Follow
Imran Khan
Imran Khan
Verified email at insight-centre.org
Title
Cited by
Cited by
Year
Perceptual encryption of JPEG compressed images using DCT coefficients and splitting of DC coefficients into bitplanes
MI Khan, V Jeoti, MA Khan
2010 International Conference on Intelligent and Advanced Systems, 1-6, 2010
352010
An energy efficient priority based wireless multimedia sensor node dynamic scheduler
MA Jamshed, MF Khan, K Rafique, MI Khan, K Faheem, SM Shah, ...
2015 12th International Conference on High-capacity Optical Networks and …, 2015
182015
Detecting Anomalous Behavior in DBMS Logs
MI Khan, SN Foley
International Conference on Risks and Security of Internet and Systems, 147-152, 2016
172016
Analysis of macro user offloading to femto cells for 5G cellular networks
MF Khan, FA Bhatti, A Habib, S Jangsher, MI Khan, I Zafar, SM Shah, ...
2017 International Symposium on Wireless Systems and Networks (ISWSN), 1-6, 2017
162017
A semantic approach to frequency based anomaly detection of insider access in Database Management Systems
MI Khan, B O’Sullivan, SN Foley
International Conference on Risks and Security of Internet and Systems, 18-28, 2017
152017
A blind watermarking scheme using bitplane of DC component for JPEG Compressed images
MI Khan, V Jeoti
2010 6th International Conference on Emerging Technologies (ICET), 150-154, 2010
132010
Towards Modelling Insiders Behaviour as Rare Behaviour to Detect Malicious RDBMS Access
MI Khan, B O’Sullivan, SN Foley
2018 IEEE International Conference on Big Data (Big Data), 3094-3099, 2018
92018
A joint watermarking and encryption scheme for DCT based codecs
MI Khan, V Jeoti, AS Malik, MF Khan
The 17th Asia Pacific Conference on Communications, 816-820, 2011
92011
On perceptual encryption: variants of DCT block scrambling scheme for JPEG compressed images
MI Khan, V Jeoti, AS Malik
Signal Processing and Multimedia, 212-223, 2010
82010
DBMS Log Analytics for Detecting Insider Threats in Contemporary Organizations
MI Khan, SN Foley, B O'Sullivan
Security Frameworks in Contemporary Electronic Government, 207-234, 2019
72019
Database Intrusion Detection Systems (DIDs): Insider Threat Detection via Behaviour-Based Anomaly Detection Systems-A Brief Survey of Concepts and Approaches
MI Khan, SN Foley, B O’Sullivan
International Symposium on Emerging Information Security and Applications …, 2021
52021
Computing the Identification Capability of SQL Queries for Privacy Comparison
MI Khan, SN Foley, B O'Sullivan
Proceedings of the ACM International Workshop on Security and Privacy …, 2019
52019
An energy efficient scheduling mechanism using concept of light weight processors for Wireless Multimedia Sensor Networks
MA Jamshed, A Nauman, MF Khan, MI Khan
2017 14th International Bhurban Conference on Applied Sciences and …, 2017
52017
Designing a joint perceptual encryption and blind watermarking scheme compliant with JPEG compression standard
MI Khan, V Jeoti, AS Malik
2010 International Conference on Computer Applications and Industrial …, 2010
42010
Quantitatively Measuring Privacy in Interactive Query Settings Within RDBMS Framework
MI Khan, SN Foley, B O'Sullivan
Frontiers in Big Data 3, 11, 2020
32020
PriDe: A Quantitative Measure of Privacy-Loss in Interactive Querying Settings
MI Khan, SN Foley, B O'Sullivan
2019 10th IFIP International Conference on New Technologies, Mobility and …, 2019
22019
On database intrusion detection: A Query analytics-based model of normative behavior to detect insider attacks
MI Khan, SN Foley, B O'Sullivan
Proceedings of the 2017 the 7th International Conference on Communication …, 2017
22017
Privacy Interpretation of Behaviour-based Anomaly Detection Approaches
MI Khan, SN Foley, B O'Sullivan
2021 14th International Conference on Security of Information and Networks …, 2021
12021
Database Intrusion Detection Systems (DIDs): Insider Threat Detection via Behavioural-based Anomaly Detection Systems--A Brief Survey of Concepts and Approaches
MI Khan, SN Foley, B O'Sullivan
arXiv preprint arXiv:2011.02308, 2020
12020
Towards Privacy-anomaly Detection: Discovering Correlation between Privacy and Security-anomalies
MI Khan, SN Foley, B O’Sullivan
Procedia Computer Science 175, 331-339, 2020
12020
The system can't perform the operation now. Try again later.
Articles 1–20