2024
NFTs for combating deepfakes and fake metaverse digital contents.
Internet Things, April, 2024
NFTs in Smart Cities: Vision, Applications, and Challenges.
IEEE Consumer Electron. Mag., March, 2024
Using NFTs for Product Management, Digital Certification, Trading, and Delivery in the Healthcare Supply Chain.
IEEE Trans. Engineering Management, 2024
Blockchain applications in UAV industry: Review, opportunities, and challenges.
J. Netw. Comput. Appl., 2024
Blockchain and NFT-based traceability and certification for UAV parts in manufacturing.
J. Ind. Inf. Integr., 2024
Blockchain-based trusted accountability in the maintenance of medical imaging equipment.
Expert Syst. Appl., 2024
Enhancing claustrophobia exposure therapy: A blockchain and NFT-enabled metaverse approach.
Comput. Hum. Behav., 2024
Smart agriculture assurance: IoT and blockchain for trusted sustainable produce.
Comput. Electron. Agric., 2024
Using blockchain technology to achieve sustainability in the hospitality industry by reducing food waste.
Comput. Ind. Eng., 2024
Non-fungible tokens (NFTs) for digital twins in the industrial metaverse: Overview, use cases, and open challenges.
Comput. Ind. Eng., 2024
Blockchain-Based Sustainability Index Score for Consumable Products.
IEEE Access, 2024
Accelerating Digital Twin Development With Generative AI: A Framework for 3D Modeling and Data Integration.
IEEE Access, 2024
Detection of Manufacturing Defects in Steel Using Deep Learning With Explainable Artificial Intelligence.
IEEE Access, 2024
LLM-Based Framework for Administrative Task Automation in Healthcare.
Proceedings of the 12th International Symposium on Digital Forensics and Security, 2024
2023
Metaverse applications in smart cities: Enabling technologies, opportunities, challenges, and future directions.
Internet Things, October, 2023
Blockchain and COVID-19 pandemic: applications and challenges.
Clust. Comput., August, 2023
Metaverse in Healthcare: Applications, Challenges, and Future Directions.
IEEE Consumer Electron. Mag., July, 2023
NFTs in Healthcare: Vision, Opportunities, and Challenges.
IEEE Consumer Electron. Mag., July, 2023
Blockchain for deep learning: review and open challenges.
Clust. Comput., February, 2023
Blockchain-based system for tracking and rewarding recyclable plastic waste.
Peer Peer Netw. Appl., January, 2023
CoLocateMe: Aggregation-Based, Energy, Performance and Cost Aware VM Placement and Consolidation in Heterogeneous IaaS Clouds.
IEEE Trans. Serv. Comput., 2023
Using NFTs for ownership management of digital twins and for proof of delivery of their physical assets.
Future Gener. Comput. Syst., 2023
Blockchain-Based Approach for Crop Index Insurance in Agricultural Supply Chain.
IEEE Access, 2023
NFTs for Open-Source and Commercial Software Licensing and Royalties.
IEEE Access, 2023
Using Composable NFTs for Trading and Managing Expensive Packaged Products in the Food Industry.
IEEE Access, 2023
Trusted Traceability and Certification of Refurbished Medical Devices Using Dynamic Composable NFTs.
IEEE Access, 2023
A Novel Secure and Privacy-Preserving Model for OpenID Connect Based on Blockchain.
IEEE Access, 2023
Using Blockchain for Enabling Transparent, Traceable, and Trusted University Ranking Systems.
IEEE Access, 2023
Trustworthy Healthcare Professional Credential Verification Using Blockchain Technology.
IEEE Access, 2023
NFTs for Trusted Traceability and Management of Digital Twins for Shipping Containers.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2023
2022
Blockchain-Based Digital Twins: Research Trends, Issues, and Future Challenges.
ACM Comput. Surv., January, 2022
epcAware: A Game-Based, Energy, Performance and Cost-Efficient Resource Management Technique for Multi-Access Edge Computing.
IEEE Trans. Serv. Comput., 2022
A Novel Contract Theory-Based Incentive Mechanism for Cooperative Task-Offloading in Electrical Vehicular Networks.
IEEE Trans. Intell. Transp. Syst., 2022
Blockchain for healthcare data management: opportunities, challenges, and future recommendations.
Neural Comput. Appl., 2022
Scalable blockchains - A systematic review.
Future Gener. Comput. Syst., 2022
A privacy-preserving framework for smart context-aware healthcare applications.
Trans. Emerg. Telecommun. Technol., 2022
Blockchain for Patient Safety: Use Cases, Opportunities and Open Challenges.
Data, 2022
A Blockchain-Based Regulatory Framework for mHealth.
Data, 2022
Machine Learning for Metaverse-enabled Wireless Systems: Vision, Requirements, and Challenges.
CoRR, 2022
Blockchain-based Supply Chain Traceability for COVID-19 personal protective equipment.
Comput. Ind. Eng., 2022
Blockchain-Based Traceability for the Fishery Supply Chain.
IEEE Access, 2022
Supply Chain Inventory Sharing Using Ethereum Blockchain and Smart Contracts.
IEEE Access, 2022
Blockchain and NFTs for Time-Bound Access and Monetization of Private Data.
IEEE Access, 2022
Blockchain-Based Management for Organ Donation and Transplantation.
IEEE Access, 2022
A Blockchain-Based Solution for Mitigating Overproduction and Underconsumption of Medical Supplies.
IEEE Access, 2022
Trustworthy IoT Data Streaming Using Blockchain and IPFS.
IEEE Access, 2022
Incorporating Registration, Reputation, and Incentivization Into the NFT Ecosystem.
IEEE Access, 2022
NFT-Based Traceability and Ownership Management of Medical Devices.
IEEE Access, 2022
Blockchain-Based Traceability for Shipping Containers in Unimodal and Multimodal Logistics.
IEEE Access, 2022
Using NFTs and Blockchain for Traceability and Auctioning of Shipping Containers and Cargo in Maritime Industry.
IEEE Access, 2022
Blockchain and NFTs for Trusted Ownership, Trading, and Access of AI Models.
IEEE Access, 2022
Blockchain-Based Processing of Health Insurance Claims for Prescription Drugs.
IEEE Access, 2022
NFT Certificates and Proof of Delivery for Fine Jewelry and Gemstones.
IEEE Access, 2022
Detecting Malicious URLs Using Machine Learning Techniques: Review and Research Directions.
IEEE Access, 2022
Proceedings of the IEEE High Performance Extreme Computing Conference, 2022
Blockchain-Based Decentralized Federated Learning.
Proceedings of the Fourth International Conference on Blockchain Computing and Applications, 2022
2021
Toward Offloading Internet of Vehicles Applications in 5G Networks.
IEEE Trans. Intell. Transp. Syst., 2021
TrustFed: A Framework for Fair and Trustworthy Cross-Device Federated Learning in IIoT.
IEEE Trans. Ind. Informatics, 2021
Blockchain for IoT-Based Healthcare: Background, Consensus, Platforms, and Use Cases.
IEEE Syst. J., 2021
HonestChain: Consortium blockchain for protected data sharing in health information systems.
Peer-to-Peer Netw. Appl., 2021
Blockchain Architectures for Physical Internet: A Vision, Features, Requirements, and Applications.
IEEE Netw., 2021
Blockchain for IoT-based smart cities: Recent advances, requirements, and future challenges.
J. Netw. Comput. Appl., 2021
The role of blockchain technology in telehealth and telemedicine.
Int. J. Medical Informatics, 2021
Blockchain for drug traceability: Architectures and open challenges.
Health Informatics J., 2021
Device-centric adaptive data stream management and offloading for analytics applications in future internet architectures.
Future Gener. Comput. Syst., 2021
Blockchain-based Digital Twins: Research Trends, Issues, and Future Challenges.
CoRR, 2021
Blockchain for aerospace and defense: Opportunities and open research challenges.
Comput. Ind. Eng., 2021
Blockchain-Based Solution for Product Recall Management in the Automotive Supply Chain.
IEEE Access, 2021
Automating Procurement Contracts in the Healthcare Supply Chain Using Blockchain Smart Contracts.
IEEE Access, 2021
A Blockchain-Based Approach for Drug Traceability in Healthcare Supply Chain.
IEEE Access, 2021
Blockchain-Based Solution for the Administration of Controlled Medication.
IEEE Access, 2021
Blockchain-Based Solution for Distribution and Delivery of COVID-19 Vaccines.
IEEE Access, 2021
appXchain: Application-Level Interoperability for Blockchain Networks.
IEEE Access, 2021
Blockchain-Based Management of Blood Donation.
IEEE Access, 2021
Blockchain-Enabled Telehealth Services Using Smart Contracts.
IEEE Access, 2021
COVID-19 Contact Tracing Using Blockchain.
IEEE Access, 2021
Trustworthy Blockchain Gateways for Resource-Constrained Clients and IoT Devices.
IEEE Access, 2021
Blockchain-Based Energy Trading in Electric Vehicles Using an Auctioning and Reputation Scheme.
IEEE Access, 2021
Design and Implementation of CryptoCargo: A Blockchain-Powered Smart Shipping Container for Vaccine Distribution.
IEEE Access, 2021
Blockchain-Based Decentralized Digital Manufacturing and Supply for COVID-19 Medical Devices and Supplies.
IEEE Access, 2021
Blockchain for Electric Vehicles Energy Trading: Requirements, Opportunities, and Challenges.
IEEE Access, 2021
Blockchain-Based Forward Supply Chain and Waste Management for COVID-19 Medical Equipment and Supplies.
IEEE Access, 2021
Blockchain for Waste Management in Smart Cities: A Survey.
IEEE Access, 2021
2020
Blockchain for explainable and trustworthy artificial intelligence.
WIREs Data Mining Knowl. Discov., 2020
Automating the Configuration of MapReduce: A Reinforcement Learning Scheme.
IEEE Trans. Syst. Man Cybern. Syst., 2020
Frequency-Minimal Utility-Maximal Moving Target Defense Against DDoS in SDN-Based Systems.
IEEE Trans. Netw. Serv. Manag., 2020
Trust in Blockchain Cryptocurrency Ecosystem.
IEEE Trans. Engineering Management, 2020
Blockchain for Digital Twins: Recent Advances and Future Research Challenges.
IEEE Netw., 2020
BehavDT: A Behavioral Decision Tree Learning to Build User-Centric Context-Aware Predictive Model.
Mob. Networks Appl., 2020
Cloud adoption for e-learning: Survey and future challenges.
Educ. Inf. Technol., 2020
Introduction to the special section on recent advances on blockchain infrastructures and applications.
Comput. Electr. Eng., 2020
Industrial internet of things: Recent advances, enabling technologies and open challenges.
Comput. Electr. Eng., 2020
Enhancing Vendor Managed Inventory Supply Chain Operations Using Blockchain Smart Contracts.
IEEE Access, 2020
Fully Decentralized Multi-Party Consent Management for Secure Sharing of Patient Health Records.
IEEE Access, 2020
Blockchain for Giving Patients Control Over Their Medical Records.
IEEE Access, 2020
An In-Depth Empirical Investigation of State-of-the-Art Scheduling Approaches for Cloud Computing.
IEEE Access, 2020
A Blockchain-Based Approach for the Creation of Digital Twins.
IEEE Access, 2020
Blockchain-Based Solution for COVID-19 Digital Medical Passports and Immunity Certificates.
IEEE Access, 2020
Blockchain-Based Solution for the Traceability of Spare Parts in Manufacturing.
IEEE Access, 2020
Blockchain-Based Decentralized Reverse Bidding in Fog Computing.
IEEE Access, 2020
Monetization of Services Provided by Public Fog Nodes Using Blockchain and Smart Contracts.
IEEE Access, 2020
Blockchain-Based Verifiable Tracking of Resellable Returned Drugs.
IEEE Access, 2020
Trustworthy Blockchain Oracles: Review, Comparison, and Open Research Challenges.
IEEE Access, 2020
Blockchain-Based Multi-Party Authorization for Accessing IPFS Encrypted Data.
IEEE Access, 2020
Blockchain-Based Traceability and Management for Additive Manufacturing.
IEEE Access, 2020
Blockchain Technology for Smart Grids: Decentralized NIST Conceptual Model.
IEEE Access, 2020
IPXACT-Based RTL Generation Tool.
Proceedings of the 2nd Novel Intelligent and Leading Emerging Sciences Conference, 2020
Towards Blockchain-Based Reputation-Aware Federated Learning.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
Blockchain-Based Solution for Multiple Operator Spectrum Sharing (MOSS) in 5G Networks.
Proceedings of the IEEE Globecom Workshops, 2020
IoT-Enabled Shipping Container with Environmental Monitoring and Location Tracking.
Proceedings of the IEEE 17th Annual Consumer Communications & Networking Conference, 2020
Transparent Blockchain-Based Voting System: Guide to Massive Deployments.
Proceedings of the International Conference on Advanced Intelligent Systems and Informatics, 2020
FairFed: Cross-Device Fair Federated Learning.
Proceedings of the 49th IEEE Applied Imagery Pattern Recognition Workshop, 2020
2019
The Rise of Proximal Mobile Edge Servers.
IT Prof., 2019
AppsPred: Predicting context-aware smartphone apps using random forest learning.
Internet Things, 2019
Trust management in social Internet of vehicles: Factors, challenges, blockchain, and fog solutions.
Int. J. Distributed Sens. Networks, 2019
Dynamic VM allocation and traffic control to manage QoS and energy consumption in cloud computing environment.
Int. J. Comput. Appl. Technol., 2019
Monetization of IoT data using smart contracts.
IET Networks, 2019
Performance modelling and analysis of Internet of Things enabled healthcare monitoring systems.
