default search action
Muhammad Salman Khan
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Muhammad Salman Khan 0001 — Qatar University, Doha, Qatar (and 3 more)
- Muhammad Salman Khan 0002 — University of North Florida, School of Computing, Jacksonville, FL, USA
- Muhammad Salman Khan 0003 (aka: Muhammad Salman 0001) — COMSATS Institute of Information Technology, Lahore, Pakistan (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j7]Muhammad Salman Khan, Rizwan Niaz, Mohammed Ahmed Alomair, Mohamed Hussien:
Investigating Global Stability and Bifurcation in an Ecological Dynamical System. Complex. 2024 (2024) - [i2]Muhammad Salman Khan, Moreno La Quatra, Kuo-Hsuan Hung, Szu-Wei Fu, Sabato Marco Siniscalchi, Yu Tsao:
Exploiting Consistency-Preserving Loss and Perceptual Contrast Stretching to Boost SSL-based Speech Enhancement. CoRR abs/2408.04773 (2024) - 2023
- [c10]Muhammad Salman Khan, Shahzad Ali, Yu Rim Lee, Soo Young Park, Won Young Tak, Soon Ki Jung:
Cell Nuclei Segmentation With Dynamic Token-Based Attention Network. EMBC 2023: 1-4 - [c9]Muhammad Salman Khan, Shahzad Ali, Yu Rim Lee, Min Kyu Kang, Soo Young Park, Won Young Tak, Soon Ki Jung:
TransUNet-Lite: A Robust Approach to Cell Nuclei Segmentation. ICMHI 2023: 251-258 - 2022
- [j6]Muhammad Salman Khan, Maria Samreen, Muhammad Asif Khan, Manuel de la Sen:
A Dynamically Consistent Nonstandard Difference Scheme for a Discrete-Time Immunogenic Tumors Model. Entropy 24(7): 949 (2022) - [i1]Muhammad Salman Khan, Adnan Ahmad, Muhammad Humayoun:
Building an Effective Automated Assessment System for C/C++ Introductory Programming Courses in ODL Environment. CoRR abs/2205.11915 (2022) - 2021
- [j5]Adnan Rafique, Muhammad Salman Khan, Muhammad Hasan Jamal, Mamoona Tasadduq, Furqan Rustam, Ernesto Lee, Patrick Bernard Washington, Imran Ashraf:
Integrating Learning Analytics and Collaborative Learning for Improving Student's Academic Performance. IEEE Access 9: 167812-167826 (2021) - [j4]Muhammad Salman Khan, Rene Richard, Heather Molyneaux, Danick Cote-Martel, Henry Jackson Kamalanathan Elango, Steve Livingstone, Manon Gaudet, Dave Trask:
Cyber Threat Hunting: A Cognitive Endpoint Behavior Analytic System. Int. J. Cogn. Informatics Nat. Intell. 15(4): 1-23 (2021) - 2020
- [j3]Muhammad Tayyab Chaudhry, Muhammad Hasan Jamal, Zeeshan Gillani, Muhammad Waqas Anwar, Muhammad Salman Khan:
Thermal-benchmarking for cloud hosting green data centers. Sustain. Comput. Informatics Syst. 25: 100357 (2020)
2010 – 2019
- 2018
- [b1]Muhammad Salman Khan:
Malvidence - a cognitive malware characterization framework. University of Manitoba, Winnipeg, Canada, 2018 - [p2]Sana Siddiqui, Muhammad Salman Khan, Ken Ferens:
Cognitive Computing and Multiscale Analysis for Cyber Security. Computer and Network Security Essentials 2018: 507-519 - [p1]Muhammad Salman Khan, Sana Siddiqui, Ken Ferens:
A Cognitive and Concurrent Cyber Kill Chain Model. Computer and Network Security Essentials 2018: 585-602 - 2017
- [c8]Sana Siddiqui, Muhammad Salman Khan, Ken Ferens, Witold Kinsner:
Fractal based cognitive neural network to detect obfuscated and indistinguishable internet threats. IEEE ICCI*CC 2017: 297-308 - [c7]Sana Siddiqui, Muhammad Salman Khan, Ken Ferens:
Multiscale Hebbian neural network for cyber threat detection. IJCNN 2017: 1427-1434 - [c6]Muhammad Salman Khan, Sana Siddiqui, Ken Ferens:
Using information fractal dimension as temperature in restricted Boltzmann Machine. IJCNN 2017: 2290-2297 - 2016
- [c5]Muhammad Salman Khan, Sana Siddiqui, Robert D. McLeod, Ken Ferens, Witold Kinsner:
Fractal based adaptive boosting algorithm for cognitive detection of computer malware. ICCI*CC 2016: 50-59 - [c4]Sana Siddiqui, Muhammad Salman Khan, Ken Ferens, Witold Kinsner:
Detecting Advanced Persistent Threats using Fractal Dimension based Machine Learning Classification. IWSPA@CODASPY 2016: 64-69 - 2015
- [j2]Muhammad Salman Khan, Ken Ferens, Witold Kinsner:
Multifractal Singularity Spectrum for Cognitive Cyber Defence in Internet Time Series. Int. J. Softw. Sci. Comput. Intell. 7(3): 17-45 (2015) - [c3]Muhammad Salman Khan, Ken Ferens, Witold Kinsner:
A cognitive multifractal approach to characterize complexity of non-stationary and malicious DNS data traffic using adaptive sliding window. ICCI*CC 2015: 76-83 - 2014
- [j1]Muhammad Salman Khan, Ken Ferens, Witold Kinsner:
A Chaotic Complexity Measure for Cognitive Machine Classification of Cyber-Attacks on Computer Networks. Int. J. Cogn. Informatics Nat. Intell. 8(3): 45-69 (2014) - [c2]Muhammad Salman Khan, Ken Ferens, Witold Kinsner:
A chaotic measure for cognitive machine classification of distributed denial of service attacks. ICCI*CC 2014: 100-108
2000 – 2009
- 2008
- [c1]Zeeshan-ul-hassan Usmani, Muhammad Salman Khan, Muhammad Noman Zafar:
Fatal Behaviors - Simulation of Suicide Bombing. CGVR 2008: 55-60
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint