2025
Simulation-based evaluation of advanced threat detection and response in financial industry networks using zero trust and blockchain technology.
Simul. Model. Pract. Theory, 2025
Internet of Things botnets: A survey on Artificial Intelligence based detection techniques.
J. Netw. Comput. Appl., 2025
2024
Cloud, IoT and Data Science.
Inf. Syst. Frontiers, August, 2024
A Deep Learning based Scalable and Adaptive Feature Extraction Framework for Medical Images.
Inf. Syst. Frontiers, August, 2024
Latent Semantic Analysis and Graph Theory for Alert Correlation: A Proposed Approach for IoT Botnet Detection.
IEEE Open J. Commun. Soc., 2024
Advancing IAM in the Finance Sector by Integrating Zero Trust and Blockchain Technology.
Proceedings of the Mobile Web and Intelligent Information Systems, 2024
Non-Negative Matrix Factorisation for Feature Selection: A Proposed Approach for the Detection of Multi-Stage Attacks.
Proceedings of the 14th International Conference on Advanced Computer Information Technologies, 2024
Latent Semantic Analysis for Feature Selection: A Proposed Approach for Anomaly Detection in Network Traffic.
Proceedings of the 14th International Conference on Advanced Computer Information Technologies, 2024
2023
Unsupervised Learning for Feature Selection: A Proposed Solution for Botnet Detection in 5G Networks.
IEEE Trans. Ind. Informatics, 2023
Sequential Pattern Mining: A Proposed Approach for Intrusion Detection Systems.
Proceedings of the 7th International Conference on Future Networks and Distributed Systems, 2023
A Novel Approach to Measure and Predict Digital Health Data Protection Compliant (DPC).
Proceedings of the 10th International Conference on Future Internet of Things and Cloud, 2023
Zero Trust Model Implementation Considerations in Financial Institutions: A Proposed Framework.
Proceedings of the 10th International Conference on Future Internet of Things and Cloud, 2023
Latent Dirichlet Allocation for the Detection of Multi-Stage Attacks.
Proceedings of the 24th International Arab Conference on Information Technology, 2023
2022
Functional and Performance Analysis of Discrete Event Network Simulation Tools.
Simul. Model. Pract. Theory, 2022
Multi-stage Attack Detection: Emerging Challenges for Wireless Networks.
Proceedings of the International Conference on Smart Applications, 2022
DDoS Attack Detection and Mitigation in Software-Defined Networking-Based 5G Mobile Networks with Multiple Controllers.
Proceedings of the 9th International Conference on Future Internet of Things and Cloud, 2022
2021
Assessing the Moderating Effect of Security Technologies on Employees Compliance with Cybersecurity Control Procedures.
ACM Trans. Manag. Inf. Syst., 2021
Deep Learning in Mobile Information Systems.
Mob. Inf. Syst., 2021
Edge-based blockchain enabled anomaly detection for insider attack prevention in Internet of Things.
Trans. Emerg. Telecommun. Technol., 2021
Convergence of cloud, Internet of Things, and big data: New platforms and applications.
Concurr. Comput. Pract. Exp., 2021
Machine Learning for Botnet Detection: An Optimized Feature Selection Approach.
Proceedings of the ICFNDS 2021: The 5th International Conference on Future Networks & Distributed Systems, Dubai United Arab Emirates, December 15, 2021
Efficacy of ADDIE Model in Peer-to-Peer Networks: Digital Evidence Investigation.
Proceedings of the 8th International Conference on Future Internet of Things and Cloud, 2021
2020
Analysis of adversary activities using cloud-based web services to enhance cyber threat intelligence.
Serv. Oriented Comput. Appl., 2020
A deductive approach for the sensitivity analysis of software defined network parameters.
Simul. Model. Pract. Theory, 2020
Modelling and Simulation of QoS-Aware Service Selection in Cloud Computing.
Simul. Model. Pract. Theory, 2020
Similarity hash based scoring of portable executable files for efficient malware detection in IoT.
