Publications

We include the publications on this page to ensure timely dissemination on a noncommercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their publications here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by the copyrights. These publications may not be reposted without the explicit permission of the copyright holder.

Recent Publications

For the complete list of publications see below or check my profile on DBLP and Google Scholar

Legends

Book/Chapter
Journal
Conference/Workshop
Theses
Technical report/others

Complete List

QADL: Prototype of Quantum Architecture Description Language (pre-print)
M. Waseem, T. Mikkonen, A. Ahmad, M. T. Khan, M. Haghparast, V. Stirbu, P. Liang. Submitted to 47th International Conference on Software Engineering, Ottawa, Canada, 2025.

Applying Inline Monitoring to Detect Run-Time Security Incidents in Water Distribution Systems (pdf)
G. E. Raptis, M. T. Khan, K. Stefanidis, C. Koulamas, D. Serpanos. In Proceedings of the 50th Annual Conference on the IEEE Industrial Electronics Society (IECON), Chicago, Illinois, USA, 2024.

Towards Integration of EPANET and ASM2S to Enhance Security in Water Distribution Systems (pdf)
G. E. Raptis, M. T. Khan, K. Stefanidis, C. Koulamas, D. Serpanos. In Proceedings of the 29th Annual Conference on Emerging Technologies and Factory Automation (ETFA), pages 1-8, 2024.

Towards Integration of Syntactic and Semantic Vulnerability Patterns (pdf)
L. M. Akhter, M. T. Khan, and G. Loukas. In Proceedings of the IEEE 21st International Conference on Software Architecture Companion (ICSA-C), Hyderabad, India, 2024, pp. 260-264, 2024.

AndroDex: Android Dex Images of Obfuscated Malware (pdf)
S. Aurangzeb, M. Aleem, M. T. Khan, G. Loukas, G. Sakellari. Scientific Data, 11(212), Nature, 2024.

Towards a DeepMalOb Improvement in the Use of Formal Security Risk Analysis Methods (pdf)
Z. Sawadogo, M. T. Khan, J. M. Dembelle, G. Mendy and S. Ouya. In Proceedings of the 6th International Conference on Cloud Computing and Artificial Intelligence: Technologies and Applications (CloudTech), Marrakech, Morocco, 2023.

CyberSecurity for Autonomous Vehicles Against Malware Attacks in Smart-Cities (pdf)
M. Aleem, S. Aurangzeb, M. T. Khan, H. Anwar, M. S. Siddique. Cluster Computing, Springer, 2023.

Towards Model-based Vulnerability Analysis of Java Programs against Known Attacks (pdf)
L. M. Akhter, M. T. Khan, G. Loukas, G. Sakellari. The 7th Workshop on Formal Approaches for Advanced Computing Systems (FAACS 2023), LNCS, Springer, 2023 - To appear.

Towards Behavior-based Analysis for Android Obfuscated Malware (pdf)
Z. Sawadogo, M. T. Khan, G. Loukas, J. M. Dembele, G. Sakellari, G. Mendy. The 7th Workshop on Formal Approaches for Advanced Computing Systems (FAACS 2023), LNCS, Springer, 2023 - To appear.

Towards Run-Time Security Monitoring of Distributed Industrial Control Systems (pdf)
G. E. Raptis, M. T. Khan, K. Stefanidis, C. Koulamas, D. Serpanos. In Proceedings of the 28th Annual Conference on Emerging Technologies and Factory Automation (ETFA), IEEE, 2023

Challenges in Modelling Applications for Safe and Resilient Digital Twins (pdf)
M. T. Khan. 8th IEEE International Smart Cities Conference, IEEE, November 2022.

Towards Practical and Formal Security Risk Analysis of IoT (Internet of Things) Applications (pdf)
M. T. Khan. 27th Annual Conference on Emerging Technologies and Factory Automation (ETFA), IEEE, November 2022.

On the Performance and Scalability of Simulators for Improving Security and Safety of Smart-City (pdf)
A. Mohsin, S. Aurangzeb, M. Aleem, M. T. Khan. 27th Annual Conference on Emerging Technologies and Factory Automation (ETFA), IEEE, November 2022.

Towards Scalable Security of Real-time Applications : A Formally Certified Approach (pdf)
M. T. Khan, D. Serpanos, H. Shrobe. 26th Annual Conference on Emerging Technologies and Factory Automation (ETFA), IEEE, January 2022.

Securing Industrial Cyber-Physical Systems: A Run-time Multi-layer Monitoring (pdf)
M. T. Khan, I. Tomic. IEEE Transactions on Industrial Informatics, vol. 17, no. 9, pp. 6251-6259, 2021.

Automatic Repair of Timestamp Comparisons (pdf)
L. Giovanni, M. T. Khan, M. Pinzger, F. Spegni, L. Spalazzi. IEEE Transactions on Software Engineering, vol. 47, no. 11, pp. 2369-2381, November 2021.

Rigorous Machine Learning for Secure and Autonomous Cyber Physical Systems (pdf) Awarded Best Presentation and Paper Award
M. T. Khan, D. Serpanos, H. Shrobe, M. M. Yousaf. In 25th Annual Conference on Emerging Technologies and Factory Automation (ETFA), pages 1815-1819, 2020.

