Ahmed Alahmadi

According to our database1, Ahmed Alahmadi authored at least 13 papers between 2012 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Prototype Device With Lightweight Protocol for Secure RFID Communication Without Reliable Connectivity.
IEEE Access, 2019

Blocking Probability Analysis for Relay-Assisted OFDMA Networks using Stochastic Geometry.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

2016
Causality Analysis of fMRI Data Based on the Directed Information Theory Framework.
IEEE Trans. Biomed. Eng., 2016

2015
Subband PUEA Detection and Mitigation in OFDM-Based Cognitive Radio Networks.
IEEE Trans. Inf. Forensics Secur., 2015

Brain functional connectivity analysis using mutual information.
Proceedings of the 2015 IEEE Global Conference on Signal and Information Processing, 2015

2014
Defense Against Primary User Emulation Attacks in Cognitive Radio Networks Using Advanced Encryption Standard.
IEEE Trans. Inf. Forensics Secur., 2014

Improving e-Health Services and System Requirements by Modelling the Health Environment.
J. Softw., 2014

Automated Health Business Process Modelling and Analysis for E-Health System Requirements Elicitation.
Proceedings of the 18th Pacific Asia Conference on Information Systems, 2014

Sub-band detection of primary user emulation attacks in OFDM-based cognitive radio networks.
Proceedings of the 2014 IEEE Global Conference on Signal and Information Processing, 2014

2013
Indoor navigational aid using active RFID and QR-code for sighted and blind people.
Proceedings of the 2013 IEEE Eighth International Conference on Intelligent Sensors, 2013

A hybrid history based weighted voting algorithm for smart mobile e-health monitoring systems.
Proceedings of the 2013 IEEE Eighth International Conference on Intelligent Sensors, 2013

Mitigating primary user emulation attacks in cognitive radio networks using advanced encryption standard.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

2012
A hybrid history based weighted voting algorithm for ultra-critical systems.
Proceedings of the International Symposium on Communications and Information Technologies, 2012


  Loading...