Future Gener. Comput. Syst., 2020
Emerging challenges and frontiers in cloud computing.
Concurr. Comput. Pract. Exp., 2020
IEEE Access Special Section Editorial: Survivability Strategies for Emerging Wireless Networks.
IEEE Access, 2020
Decentralised Compliant Data Trading for Banks.
Proceedings of the IECC 2020: 2nd International Electronics Communication Conference, 2020
2019
Performance analysis of radio spectrum for cognitive radio wireless networks using discrete time Markov chain.
J. Syst. Softw., 2019
Hybrid case-base maintenance approach for modeling large scale case-based reasoning systems.
Hum. centric Comput. Inf. Sci., 2019
Correction to: Detection and classification of social media-based extremist affiliations using sentiment analysis techniques.
Hum. centric Comput. Inf. Sci., 2019
Detection and classification of social media-based extremist affiliations using sentiment analysis techniques.
Hum. centric Comput. Inf. Sci., 2019
Failure prediction using machine learning in a virtualised HPC system and application.
Clust. Comput., 2019
Taxonomy-Based Intelligent Malware Detection Framework.
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Multi-layer Approach to Internet of Things (IoT) Security.
Proceedings of the 7th International Conference on Future Internet of Things and Cloud, 2019
A Framework for Distributed Denial of Service Attack Detection and Reactive Countermeasure in Software Defined Network.
Proceedings of the 7th International Conference on Future Internet of Things and Cloud, 2019
Ransomware Prediction Using Supervised Learning Algorithms.
Proceedings of the 7th International Conference on Future Internet of Things and Cloud, 2019
2018
Editorial: New developments in cloud and IoT.
Future Gener. Comput. Syst., 2018
CloudIntell: An intelligent malware detection system.
Future Gener. Comput. Syst., 2018
A Cloud-Based Energy Efficient Hosting Model for Malware Detection Framework.
Proceedings of the IEEE Global Communications Conference, 2018
An Approach to Detecting Distributed Denial of Service Attacks in Software Defined Networks.
Proceedings of the 6th IEEE International Conference on Future Internet of Things and Cloud, 2018
Integrating Behavioural Security Factors for Enhanced Protection of Organisational Information Technology Assets.
Proceedings of the 6th IEEE International Conference on Future Internet of Things and Cloud, 2018
The World of Malware: An Overview.
Proceedings of the 6th IEEE International Conference on Future Internet of Things and Cloud, 2018
Understanding Awareness of Cyber Security Threat among IT Employees.
Proceedings of the 6th International Conference on Future Internet of Things and Cloud Workshops, 2018
Cyber Threat Intelligence from Honeypot Data Using Elasticsearch.
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018
2017
Failover strategy for fault tolerance in cloud computing environment.
Softw. Pract. Exp., 2017
A framework for dynamic selection of backoff stages during initial ranging process in wireless networks.
J. Syst. Softw., 2017
Failure Analysis Modelling in an Infrastructure as a Service (Iaas) Environment.
Proceedings of the thirty third Annual UK Performance Engineering Workshops, 2017
DoS Attack Impact Assessment on Software Defined Networks.
Proceedings of the Wireless and Satellite Systems, 2017
Evaluation of AV systems against modern malware.
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017
Automated Labeling of Unknown Contracts in Ethereum.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017
An Empirical Study of Cultural Dimensions and Cybersecurity Development.
Proceedings of the 5th IEEE International Conference on Future Internet of Things and Cloud, 2017
An Approach to Failure Prediction in a Cloud Based Environment.
Proceedings of the 5th IEEE International Conference on Future Internet of Things and Cloud, 2017
Empirical study of the impact of e-government services on cybersecurity development.
Proceedings of the Seventh International Conference on Emerging Security Technologies, 2017
2016
Clustering synchronisation of wireless sensor network based on intersection schedules.
Simul. Model. Pract. Theory, 2016
Performance analysis of contending customer equipment in wireless networks.
J. Syst. Softw., 2016
Internet of Things and Cloud Services.
Future Gener. Comput. Syst., 2016
An Integrated Virtualized Strategy for Fault Tolerance in Cloud Computing Environment.
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016
Detection of Malicious Portable Executables Using Evidence Combinational Theory with Fuzzy Hashing.
Proceedings of the 4th IEEE International Conference on Future Internet of Things and Cloud, 2016
Optimising Fault Tolerance in Real-Time Cloud Computing IaaS Environment.
Proceedings of the 4th IEEE International Conference on Future Internet of Things and Cloud, 2016
Mobile Basestations as a Capacity Enhancement Approach to Improve the Fairness of Traffic in LTE Networks.
Proceedings of the 4th IEEE International Conference on Future Internet of Things and Cloud, 2016
Cyber-Attack Modeling Analysis Techniques: An Overview.
Proceedings of the 4th IEEE International Conference on Future Internet of Things and Cloud Workshops, 2016
A Cloud-Based Energy Efficient System for Enhancing the Detection and Prevention of Modern Malware.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016
2015
Recommendation Based Trust Model with an Effective Defence Scheme for MANETs.
IEEE Trans. Mob. Comput., 2015
Modeling of initial contention window size for successful initial ranging process in IEEE 802.22 WRAN cell.
Simul. Model. Pract. Theory, 2015
Route optimasation based on multidimensional trust evaluation model in mobile ad hoc networks.
Proceedings of the 2015 Second International Conference on Information Security and Cyber Forensics, 2015
Performance Evaluation for Process Refinement Stage of SWA System.
Proceedings of the 3rd International Conference on Future Internet of Things and Cloud, 2015
Measuring the Ranking Capability of SWA System.
Proceedings of the 3rd International Conference on Future Internet of Things and Cloud, 2015
Detection, Mitigation and Quantitative Security Risk Assessment of Invisible Attacks at Enterprise Network.
Proceedings of the 3rd International Conference on Future Internet of Things and Cloud, 2015
Mathematical Modeling of Association Attempt with the Base Station for Maximum Number of Customer Premise Equipments in the IEEE 802.22 Network.
Proceedings of the 3rd International Conference on Future Internet of Things and Cloud, 2015
2014
An efficient cluster-based communication protocol for wireless sensor networks.
Telecommun. Syst., 2014
Botnet detection techniques: review, future trends, and issues.
J. Zhejiang Univ. Sci. C, 2014
Modeling and analysis of customer premise equipments registration process in IEEE 802.22 WRAN cell.
J. Syst. Softw., 2014
A Priority-Based Admission Control Scheme for Commercial Web Servers.
Int. J. Parallel Program., 2014
Modelling QoS in IoT Applications.
Proceedings of the 17th International Conference on Network-Based Information Systems, 2014
Friendship Based Trust Model to Secure Routing Protocols in Mobile Ad Hoc Networks.
Proceedings of the 2014 International Conference on Future Internet of Things and Cloud, 2014
Performance Evaluation of Cognitive Radio Networks under Licensed and Unlicensed Spectrum Bands.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014
2013
Mobility Management Scheme for Context-Aware Transactions in Pervasive and Mobile Cyberspace.
IEEE Trans. Ind. Electron., 2013
Analytical modeling for spectrum handoff decision in cognitive radio networks.
Simul. Model. Pract. Theory, 2013
Modeling and online parameter estimation of intake manifold in gasoline engines using sliding mode observer.
Simul. Model. Pract. Theory, 2013
A Next-Generation Approach to Combating Botnets.
Computer, 2013
Editorial Performance Engineering of Communication Systems and Applications.
Comput. J., 2013
Towards QoS in Internet of Things for Delay Sensitive Information.
Proceedings of the Trends in Mobile Web Information Systems, 2013
Enhancing Dynamic Recommender Selection Using Multiple Rules for Trust and Reputation Models in MANETs.
Proceedings of the 25th IEEE International Conference on Tools with Artificial Intelligence, 2013
Towards an enterprise self-healing system against botnets attacks.
Proceedings of the International Conference on Computing, Networking and Communications, 2013
A Quantitative Measure of the Security Risk Level of Enterprise Networks.
Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, 2013
Modeling and Performance Analysis of Scalable Web Servers Deployed on the Cloud.
Proceedings of the 2013 Eighth International Conference on Broadband and Wireless Computing, 2013
Overlapped Schedules with Centralized Clustering for Wireless Sensor Networks.
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013
2012
A second order sliding mode control design of a switched reluctance motor using super twisting algorithm.
Simul. Model. Pract. Theory, 2012
Erratum to "Performance evaluation of fast handover in mobile IPv6 based on link layer informations" [Journal of Systems and Software 83 (2010) 1644-1650].
J. Syst. Softw., 2012
Prioritized Proactive Scheme for Spectrum Handoff Decision in Cognitive Radio Networks.
Proceedings of the 2012 Seventh International Conference on Broadband, 2012
A Unique Global Mobile Network Service Tracker and User Centric Data Analyser.
Proceedings of the 2012 Seventh International Conference on Broadband, 2012
2011
Implementation and Evaluation of Network Intrusion Detection Systems.
Proceedings of the Network Performance Engineering, 2011
QuePED: Revisiting queueing networks for the performance evaluation of database designs.
Simul. Model. Pract. Theory, 2011
An empirical study of modeling self-management capabilities in autonomic systems using case-based reasoning.
Simul. Model. Pract. Theory, 2011
Performance Evaluation Study of Intrusion Detection Systems.
Proceedings of the 2nd International Conference on Ambient Systems, 2011
Special issue on the information networking and services.
J. Syst. Softw., 2011
Priority scheduling of requests to web portals.
J. Syst. Softw., 2011
QoS enhancements and performance analysis for delay sensitive applications.
J. Comput. Syst. Sci., 2011
Controlling mean queuing delay under multi-class bursty and correlated traffic.
J. Comput. Syst. Sci., 2011
Performance modeling and evaluation of heterogeneous computer networks.
J. Comput. Syst. Sci., 2011
Adaptive decentralized re-clustering protocol for wireless sensor networks.
J. Comput. Syst. Sci., 2011
Performance Evaluation of Local and Cloud Deployment of Web Clusters.
Proceedings of the 14th International Conference on Network-Based Information Systems, 2011
Event-Based Alert Correlation System to Detect SQLI Activities.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications, 2011
2010
Performance modelling and evaluation of telecommunication systems.
Telecommun. Syst., 2010
A mathematical model for wireless channel allocation and handoff schemes.
Telecommun. Syst., 2010
Special issue on "Modeling and simulation techniques for future generation communication networks".
Simul. Model. Pract. Theory, 2010
An interactive QoS framework for fixed WiMAX networks.
Simul. Model. Pract. Theory, 2010
Performance Evaluation of Fast Handover in Mobile IPv6 Based on Link-Layer Information.
J. Syst. Softw., 2010
Energy efficient clustering protocol to enhance lifetime of wireless sensor network.
J. Ambient Intell. Humaniz. Comput., 2010
Impact of AQM scheme on WLANs using queue thresholds.
Int. J. Wirel. Mob. Comput., 2010
An Improved S-MAC Protocol Based on Parallel Transmission for Wireless Sensor Networks.
Proceedings of the 13th International Conference on Network-Based Information Systems, 2010
Synthesis of performance management mechanisms in modern e-commerce services.
Proceedings of the iiWAS'2010, 2010
Mobile IP Handoff Based Link Layer Information.
Proceedings of the 7th IEEE Consumer Communications and Networking Conference, 2010
A Formal Approach to Investigate the Performance of Modern E-commerce Services.