Runtime Protection of Real-time Critical Control Applications against Known Threats (pdf)
M. T. Khan, M. Pinzger, D. Serpanos, H. Shrobe. IEEE Design & Test 37(6), pp. 88-95, DOI: 10.1109/MDAT.2020.3007729, December 2020.

Run-Time Security Assurance of Cyber Physical System Applications (Book Chapter) (pdf)
M. T. Khan, D. Serpanos, H. Shrobe. In: Bhattacharyya S., Potkonjak M., Velipasalar S. (eds) Embedded, Cyber-Physical, and IoT Systems. Springer, Cham, pages 79-88, 2020.

Indexing of Real Time Geospatial Data by IoT enabled Devices: Opportunities, Challenges and Design Considerations (pdf)
N. Chaudhry, M. M. Yousaf, M. T. Khan. Journal of Ambient Intelligence and Smart Environments 12(4), pages 281-312, 2020.

Security Assessment of Data Management Systems for Cyber Physical System Applications (pdf)
N. Chaudhry, M. M. Yousaf, M. T. Khan. Journal of Software : Evolution and Process 32(2), 2020.

On Synthesis of Runtime Security Monitor for Realtime IoT Applications (pdf) Awarded Best Paper Award
M. T. Khan, D. Serpanos, H. Shrobe. In Proceedings of the 6th International Symposium for ICS & SCADA Cyber Security Research, 2019.

Automatic Identification and Recovery of Errors in Programs - A Rigorous Approach (pdf)
G. Liva, F. Spegni, M. T. Khan, L. Spalazzi, M. Pinzger. In: Technical Report, SERG Report Series AAU-SERG-2019-002, Alpen-Adria University, Austria, 2019.

Proof of Soundness of Time Type System and Repair Strategy (pdf)
G. Liva, M. T. Khan. In: Technical Report, SERG Report Series AAU-SERG-2019-001, Alpen-Adria University, Austria, 2019.

Security of Cyber Physical Systems: Chaining Induction and Deduction (pdf)
M. T. Khan, H. Shrobe. IEEE Computer 52(7): 72-75, 2019.

Semantics-Driven Extraction of Timed Automata from Java Programs (pdf)
G. Liva, M. T. Khan, and M. Pinzger. Journal of Empirical Software Engineering (EMSE), online, Springer, 2019.

Modeling Time in Java Programs for Automatic Error Detection (pdf)
G. Liva, M. T. Khan, F. Spegni, L.Spalazzi, A. Bollin, and M. Pinzger. In Proceedings of the International Conference on Formal Methods in Software Engineering (FormaliSE), pp. 50-59, IEEE, 2018.

Designing Safe and Secure Industrial Control Systems: A Tutorial Review (pdf)
D. Serpanos, M. T. Khan, H. Shrobe. IEEE Design & Test 35(3): 73-88, 2018.

Highly Assured Safety and Security of e-Health Applications (pdf)
M. T. Khan, D. Serpanos and H. Shrobe. In: Proceedings of the 14th International Conference on Wireless and Mobile Computing, Networking and Communications, WiMob, pages 137-144, 2018.

ARMET: Behavior-based Secure and Resilient Industrial Control Systems (pdf)
M. T. Khan, D. Serpanos, H. Shrobe. Proceedings of the IEEE, 106(1), 129-143, 2018.

A Formally Reliable Cognitive Middleware for the Security of Industrial Control Systems (pdf)
M. T. Khan, D. Serpanos, H. Shrobe. Electronics, 6(58), 2017.

Extracting Timed Automata from Java Methods (pdf)
G. Liva, M. T. Khan, and M. Pinzger. In Proceedings of the International Working Conference on Source Code Analysis and Manipulation (SCAM), pp. 91-100, IEEE, 2017.

A Rigorous and Efficient Run-time Security Monitor for Real-time Critical Embedded System Applications (pdf) Awarded Best Paper Award
M. T. Khan, D. Serpanos, H. Shrobe. In: Proceedings of the MARTCPS'16, IEEE World Forum on Internet of Things, IEEE, pages 100-105, December 2016.

Sound and Complete Runtime Security Monitor for Application Software (pdf)
M. T. Khan, D. Serpanos, H. Shrobe. MIT CSAIL Technical Series, MIT-CSAIL-TR-2016-017, December 2016.

Behavior Based Security of Cyber Physical Systems (pdf)
D. Serpanos, H. Shrobe, M. T. Khan. In: European Reserch Consortium for Informatics and Mathematics (ERCIM) News, ERCIM, vol. 107, 2016.

Abstract Data Machine: Data Classifier for Reliable Embedded Systems Software (pdf)
M. T. Khan, A. Fragopoulos, D. Serpanos, H. Shrobe. In Proceedings of the WESS'15: Workshop on Embedded Systems Security (WESS'15). ACM, New York, NY, USA, Article 8 , 5 pages. DOI dx.doi.org/10.1145/2818362.2818370, October 2015.

