Speakers

Burhan Ul Islam Khan

Burhan Ul Islam Khan

Place of Birth : Srinagar, India
Position : Senior Lecturer, Universiti Malaya, Malaysia
Field of study : Computer Science and Information Technology


Biography:

Dr. Burhan Ul Islam Khan is a distinguished academic and researcher serving as a Senior Lecturer at the Faculty of Computer Science and Information Technology, Universiti Malaya, which is ranked 58th globally. He holds a Ph.D. in Engineering from the International Islamic University Malaysia, where he focused on a Scalable Mobile-based Offline TOTP Authentication Prototype for secure Internet banking. His research has resulted in over 75 scientific publications and has garnered more than 750 citations, earning him international recognition through presentations at prestigious conferences in the UK, France, and Malaysia. Dr. Khan has two patents pending in Malaysia and India for his innovative prototypes, which have been awarded gold and bronze medals by national research and design societies. He is deeply committed to education, having developed the curriculum for a Master's in Cyber Security and currently supervising four Ph.D. students. He also serves as a reviewer for top-tier journals from leading publishers such as IEEE, Springer, and Elsevier.

Education:
  • Ph.D. in Engineering: International Islamic University Malaysia (IIUM), Malaysia (2020)
  • M.S. in Computer and Information Engineering: International Islamic University Malaysia (IIUM), Malaysia (2014)
  • B.Tech. in Computer Science & Engineering: Islamic University of Science and Technology (IUST), India (2011)
Experiences:
  • Senior Lecturer: Universiti Malaya, Malaysia
  • Postdoctoral Fellow: Computer Network Research Group, International Islamic University Malaysia
  • Academic Appointments: Lecturer and Assistant Professor
  • Industry Roles: Research Analyst and Software Engineer
Area of Expertise:
  • Secure Routing for Mobile Adhoc Networks
  • Big Data Handling on Cloud
  • Analysis of Network Performance Indicators
  • Application of Game Theory and Mechanism Design
  • Secure One-Time-Passwords
  • Authentication and Authorization in Cloud Computing and IoT
© Copyright STEP 2019, All rights reserved
×