Proceedings of the Analytical and Stochastic Modeling Techniques and Applications, 2010
Performance Evaluation of Database Designs.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010
RED and WRED Performance Analysis Based on Superposition of N MMBP Arrival Proccess.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010
MARS: Multi-stage Attack Recognition System.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010
A Cross-Layer Decision for Mobile IP Handover.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010
Performance of Weighted Fair Queuing System with Multi-class Jobs.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010
Distributed Energy Balanced Clustering for Wireless Sensor Networks.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010
High Speed NIDS using Dynamic Cluster and Comparator Logic.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010
2009
Performance evaluation of dynamic probabilistic broadcasting for flooding in mobile ad hoc networks.
Simul. Model. Pract. Theory, 2009
Performance analysis of a threshold-based discrete-time queue using maximum entropy.
Simul. Model. Pract. Theory, 2009
Performance modelling and evaluation of telecommunication systems.
Simul. Model. Pract. Theory, 2009
Performance evaluation with different mobility models for dynamic probabilistic flooding in MANETs.
Mob. Inf. Syst., 2009
Special issue on service oriented computing and advanced network applications.
J. Netw. Comput. Appl., 2009
A class-based scheme for E-commerce web servers: Formal specification and performance evaluation.
J. Netw. Comput. Appl., 2009
Specification, standards and information management for distributed systems.
Comput. Stand. Interfaces, 2009
Delay Sensitive Aware Subframe Allocation Schema in WiMAX Base Stations.
Proceedings of the 5th IEEE International Conference on Wireless and Mobile Computing, 2009
Virtualization in Network Intrusion Detection Systems.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2009 Workshops, 2009
Performance Evaluation of Weighted Fair Queuing System Using Matrix Geometric Method.
Proceedings of the NETWORKING 2009, 2009
Energy Aware Adaptive Clustering for Wireless Sensor Networks.
Proceedings of the NBiS 2009, 2009
Smart Logic - Preventing Packet Loss in High Speed Network Intrusion Detection Systems.
Proceedings of the Information Security and Digital Forensics, 2009
Virtualization Efficacy for Network Intrusion Detection Systems in High Speed Environment.
Proceedings of the Information Security and Digital Forensics, 2009
Enhanced Mobile IP handoff using link layer information.
Proceedings of the iiWAS'2009, 2009
Bounding Queuing Delay in a Router Based on Superposition of N MMBP Arrival Process.
Proceedings of the 18th International Conference on Computer Communications and Networks, 2009
A Survey of Handoff Performance in Mobile IP.
Proceedings of the EMS 2009, 2009
Analytical Modeling of Active Queue Management under Dynamic Channel Conditions.
Proceedings of the 23rd International Conference on Advanced Information Networking and Applications, 2009
QoS Enhancements and Performance Analysis for Delay Sensitive Applications.
Proceedings of the IEEE 23rd International Conference on Advanced Information Networking and Applications, 2009
Fair and Latency Aware Uplink Scheduler In IEEE 802.16 Using Customized Deficit Round Robin.
Proceedings of the 23rd International Conference on Advanced Information Networking and Applications, 2009
Investigating Interactions between Clients and Server in the Performance Analysis of eCommerce Systems.
Proceedings of the 23rd International Conference on Advanced Information Networking and Applications, 2009
Performance Evaluation Based on Simulation of Improving Dynamic Probabilistic Flooding in MANETs.
Proceedings of the 23rd International Conference on Advanced Information Networking and Applications, 2009
Performance Analysis in AODV Based Protocols for MANETs.
Proceedings of the 23rd International Conference on Advanced Information Networking and Applications, 2009
Centralized Dynamic Clustering for Wireless Sensor Network.
Proceedings of the 23rd International Conference on Advanced Information Networking and Applications, 2009
ANFIS Based AQM Controller for Congestion Control.
Proceedings of the IEEE 23rd International Conference on Advanced Information Networking and Applications, 2009
A Comparison Between the Tunneling Process and Mapping Schemes for IPv4/IPv6 Transition.
Proceedings of the 23rd International Conference on Advanced Information Networking and Applications, 2009
An Efficient Routing Mechanism Based on Heading Angle.
