Skip navigation

Items where Greenwich Author is "Khan, Muhammad Taimoor"

Items where Greenwich Author is "Khan, Muhammad Taimoor"

Group by: Item Type | Date | Funders | Uncontrolled Keywords | No Grouping
Jump to: Android malware detection, obfuscation techniques, Deep learning, cyber-security, memory dump, formal method | Industrial Cyber-Physical System (ICPS), security, communication and application layer attacks, run-time monitoring | Java, semantics, computer bugs, tools, software, runtime | Security, Deductive reasoning, Inductive reasoning | cyber risk; formal analysis; IoT applications | cyber security, distributed systems, distributed industrial control systems (ICS), cybersecurity, critical systems, behavior-based security monitoring, water management system | cyber security, model-based, specification, industrial control systems, distributed industrial control systems (ICS), cybersecurity, critical systems, behavior-based security monitoring, water management system, computational attacks, network attacks, false data injection (FDI) attacks | cyber security; formal analysis; real-time security | digital twin; security and safety; modeling; resilience | inline security monitoring, industrial control systems, distributed ICS, water distribution systems, JML specifications, generative AI, large language models, cybersecurity, formal verification, runtime anomaly detection | malware detection; security; smart cities; autonomous systems | malware; Android; cyber attacks | model-based security, vulnerability detection, syntact patterns, semantic patterns | monitoring, safety, security, sugar, biomedical monitoring, sensors, insulin | monitoring, security, real-time systems, computational modeling, calculus, prototypes, industrial control | privacy, Ejabberd, WhatsApp, consent, confidentiality | privacy, analytical models, passwords, privacy breach, control systems, servers, Internet telephony, manufacturing automation | program verification, time semantics, timed automata | safety, computer security, process control, control systems, computer hacking, tutorials, cyberattack | security, integrated circuits, safety, information and communication technology, runtime, sensors, industrial control, cyber-physical, systems, design methodology, computer crime, computer security | security; safety; smart cities | semantic web, digital economy, Smart contracts, switches, vectors, real-time systems, delays, logic, monitoring, resilience, oracle networks, latency attacks, bitflips, price access manipulation, price aggregation, Solana | software/program verification, formal methods, error handling and recovery | training, Java, Generative AI, large language models, industrial control, robustness, security, formal specifications, integrated circuit modeling, monitoring, industrial Control Systems (ICS), security monitoring;inline monitors;formal specification, generative AI, large language models (LLMs), Java Modeling Language (JML); cyber-physical systems, run-time verification, water distribution systems
Number of items: 24.

Android malware detection, obfuscation techniques, Deep learning, cyber-security, memory dump, formal method

Sawadogo, Zakaria, Mendy, Gervais, Khan, Muhammad Taimoor ORCID logoORCID: https://orcid.org/0000-0002-5752-6420, Ouya, Samuel and Dembelle, Jean Marie (2023) Towards a DeepMalOb improvement in the use of formal security risk analysis methods. In: 2023 IEEE 6th International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications (CloudTech), 21st - 23rd November 2023, Marrakesh, Morocco. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 118-122. ISBN 979-8350303070; 979-8350303063 (doi:10.1109/CloudTech58737.2023.10366167)

Industrial Cyber-Physical System (ICPS), security, communication and application layer attacks, run-time monitoring

Khan, Taimoor ORCID logoORCID: https://orcid.org/0000-0002-5752-6420 and Tomic, Ivana ORCID logoORCID: https://orcid.org/0000-0003-3502-5980 (2020) Securing industrial cyber-physical systems: A run-time multi-layer monitoring. IEEE Transactions on Industrial Informatics, 17 (9). pp. 6251-6259. ISSN 1551-3203 (Print), 1941-0050 (Online) (doi:10.1109/TII.2020.3032968)

Java, semantics, computer bugs, tools, software, runtime

Liva, Giovanni, Khan, Muhammad Taimoor ORCID logoORCID: https://orcid.org/0000-0002-5752-6420, Spegni, Francesco, Spalazzi, Luca, Bollin, Andreas and Pinzger, Martin (2018) Modeling time in Java programs for automatic error detection. In: Proceedings of the 6th Conference on Formal Methods in Software Engineering - FormaliSE '18. ACM, New York, USA, pp. 50-59. ISBN 978-1450357180 (doi:10.1145/3193992.3193997)

