1. M.N. Khan, C.R. Chatwin, R.C.D. Young A framework for post-event timeline reconstruction using neural networks. Digital Investigation Volume 4, Issues 3-4, September-December 2007, Pages 146-157
  2. M.N. Khan Performance analysis of Bayesian networks and neural networks in classification of file system activities Computers & Security 31( 2 0 1 2 ), pp. 391-401
  3. M. Umar, M.N. Khan A Framework to Separate Non-Functional Requirements (NFRs) to assist System Maintainability Kuwait Journal of Science & Engineering (now renamed as Kuwait Journal of Science) Vol. 39 No. 1B, 2012, pp. 211-230.
  4. S. Khan, M. Nazir, N. Riaz, M. Khan Optimized Features Selection using Hybrid PSO-GA for Multi-view Gender Classification The International Arab Journal of Information Technology (IAJIT), No.2 Vol.12, 2015.
  5. M. Khan, M. Akram, N. Riaz A Comparative Analysis of Software Protection Schemes The International Arab Journal of Information Technology (IAJIT) Volume 12, No. 3, May 2015.
  6. A. Abbasi, M. Khan Iris-Pupil Thickness Based Method for Determining Age Group of a Person International Arab Journal of Information Technology (IAJIT) Volume 13, No. 6, November 2016
  7. S. Shafqat, M. N. Khan, N. Riaz, K. Khan Identity Matrix: Architecture Framework for Trusted Cloud Computing through Cloud Intellect Journal of Internet Technology (JIT) Volume 17(2016), No. 4, pp. 1-9
  8. L. Yaqoob, M. N. Khan, F. Subhan An Overview of Existing Decision Support Systems for Disasters Management Science International-Lahore, No. 26(4), pp.1765-1776, 2014
  9. N. Ahmed, F. Subhan, S. Haider, M. N. A. Khan, S. Ahmed, K. S. Alimgeer Positioning in Bluetooth Networks using Lateration Approach-A Comparative Study Science International-Lahore, No. 26(5), pp.2077-2082, 2014
  10. M. S. Bashir, M. N. Khan A triage framework for digital forensics Computer Fraud & Security Volume 2015, Issue 2 pp. 8-18
  11. M. Rafique, M. N. Khan Profiling Software Applications for Forensic Analysis Computer Fraud & Security Volume 2015, Issue 6 pp. 13-18
  12. G. Ahmed, M. N. Khan, M. S. Bashir A Linux-based IDPS using Snort Computer Fraud & Security Volume 2015, Issue 8, August 2015, Pages 13–18
  13. M. A. Mehmood, A. Mahmood, M. N. Khan, S. Khatoon A scenario-based distributed testing model for software applications International Journal of Advanced and Applied Sciences, 3(10) 2016, Pages: 64-71
  14. M. N. Khan, S. Hussain Grid Computing Security Implementation Challenges International Journal of Computer Science and Network Security (IJCSNS), Vol.13 No.3, March 2013


  1. A. Tahir, M. N. Khan, S. Mughal. Securing Cloud-Based File Storage System via Homomorphism The International Conference on Recent Advances in Computer Systems (RACS-2015), 30 Nov - 1 Dec 2015, Hail University, Hail, KSA
  2. M. N. Khan, M. A. Mehmood, Q. Nazir State of Quality Engineering Practices: Pakistan’s Perspective In: Proceedings of the International Conference on Computing, Communication, Electrical, Electronics, Devices and Signal Processing (CCEEDS), 28–30 March, 2015, Lankapalli (Challapalli), India, pp. 426-431.
  3. M. Umar, M. N. Khan Analyzing non-functional requirements (NFRs) for software development. In 2011 IEEE 2nd International Conference on Software Engineering and Service Science (pp. 675-678). IEEE. July 2011.