Proceedings of the 23rd International Conference on Advanced Information Networking and Applications, 2009
Analysis of the Weighted Fair Queuing System with Two Classes of Customers with Finite Buffer.
Proceedings of the 23rd International Conference on Advanced Information Networking and Applications, 2009
Performance Evaluation of Secure Call Admission Control for Multiclass Internet Services.
Proceedings of the 23rd International Conference on Advanced Information Networking and Applications, 2009
Empowered Certification Authority in VANETs.
Proceedings of the 23rd International Conference on Advanced Information Networking and Applications, 2009
Evaluating Intrusion Detection Systems in High Speed Networks.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
Towards a Performance Evaluation Model for Database Designs.
Proceedings of the 2nd International Conference on Computer Science and its Applications, 2009
2008
Advances in modelling and evaluation of communication systems.
Telecommun. Syst., 2008
Design of Fuzzy Based Multi-Constrained Routing Protocol and the Performance Evaluation.
J. Interconnect. Networks, 2008
Performance analysis of multimedia based web traffic with QoS constraints.
J. Comput. Syst. Sci., 2008
Priority scheduling service for E-commerce web servers.
Inf. Syst. E Bus. Manag., 2008
Effective admission and congestion control for interconnection networks of cluster computing systems.
Int. J. High Perform. Comput. Netw., 2008
Multilayer Cluster Based Energy Efficient Routing Protocol for Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2008
Application of Queueing Network Models in the Performance Evaluation of Database Designs.
Proceedings of the Third International Workshop on the Practical Application of Stochastic Modelling, 2008
Fast Handoff Scheme Using Location Information.
Proceedings of the 10th EUROS/UKSim International Conference on Computer Modelling and Simulation, 2008
Performance Analysis of Angle Routing in MANETs.
Proceedings of the Network-Based Information Systems, 2nd International Conference, 2008
Analytical Models for Complete and Partial Channel Allocation Schemes.
Proceedings of the 17th International Conference on Computer Communications and Networks, 2008
An Integrated Uplink Scheduler in IEEE 802.16.
Proceedings of the EMS 2008, 2008
Dynamic/Static Clustering Protocol for Wireless Sensor Network.
Proceedings of the EMS 2008, 2008
Implementation of IPv4/IPv6 BDMS Translation Mechanism.
Proceedings of the EMS 2008, 2008
Evaluating BDMS and DSTM Transition Mechanisms.
Proceedings of the EMS 2008, 2008
Dynamic Probabilistic Flooding Performance Evaluation of On-Demand Routing Protocols in MANETs.
Proceedings of the Second International Conference on Complex, 2008
Pre-Emptive Channel Assignment Scheme with Fair Queue Scheduling in Evolving Mobile Networks.
Proceedings of the Second Asia International Conference on Modelling and Simulation, 2008
Performance Analysis of DSR & Extended DSR Protocols.
Proceedings of the Second Asia International Conference on Modelling and Simulation, 2008
Performance Analysis of an Efficient Flow Control Mechanism with Job Threshold in InfiniBand Networks.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008
An Analytical Model for Priority-Based AQM in the Presence of Heterogeneous Network Traffic.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008
Delay Restraining of Combined Multiple Input Cross Core Router.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008
2007
Performance Evaluation of CAC Schemes for Multi-service Traffic Environment in 3G Networks.
Simul., 2007
Performance modelling and analysis of communication systems.
Simul. Model. Pract. Theory, 2007
Performance analysis of networks of queues under active queue management scheme.
Simul. Model. Pract. Theory, 2007
Discrete-time performance analysis of a congestion control mechanism based on RED under multi-class bursty and correlated traffic.
J. Syst. Softw., 2007
Stochastic Modeling and Analysis of an Active Congestion Control Protocol under Differentiated Bursty Traffic.
J. Interconnect. Networks, 2007
Modeling and evaluation of congestion control for different classes of network traffic.
Concurr. Comput. Pract. Exp., 2007
Special Issue: Performance Analysis and Enhancements of Wireless Networks.
