", International Journal of Applied Research on Information Technology and Computing, Volume 4, Issue 3, December 2013, pp. 122-132.

[J30] Mohamed Guerroumi, Al-Sakib Khan Pathan, Nadjib Badache, and Samira Moussaoui, “Strengths and Weaknesses of Prominent Data Dissemination Techniques in Wireless Sensor Networks”, International Journal of Communication Networks and Information Security, Vol. 5, No. 3, 2013, pp. 158-177.

[J29] Sherali Zeadally, Al-Sakib Khan Pathan, Cristina Alcaraz, and Mohamad Badra, "Towards Privacy Protection in Smart Grid", Wireless Personal Communications, Springer, DOI 10.1007/s11277-012-0939-1, Volume 73, Issue 1, November 2013, pp 23-50. (This article was included in IEEE Communications Society's (IEEE ComSoc) Best Readings Topics on Communications and Information Systems Security, 2013 under the category of “Privacy”)

[J28] Diallo Abdoulaye Kindy and Al-Sakib Khan Pathan, “A Detailed Survey on various aspects of SQL Injection in Web Applications: Vulnerabilities, Innovative Attacks and Remedies”, International Journal of Communication Networks and Information Security, Vol. 5, No. 2, August 2013, pp. 80-92.

[J27] Abror Abduvaliyev, Al-Sakib Khan Pathan, Jianying Zhou, Rodrigo Roman, and Wai-Choong Wong, "On the Vital Areas of Intrusion Detection Systems in Wireless Sensor Networks", IEEE Communications Surveys & Tutorials, DOI: 10.1109/SURV.2012.121912.00006, Volume: 15, Issue: 3, Third Quarter 2013, pp. 1223-1237. (This article was included in IEEE Communications Society's (IEEE ComSoc) Best Readings Topics on Communications and Information Systems Security, 2013 under the category of “Intrusion Detection Systems”)

[J26] Homero Toral-Cruz, Al-Sakib Khan Pathan, and Julio C. Ramírez Pacheco, "Accurate Modeling of VoIP Traffic QoS Parameters in Current and Future Networks with Multifractal and Markov Models", Mathematical and Computer Modelling Journal, Elsevier, DOI: 10.1016/j.mcm.2011.12.007, Volume 57, Issues 11–12, June 2013, pp. 2832-2845.

[J25] Feyza Gündüz and Al-Sakib Khan Pathan, "On the Key Factors of Usability in Small-sized Mobile Touch-Screen Application”, International Journal of Multimedia and Ubiquitous Engineering, SERSC Publisher, Vol. 8, No. 3, May 2013, pp. 115-137.

[J24] Harry Tin Win and Al-Sakib Khan Pathan, "On the Issues and Challenges of Fiber-Wireless (Fi-Wi) Networks", Journal of Engineering, Hindawi Publishing Corporation, Volume 2013, Article ID 645745, pp. 1-11.

[J23] Xianglin Wei, Jianhua Fan, Ming Chen, Tarem Ahmed, and Al-Sakib Khan Pathan, "SMART: A Subspace based Malicious Peers Detection algorithm for P2P Systems", International Journal of Communication Networks and Information Security, Vol. 5, No. 1, April 2013, pp. 1-9.

[J22] Wafaa Mustafa Abduallah, Abdul Monem S. Rahma, and Al-Sakib Khan Pathan, "A New Data Hiding Technique Based on Irreducible Polynomials", Journal of Emerging Technologies in Web Intelligence, Academy Publisher, Volume 5, No. 1, 2013, pp. 45-51.

[J21] Al-Sakib Khan Pathan, Wafaa Mustafa Abduallah, Shapla Khanam, and Habibullah Yusuf Saleem, "A Pay-and-Stay Model for Tackling Intruders in Hybrid Wireless Mesh Networks", SIMULATION: Transactions of The Society for Modeling and Simulation International, DOI: 10.1177/0037549712467827, Volume 89, Issue 5, May 2013, pp. 616-633.

[J20] Tarem Ahmed, Xianglin Wei, Supriyo Ahmed, and Al-Sakib Khan Pathan, "Efficient and Effective Automated Surveillance Agents using Kernel Tricks", SIMULATION: Transactions of The Society for Modeling and Simulation International, DOI: 10.1177/0037549712460908, Volume 89, Issue 5, May 2013, pp. 562-577.

[J19] Hassen Mohammed Alsafi, Wafaa Mustafa Abduallah, and Al-Sakib Khan Pathan, "IDPS: An Integrated Intrusion Handling Model for Cloud Computing Environment", International Journal of Computing & Information Technology, Volume 4, Number 1, Jan-June 2012, pp. 1-16.

[J18] Tarem Ahmed, Xianglin Wei, Supriyo Ahmed, and Al-Sakib Khan Pathan, "Automated Intruder Detection from Image Sequences using Minimum Volume Sets", International Journal of Communication Networks and Information Security, Volume 4, Number 1, April 2012, pp. 11-17.

[J17] Muhammad Mostafa Monowar, Md. Obaidur Rahman, Al-Sakib Khan Pathan, and Choong Seon Hong, “Prioritized Heterogeneous Traffic-oriented Congestion Control Protocol for Wireless Sensor Network”, The International Arab Journal of Information Technology, Volume 9, No.1, January 2012, pp. 39-48.

[J16] Mohammad Moshee Uddin, Al-Sakib Khan Pathan, Mohiuddin Ahmed, and Shariq Haseeb, “Experimental Analysis of MIPL Based Mobile IPv6 Using Single vs Dual Interface with Practical Test-Beds”, International Journal of Applied Research on Information Technology and Computing, Volume 2, Issue 3, December 2011, pp. 61-79 .

[J15] Abdelgadir Tageldin Abdelgadir, Mohiuddin Ahmed, Al-Sakib Khan Pathan, Ariff Abdullah, and Shariq Haseeb, "Performance Analysis of a Highly Available Home Agent in Mobile Networks", American Journal of Applied Sciences, Volume 8, Issue 12, DOI: 10.3844/ajassp.2011.1388.1397, Science Publications, USA, 2011, pp. 1388-1397.

[J14] Al-Sakib Khan Pathan, Muhammad Mostafa Monowar, Jinfang Jiang, Lei Shu, and Guangjie Han, "An Efficient Approach of Secure Group Association Management in Densely Deployed Heterogeneous Distributed Sensor Network", Security and Communication Networks, Wiley InterScience, DOI: 10.1002/sec.277, Volume 4, Issue 9, August 2011, pp. 1013–1026.