IET Networks, 2019
COLIDE: a collaborative intrusion detection framework for Internet of Things.
IET Networks, 2019
The role of big data analytics in industrial Internet of Things.
Future Gener. Comput. Syst., 2019
Performance analysis of content discovery for ad-hoc tactile networks.
Future Gener. Comput. Syst., 2019
Decentralized document version control using ethereum blockchain and IPFS.
Comput. Electr. Eng., 2019
An ultrafast neural network-based hardware acceleration for nonlinear systems' simulators.
Comput. Electr. Eng., 2019
Smart contract-based approach for efficient shipment management.
Comput. Ind. Eng., 2019
Blockchain for AI: Review and Open Research Challenges.
IEEE Access, 2019
Blockchain-Based Soybean Traceability in Agricultural Supply Chain.
IEEE Access, 2019
Combating Deepfake Videos Using Blockchain and Smart Contracts.
IEEE Access, 2019
IoT Public Fog Nodes Reputation System: A Decentralized Solution Using Ethereum Blockchain.
IEEE Access, 2019
Privacy Management in Social Internet of Vehicles: Review, Challenges and Blockchain Based Solutions.
IEEE Access, 2019
A Survey on Autonomic Provisioning and Management of QoS in SDN Networks.
IEEE Access, 2019
Reliable Middleware for Wireless Sensor-Actuator Networks.
IEEE Access, 2019
Development of a Generic and a Reconfigurable UVM-Based Verification Environment for SoC Buses.
Proceedings of the 31st International Conference on Microelectronics, 2019
Decentralized Access Control for IoT Data Using Blockchain and Trusted Oracles.
Proceedings of the IEEE International Conference on Industrial Internet, 2019
Cost-Performance Trade-Offs in Fog Computing for IoT Data Processing of Social Virtual Reality.
Proceedings of the IEEE International Conference on Fog Computing, 2019
Blockchain for 5G: Opportunities and Challenges.
Proceedings of the 2019 IEEE Globecom Workshops, Waikoloa, HI, USA, December 9-13, 2019, 2019
Architecture to manage Internet of Things Data using Blockchain and Fog Computing.
Proceedings of the BDIoT'19: The 4th International Conference On Big Data and Internet of Things, 2019
Proof of Concept Blockchain-based Voting System.
Proceedings of the BDIoT'19: The 4th International Conference On Big Data and Internet of Things, 2019
Exploiting Ethereum Smart Contracts for Clinical Trial Management.
Proceedings of the 16th IEEE/ACS International Conference on Computer Systems and Applications, 2019
Towards a Blockchain-Based Decentralized Reputation System for Public Fog Nodes.
Proceedings of the 16th IEEE/ACS International Conference on Computer Systems and Applications, 2019
Stateful Public-Key Encryption: A Security Solution for Resource-Constrained Environment.
Proceedings of the Advances in Cyber Security: Principles, Techniques, and Applications., 2019
2018
IoT security: Review, blockchain solutions, and open challenges.
Future Gener. Comput. Syst., 2018
Performance analysis of multi-core VMs hosting cloud SaaS applications.
Comput. Stand. Interfaces, 2018
A Review of Performance, Energy and Privacy of Intrusion Detection Systems for IoT.
CoRR, 2018
Systems and methods for SPIT detection in VoIP: Survey and future directions.
Comput. Secur., 2018
M2M-REP: Reputation system for machines in the internet of things.
Comput. Secur., 2018
Improved Session Table Architecture for Denial of Stateful Firewall Attacks.
IEEE Access, 2018
Proof of Delivery of Digital Assets Using Blockchain and Smart Contracts.
IEEE Access, 2018
Blockchain-Based Proof of Delivery of Physical Assets With Single and Multiple Transporters.
IEEE Access, 2018
Constructing Effective UVM Testbench for DRAM Memory Controllers.
Proceedings of the 2018 New Generation of CAS, 2018
Blockchain-based Ownership Management for Medical IoT (MIoT) Devices.
Proceedings of the 2018 International Conference on Innovations in Information Technology (IIT), 2018
Cloud Automation to Run Large-Scale Quantum Chemical Simulations.
Proceedings of the 2018 International Conference on Innovations in Information Technology (IIT), 2018
Automatic RTL coding correction Linting tool for critical issues.
Proceedings of the 30th International Conference on Microelectronics, 2018
HEVC Implementation for IoT Applications.
Proceedings of the 30th International Conference on Microelectronics, 2018
An Automated Lightweight UVM Tool.
Proceedings of the 30th International Conference on Microelectronics, 2018
ASIC Implementation of Energy-Optimized Successive Cancellation Polar Decoders for Internet of Things.
Proceedings of the 30th International Conference on Microelectronics, 2018
Using Blockchain for IOT Access Control and Authentication Management.
Proceedings of the Internet of Things - ICIOT 2018, 2018
IPFS-Blockchain-Based Authenticity of Online Publications.
Proceedings of the Blockchain - ICBC 2018, 2018
Blockchain-Based Solution for Proof of Delivery of Physical Assets.
Proceedings of the Blockchain - ICBC 2018, 2018
Performance Evaluation of IoT-Fag-Cloud Deployment for Healthcare servicies.
Proceedings of the 2018 4th International Conference on Cloud Computing Technologies and Applications, 2018
Internet of things: A comparative study.
Proceedings of the IEEE 8th Annual Computing and Communication Workshop and Conference, 2018
A User Authentication Scheme of IoT Devices using Blockchain-Enabled Fog Nodes.
Proceedings of the 15th IEEE/ACS International Conference on Computer Systems and Applications, 2018
2017
Analytical Model for Elastic Scaling of Cloud-Based Firewalls.
IEEE Trans. Netw. Serv. Manag., 2017
Efficient and dynamic scaling of fog nodes for IoT devices.
J. Supercomput., 2017
Formal analysis of seamless application execution in mobile cloud computing.
J. Supercomput., 2017
Performance modeling and analysis of hypoexponential network servers.
Telecommun. Syst., 2017
A novel model order reduction technique based on artificial intelligence.
Microelectron. J., 2017
Approaches to analyze cyber terrorist communities: Survey and challenges.
Comput. Secur., 2017
An innovative approach of model order reduction using ant colony optimization.
Proceedings of the 8th IEEE Annual Ubiquitous Computing, 2017
Real time embedded system IPs protection using chaotic maps.
Proceedings of the 8th IEEE Annual Ubiquitous Computing, 2017
BigCrypt for big data encryption.
Proceedings of the 2017 Fourth International Conference on Software Defined Systems, 2017
A Scattering Technique for Protecting Cryptographic Keys in the Cloud.
Proceedings of the 2nd IEEE International Workshops on Foundations and Applications of Self* Systems, 2017
Workflow Automation for Partially Hosted Cloud Services.
Proceedings of the 2nd IEEE International Workshops on Foundations and Applications of Self* Systems, 2017
A Unified UVM Architecture for Flash-Based Memory.
Proceedings of the 18th International Workshop on Microprocessor and SOC Test and Verification, 2017
A comparative analysis between FPGA and GPU for solving large numbers of linear equations.
Proceedings of the 29th International Conference on Microelectronics, 2017
Performance modeling of cloud apps using message queueing as a service (MaaS).
Proceedings of the 20th Conference on Innovations in Clouds, Internet and Networks, 2017
Stochastic modelling and analysis of cloud computing data center.
Proceedings of the 20th Conference on Innovations in Clouds, Internet and Networks, 2017
Smart auto-correction methodology using assertions and dynamic partial reconfiguration.
Proceedings of the 24th IEEE International Conference on Electronics, Circuits and Systems, 2017
A generic model order reduction technique based on Particle Swarm Optimization (PSO) algorithm.
Proceedings of the IEEE EUROCON 2017 -17th International Conference on Smart Technologies, 2017
2016
A High-Speed FPGA Implementation of an RSD-Based ECC Processor.
IEEE Trans. Very Large Scale Integr. Syst., 2016
Clustering VoIP caller for SPIT identification.
Secur. Commun. Networks, 2016
An Analytical Model for Estimating Cloud Resources of Elastic Services.
J. Netw. Syst. Manag., 2016
Securing Cryptographic Keys in the Cloud: A Survey.
IEEE Cloud Comput., 2016
An RTL power optimization technique based on System Verilog assertions.
Proceedings of the 7th IEEE Annual Ubiquitous Computing, 2016
Model order reduction using genetic algorithm.
Proceedings of the 7th IEEE Annual Ubiquitous Computing, 2016
A 65nm ASIC based 256 NIST prime field ECC processor.
Proceedings of the IEEE 59th International Midwest Symposium on Circuits and Systems, 2016
An Efficient Scenario Based Testing Methodology Using UVM.
Proceedings of the 17th International Workshop on Microprocessor and SOC Test and Verification, 2016
Coverage Closure Efficient UVM Based Generic Verification Architecture for Flash Memory Controllers.
Proceedings of the 17th International Workshop on Microprocessor and SOC Test and Verification, 2016
Subverting MAC: How authentication in mobile environment can be undermined.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016
Architectural design of a cloud-based reCAPTCHA service.
Proceedings of the 2016 12th International Conference on Innovations in Information Technology (IIT), 2016
Model order reduction using fuzzy logic algorithm.