Concurr. Comput. Pract. Exp., 2007
Performance analysis of buffer allocation schemes under MMPP and Poisson traffic with individual thresholds.
Clust. Comput., 2007
Performance Evaluation of Dynamic Probabilistic Flooding Using Local Density Information in MANETs.
Proceedings of the Network-Based Information Systems, First International Conference, 2007
An Adaptive Call Admission Control Approach for Multimedia 3G Network.
Proceedings of the Network-Based Information Systems, First International Conference, 2007
Message from PMAC-2WN Program Co-Chairs.
Proceedings of the 13th International Conference on Parallel and Distributed Systems, 2007
Performance evaluation of dynamic probabilistic flooding under different mobility models in MANETs.
Proceedings of the 13th International Conference on Parallel and Distributed Systems, 2007
Active Queue Management Controller using Smith Predictor for Time Delay Networks.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2007
Analysis of Discrete Time Queueing Networks under Buffer Threshold Scheme.
Proceedings of the 16th International Conference on Computer Communications and Networks, 2007
An Architectural Approach for Integrating Performance Evaluation into the Systems Design Process.
Proceedings of the First Asia International Conference on Modelling and Simulation, 2007
Performance Modelling of Finite Capacity Queues with Complete Buffer Partitioning Scheme for Bursty Traffic.
Proceedings of the First Asia International Conference on Modelling and Simulation, 2007
A P2P Network Protocol for Efficient Choreography of Web Services.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007
Performance Analysis of an Active Flow Control Mechanism with Entry Threshold in InfiniBand Networks.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007
Stochastic Modeling and Analysis of GRED-I Congestion Control for Differentiated Bursty Traffic.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007
Coverage Based Intercluster Communication for Load Balancing in Wireless Sensor Networks.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007
2006
Stochastic Analysis of Deterministic Routing Algorithms in the Presence of Self-Similar Traffic.
J. Supercomput., 2006
Analysis of multiple-threshold queues for congestion control of heterogeneous traffic streams.
Simul. Model. Pract. Theory, 2006
Performance Modelling of Traffic Congestion in Wireless Networks.
J. Interconnect. Networks, 2006
Performance Analysis of Credit-Based Flow Control in InfiniBand Interconnection Networks.
J. Interconnect. Networks, 2006
Control of queueing delay in a buffer with time-varying arrival rate.
J. Comput. Syst. Sci., 2006
Performance modelling and evaluation of computer systems.
J. Comput. Syst. Sci., 2006
Mobility management for m-commerce requests in wireless cellular networks.
Inf. Syst. Frontiers, 2006
Performance evaluation of e-commerce requests in wireless cellular networks.
Inf. Softw. Technol., 2006
Modeling and Analysis of Active Queue Management Schemes under Bursty Traffic.
Int. J. Wirel. Inf. Networks, 2006
Performance Evaluation of Wireless Networks.
Int. J. Wirel. Inf. Networks, 2006
An efficient composition of Web services with active network support.
Expert Syst. Appl., 2006
Analysis of Queuing Networks with Blocking under Active Queue Management Scheme.
Proceedings of the 12th International Conference on Parallel and Distributed Systems, 2006
Efficient Scheduling of Vital E-Commerce Requests.
Proceedings of the 2006 IEEE International Conference on e-Business Engineering (ICEBE 2006), 2006
An Enhanced Congestion Control Mechanism in InfiniBand Networks for High Performance Computing Systems.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006
Modelling Active Queue Management with Different Traffic Classes.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006
Performance Analysis of Buffer Allocation Schemes under Heterogeneous Traffic with Individual Thresholds.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006
Bounding Delay through a Buffer using Dynamic Queue Thresholds.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006
2005
Performance Modelling of a Wireless 4G Cell under GPS Scheme.
Proceedings of the 2005 IEEE/IPSJ International Symposium on Applications and the Internet Workshops (SAINT 2005 Workshops), 31 January, 2005
Analysis of Threshold Based Queue with MMPP Arrival Process.