[J13] Nazmus Saquib, Md. Sabbir Rahman Sakib, and Al-Sakib Khan Pathan, "ViSim: A User-Friendly Graphical Simulation Tool for Performance Analysis of MANET Routing Protocols", Mathematical and Computer Modelling Journal, Elsevier, Volume 53, Issues 11-12, June 2011, pp. 2204-2218.

[J12] Khadija Rasul, Nujhat Nuerie, and Al-Sakib Khan Pathan, “Securing Wireless Sensor Networks with An Efficient B+ Tree-Based Key Management Scheme”, International Journal of Communication Networks and Information Security, Volume 2, Number 3, December 2010, pp. 162-168.

[J11] Mohammad Ziaur Rahman and Al-Sakib Khan Pathan, "A Case Study - Establishing Redundant Access Networks in the Telecommunication Sector of a Developing Country", International Journal of Information Technology, Communications, and Convergence, Inderscience Publishers, Volume 1, No. 1, 2010, pp. 108-126.

[J10] Mohammad Ziaur Rahman and Al-Sakib Khan Pathan, "A Case Study: Submarine Cable in Bangladesh - Its Prospects, Present Status, and Challenges Ahead", International Journal of Applied Research on Information Technology and Computing, Volume 1, Number 2, May-August 2010, pp. 209-223.

[J09] Al-Sakib Khan Pathan, "A Review and Cryptanalysis of Similar Timestamp-Based Password Authentication Schemes Using Smart Cards", International Journal of Communication Networks and Information Security, Volume 2, Number 1, April 2010, pp. 15-20.

[J08] Al-Sakib Khan Pathan and Choong Seon Hong, "Weakly connected dominating set-based secure clustering and operation in distributed sensor networks", International Journal of Communication Networks and Distributed Systems, DOI: 10.1504/IJCNDS.2009.026825, Inderscience Publishers, Volume 3, Number 2, 2009, pp. 175-195. (Conference version appeared in HPCC 2006)

[J07] Md. Mokammel Haque, Al-Sakib Khan Pathan, Choong Seon Hong, and Eui-Nam Huh, "An Asymmetric Key-Based Security Architecture for Wireless Sensor Networks", KSII Transactions on Internet and Information Systems, DOI: 10.3837/tiis.2008.05.004, Volume 2, Number 5, October 2008, pp. 265-279. (Conference version appeared in IEEE MILCOM 2007) [Open Access] (One of the top 10 downloaded papers in May-June 2009)

[J06] Al-Sakib Khan Pathan and Choong Seon Hong, "SERP: Secure Energy-efficient Routing Protocol for Densely Deployed Wireless Sensor Networks", Annals of Telecommunications, DOI: 10.1007/s12243-008-0042-5, Volume 63, Numbers 9-10, October 2008, pp. 529-541. (Conference version appeared in ISPA 2007)

[J05] Al-Sakib Khan Pathan, Muhammad Mostafa Monowar, Md. Forhad Rabbi, Muhammad Mahbub Alam, and Choong Seon Hong, "NAMP: Neighbor Aware Multicast Routing Protocol for Mobile Ad Hoc Networks", The International Arab Journal of Information Technology, Vol. 5, No. 1, January 2008, pp. 102-107. (Conference version appeared in IEEE E-Tech 2004)

[J04] Al-Sakib Khan Pathan and Choong Seon Hong, "A Security Enhanced Timestamp-Based Password Authentication Scheme Using Smart Cards", IEICE Transactions on Information and Systems, Volume E90-D, No. 11, November, 2007, pp. 1885-1888. (Conference version appeared in IEEE ICACT 2007)

[J03] Tran Thanh Dai, Al-Sakib Khan Pathan, and Choong Seon Hong, "A Resource-Optimal Key Pre-distribution Scheme with Improved Security for Wireless Sensor Networks", The 9th Asia-Pacific Network Operations and Management Symposium (APNOMS 2006), Busan, Korea, (Y.-T. Kim and M. Takano Eds.), Lecture Notes in Computer Science (LNCS), Volume 4238, Springer-Verlag 2006, pp. 546-549. (acceptance rate: 26.7%)

[J02] Al-Sakib Khan Pathan and Choong Seon Hong, "A Key-Predistribution-Based Weakly Connected Dominating Set for Secure Clustering in DSN", The 2006 International Conference on High Performance Computing and Communications (HPCC 2006), Munich, Germany, (M. Gerndt and D. Kranzlmüller Eds.), Lecture Notes in Computer Science (LNCS), Volume 4208, Springer-Verlag 2006, pp. 270-279. (acceptance rate: 29%)

[J01] Al-Sakib Khan Pathan and Humayun Kadir Islam, "A Study on the Key Factors for Effective E-Learning", Asian Journal of Information Technology, Volume 4 Number 1, 2005, pp. 49-52.

 



Papers in other Lecture Notes in Computer Science (LNCS) Volumes (non-SCIE)
 

[LN08] Shapla Khanam, Habibullah Saleem, and Al-Sakib Khan Pathan, "An Efficient Detection Model of Selective Forwarding Attacks in Wireless Mesh Networks", Proceedings of IDCS 2012, 21-23 November 2012, Wu Yi Shan, Fujian, China, (Y. Xiang et al. (Eds.)) Lecture Notes in Computer Science (LNCS), Volume 7646, Springer-Verlag 2012, pp. 1–14, 2012.

[LN07] Abdelgadir Tageldin Abdelgadir, Al-Sakib Khan Pathan, Mohiuddin Ahmed, "On the Performance of MPI-OpenMP on a 12 nodes Multi-core Cluster", Proceedings of ICA3PP 2011 Workshops (IDCS Workshop), October 24-26, 2011, Melbourne, Australia, (Y. Xiang et al. (Eds.)): ICA3PP 2011, Part II, Lecture Notes in Computer Science (LNCS), Volume 7017, Springer-Verlag 2011, pp. 225–234, 2011.

