E-mail authorship verification for forensic investigation F Iqbal, LA Khan, BCM Fung, M Debbabi Proceedings of the 2010 ACM Symposium on Applied computing, 1591-1598, 2010 | 80 | 2010 |
Speaker recognition from encrypted VoIP communications LA Khan, MS Baig, AM Youssef digital investigation 7 (1-2), 65-73, 2010 | 63 | 2010 |
Sefaced: Semantic-based forensic analysis and classification of e-mail data using deep learning M Hina, M Ali, AR Javed, F Ghabban, LA Khan, Z Jalil IEEE Access 9, 98398-98411, 2021 | 38 | 2021 |
Forensic analysis of the Cisco WebEx application Z Khalid, F Iqbal, F Kamoun, M Hussain, LA Khan 2021 5th Cyber Security in Networking Conference (CSNet), 90-97, 2021 | 12 | 2021 |
Efficient approach for anomaly detection in internet of things traffic using deep learning SI Imtiaz, LA Khan, AS Almadhor, S Abbas, S Alsubai, M Gregus, Z Jalil Wireless Communications and Mobile Computing 2022, 1-15, 2022 | 5 | 2022 |
Speaker verification from partially encrypted compressed speech for forensic investigation LA Khan, F Iqbal, MS Baig Digital Investigation 7 (1-2), 74-80, 2010 | 5 | 2010 |
A Server Based ASR Approach to Automated Cryptanalysis of Two Time Pads in Case of Speech LA Khan, MS Baig 2008 The Fourth International Conference on Information Assurance and …, 2008 | 5 | 2008 |
Cryptanalysis of keystream reuse in stream ciphered digitized speech using hmm based asr techniques LA Khan, MS Baig Proceedings International Conf on Computer Science and Applications, San …, 2007 | 5 | 2007 |
Crypt analysis of two time pads in case of compressed speech LA Khan, MS Baig, A Hassan Computers & Electrical Engineering 37 (4), 559-569, 2011 | 4 | 2011 |
Forensic investigation of Cisco WebEx desktop client, web, and Android smartphone applications Z Khalid, F Iqbal, F Kamoun, LA Khan, B Shah Annals of Telecommunications 78 (3), 183-208, 2023 | 3 | 2023 |
Effective model for real time end to end secure communication over gsm voice channel MU Rehman, M Adnan, M Batool, LA Khan, A Masood Wireless Personal Communications 119, 1643-1659, 2021 | 3 | 2021 |
Automated Cryptanalysis of Plaintext XORs of Waveform Encoded Speech. LA Khan, MS Baig IAENG International Journal of Computer Science 35 (2), 2008 | 3 | 2008 |
Comparison of Metaiseau Technique with a Percutaneous K-Wire Fixation for Displaced Radial Neck Fractures in Pediatric Age Group I Hussain, L Khan, S Hussain Medical Forum Monthly 34 (2), 2023 | | 2023 |
Improved trust based key management for end-to-end secure communication in cellular networks N Mukhtar, MS Baig, LA Khan Proceedings of the 8th International Conference on Security of Information …, 2015 | | 2015 |
Analysis encrypted speech LA Khan MCS, 2011 | | 2011 |
A Hidden Markov Model based Speech Recognition Approach to Automated Cryptanalysis of Two Time Pads LA Khan, MS Baig Advances in Computational Algorithms and Data Analysis, 159-168, 2009 | | 2009 |
Parallel Implementation of 2D-DWT by Purging Read after Write Dependency for High Speed Applications M Ashraf, MS Baig, LA Khan, A Hassan 2007 International Conference on Emerging Technologies, 263-268, 2007 | | 2007 |
Reconstructing a Class of Cipher Systems Used in Wireless Digital Communications LA Khan, MS Baig 2007 International Conference on Electrical Engineering, 1-4, 2007 | | 2007 |
Effect of various levels of microbial culture (EM Four) on nutrient digestibility and performance of male broilers S Mahmood, I Hussain, M Sarwar, LH Shah, IA Khan Pakistan Journal of Biological Sciences (Pakistan) 1 (2), 1998 | | 1998 |
End to End Secure Voice Communication over GSM M Batool, FI Abro, LA Khan, I Hussain, A Masood | | |