Follow
Dr. Rafiullah Khan
Dr. Rafiullah Khan
Verified email at qub.ac.uk - Homepage
Title
Cited by
Cited by
Year
Future Internet: The Internet of Things Architecture, Possible Applications and Key Challenges.
R Khan, SU Khan, R Zaheer, S Khan
FIT, 257-260, 2012
20502012
STRIDE-based threat modeling for cyber-physical systems
R Khan, K McLaughlin, D Laverty, S Sezer
2017 IEEE PES Innovative Smart Grid Technologies Conference Europe (ISGT …, 2017
2532017
Threat analysis of blackenergy malware for synchrophasor based real-time control and monitoring in smart grid
R Khan, P Maynard, K McLaughlin, D Laverty, S Sezer
4th International Symposium for ICS & SCADA Cyber Security Research 2016, 2016
1702016
Localization performance evaluation of extended Kalman filter in wireless sensors network
R Khan, SU Khan, S Khan, MUA Khan
Procedia Computer Science 32, 117-124, 2014
532014
An efficient network monitoring and management system
R Khan, SU Khan, R Zaheer, MI Babar
International Journal of Information and Electronics Engineering 3 (1), 122-126, 2013
532013
Analysis of IEEE C37. 118 and IEC 61850-90-5 synchrophasor communication frameworks
R Khan, K McLaughlin, D Laverty, S Sezer
2016 IEEE Power and Energy Society General Meeting (PESGM), 1-5, 2016
522016
Design and Implementation of Security Gateway for Synchrophasor Based Real-Time Control and Monitoring in Smart Grid
R Khan, K Mclaughlin, D Laverty, S Sezer
IEEE Access 5, 11626-11644, 2017
432017
IEEE C37.118-2 Synchrophasor Communication Framework - Overview, Cyber Vulnerabilities Analysis and Performance Evaluation
R Khan, K McLaughlin, D Laverty, S Sezer
Proceedings of the 2nd International Conference on Information Systems …, 2016
422016
Multiple authorities attribute-based verification mechanism for Blockchain mircogrid transactions
S Khan, R Khan
Energies 11 (5), 1154, 2018
342018
Smart proxying for reducing network energy consumption
R Khan, R Bolla, M Repetto, R Bruschi, M Giribaldi
2012 International Symposium on Performance Evaluation of Computer …, 2012
282012
Model based intrusion detection system for synchrophasor applications in smart grid
R Khan, A Albalushi, K McLaughlin, D Laverty, S Sezer
2017 IEEE Power & Energy Society General Meeting, 1-5, 2017
272017
Secure communication architecture for dynamic energy management in smart grid
S Khan, R Khan, AH Al-Bayatti
IEEE Power and Energy Technology Systems Journal 6 (1), 47-58, 2019
252019
Design and implementation of an automated network monitoring and reporting back system
R Khan, SU Khan
Journal of Industrial Information Integration 9, 24-34, 2018
252018
Demonstrating Cyber-Physical Attacks and Defense for Synchrophasor Technology in Smart Grid
R Khan, K McLaughlin, JHD Laverty, H David, S Sezer
2018 16th Annual Conference on Privacy, Security and Trust (PST), 1-10, 2018
242018
Improving smartphones battery life by reducing energy waste of background applications
R Bolla, R Khan, X Parra, M Repetto
2014 Eighth International Conference on Next Generation Mobile Apps …, 2014
232014
Hybrid positioning through extended kalman filter with inertial data fusion
R Khan, F Sottile, MA Spirito
International journal of information and electronics engineering 3 (1), 127-131, 2013
222013
Acquisition strategies of GNSS receiver
R Khan, SU Khan, R Zaheer, S Khan
International Conference on Computer Networks and Information Technology …, 2011
222011
Network connectivity proxy: An optimal strategy for reducing energy waste in network edge devices
R Bolla, M Giribaldi, R Khan, M Repetto
2013 24th Tyrrhenian International Workshop on Digital Communications-Green …, 2013
182013
Design and implementation of cooperative network connectivity proxy using universal plug and play
R Bolla, M Giribaldi, R Khan, M Repetto
The Future Internet: Future Internet Assembly 2013: Validated Results and …, 2013
182013
Assessing the Potential for Saving Energy by Impersonating Idle Networked Devices
R Bolla, R Khan, M Repetto
IEEE Journal on Selected Areas in Communications 34 (5), 1676-1689, 2016
162016
The system can't perform the operation now. Try again later.
Articles 1–20