[LN06] Homero Toral-Cruz, Al-Sakib Khan Pathan, and Julio C. Ramírez-Pacheco, "Modeling QoS Parameters of VoIP Traffic with Multifractal and Markov Models", Proceedings of ICA3PP 2011 Workshops (IDCS Workshop), October 24-26, 2011, Melbourne, Australia, (Y. Xiang et al. (Eds.)): ICA3PP 2011, Part II, Lecture Notes in Computer Science (LNCS), Volume 7017, Springer-Verlag 2011, pp. 255–265, 2011.

[LN05] Md. Sabbir Rahman Sakib, Nazmus Saquib, and Al-Sakib Khan Pathan, "A New Visual Simulation Tool for Performance Evaluation of MANET Routing Protocols", The 2010 International Symposium on Frontiers of Parallel and Distributed Computing (FPDC 2010) In conjunction with The 10th ICA3PP 2010, 23 May, 2010, Busan, Korea, (C.-H. Hsu et al. (Eds.)): ICA3PP 2010, Part II, Lecture Notes in Computer Science (LNCS), Volume 6082, Springer-Verlag 2010, pp. 208–217. [Invited Paper]

[LN04] Al-Sakib Khan Pathan, Jae Hyun Ryu, Md. Mokammel Haque, and Choong Seon Hong, "Security Management in Wireless Sensor Networks with a Public Key Based Scheme", The 10th Asia-Pacific Network Operations and Management Symposium (APNOMS 2007), 10-12 October, 2007, Sapporo, Japan, (Shingo Ata and Choong Seon Hong (Eds.)) Lecture Notes in Computer Science (LNCS), Volume 4773, Springer-Verlag 2007, pp. 503-506. (acceptance rate: 48.4%)

[LN03] Al-Sakib Khan Pathan and Choong Seon Hong, "A Secure Energy-Efficient Routing Protocol for WSN", The Fifth International Symposium on Parallel and Distributed Processing and Applications (ISPA 2007), August 29-31, Niagara Falls, Ontario, Canada, (Ivan Stojmenovic, Ruppa K. Thulasiram, Laurence T. Yang, Weijia Jia, Minyi Guo and Rodrigo F. de Mello (Eds.)), Lecture Notes in Computer Science (LNCS), Volume 4742, Springer-Verlag 2007, pp. 407-418. (acceptance rate: 34%)

[LN02] Al-Sakib Khan Pathan and Choong Seon Hong, "Securing Sensor Reports in Wireless Sensor Networks", European Conference on Parallel and Distributed Computing (Euro-Par 2007), August 28-31, Rennes, France, (A.-M. Kermarrec, L. Bougé, and T. Priol (Eds.)), Lecture Notes in Computer Science (LNCS), Volume 4641, Springer-Verlag 2007, pp. 881-890. (acceptance rate: 27%)

[LN01] Al-Sakib Khan Pathan, Tran Thanh Dai, and Choong Seon Hong, "A Key Management Scheme with Encoding and Improved Security for Wireless Sensor Networks", The 2006 International Conference on Distributed Computing and Internet Technology (ICDCIT 2006), December 20-23, Bhubaneswar, India, (S. Madria, K. Claypool, R. Kannan, and P. Uppuluri (Eds.)), Lecture Notes in Computer Science (LNCS), Volume 4317, Springer-Verlag 2006, pp. 102-115. (acceptance rate: 12%)

 


 

Papers in Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST) Volume

 

[LNT01] Wafaa Mustafa Abduallah, Abdul Monem S. Rahma, and Al-Sakib Khan Pathan, “Reversible Data Hiding Scheme based on 3-Least Significant Bits and Mix Column Transform”, 4th International Workshop on Applications and Techniques in Information Security (ATIS), 26 September 2013 with the 9th International Conference on Security and Privacy in Communication Networks (SecureComm 2013), September 25-27, 2013, Sydney, Australia, (Zia, T., Zomaya, A., Varadharajan, V., and Mao, M. (Eds.)), Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (LNICST), Volume 0127, Springer, 2013, pp. 405-417.

 


 

Conference Proceedings Edited
 

6. Jinsong Wu, Gregorio Martinez Perez, Sabu M. Thampi, Mohammed Atiquzzaman, Stefano Berretti, Joel J. P. C. Rodrigues, Raghuvir Tomar, Ravi Prakash Gorthi, Patrick Siarry, Al-Sakib Khan Pathan, Jie Li, Punam Bedi, Sameep Mehta, Mohamed Habib Kammoun, and Vivek Jain, ICACCI-2016: Proceedings of Fifth International Conference on Computing, Communications and Informatics, Jaipur, India, IEEE, 2016.

5. Latifur Khan, Joarder Kamruzzaman, Al Sakib Khan Pathan, Dependsys 2015: Proceedings of the First International Symposium on Dependability in Sensor, Cloud, and Big Data Systems and Applications, Zhangjiajie, China, Springer Verlag, 2015.

4. Bernady O. Apduhan, Yan Wang, Zhiwen Yu, Huansheng Ning, Al-Sakib Khan Pathan, Mianxiong Dong, Yuqing Sun, Yukikazu Nakamoto, UFirst 2014: Proceedings of the 2014 International Symposium on UbiCom Frontiers - Innovative Research, Systems and Technologies: 11th IEEE International Conference on Ubiquitous Intelligence and Computing and 11th IEEE International Conference on Autonomic and Trusted Computing and 14th IEEE International Conference on Scalable Computing and Communications and Associated Symposia/Workshops, UIC-ATC-ScalCom 2014, Bali, Indonesia, IEEE, 2014.

3. Eunyong Lee, Cho-Li wang, Borgy Waluyo, Al-Sakib Khan Pathan, SanHyun Seo, MUE 2013: Proceedings of FTRA 7th International Conference on Multimedia and Ubiquitous Engineering, Seoul, South Korea, Springer, 2013.

2. Jemal Abawajy, Al-Sakib Khan Pathan, and Mustafizur Rahman, IDCS '10: Proceedings of the 3rd International Workshop on Internet and Distributed Computing Systems, IEEE CS Press, Los Alamitos, CA, USA, IEEE, 2010.

1. Al-Sakib Khan Pathan, Mukaddim Pathan, and Hae Young Lee, IDCS '09: Proceedings of the 2nd International Workshop on Internet and Distributed Computing Systems, IEEE CS Press, Los Alamitos, CA, USA, IEEE, 2009.

 



Refereed International Conference Papers

 

[C49] Houssem Mansouri, Al-Sakib Khan Pathan, and Makhlouf Aliouat, “A Snapshot Security Protocol for Radar Network Protection”, 7th Seminar on Detection Systems: Architectures and Technologies (DAT 2017), February 20-22, 2017, Algiers, Algeria.