Proceedings of the 28th International Conference on Microelectronics, 2016
A novel assertion-based CAD tool for automatic extraction of functional coverage.
Proceedings of the 28th International Conference on Microelectronics, 2016
Model order reduction using artificial neural networks.
Proceedings of the 2016 IEEE International Conference on Electronics, Circuits and Systems, 2016
Adaptive Cloud Resource Allocation scheme to minimize SLO response time violation.
Proceedings of the 13th IEEE/ACS International Conference of Computer Systems and Applications, 2016
TGV versus TSV: A comparative analysis.
Proceedings of the 3rd International Conference on Advances in Computational Tools for Engineering Applications, 2016
Lightweight Encryption for Smart Home.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016
2015
Teaching Cybersecurity Using the Cloud.
IEEE Trans. Learn. Technol., 2015
Review of Elliptic Curve Cryptography processor designs.
Microprocess. Microsystems, 2015
Gigabit Wireless Networking with IEEE 802.11ac: Technical Overview and Challenges.
J. Networks, 2015
Modelling and analysis of rule-based network security middleboxes.
IET Inf. Secur., 2015
On kernel acceleration of electromagnetic solvers via hardware emulation.
Comput. Electr. Eng., 2015
Using the Cloud to Teach Computer Networks.
Proceedings of the 8th IEEE/ACM International Conference on Utility and Cloud Computing, 2015
Securing Cryptographic Keys in the IaaS Cloud Model.
Proceedings of the 8th IEEE/ACM International Conference on Utility and Cloud Computing, 2015
New TSV-Based applications: Resonant inductive coupling, variable inductor, power amplifier, bandpass filter, and antenna.
Proceedings of the IEEE 13th International New Circuits and Systems Conference, 2015
Proceedings of the 40th IEEE Local Computer Networks Conference Workshops, 2015
An analytical model to achieve elasticity for cloud-based firewalls.
Proceedings of the 40th IEEE Conference on Local Computer Networks, 2015
Finite element emulation-based solver for electromagnetic computations.
Proceedings of the 2015 IEEE International Symposium on Circuits and Systems, 2015
Design of adiabatic TSV, SWCNT TSV, and Air-Gap Coaxial TSV.
Proceedings of the 2015 IEEE International Symposium on Circuits and Systems, 2015
A novel wavelet-based method for TSV modeling.
Proceedings of the 10th International Design & Test Symposium, 2015
A proposed methodology to improve UVM-based test generation and coverage closure.
Proceedings of the 10th International Design & Test Symposium, 2015
A SWOT analysis of TSV: Strengths, weaknesses, opportunities, and threats.
Proceedings of the 27th International Conference on Microelectronics, 2015
A Novel TSV-Based power harvesting system for low-power applications.
Proceedings of the 27th International Conference on Microelectronics, 2015
Accelerating electromagnetic simulations: A hardware emulation approach.
Proceedings of the 2015 IEEE International Conference on Electronics, 2015
A functional coverage approach for direct testing: An industrial IP as a case study.
Proceedings of the IEEE EUROCON 2015, 2015
A TSV to TSV, A TSV to Metal interconnects, and A TSV to active device coupling capacitance: Analysis and recommendations.
Proceedings of the 10th International Conference on Design & Technology of Integrated Systems in Nanoscale Era, 2015
Implementation and verification of a generic universal memory controller based on UVM.
Proceedings of the 10th International Conference on Design & Technology of Integrated Systems in Nanoscale Era, 2015
Inspection and deconfliction of published virtual machine templates' remnant data for improved assurance in public Clouds.
Proceedings of the 12th IEEE/ACS International Conference of Computer Systems and Applications, 2015
Cloud-based Arabic reCAPTCHA service: Design and architecture.
Proceedings of the 12th IEEE/ACS International Conference of Computer Systems and Applications, 2015
Experimental Proof: Data Remanence in Cloud VMs.
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015
2014
Performance Study of Mobile TV over Mobile WiMAX Considering Different Modulation and Coding Techniques.
CoRR, 2014
VDC-Analyst: Design and verification of virtual desktop cloud resource allocations.
Comput. Networks, 2014
Harnessing the cloud for teaching cybersecurity.
Proceedings of the 45th ACM Technical Symposium on Computer Science Education, 2014
Accelerating snort NIDS using NetFPGA-based Bloom filter.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2014
A novel dimensional analysis method for TSV modeling and analysis in three dimensional integrated circuits.
Proceedings of the IEEE International Symposium on Circuits and Systemss, 2014
TSV-based 3D integration fabrication technologies: An overview.
Proceedings of the 9th International Design and Test Symposium, 2014
A UVM-based smart functional verification platform: Concepts, pros, cons, and opportunities.
Proceedings of the 9th International Design and Test Symposium, 2014
Framework for a NetFPGA-based Snort NIDS.
Proceedings of the 9th International Symposium on Communication Systems, 2014
A Modbus traffic generator for evaluating the security of SCADA systems.
Proceedings of the 9th International Symposium on Communication Systems, 2014
2013
Classifying malicious activities in Honeynets using entropy and volume-based thresholds.
Secur. Commun. Networks, 2013
Performance of IP-forwarding of Linux hosts with multiple network interfaces.
J. Netw. Comput. Appl., 2013
Using Cloud Computing to Implement a Security Overlay Network.
IEEE Secur. Priv., 2013
Evaluating the Performance of IPTV over Fixed WiMAX.
CoRR, 2013
Analyzing the security of Windows 7 and Linux for cloud computing.
Comput. Secur., 2013
TSV-based on-chip inductive coupling communications.
Proceedings of the 2013 IEEE International Symposium on Circuits and Systems (ISCAS2013), 2013
Performance comparison between air-gap based coaxial TSV and conventional circular TSV in 3D-ICs.
Proceedings of the 8th International Design and Test Symposium, 2013
A TSV-based architecture for AC-DC converters.
Proceedings of the 8th International Design and Test Symposium, 2013
RSD based Karatsuba multiplier for ECC processors.
Proceedings of the 8th International Design and Test Symposium, 2013
Memory controller architectures: A comparative study.
Proceedings of the 8th International Design and Test Symposium, 2013
Network-aware resource allocation for cloud elastic applications.
Proceedings of the 20th IEEE International Conference on Electronics, 2013
An FPGA implementation of NIST 256 prime field ECC processor.
Proceedings of the 20th IEEE International Conference on Electronics, 2013
An online RTL-level scan-chain-based methodology for accelerating IP emulation debugging at run-time.
Proceedings of the 4th Annual International Conference on Energy Aware Computing Systems and Applications, 2013
Secure Framework for the Return Routability Procedure in MIPv6.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013
A macro-modeling approach for through silicon via.
Proceedings of Eurocon 2013, 2013
Achieving elasticity for cloud MapReduce jobs.
Proceedings of the IEEE 2nd International Conference on Cloud Networking, 2013
Impact of CPU Utilization Thresholds and Scaling Size on Autoscaling Cloud Resources.
Proceedings of the IEEE 5th International Conference on Cloud Computing Technology and Science, 2013
A Queueing Model to Achieve Proper Elasticity for Cloud Cluster Jobs.
Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, June 28, 2013
2012
Performance Modeling and Analysis of Network Firewalls.
IEEE Trans. Netw. Serv. Manag., 2012
Mitigating starvation of Linux CPU-bound processes in the presence of network I/O.
J. Syst. Softw., 2012
Video-on-Demand (VoD) deployment over hospitality networks.
Int. J. Netw. Manag., 2012
Mitigation of DHCP starvation attack.
Comput. Electr. Eng., 2012
Assessing Overhead Cost Associated with Encrypting Swap File.
Proceedings of the 11th IEEE International Conference on Trust, 2012
Enhanced EDoS-Shield for Mitigating EDoS Attacks Originating from Spoofed IP Addresses.
Proceedings of the 11th IEEE International Conference on Trust, 2012
A closed form expression for TSV-based on-chip spiral inductor.
Proceedings of the 2012 IEEE International Symposium on Circuits and Systems, 2012
Modeling and analysis of through silicon via: Electromagnetic and device simulation approach.
Proceedings of the 19th IEEE International Conference on Electronics, Circuits and Systems, 2012
Analysis of coupling capacitance between TSVs and metal interconnects in 3D-ICs.
Proceedings of the 19th IEEE International Conference on Electronics, Circuits and Systems, 2012
Effect of non-uniform substrate doping profile on the electrical performance of through-silicon-via for low power application.
Proceedings of the International Conference on Energy Aware Computing, 2012
Estimating service response time for elastic cloud applications.
Proceedings of the 1st IEEE International Conference on Cloud Networking, 2012
2011
A potential low-rate DoS attack against network firewalls.
Secur. Commun. Networks, 2011
Performance Evaluation of Snort under Windows 7 and Windows Server 2008.
J. Univers. Comput. Sci., 2011
Statistical analysis of H.264 video frame size distribution.
IET Commun., 2011
On Linux starvation of CPU-bound processes in the presence of network I/O.
Comput. Electr. Eng., 2011
Analysis of a two-stage network server.