Security, Deductive reasoning, Inductive reasoning

Khan, Muhammad Taimoor ORCID logoORCID: https://orcid.org/0000-0002-5752-6420 and Shrobe, Howard (2019) Security of cyberphysical systems: Chaining induction and deduction. Computer, 52. pp. 72-75. ISSN 0018-9162 (Print), 1558-0814 (Online) (doi:10.1109/MC.2019.2913138)

cyber risk; formal analysis; IoT applications

Khan, Muhammad Taimoor ORCID logoORCID: https://orcid.org/0000-0002-5752-6420 (2022) Towards practical and formal security risk analysis of IoT (Internet of Things) applications. In: 2022 IEEE 27th International Conference on Emerging Technologies and Factory Automation (ETFA). IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 1-4. ISBN 978-1665499965; 978-1665499972 (doi:10.1109/ETFA52439.2022.9921511)

cyber security, distributed systems, distributed industrial control systems (ICS), cybersecurity, critical systems, behavior-based security monitoring, water management system

Raptis, George E., Khan, Muhammad Taimoor ORCID logoORCID: https://orcid.org/0000-0002-5752-6420, Koulamas, Christos and Serpanos, Dimitrios (2025) Applying inline monitoring to detect run-time security incidents in water distribution systems. In: IECON 2024 - 50th Annual Conference of the IEEE Industrial Electronics Society. Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey. ISBN 978-1665464550 (doi:10.1109/IECON55916.2024.10905306)

cyber security, model-based, specification, industrial control systems, distributed industrial control systems (ICS), cybersecurity, critical systems, behavior-based security monitoring, water management system, computational attacks, network attacks, false data injection (FDI) attacks

Raptis, George E., Khan, Muhammad Taimoor ORCID logoORCID: https://orcid.org/0000-0002-5752-6420, Koulamas, Christos and Sepanos, Dimitrios (2024) Towards integration of EPANET and ASM2S to enhance security in water distribution systems. In: 2024 IEEE 29th International Conference on Emerging Technologies and Factory Automation (ETFA), Padova, Italy, 10th - 13th September 2024. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 1-8. ISBN 979-835031230; 979-8350361247 ISSN 1946-0759 (Print), 1946-0740 (Online) (doi:10.1109/ETFA61755.2024.10710978)

cyber security; formal analysis; real-time security

Khan, Muhammad Taimoor ORCID logoORCID: https://orcid.org/0000-0002-5752-6420, Serpanos, Dimitrios and Shrobe, Howard (2021) Towards scalable security of real-time applications: a formally certified approach. In: 2021 26th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA ). IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, 01-04. ISBN 978-1728129907; 978-1728129891 (doi:10.1109/ETFA45728.2021.9613489)

digital twin; security and safety; modeling; resilience

Khan, Muhammad Taimoor ORCID logoORCID: https://orcid.org/0000-0002-5752-6420 (2023) Challenges in modelling applications for safe and resilient digital twins. In: 2022 IEEE International Smart Cities Conference (ISC2), Pafos, Cyprus. 26-29 Sept 2022. IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 1-6. ISBN 978-1665485616; 978-1665485623 ISSN 2687-8860 (Print), 2687-8852 (Online) (doi:10.1109/ISC255366.2022.9921921)

inline security monitoring, industrial control systems, distributed ICS, water distribution systems, JML specifications, generative AI, large language models, cybersecurity, formal verification, runtime anomaly detection