[C48] Dieynaba Mall, Karim Konaté, and Al-Sakib Khan Pathan, “ECL-EKM: An Enhanced Certificateless Effective Key Management Protocol for Dynamic WSN”, International Conference on Networking, Systems and Security (NSysS 2017), January 5-8, 2017, Dhaka, Bangladesh, pp. 150-155.

[C47] Houssem Mansouri and Al-Sakib Khan Pathan, “An Efficient Minimum-Process Non-Intrusive Snapshot Algorithm for Vehicular Ad Hoc Networks”, 13th ACS/IEEE International Conference on Computer Systems and Applications (AICCSA 2016), November 29-December 2, 2016, Agadir, Morocco. (acceptance rate: 26%)

[C46] Matin Saad Abdullah, M.M. Hafizur Rahman, Al-Sakib Khan Pathan, and Imad Fakhri Al Shaikhli, “A Practical and Interactive Web-based Software for Online Qur’anic Arabic Learning”, International Conference on Information & Communication Technology For the Muslim World (ICT4M’16), November 22-24, 2016, Jakarta, Indonesia, pp. 76-81.

[C45] Mohamed Guerroumi, Abdelouahid Derhab, Al-Sakib Khan Pathan, Nadjib Badache, and Samira Moussaoui, “MMSMAC: A Multi-mode Medium Access Control Protocol for Wireless Sensor Networks”, IEEE Wireless Communications and Networking Conference (IEEE WCNC 2016), April 3-6, 2016, Doha, Qatar.

[C44] Houssem Mansouri, Nadjib Badache, Makhlouf Aliouat, and Al-Sakib Khan Pathan, "A Non-Blocking Coordinated Checkpointing Algorithm for Message-Passing Systems", International Conference on Intelligent Information Processing, Security and Advanced Communication (IPAC 2015), Article No. 34, ACM, November 23-25, 2015, Batna, Algeria.

[C43] Houssem Mansouri, Nadjib Badache, Makhlouf Aliouat, and Al-Sakib Khan Pathan, “Adaptive Fault Tolerant Checkpointing Algorithm for Cluster Based Mobile Ad Hoc Networks”, International Conference on Advanced Wireless, Information, and Communication Technologies (AWICT 2015), September 20-23, 2015, Sousse, Tunisia, Procedia Computer Science, Elsevier, Volume 73, 2015, pp. 40-47.

[C42] A. Babu Karuppiah, J. Dalfiah, K. Yuvashri, S. Rajaram, and Al-Sakib Khan Pathan, “Energy-Efficient Sybil Node Detection Algorithm for Wireless Sensor Networks”, 3rd International Conference on Eco-Friendly Computing and Communication Systems (ICECCS 2014), December 18-21, 2014, Mangalore, India, pp. 95-98.

[C41] Mohssen M. Z. E. Mohammed and Al-Sakib Khan Pathan, "International Center for Monitoring Cloud Computing Providers (ICMCCP) for Ensuring Trusted Clouds", The 11th IEEE International Conference on Autonomic and Trusted Computing (ATC-2014), December 9-12, 2014, Ayodya Resort, Bali, Indonesia, pp. 571-576.

[C40] Imran Yusof and Al-Sakib Khan Pathan, “Preventing Persistent Cross-Site Scripting (XSS) Attack By Applying Pattern Filtering Approach”, The 5th International Conference on Information and Communication Technology for the Muslim World (ICT4M 2014), November 17-19 2014, Kuching, Sarawak, Malaysia.

[C39] Md. Rafiqul Islam, M.A.E. Shakib, Md. Azizur Rahaman, Md. Obaidur Rahman, and Al-Sakib Khan Pathan, "A Neighbour Discovery Approach for Cognitive Radio Network Using Tower of Hanoi (ToH) Sequence Based Channel Rendezvous", The 5th International Conference on Information and Communication Technology for the Muslim World (ICT4M 2014), November 17-19 2014, Kuching, Sarawak, Malaysia.

[C38] Tarem Ahmed, Al-Sakib Khan Pathan, and Supriyo Ahmed, “Adaptive Algorithms for Automated Intruder Detection in Surveillance Networks”, ICACCI 2014 Doctoral Consortium; 3rd International Conference on Advances in Computing, Communications & Informatics (ICACCI 2014), September 24-27, 2014, Delhi, India, pp. 2775-2780.

[C37] Dieynaba Mall, Karim Konaté, and Al-Sakib Khan Pathan, “SECRET: A Secure and Efficient Certificate Revocation Scheme for Mobile Ad Hoc Networks”, International Symposium on Biometric and Security Technologies 2014 (ISBAST'14), August 26-27, 2014, Kuala Lumpur, Malaysia, pp. 137-143.

[C36] Mohssen M. Z. E. Mohammed, H. Anthony Chan, Neco Ventura and Al-Sakib Khan Pathan, "An Automated Signature Generation Method for Zero-day Polymorphic Worms Based on Multilayer Perceptron Model", 2nd International Conference on Advanced Computer Science Applications and Technologies – ACSAT2013, December 22-24, 2013, Kuching, Sarawak, Malaysia, pp. 450-455.

[C35] Wafaa Mustafa Abduallah, Abdul Monem S. Rahma, and Al-Sakib Khan Pathan, "Data Hiding within Color Images based on MCT with X-OR Operations", 2nd International Conference on Advanced Computer Science Applications and Technologies – ACSAT2013, December 22-24, 2013, Kuching, Sarawak, Malaysia, pp. 19-24. [Invited Paper]

[C34] Tarem Ahmed, Supriyo Ahmed, and Al-Sakib Khan Pathan, “Automated Surveillance in Distributed, Wireless Visual Networks: A Comparative Study”, Workshop on Mobile and Wireless 2013 Second (Mobile2013SE), December 11-13, 2013, Jeju National University International Center, Jeju Island, Korea; Advanced Science and Technology Letters, Volume 42 (Mobile and Wireless 2013), DOI: 10.14257/astl.2013.42.01, pp.1-4. [Invited Paper]

[C33] Dieynaba Mall, Karim Konaté, and Al-Sakib Khan Pathan, "On the Key Revocation Schemes in Wireless Sensor Networks", The 2013 IEEE International Conference on Green Computing and Communications (GreenCom 2013): Security, Privacy, and Trust Computing, August 20-23, 2013, Beijing, China, pp. 290-297.

