Dr. Khurram Gulzar Rana
ASSISTANT PROFESSOR
051-9064-3203
khurram@qau.edu.pk
Embarking on a journey of academic excellence, Dr. Khurram Gulzar Rana stands as an Assistant Professor with an illustrious background in the realm of Information Security. His academic voyage led him to the prestigious BJUT in Beijing, China, where he earned his Ph.D., shaping his expertise in Network Security. Dr. Rana's commitment to knowledge extends to his M.S. in Information Security from NUST Rawalpindi Cantt and an MIT from Quaid-i-Azam University, Islamabad.
Distinguished by a profound interest in Network Security, Dr. Rana imparts his wealth of knowledge through a diverse range of courses. His dedication to education is evident in his teachings, covering subjects like Discrete Mathematics, Network and Security Management, and more. His pedagogical prowess extends to guiding students through the intricacies of Analysis of Algorithms, Web Engineering, and the complexities of Machine Learning.
Dr. Rana's intellectual contributions transcend the classroom, reflected in a myriad of publications that showcase his expertise. His research has made a significant impact in areas such as circumventing sinkhole attacks in ad hoc networks, detecting malicious nodes, and addressing security challenges in wireless sensor networks. Dr. Khurram Gulzar Rana's commitment to advancing the field of Network Security is not only evident in his publications but also in his continuous exploration of innovative solutions.
In addition to his scholarly achievements, Dr. Rana fosters a collaborative research environment, guiding students in projects such as handling the CSP problem for DDoS attack detection. His commitment to excellence is underscored by his participation in workshops aimed at promoting research excellence in academia across Pakistan.
Dr. Khurram Gulzar Rana's journey is marked by a relentless pursuit of knowledge, a commitment to educational enrichment, and a dedication to shaping the future of Network Security. His impact extends beyond the pages of academic journals, leaving an indelible mark on the minds of those fortunate enough to be under his tutelage.
NO. | Education |
---|---|
01. | Ph.d.: BJUT, Beijing, China |
02. | MS Information Security: NUST Rawalpindi Cantt |
03. | MIT: Quaid-i-Azam University Islamabad |
NO. | Courses |
---|---|
01. | Discrete Mathematic |
02. | Network and Security Management |
1. Khurram Gulzar Rana, Cai Yongquan, Allah Ditta, Muhammad Azeem, Muhammad Qasim. Circumventing Sinkhole Attack in Ad hoc Networks. International Journal ofWireless and Mobile Computing. 2015. 9(4): 363–369. (EI: 20160201784449).
2. Khurram Gulzar Rana, Cai Yongquan, Muhammad Azeem, Allah Ditta, Haiyang Yu,Sajjad Ali Khuhro. Wireless ad hoc network: detection of malicious node by usingneighbor based authentication approach. International Journal of Wireless and MobileComputing. 2018. 14(1): 16–24. (EI: 20181004878309).
3. Khurram Gulzar Rana, Cai Yongquan, Muhammad Azeem, Allah Ditta, Haiyang Yu.
Detection of Malicious Node in Wireless Ad Hoc Network by Using Acknowledgement Based Approach. In Proc. of ACM 7th International Conference on Communication andNetwork Security, Tokyo, Japan. November 24–26, 2017: 76-80. (EI: 20180704798542).
4. Khurram Gulzar Rana, Cai Yongquan, Muhammad Azeem, Muhammad Qasim, Allah Ditta. An Efficient Approach to Detect and Remove Black Hole Attack in Wireless Sensor Networks. In Proc. of IEEE International Conference on Computer Systems,Electronics and Control. Dalian, China. December 25-27, 2017: 151-155. ( EI, ISBN:978-1-5386-3573-5)
5. Allah Ditta, Cai Yongquan, Muhammad Azeem, Khurram Gulzar Rana, Muhammad Qasim Memon and Haiyang Yu. Information Hiding: Arabic Text Steganography by Using Unicode Characters to Hide Secret Data. International Journal of ElectronicSecurity and Digital Forensics. 2018. 10(1): 61-78. (EI: 20180304658032).
6. Allah Ditta, Cai Yongquan, Khurram Gulzar Rana, Kong Shanshan, Muhammad Azeem, Tahadray Jean. By Using Different Techniques of Steganography Deducting NullCipher in Plain Text. International Journal of Wireless and Mobile Computing. 2015.
9(4): 307-316. (EI: 20160201784450).
7. Muhammad Azeem, Jingsha He, Khurram Gulzar Rana, Faheem Akhtar. A
cryptographic Data Hiding Algorithm with High Cover Text Capacity. InternationalJournal of Electronic Security and Digital Forensics. 2019. 11(2): 225-244. (EI).
8. Muhammad Azeem, Cai Yongquan, Allah Ditta, Khurram Gulzar Rana and Faheem Akhtar Rajpoot. Information Hiding: A Novel Algorithm for Enhancement of Cover Text Capacity by Using Unicode Characters. International Journal of Information andComputer Security. 2018. 10(4): 437-453. (EI).
9. Allah Ditta, Cai Yongquan, Muhammad Azeem, Khurram Gulzar Rana, Lei Chen.
Design and Implementation of Skype Static Traffic Identifier with Analysis of Skype Login Process on LAN. International Journal of Computer Science and InformationSecurity. 2016. 8(14): 683-693. (ESCI).
10. Muhammad Azeem, Cai Yongquan, Khurram Gulzar Rana, Zeeshan Shaukat, Allah Ditta. A Secure and Size Efficient Approach to Enhance the Performance of Text Steganographic Algorithm. In Proc. of IEEE International Conference on ComputerSystems, Electronics and Control. Dalian, China. 2017: 146-150. (EI).
11. Haiyang Yu, Cai Yongquan, Fei Xue, Khurram Gulzar Rana and Shanshan Kong.
Efficient public auditing for data migration across cloud systems. International Journal ofWireless and Mobile Computing. 2017. 12(1): 41-48. (EI: 20171303492468).
12. Muhammad Qasim Memon, He Jingsha, Aasma, Khurram Gulzar Rana and Allah Ditta. Dynamic integration of PL/SQL for Complex Queries. International Journal ofdatabase theory and application. 2016. 9(10): 351-362. (EI: 20164903089141).
13. Muhammad Qasim Memon, He Jingsha, Aasma Memon, Khurram Gulzar Rana andMuhammad Salman Pathen. Query Processing for Time Efficient Data Retrieval.
Indonesian Journal of Electrical Engineering and Computer Science. 2018. 9(3): 784-788.
(EI).
14. Allah Ditta, Muhammad Azeem, Shahid Naseem, Khurram Gulzar Rana, Muhammad Adnan Khan, Zafar Iqbal. A secure and size efficient algorithm to enhance data hidingcapacity and security of cover text by using unicode. Journal of King Saud University Computer and Information Sciences. Volume 34, Issue 5, May 2020, Pages 2180-2191.
(SCI).