Raptis, George E., Khan, Muhammad Taimoor ORCID logoORCID: https://orcid.org/0000-0002-5752-6420, Koulamas, Christos and Serpanos, Dimitrios (2025) Cross-model evaluation of LLMs for generating formal specification of distributed Industrial Control Systems. Procedia Computer Science, 270. pp. 5846-5854. ISSN 1877-0509 (Online) (doi:10.1016/j.procs.2025.10.053)

malware detection; security; smart cities; autonomous systems

Aurangzeb, Sana, Aleem, Muhammad, Khan, Muhammad Taimoor ORCID logoORCID: https://orcid.org/0000-0002-5752-6420, Anwar, Haris and Siddique, Muhammad Shaoor (2023) Cybersecurity for autonomous vehicles against malware attacks in smart-cities. Cluster Computing. ISSN 1386-7857 (Print), 1573-7543 (Online) (doi:10.1007/s10586-023-04114-7)

malware; Android; cyber attacks

Aurangzeb, Sana, Aleem, Muhammad, Khan, Muhammad Taimoor ORCID logoORCID: https://orcid.org/0000-0002-5752-6420, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Sakellari, Georgia ORCID logoORCID: https://orcid.org/0000-0001-7238-8700 (2024) AndroDex: Android Dex images of obfuscated malware. Scientific Data, 11 (212). pp. 1-10. ISSN 2052-4463 (Online) (doi:10.1038/s41597-024-03027-3)

model-based security, vulnerability detection, syntact patterns, semantic patterns

Akhter, Lal, Khan, Muhammad Taimoor ORCID logoORCID: https://orcid.org/0000-0002-5752-6420, Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 and Sakellari, Georgia ORCID logoORCID: https://orcid.org/0000-0001-7238-8700 (2024) Towards integration of syntactic and semantic vulnerability patterns. In: 2024 IEEE 21st International Conference on Software Architecture Companion (ICSA-C) DOI: 10.1109/ICSA-C63560.2024, 4th - 8th June 2024. Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 260-264. ISBN 979-8350366259; 979-850366266 ISSN 2768-4288 (Print), 2768-427X (Online) (doi:10.1109/ICSA-C63560.2024.00054)

monitoring, safety, security, sugar, biomedical monitoring, sensors, insulin

Khan, Muhammad Taimoor ORCID logoORCID: https://orcid.org/0000-0002-5752-6420, Serpanos, Dimitrios and Shrobe, Howard (2018) Highly assured safety and security of e-health applications. In: 2018 14th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob). IEEE, pp. 137-144. ISBN 978-1538668764 ISSN 2160-4886 (doi:10.1109/WiMOB.2018.8589095)

monitoring, security, real-time systems, computational modeling, calculus, prototypes, industrial control

Khan, Muhammad Taimoor ORCID logoORCID: https://orcid.org/0000-0002-5752-6420, Serpanos, Dimitrios and Shrobe, Howard (2017) A rigorous and efficient run-time security monitor for real-time critical embedded system applications. In: 2016 IEEE 3rd World Forum on Internet of Things (WF-IoT). IEEE, pp. 100-105. ISBN 978-1509041305 (doi:10.1109/WF-IoT.2016.7845510)

privacy, Ejabberd, WhatsApp, consent, confidentiality

Naz, Muqaddas, Khan, Muhammad Taimoor ORCID logoORCID: https://orcid.org/0000-0002-5752-6420 and Waqas, Muhammad ORCID logoORCID: https://orcid.org/0000-0003-0814-7544 (2025) Model-driven privacy analysis of messaging platforms. In: ACM Conference on Computer and Communications Security. The Association for Computing Machinery (ACM), Taipei, Taiwan. (In Press)

privacy, analytical models, passwords, privacy breach, control systems, servers, Internet telephony, manufacturing automation

Naz, M. and Khan, M. T. ORCID logoORCID: https://orcid.org/0000-0002-5752-6420 (2025) Towards privacy analysis of Internet-based messaging applications. In: 2025 IEEE 30th International Conference on Emerging Technologies and Factory Automation (ETFA), Porto, Portugal, 2025. IEEE Xplore . Institute of Electrical and Electronics Engineers, Inc. (IEEE), Piscataway, New Jersey, pp. 1-8. ISBN 979-8331553838 (doi:10.1109/ETFA65518.2025.11205612)

program verification, time semantics, timed automata

Liva, Giovanni ORCID logoORCID: https://orcid.org/0000-0002-9337-5762, Khan, Muhammad Taimoor ORCID logoORCID: https://orcid.org/0000-0002-5752-6420 and Pinzger, Martin (2019) Semantics-driven extraction of timed automata from Java programs. Empirical Software Engineering, 24 (5). pp. 3114-3150. ISSN 1382-3256 (Print), 1573-7616 (Online) (doi:10.1007/s10664-019-09699-5)

safety, computer security, process control, control systems, computer hacking, tutorials, cyberattack