[C32] Matin Saad Abdullah and Al-Sakib Khan Pathan, "Learning Qur’anic Arabic through Interactive Web-Based Software: A Pragmatic Approach in Language for Specific Purpose", The 4th International Conference on Information and Communication Technology for the Muslim World (ICT4M 2013), March 25-27, 2013, Rabat, Morocco, pp. 1-6. (CD Proceedings)

[C31] Feyza Gündüz and Al-Sakib Khan Pathan, "Usability Improvements for Touch-Screen Mobile Flight Booking Application: A Case Study", International Conference on Advanced Computer Science Applications and Technologies (ACSAT2012), November 26 - 28 2012, Kuala Lumpur, Malaysia, pp. 49-54.

[C30] Muhammad Faheem Mohd Ezani, Al-Sakib Khan Pathan, and Shariq Haseeb, "Comparative Analysis of IEEE 802.11g Multimedia Multicast Performance Using RTP with an Implemented Test-bed", The 2012 IEEE Conference on Open Systems (ICOS 2012), October 21-24, 2012, Kuala Lumpur, Malaysia, pp. 1-5.

[C29] Matin Saad Abdullah and Al-Sakib Khan Pathan, "Using the Web for Critical Learning of Al-Qur’an’s Language: an Exploratory Case Study", World Conference on Islamic Thought 2012 (WCIT'12), September 11-12 2012, Perak, Malaysia.

[C28] Imad Al Shaikhli, Akram M. Zeki, Rusydi Makarim, and Al-Sakib Khan Pathan, "Protection of Integrity and Ownership of PDF Documents Using Invisible Signature", UKSim 14th International Conference on Computer Modelling and Simulation (UKSim2012), Cambridge University (Emmanuel College), 28 - 30 March 2012, United Kingdom.

[C27] Xianglin Wei, Tarem Ahmed, Ming Chen, and Al-Sakib Khan Pathan, "PeerMate: A Malicious Peer Detection Algorithm for P2P Systems based on MSPCA", International Conference on Computing, Networking and Communications (IEEE ICNC 2012), January 30 - February 2, 2012, Maui, Hawaii, USA, pp. 815-819.

[C26] Tarem Ahmed, Xianglin Wei, Supriyo Ahmed, and Al-Sakib Khan Pathan, "Intruder Detection in Camera Networks using the One-Class Neighbor Machine",  Networking and Electronic Commerce Research Conference 2011 (NAEC 2011), October 13-16, 2011, Riva del Garda, Italy, pp. 115-118. [Invited Paper]

[C25] Leopoldo Estrada-Vargas, Homero Toral-Cruz, and Al-Sakib Khan Pathan, "A Generator of Cauchy-distributed Time Series with Specific Hurst Index",  Networking and Electronic Commerce Research Conference 2011 (NAEC 2011), October 13-16, 2011, Riva del Garda, Italy, pp. 8-14. [Invited Paper]

[C24] Mohammad Moshee Uddin, Shariq Haseeb, Mohiuddin Ahmed, and Al-Sakib Khan Pathan, "Comprehensive QoS Analysis of MIPL Based Mobile IPv6 Using Single VS. Dual Interfaces", 1st International Conference on Electrical, Control and Computer Engineering 2011 (IEEE InECCE 2011), June 21-22, 2011, Kuantan, Pahang, Malaysia, pp. 388-393.

[C23] Diallo Abdoulaye Kindy and Al-Sakib Khan Pathan, "A Survey on SQL Injection: Vulnerabilities, Attacks, and Prevention Techniques", The 15th IEEE Symposium on Consumer Electronics (IEEE ISCE 2011), June 14-17, 2011, Singapore, p. 77 (digital proceedings).

[C22] Mohammad Moshee Uddin, Al-Sakib Khan Pathan, Shariq Haseeb, and Mohiuddin Ahmed, "A Test-Bed Analysis for Seamless MIPV6 Handover in Heterogeneous Environment", The 15th IEEE Symposium on Consumer Electronics (IEEE ISCE 2011), June 14-17, 2011, Singapore, p. 24 (digital proceedings).

[C21] Abdelgadir Tageldin Abdelgadir, Mohiuddin Ahmed, Al-Sakib Khan Pathan, Ariff Abdullah, Shariq Haseeb, and Omar Al-Mushayt, "Performance Analysis of a Highly Available Home Agent in Mobile Networks", 14th Communications and Networking Symposium (CNS 2011) with SpringSim’11, April 4-7, 2011, Boston, MA, USA, pp. 62-70.

[C20] Khadija Rasul, Nujhat Nuerie, and Al-Sakib Khan Pathan, "An Enhanced Tree-based Key Management Scheme for Secure Communication in Wireless Sensor Network", Proceedings of the 3rd IEEE International Workshop on Internet and Distributed Computing Systems (IDCS'10) in conjunction with the 12th IEEE International Conference on High Performance Computing and Communications (HPCC 2010), September 01-03, 2010, Melbourne, Australia, pp. 671-676.

[C19] Nazmus Saquib, Md. Sabbir Rahman Sakib, and Al-Sakib Khan Pathan, "Demo Abstract: ViSiM, A MANET Routing Simulation Demonstration Tool for Naive Users", The 29th IEEE Conference on Computer Communications (IEEE INFOCOM 2010), San Diego, USA. [Demo Session Paper]

[C18] Al-Sakib Khan Pathan and Choong Seon Hong, "Bilinear-Pairing-Based Remote User Authentication Schemes Using Smart Cards", Proceedings of the Third International Conference on Ubiquitous Information Management and Communication (ACM ICUIMC 2009), ACM SIGKDD and ACM SIGMOD, January 15-16, 2009, SKKU, Suwon, Korea, pp. 366-371.