On the Formal Semantics of the Cognitive Middleware AWDRAT (pdf)
M. T. Khan, D. Serpanos, H. Shrobe. MIT CSAIL Technical Series, MIT-CSAL-TR-2015-007, March 2015.

On the Behavioral Formalization of the Cognitive Middleware AWDRAT (pdf)
M. T. Khan, D. Serpanos, H. Shrobe. In: Proceedings of the 26th Nordic Workshop on Programming Theory (NWPT'14), (ed.), pp. 37-39, Halmstad, Sweden, October 2014.

Formal Specification and Verification of Computer Algebra Software (pdf)
M. T. Khan. Technical report no. 14-04 in RISC Report Series, Research Institute for Symbolic Computation (RISC), Johannes Kepler University, Linz, Austria, PhD Thesis, April 2014.

On the Soundness of the Translation of MiniMaple to Why3ML (pdf)
M. T. Khan. Technical report no. 2014-03 in DK Report Series and also Technical report no. 14-01 in RISC Report Series, Research Institute for Symbolic Computation (RISC), Johannes Kepler University, Linz, Austria, February 2014.

On the Formal Verification of Maple Programs (pdf)
M. T. Khan. Technical report no. 2013-06 in DK Report Series and also Technical report no. 13-07 in RISC Report Series, Research Institute for Symbolic Computation (RISC), Johannes Kepler University, Linz, Austria, June-July 2013.

A Verification Framework for MiniMaple Program (pdf) Nominated Best Poster Award
M. T. Khan, W. Schreiner. In: ACM Communications in Computer Algebra, 47(3):98--99, September 2013. Accepted extended abstract from poster presentation at 38th International Symposium on Symbolic and Algebraic Computation (ISSAC), June 2013.

Translation of MiniMaple to Why3ML (pdf)
M. T. Khan. Technical report no. 2013-02 in DK Report Series and also Technical report no. 13-01 in RISC Report Series, Research Institute for Symbolic Computation (RISC), Johannes Kepler University, Linz, Austria, February 2013.

On the Formal Semantics of MiniMaple and its Specification Language (pdf)
M. T. Khan. In: Proceedings of the 10th International Conference on Frontiers of Information Technology (FIT 2012), IEEE Digital Library, pp. 169-174, DOI 10.1109/FIT.2012.38, December 2012.

On the Formal Specification of Maple Programs (pdf)
M. T. Khan, W. Schreiner. In: Intelligent Computer Mathematics, Johan Jeuring, John A. Campbell, Jacques Carette, Gabriel Dos Reis, Petr Sojka, Makarius Wenzel, Volker Sorge (ed.), Lecture Notes in Artificial Intelligence (LNAI) 7362, pp. 443-447, Springer Berlin/Heidelberg, ISBN 978-3-642-31373-8, DOI 10.1007/978-3-642-31374-5_33, July 9-13, 2012.

Towards the Formal Specification and Verification of Maple Programs (pdf) Awarded Best Student Paper Award
M. T. Khan, W. Schreiner. In: Intelligent Computer Mathematics, Johan Jeuring, John A. Campbell, Jacques Carette, Gabriel Dos Reis, Petr Sojka, Makarius Wenzel, Volker Sorge (ed.), Lecture Notes in Artificial Intelligence (LNAI) 7362, pp. 231-247, Springer Berlin/Heidelberg, ISBN 978-3-642-31373-8, DOI 10.1007/978-3-642-31374-5_16, July 9-13, 2012.

Formal Semantics of a Specification Language for MiniMaple (pdf)
M. T. Khan. Technical report no. 2012-06 in DK Report Series and also Technical report no. 12-05 in RISC Report Series, Research Institute for Symbolic Computation (RISC), Johannes Kepler University, Linz, Austria, April 2012.

Formal Semantics of MiniMaple (pdf)
M. T. Khan. Technical report no. 2012-01 in DK Report Series and also Technical report no. 12-04 in RISC Report Series, Research Institute for Symbolic Computation (RISC), Johannes Kepler University, Linz, Austria, January 2012.

Towards a Behavioral Analysis of Computer Algebra Programs (pdf)
M. T. Khan. Technical report no. 2011-13 in DK Report Series and also Technical report no. 11-13 in RISC Report Series, Research Institute for Symbolic Computation (RISC), Johannes Kepler University, Linz, Austria, November 2011.

Towards a Behavioral Analysis of Computer Algebra Programs (Extended Abstract) (pdf)
M. T. Khan, W. Schreiner. In: Proceedings of the 23rd Nordic Workshop on Programming Theory (NWPT'11), Paul Petterson and Cristina Seceleanu (ed.), pp. 42-44. Vasteras, Sweden, October 2011.

A Type Checker for MiniMaple (pdf)
M. T. Khan. Technical report no. 2011-05 in DK Report Series and also Technical report no. 11-05 in RISC Report Series, Research Institute for Symbolic Computation (RISC), Johannes Kepler University, Linz, Austria, April 2011.

Formal Verification of Space Missions Communication Protocols: NASA project Space Link Extension – Service Management
M.T. Khan. Master’s Thesis, University of Leicester, UK, 2008.