Serpanos, Dimitrios ORCID logoORCID: https://orcid.org/0000-0002-1385-7113, Khan, Muhammad Taimoor ORCID logoORCID: https://orcid.org/0000-0002-5752-6420 and Shrobe, Howard (2018) Designing safe and secure industrial control systems: A tutorial review. IEEE Design & Test, 35 (3). pp. 73-88. ISSN 2168-2356 (Print), 2168-2364 (Online) (doi:10.1109/MDAT.2018.2816943)

security, integrated circuits, safety, information and communication technology, runtime, sensors, industrial control, cyber-physical, systems, design methodology, computer crime, computer security

Khan, Muhammad Taimoor ORCID logoORCID: https://orcid.org/0000-0002-5752-6420, Serpanos, Dimitrios and Shrobe, Howard (2017) ARMET: behavior-based secure and resilient industrial control systems. Proceedings of the IEEE, 106 (1). pp. 129-143. ISSN 0018-9219 (Print), 1558-2256 (Online) (doi:10.1109/JPROC.2017.2725642)

security; safety; smart cities

Mohsin, Ali, Aurangzeb, Sana, Aleem, Muhammad and Khan, Muhammad Taimoor ORCID logoORCID: https://orcid.org/0000-0002-5752-6420 (2022) On the performance and scalability of simulators for improving security and safety of smart cities. In: 2022 IEEE 27th International Conference on Emerging Technologies and Factory Automation (ETFA). IEEE Xplore . Institute of Electrical and Electronics Engineers (IEEE), Piscataway, New Jersey, pp. 1-8. ISBN 978-1665499965; 978-1665499972 (doi:10.1109/ETFA52439.2022.9921600)

semantic web, digital economy, Smart contracts, switches, vectors, real-time systems, delays, logic, monitoring, resilience, oracle networks, latency attacks, bitflips, price access manipulation, price aggregation, Solana

Zhukovsky, D. and Khan, M. T. ORCID logoORCID: https://orcid.org/0000-0002-5752-6420 (2025) Vulnerability analysis of Web 3.0 based decentralised oracle networks. In: 2025 IEEE International Conference on Cyber Security and Resilience (CSR), Chania, Crete, Greece, 2025. IEEE Xplore . Institute of Electrical and Electronics Engineers, Inc. (IEEE), Piscataway, New Jersey, pp. 1106-1112. ISBN 979-8331535919 (doi:10.1109/CSR64739.2025.11130021)

software/program verification, formal methods, error handling and recovery

Giovanni, Liva, Khan, Muhammad Taimoor ORCID logoORCID: https://orcid.org/0000-0002-5752-6420, Pinzger, Martin, Spegni, Francesco and Spalazzi, Luca (2019) Automatic repair of timestamp comparisons. IEEE Transactions on Software Engineering, 47 (11). pp. 2369-2381. ISSN 0098-5589 (doi:10.1109/TSE.2019.2948351)

training, Java, Generative AI, large language models, industrial control, robustness, security, formal specifications, integrated circuit modeling, monitoring, industrial Control Systems (ICS), security monitoring;inline monitors;formal specification, generative AI, large language models (LLMs), Java Modeling Language (JML); cyber-physical systems, run-time verification, water distribution systems

Raptis, G. E., Khan, M. T. ORCID logoORCID: https://orcid.org/0000-0002-5752-6420, Koulamas, C. and Serpanos, D. (2025) Synthesizing inline security monitors for ICS using Generative AI and FormalBench. In: IECON 2025: 51st Annual Conference of the IEEE Industrial Electronics Society 14th - 17th Oct. 2025. IEEE Xplore . Institute of Electrical and Electronics Engineers, Inc. (IEEE), Piscataway, New Jersey, pp. 1-6. (doi:10.1109/IECON58223.2025.11221437)

This list was generated on Sun Nov 30 18:23:00 2025 UTC.