[C17] Al-Sakib Khan Pathan and Choong Seon Hong, "Feasibility of PKC in Resource-Constrained Wireless Sensor Networks", Proceedings of the IEEE International Workshop on Internet and Distributed Computing Systems (IEEE IDCS'08) in conjunction with 11th IEEE ICCIT'08, December 24, 2008, Khulna, Bangladesh, pp. 13-20. (acceptance rate: 25.45%)

[C16] Muhammad Mostafa Monowar, Md. Obaidur Rahman, Al-Sakib Khan Pathan, and Choong Seon Hong, "Congestion Control Protocol for Wireless Sensor Networks Handling Prioritized Heterogeneous Traffic", Proceedings of the 2nd International Symposium on Security and Multimodality in Pervasive Environments (SMPE'08) Workshop in conjunction with MobiQuitous 2008, July 21-25, 2008, Trinity College Dublin, Ireland, 2008. (acceptance rate: 24%)

[C15] Al-Sakib Khan Pathan and Choong Seon Hong, "Cryptanalysis of Yang-Wang-Chang's Password Authentication Scheme with Smart Cards", Proceedings of the 10th International Conference on Advanced Communication Technology (IEEE ICACT 2008), Volume III, February 17-20, 2008, Phoenix Park, Korea, pp. 1618-1620.

[C14] Md. Mokammel Haque, Al-Sakib Khan Pathan, and Choong Seon Hong, "Securing U-Healthcare Sensor Networks using Public Key Based Scheme", Proceedings of the 10th International Conference on Advanced Communication Technology (IEEE ICACT 2008), Volume II, February 17-20, 2008, Phoenix Park, Korea, pp. 1108-1111.

[C13] Al-Sakib Khan Pathan, Gihyuk Heo, and Choong Seon Hong, "A Secure Lightweight Approach of Node Membership Verification in Dense HDSN", Proceedings of the IEEE Military Communications Conference (IEEE MILCOM 2007), October 29-31, Orlando, Florida, USA, p. 99 (CD).

[C12] Md. Mokammel Haque, Al-Sakib Khan Pathan, Byung Goo Choi, and Choong Seon Hong, "An Efficient PKC-Based Security Architecture for Wireless Sensor Networks", Proceedings of the IEEE Military Communications Conference (IEEE MILCOM 2007), October 29-31, Orlando, Florida, USA, p. 72 (CD). (This article received IEEE Student Travel Grant Award)

[C11] Brian J. d'Auriol, Nguyen Thi Thanh Tuyen, Vo Quoc Hung, Duc Thang, Hassan Jameel, Le Xuan Hung, S.M.K.R. Raazi, Dao Phuong Thuy, Ngo Trong Canh, Adil Mehmood Khan, Sunghyun Kim, Shu Lei, Sakib Pathan, Tran Van Phuong, Sungyoung Lee and Young-Koo Lee, "Embedded Processor Security", Proceedings of the 2007 International Conference on Security and Management (SAM'07), June 25-28, Las Vegas, Nevada, USA, pp. 591-594.

[C10] Al-Sakib Khan Pathan and Choong Seon Hong, "An Improved Timestamp-Based Password Authentication Scheme with Two-Party Verification using Smart Cards", Proceedings of the 9th International Conference on Advanced Communication Technology (IEEE ICACT 2007), Volume I, February 12-14, 2007, Phoenix Park, Korea, pp. 804-809.

[C09] Al-Sakib Khan Pathan, Choong Seon Hong, and Tatsuya Suda, "A Novel and Efficient Bilateral Remote User Authentication Scheme Using Smart Cards", Proceedings of the 2007 IEEE International Conference on Consumer Electronics (IEEE ICCE 2007), January 10-14, Las Vegas, USA, pp. 1-2. (acceptance rate: 41.9%)

[C08] Al-Sakib Khan Pathan and Choong Seon Hong, "Developing an Efficient DMCIS with Next-Generation Wireless Networks", Proceedings of the IEEE Military Communications Conference (IEEE MILCOM 2006), October 23-25, Washington, DC, USA, p. 92 (CD). (This article received IEEE Student Travel Grant Award)

[C07] Al-Sakib Khan Pathan and Choong Seon Hong, "Secure Clustering in DSN with Key Predistribution and WCDS", Proceedings of the IEEE Military Communications Conference (IEEE MILCOM 2006), October 23-25, Washington, DC, USA, p. 93 (CD).

[C06] Al-Sakib Khan Pathan, Tran Thanh Dai, and Choong Seon Hong, "An Efficient LU Decomposition-based Key Pre-distribution Scheme for Ensuring Security in Wireless Sensor Networks", Proceedings of the 2006 IEEE International Conference on Computer and Information Technology (IEEE CIT 2006), September 20-22, Seoul, Korea, 2006, pp. 227-232. (acceptance rate: 40%)

[C05] Al-Sakib Khan Pathan and Choong Seon Hong, and Hyung-Woo Lee, "Towards Developing Smart Environment using Wireless Sensor and Ad Hoc Networks", Accepted as Poster in the International Conference on Computational Science and its Applications 2006, Glasgow, Scotland (UK), ICCSA 2006 (IEE), May 8-11, 2006.

[C04] Al-Sakib Khan Pathan, Hyung-Woo Lee, and Choong Seon Hong, "Security in Wireless Sensor Networks: Issues and Challenges", Proceedings of the 8th International Conference on Advanced Communication Technology (IEEE ICACT 2006), Volume II, 20-22 February, Phoenix Park, Korea, 2006, pp. 1043-1048. (This article was included in IEEE Communications Society's (IEEE ComSoc) Best Readings Topics on Communications and Information Systems Security, 2013 under the category of “Wireless Sensor Networks”)

[C03] Al-Sakib Khan Pathan, Choong Seon Hong, and Hyung-Woo Lee, "Smartening the Environment using Wireless Sensor Networks in a Developing Country", Proceedings of the 8th International Conference on Advanced Communication Technology (IEEE ICACT 2006), Volume I, 20-22 February, Phoenix Park, Korea, 2006, pp. 705-709.

[C02] Al-Sakib Khan Pathan, Humayun Kadir Islam, Sabit Anjum Sayeed, Farruk Ahmed, and Choong Seon Hong, "A Framework for Providing E-Services to the Rural Areas Using Wireless Ad Hoc and Sensor Networks", Proceedings of the First International Conference on Next-Generation Wireless Systems (IEEE ICNEWS 2006), 2-4 January, Dhaka, Bangladesh, 2006, pp. 282-286.

[C01] Al-Sakib Khan Pathan, Md. Mahbub Alam, Md. Mostafa Monowar, and Md. Forhad Rabbi, "An Efficient Routing Protocol for Mobile Ad Hoc Networks with Neighbor Awareness and Multicasting", Proceedings of IEEE E-Tech, pp. 97-100, Karachi, Pakistan, July, 2004.

