​
Login / Signup
Sohail Khan
ORCID
Publication Activity (10 Years)
Years Active: 2009-2024
Publications (10 Years): 9
Top Topics
Electric Vehicle Charging
Stochastic Process
Dynamic Behavior
Optimal Placement
Top Venues
CoRR
Secur. Commun. Networks
ICIT
Clust. Comput.
</>
Publications
</>
Sohail Khan
,
Mohammad Nauman
Interpretable Detection of Malicious Behavior in Windows Portable Executables Using Multi-Head 2D Transformers.
Big Data Min. Anal.
7 (2) (2024)
Sohail Khan
,
Sawsan Henein
,
Helfried Brunner
Optimal Energy Interruption Planning and Generation Re-dispatch for Improving Reliability during Contingencies.
CoRR
(2020)
Muhammad Zulqarnain Zeb
,
Kashif Imran
,
Abraiz Khattak
,
Abdul Kashif Janjua
,
Anamitra Pal
,
Muhammad Nadeem
,
Jiangfeng Zhang
,
Sohail Khan
Optimal Placement of Electric Vehicle Charging Stations in the Active Distribution Network.
IEEE Access
8 (2020)
Sohail Khan
,
Sawsan Henein
,
Helfried Brunner
Optimal Energy Interruption Planning and Generation Re-dispatch for Improving Reliability during Contingencies.
ISGT
(2020)
Mohammad Nauman
,
Tamleek Ali Tanveer
,
Sohail Khan
,
Toqeer Ali Syed
Deep neural architectures for large scale android malware analysis.
Clust. Comput.
21 (1) (2018)
Toqeer Ali Syed
,
Roslan Ismail
,
Shahrulniza Musa
,
Mohammad Nauman
,
Sohail Khan
Design and implementation of an attestation protocol for measured dynamic behavior.
J. Supercomput.
74 (11) (2018)
Sohail Khan
,
Mohammad Nauman
,
Abu Talib Othman
,
Shahrulniza Musa
,
Toqeer Ali Syed
TSSDroid: realization of an efficient and usable TSS API for the Android software stack.
Secur. Commun. Networks
9 (11) (2016)
Sohail Khan
,
Mohsin Shahzad
,
Usman Habib
,
Wolfgang Gawlik
,
Peter Palensky
Stochastic battery model for aggregation of thermostatically controlled loads.
ICIT
(2016)
Sohail Khan
,
Mohsin Shahzad
,
Usman Habib
,
Wolfgang Gawlik
,
Peter Palensky
Stochastic Battery Model for Aggregation of Thermostatically Controlled Loads.
CoRR
(2016)
Mohammad Nauman
,
Sohail Khan
,
Abu Talib Othman
,
Shahrulniza Musa
Realization of a user-centric, privacy preserving permission framework for Android.
Secur. Commun. Networks
8 (3) (2015)
Sohail Khan
,
Hadrien Bosetti
,
Peter Palensky
,
Wolfgang Gawlik
A Replicator Dynamics method for the Unit Commitment problem.
MSCPES@CPSWeek
(2014)
Abu Talib Othman
,
Mohammad Nauman
,
Shahrulniza Musa
,
Sohail Khan
Transforming high-level requirements to executable policies for Android.
ICUIMC
(2014)
Hadrien Bosetti
,
Sohail Khan
,
Hamid Aghaie
,
Peter Palensky
Survey, Illustrations and Limits of Game Theory for Cyber-Physical Energy Systems.
Autom.
62 (5) (2014)
Roslan Ismail
,
Toqeer Ali Syed
,
Shahrulniza Musa
,
Mohammad Nauman
,
Sohail Khan
Realization of dynamic behavior using remotely verifiable n-call slides in Unix process execution trace.
ICUIMC
(2013)
Sohail Khan
,
Mohsin Shahzad
,
Peter Palensky
,
Khurram Jahangir
Dynamics of wind-turbine driven Self-Excited Induction Generator with online parameter calculation.
IECON
(2013)
Abu Talib Othman
,
Sohail Khan
,
Mohammad Nauman
,
Shahrulniza Musa
Towards a high-level trusted computing API for Android software stack.
ICUIMC
(2013)
Toqeer Ali Syed
,
Roslan Ismail
,
Shahrulniza Musa
,
Mohammad Nauman
,
Sohail Khan
A sense of others: behavioral attestation of UNIX processes on remote platforms.
ICUIMC
(2012)
Mohammad Nauman
,
Sohail Khan
,
Abu Talib Othman
,
Shahrulniza Musa
,
Najeeb Ur Rehman
POAuth: privacy-aware open authorization for native apps on smartphone platforms.
ICUIMC
(2012)
Sohail Khan
,
Mohammad Nauman
,
Abu Talib Othman
,
Shahrulniza Musa
How secure is your smartphone: An analysis of smartphone security mechanisms.
CyberSec
(2012)
Mohammad Nauman
,
Sohail Khan
Design and implementation of a fine-grained resource usage model for the android platform.
Int. Arab J. Inf. Technol.
8 (4) (2011)
Mohammad Nauman
,
Sohail Khan
,
Xinwen Zhang
,
Jean-Pierre Seifert
Beyond Kernel-Level Integrity Measurement: Enabling Remote Attestation for the Android Platform.
TRUST
(2010)
Mohammad Nauman
,
Sohail Khan
,
Xinwen Zhang
Apex: extending Android permission model and enforcement with user-defined runtime constraints.
AsiaCCS
(2010)
Masoom Alam
,
Xinwen Zhang
,
Mohammad Nauman
,
Sohail Khan
,
Quratulain Alam
MAuth: A Fine-Grained and User-centric Permission Delegation Framework for Multi-mashup Web Services.
SERVICES
(2010)
Sohail Khan
,
Amir Hayat
A trustworthy identity management architecture for e-government processes in Pakistan.
FIT
(2009)