Proceedings of the Systems Communications 2005 (ICW / ICHSN / ICMCS / SENET 2005), 2005
Analysis of Discrete-Time Queues with Space and Service Priorities for Arbitrary Arrival Processes.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005
RED Based Congestion Control Mechanism for Internet Traffic at Routers.
Proceedings of the Information Networking, 2005
Analytical Modeling and Comparison of AQM-Based Congestion Control Mechanisms.
Proceedings of the High Performance Computing and Communications, 2005
Differential treatment of Web services-based collaborative applications.
Proceedings of the Ninth International Conference on Computer Supported Cooperative Work in Design, 2005
Performance Analysis Mobility Management in Heterogeneous Wireless Networks.
Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 2005
2004
Network-centric strategy for mobile transactions.
J. Interconnect. Networks, 2004
Stochastic modelling of random early detection based congestion control mechanism for bursty and correlated traffic.
IEE Proc. Softw., 2004
One-to-all broadcasting scheme for arbitrary static interconnection networks with bursty background traffic.
Concurr. Pract. Exp., 2004
Communication delay in hypercubic networks with LRD traffic.
Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), 2004
Analytical modelling of priority commit protocol for reliable Web applications.
Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), 2004
Performance Modelling of a Wireless GSM/GPRS Cell under Partial Sharing Scheme.
Proceedings of the NETWORKING 2004, 2004
A Queuing Model of Dimension-Ordered Routing under Self-Similar Traffic Loads.
Proceedings of the 18th International Parallel and Distributed Processing Symposium (IPDPS 2004), 2004
Quality Driven Web Services in Mobile Computing.
Proceedings of the 24th International Conference on Distributed Computing Systems Workshops (ICDCS 2004 Workshops), 2004
Stochastic Modelling of Maintaining Specified QoS Constraints in Discrete-Time Domain.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 2004), 2004
Performance Analysis of Congestion Control Mechanism Using Queue Thresholds Under Bursty Traffic.
Proceedings of the Universal Multiservice Networks: Third European Conference, 2004
Performance Analysis of Preemptive Resume Scheduling in Mobile Transactions.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004
Analysis of Grid Service Composition with BPEL4WS.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004
A ME-Based Approximation Model for the Performance Evaluation of Congestion Control Mechanism Using Queue Thresholds.
Proceedings of the 2004 International Conference on Computer and Information Technology (CIT 2004), 2004
2003
Analysis of GSM/GPRS Cell with Multiple Data Service Classes.
Wirel. Pers. Commun., 2003
Entropy maximisation and open queueing networks with priorities and blocking.
Perform. Evaluation, 2003
Efficient Commit Processing of Web Transactions Using Priority Scheduling Mechanism.
Proceedings of the 4th International Conference on Web Information Systems Engineering, 2003
Modelling Differentiated Services in UMTS Networks.
Proceedings of the 11th International Workshop on Modeling, 2003
One-to-All Broadcasting Scheme for Hypercubes with Background Traffic.
Proceedings of the Proceedings 36th Annual Simulation Symposium (ANSS-36 2003), Orlando, Florida, USA, March 30, 2003
2002
A Queueing Model for a Wireless GSM/GPRS Cell with Multiple Service Classes.
Proceedings of the NETWORKING 2002, 2002
Performance Analysis of GSM Cells with Re-Use Partitioning.
Proceedings of the 16<sup>th</sup> European Simulation Multiconference: Modelling and Simulation 2002, 2002
2000
A cost-effective approximation for SRD traffic in arbitrary multi-buffered networks.
Comput. Networks, 2000
1998
MEM for arbitrary closed queueing networks with RS-blocking and multiple job classes.
Ann. Oper. Res., 1998
Approximate Analysis of Arbitrary Open Networks with HOL Priorities and PBS Scheme.
Proceedings of the 12<sup>th</sup> European Simulation Multiconference - Simulation, 1998
1997
Approximate Analysis of Arbitrary QNMs with Space and Service Priorities.
Proceedings of the Performance Analysis of ATM Networks, 1997