 



Papers in National/Domestic Conferences (Bangladesh and Korea)
 

[D08] Mohammad Ziaur Rahman and Al-Sakib Khan Pathan, "A Case Study - Establishing Redundant Access Networks in the Telecommunication Sector of a Developing Country", Proceedings of Annual Conference and Seminar on “Electronics and Telecommunications for Digital Bangladesh”, 2-3 June 2010, Atomic Energy Centre, Dhaka, Bangladesh.

[D07] Al-Sakib Khan Pathan and Choong Seon Hong, "Cryptanalysis of Improved Password Authentication Scheme with Smart Cards ", (Poster) Proceedings of Korea Computer Congress 2008 (KCC 2008), Volume 35, No.1(D), June 30-July 2, 2008, Phoenix Park, Korea, pp. 101-104.

[D06] Md. Mokammel Haque, Al-Sakib Khan Pathan, and Choong Seon Hong, "S-PkSec: An Asymmetric Key Based Security Management Scheme for Sensor Network Operation", Proceedings of KNOM (Korean Network Operations and Management) Conference 2008, (TS6-5), April 24-25, Changwon, Korea.

[D05] Al-Sakib Khan Pathan and Choong Seon Hong, "A Secure and Efficient Way of Node Membership Verification in Wireless Sensor Networks", (Poster) Proceedings of the 27th KIPS Spring Conference, 11-12 May 2007, Seongnam, Korea, pp. 1100-1101.

[D04] Md. Mokammel Haque, Al-Sakib Khan Pathan, and Choong Seon Hong, "An Efficient Public Key Based Security Architecture for Wireless Sensor Networks", (Poster) Proceedings of the 27th KIPS Spring Conference, 11-12 May 2007, Seongnam, Korea, pp. 1098-1099.

[D03] Al-Sakib Khan Pathan and Choong Seon Hong, "An Efficient Scheme for Secure Data Transmission in Wireless Sensor Networks", Proceedings of the 17th Joint Conference on Communication & Information (JCCI 2007), 2-4 May 2007, PyeongChang, Korea, p. 48 (CD). (This article received the IEEE ComSoc Seoul Chapter Best Paper Award)

[D02] Al-Sakib Khan Pathan and Choong Seon Hong, "Attacks on Shen et. al.’s Remote User Authentication Scheme and Defense", Proceedings of the 26th KIPS Fall Conference 2006, November 10-11, Cheongju, Korea, pp. 1589-1592.

[D01] Al-Sakib Khan Pathan and Choong Seon Hong, "An Efficient Bilateral Remote User Authentication Scheme with Smart Cards", Proceedings of the 33rd Korea Information Science Society Fall Conference 2006, October 20-21, Seoul, Korea. pp. 132-134.




Other Conference Papers in the Past
 

[P5] Al-Sakib Khan Pathan, Md. Mehedi Hassan, and Humayun Kadir Islam, "E-Learning: Can it Help the Education in Bangladesh?". Accepted in the Eleventh International Conference on Distributed Multimedia Systems (DMS 2005), Banff, Canada, 5-7 September, 2005.

[P4] Al-Sakib Khan Pathan, "Where is the Intelligence in Computational Intelligence?". Accepted in the World ENFORMATIKA Joint Conferences (WEC 2005), Istanbul, Turkey, June, 2005.

[P3] Humayun Kadir Islam and Al-Sakib Khan Pathan, "Technological Impact on Disaster Management Information System". Accepted in the 2nd International Conference on Information and Communication Technology (ICT 2004), Bangkok, Thailand, November, 2004.

[P2] Al-Sakib Khan Pathan and Humayun Kadir Islam, "A Study on the Key Factors for Effective E-Learning". Accepted in the 3rd International Conference on ICT and Higher Education e-University 2004, Bangkok, Thailand, August, 2004.

[P1] Al-Sakib Khan Pathan, Md. Mahbub Alam, M. Monowar, F. Rabbi, S. Ahmed, and T. H. Khan, "12-Segment Display for the Bengali Numerical Characters". Proceedings of the National Conference on Computer Processing of Bangla (NCCPB-2004), pp. 82-88, Dhaka, Bangladesh, February, 2004.

 



Peer Reviewed Workshop Papers/Student Posters

 

[WP09] Wafaa Mustafa Abduallah, Al-Sakib Khan Pathan, and Abdulmonem S. Rahma, “Reversible Data Hiding Scheme based on 3-Least Significant Bits and Mix Column Transform”, POSTER presentation in International Islamic University Malaysia (IIUM) KICT Postgraduate Student Colloquium, October 2013, Kuala Lumpur, Malaysia. (This POSTER won the Silver Medal in the event)

[WP08] Matin Saad Abdullah and Al-Sakib Khan Pathan, “Teaching and Learning Qur’anic Arabic Utilizing New Technologies and ICT”, POSTER presentation in International Islamic University Malaysia (IIUM) KICT Postgraduate Student Colloquium, October 2013, Kuala Lumpur, Malaysia.

[WP07] Tarem Ahmed, Xianglin Wei, Supriyo Ahmed, and Al-Sakib Khan Pathan, “Automated Visual Surveillance using Kernel Tricks”, POSTER presentation in ENS/INRIA Visual Recognition and Machine Learning (CVML 2013), Summer School, 22-26 July 2013, Paris, France.

[WP06] Matin Saad Abdullah and Al-Sakib Khan Patha, “New Technologies for Teaching and Learning Qur’anic Arabic”, POSTER presentation in International Islamic University Malaysia (IIUM) KICT Postgraduate Student Colloquium, December 2012, Kuala Lumpur, Malaysia.

[WP05] Wafaa Mustafa Abduallah, Al-Sakib Khan Pathan, and Abdulmonem S. Rahma (2012b), “New Data Hiding Technique Based on Irreducible Polynomial Mathematics”, POSTER presentation in International Islamic University Malaysia (IIUM) KICT Postgraduate Student Colloquium, December 2012, Kuala Lumpur, Malaysia.

[WP04] Tarem Ahmed and Al-Sakib Khan Pathan (2012b), “An Effective Automated Surveillance System”, POSTER presentation in International Islamic University Malaysia (IIUM) KICT Postgraduate Student Colloquium, December 2012, Kuala Lumpur, Malaysia.

