Follow
L A Khan
L A Khan
NUST, CIISE, Air University
Verified email at mail.au.edu.pk
Title
Cited by
Cited by
Year
E-mail authorship verification for forensic investigation
F Iqbal, LA Khan, BCM Fung, M Debbabi
Proceedings of the 2010 ACM Symposium on Applied computing, 1591-1598, 2010
802010
Speaker recognition from encrypted VoIP communications
LA Khan, MS Baig, AM Youssef
digital investigation 7 (1-2), 65-73, 2010
632010
Sefaced: Semantic-based forensic analysis and classification of e-mail data using deep learning
M Hina, M Ali, AR Javed, F Ghabban, LA Khan, Z Jalil
IEEE Access 9, 98398-98411, 2021
382021
Forensic analysis of the Cisco WebEx application
Z Khalid, F Iqbal, F Kamoun, M Hussain, LA Khan
2021 5th Cyber Security in Networking Conference (CSNet), 90-97, 2021
122021
Efficient approach for anomaly detection in internet of things traffic using deep learning
SI Imtiaz, LA Khan, AS Almadhor, S Abbas, S Alsubai, M Gregus, Z Jalil
Wireless Communications and Mobile Computing 2022, 1-15, 2022
52022
Speaker verification from partially encrypted compressed speech for forensic investigation
LA Khan, F Iqbal, MS Baig
Digital Investigation 7 (1-2), 74-80, 2010
52010
A Server Based ASR Approach to Automated Cryptanalysis of Two Time Pads in Case of Speech
LA Khan, MS Baig
2008 The Fourth International Conference on Information Assurance and …, 2008
52008
Cryptanalysis of keystream reuse in stream ciphered digitized speech using hmm based asr techniques
LA Khan, MS Baig
Proceedings International Conf on Computer Science and Applications, San …, 2007
52007
Crypt analysis of two time pads in case of compressed speech
LA Khan, MS Baig, A Hassan
Computers & Electrical Engineering 37 (4), 559-569, 2011
42011
Forensic investigation of Cisco WebEx desktop client, web, and Android smartphone applications
Z Khalid, F Iqbal, F Kamoun, LA Khan, B Shah
Annals of Telecommunications 78 (3), 183-208, 2023
32023
Effective model for real time end to end secure communication over gsm voice channel
MU Rehman, M Adnan, M Batool, LA Khan, A Masood
Wireless Personal Communications 119, 1643-1659, 2021
32021
Automated Cryptanalysis of Plaintext XORs of Waveform Encoded Speech.
LA Khan, MS Baig
IAENG International Journal of Computer Science 35 (2), 2008
32008
Comparison of Metaiseau Technique with a Percutaneous K-Wire Fixation for Displaced Radial Neck Fractures in Pediatric Age Group
I Hussain, L Khan, S Hussain
Medical Forum Monthly 34 (2), 2023
2023
Improved trust based key management for end-to-end secure communication in cellular networks
N Mukhtar, MS Baig, LA Khan
Proceedings of the 8th International Conference on Security of Information …, 2015
2015
Analysis encrypted speech
LA Khan
MCS, 2011
2011
A Hidden Markov Model based Speech Recognition Approach to Automated Cryptanalysis of Two Time Pads
LA Khan, MS Baig
Advances in Computational Algorithms and Data Analysis, 159-168, 2009
2009
Parallel Implementation of 2D-DWT by Purging Read after Write Dependency for High Speed Applications
M Ashraf, MS Baig, LA Khan, A Hassan
2007 International Conference on Emerging Technologies, 263-268, 2007
2007
Reconstructing a Class of Cipher Systems Used in Wireless Digital Communications
LA Khan, MS Baig
2007 International Conference on Electrical Engineering, 1-4, 2007
2007
Effect of various levels of microbial culture (EM Four) on nutrient digestibility and performance of male broilers
S Mahmood, I Hussain, M Sarwar, LH Shah, IA Khan
Pakistan Journal of Biological Sciences (Pakistan) 1 (2), 1998
1998
End to End Secure Voice Communication over GSM
M Batool, FI Abro, LA Khan, I Hussain, A Masood
The system can't perform the operation now. Try again later.
Articles 1–20