[WP03] Wafaa Mustafa Abduallah, and Al-Sakib Khan Pathan (2012a), “Defending Against Node Capture Attack in WSN”, POSTER presentation in International Islamic University Malaysia (IIUM) KICT Postgraduate Student Colloquium, February 2012, Kuala Lumpur, Malaysia.

[WP02] Tarem Ahmed and Al-Sakib Khan Pathan (2012a), “Towards Automated Surveillance Systems”, POSTER presentation in International Islamic University Malaysia (IIUM) KICT Postgraduate Student Colloquium, February 2012, Kuala Lumpur, Malaysia.

[WP01] Al-Sakib Khan Pathan and Choong Seon Hong, "Secure Group Association Management in Heterogeneous Distributed Sensor Networks", Proceedings of IEEE Seoul Section 2008, 29 November, 2008, Hanyang University, South Korea, pp. 25-32. (IEEE Seoul Section Bronze Paper Award in the IEEE International Student Paper Contest 2008 organized by IEEE Seoul Section, Tokyo Section, Beijing Section, and Japan Council)




Significant Talks/Presentations


[TP10] "Mitigating Cross-Site Scripting Attacks with a Content Security Policy", as the Keynote Speaker in the Technical-Talk event organized by IEEE Student Branch, University of Dhaka, Bangladesh, 17 April, 2016

[TP09] “Building Customer Trust in Cloud Computing Model”, as Distinguished Guest and Keynote Speaker in the 2nd IEEE International Conference on Advances in Computing & Communication Engineering (ICACCE-2015), May 1-2, 2015 by Tula’s Institute, Dehradun, Uttarakhand, India, 2 May, 2015.

[TP08] “Computer Science and IT Today: Research Issues and Publication Tips”, as Chief Guest and Keynote Speaker in International Conference on Innovations in Electronics, Communication & Computing (ICIECC 2014), 10-11 April, 2014, Madurai, Tamil Nadu, India, 10 April, 2014.

[TP07] “Wireless Sensor Network Security: Current status and Future Trends”, as Keynote Speaker in International Conference on “Electronics, Communication and Information Technology” (ICECIT 2013), Oct. 4-5, 2013 held at Thapar University, Patiala, Punjab, India, 04 October 2013.

[TP06] "The Need-to-Know Issues for Publishing Books and Book Chapters", Springer eBooks Seminar, IIUM, 20 September 2013, Kuala Lumpur, Malaysia.

[TP05] "How to Publish Quality Journal Papers?", KICT Conference Room, IIUM, 20 December, 2012, Malaysia.

[TP04] "Wireless Network Security: 3G, 4G, Wireless PAN/LAN/MAN", Centre for Information and Communication Technology (CICT), Universiti Teknologi Malaysia (UTM), 23 May 2012, Skudai, Johor, Malaysia.

[TP03] "Energy-Efficient Secure Routing in Heavily Deployed Wireless Sensor Networks", KICT Research Seminar, IIUM, June 22-23, 2011, Malaysia.

[TP02] "How to Write Quality Journal Paper & Getting it Published?", KICT Conference Room, IIUM, 22 October, 2010, Malaysia.

[TP01] "Introduction to Wireless Sensor Network Security", BRAC University Seminar series, UB0124, 17 February, 2010, Bangladesh.
 



Technical Reports
 

[T5] Nazmus Saquib, Md. Sabbir Rahman Sakib, and Al-Sakib Khan Pathan. ViSim: A User-Friendly Simulation Tool for MANET Routing Protocols. Technical Report, TR-BU-CSE001-Oct09, BRAC University, October, 2009.

[T4] Al-Sakib Khan Pathan. Future Internet Addressing (FI Address). Technical Report 2008N4-SP-NL, Networking Lab, KHU, 11 December, 2008.

[T3] Al-Sakib Khan Pathan and Choong Seon Hong. Security Attacks and Challenges in Wireless Sensor Networks. Technical Report 2008N3-SP-NL, Networking Lab, KHU, 2008.

[T2] Al-Sakib Khan Pathan and Choong Seon Hong. Public Key Cryptography in Resource-Constrained WSN. Technical Report 2008N2-SP-NL, Networking Lab, KHU, 2008.

[T1] Al-Sakib Khan Pathan and Choong Seon Hong. Heterogeneous Distributed Sensor Networks (HDSN). Technical Report 2007N1-SP-NL, Networking Lab, KHU, 2007.




Opinion Piece

 

- Al-Sakib Khan Pathan, "What is the difference between IoT and CPS (and M2M)?", December, 2015.
- Al-Sakib Khan Pathan and San Murugesan, "Trust in Cloud Needs Ensuring Cloud of Trust", November, 2015.




Newspaper Article

 

- Al-Sakib Khan Pathan, "Solution to question paper leak", The Daily Star, Bangladesh. 12:00 AM, August 19, 2014 / LAST MODIFIED: 01:53 AM, March 08, 2015. (http://www.thedailystar.net/solution-to-question-paper-leak-37653)



Patent (Korean)
 

[PT1] 홍충선, Md Mokammel Haque, Al-Sakib Khan Pathan, 허지혁, "무선 센서 네트워크에서 센서 노드들 사이의 메시지 암호화/복호화 방법", 등록번호 : 특허 제 10-0941764 호, 대한민국 특허청, 2010.02.03 (특허권자: 경희대학교 산학협력단) [ Choong Seon Hong, Md. Mokammel Haque, Al-Sakib Khan Pathan, and Gihyuk Heo, "Message Encryption / Decryption Method Between Sensor Nodes in Wireless Sensor Networks," Registration No.: Patent No. 10-0941764, Republic of Korea Intellectual Property Office, 03/02/2010 (Patent : Industry-Academic Cooperation Foundation, Kyung Hee University) ]

 



Ph.D. Thesis
 

"Resource Efficient Security Management in Wireless Sensor Networks", Department of Computer Engineering, Kyung Hee University, South Korea, August, 2009.

 



B.Sc. Thesis
 

"Neighbor Aware Multicast Routing Protocol for Mobile Ad Hoc Networks", Department of Computer Science and Information Technology, Islamic University of Technology, Final year thesis project, September, 2003.

Ċ
Al-Sakib Khan Pathan,
Aug 7, 2015, 6:40 PM
Ċ
Al-Sakib Khan Pathan,
Dec 30, 2015, 6:38 AM