Appl. Math. Comput., 2011
EDoS-Shield - A Two-Steps Mitigation Technique against EDoS Attacks in Cloud Computing.
Proceedings of the IEEE 4th International Conference on Utility and Cloud Computing, 2011
Compact lumped element model for TSV in 3D-ICs.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2011), 2011
Performance evaluation of popular Cloud IaaS providers.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011
A unified countermeasure against side channel attacks on cryptographic RFID.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011
Evaluation of popular application sandboxing.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011
On the security of inclusion or omission of MixColumns in AES cipher.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011
Identifying Scanning Activities in Honeynet Data Using Data Mining.
Proceedings of the Third International Conference on Computational Intelligence, 2011
Identifying network traffic features suitable for honeynet data analysis.
Proceedings of the 24th Canadian Conference on Electrical and Computer Engineering, 2011
Equivalent lumped element models for various n-port Through Silicon Vias networks.
Proceedings of the 16th Asia South Pacific Design Automation Conference, 2011
2010
Impact of CPU-bound Processes on IP Forwarding of Linux and Windows XP.
J. Univers. Comput. Sci., 2010
Performance evaluation comparison of Snort NIDS under Linux and Windows Server.
J. Netw. Comput. Appl., 2010
Discovering last-matching rules in popular open-source and commercial firewalls.
Int. J. Internet Protoc. Technol., 2010
Distributed security for multi-agent systems - review and applications.
IET Inf. Secur., 2010
Multi-Agent pattern recognition mechanism for detecting distributed denial of service attacks.
IET Inf. Secur., 2010
On the performance of IP-forwarding for multicore multiprocessor Linux hosts.
IET Commun., 2010
Modeling and analysis of PC-based software routers.
Comput. Commun., 2010
Queuing Analysis of Network Firewalls.
Proceedings of the Global Communications Conference, 2010
2009
Comparative packet-forwarding measurement of three popular operating systems.
J. Netw. Comput. Appl., 2009
An analytical simulator for deploying IP telephony.
Int. J. Netw. Manag., 2009
Improving snort performance under linux.
IET Commun., 2009
Implementation and experimental performance evaluation of a hybrid interrupt-handling scheme.
Comput. Commun., 2009
Resiliency of open-source firewalls against remote discovery of last-matching rules.
Proceedings of the 2nd International Conference on Security of Information and Networks, 2009
An Entropy-Based Countermeasure against Intelligent DoS Attacks Targeting Firewalls.
Proceedings of the POLICY 2009, 2009
2008
Assessing readiness of IP networks to support desktop videoconferencing using OPNET.
J. Netw. Comput. Appl., 2008
On the performance of a simple packet rate estimator.
Proceedings of the 6th ACS/IEEE International Conference on Computer Systems and Applications, 2008
2007
Throughput and delay analysis of interrupt-driven kernels under Poisson and bursty traffic.
Comput. Syst. Sci. Eng., 2007
Performance analysis and comparison of interrupt-handling schemes in gigabit networks.
Comput. Commun., 2007
Modeling and Analysis of Interrupt Disable-Enable Scheme.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007
2006
Throughput-delay analysis of interrupt-driven kernels with DMA enabled and disabled in high-speed networks.
J. High Speed Networks, 2006
On the accuracy of two analytical models for evaluating the performance of Gigabit Ethernet hosts.
Inf. Sci., 2006
An OPNET-based simulation approach for deploying VoIP.
Int. J. Netw. Manag., 2006
On the deployment of VoIP in Ethernet networks: methodology and case study.
Comput. Commun., 2006
An Analytical Tool to Assess Readiness of Existing Networks for Deploying IP Telephony.
Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC 2006), 2006
2005
Modeling and Analysis of Application Throughput in Gigabit Networks.
Int. J. Comput. Their Appl., 2005
Integrated performance evaluating criterion for selecting between interrupt coalescing and normal interruption.
Int. J. High Perform. Comput. Netw., 2005
Analysis and simulation of interrupt overhead impact on OS throughput in high-speed networks.
Int. J. Commun. Syst., 2005
An Analytical Model for Evaluating Interrupt-Driven System Performance of Gigabit Ethernet Hosts with Finite Buffer.
Proceedings of the 10th IEEE Symposium on Computers and Communications (ISCC 2005), 2005
2003
Evaluating System Performance in Gigabit Networks.
Proceedings of the 28th Annual IEEE Conference on Local Computer Networks (LCN 2003), 2003
Performance evaluation of interrupt-driven kernels in gigabit networks.
Proceedings of the Global Telecommunications Conference, 2003
Modeling and Analysis of OS Performance in High-Speed Networks.
Proceedings of the International Conference on Communications in Computing, 2003
1999
Periodic Route Optimization for Handed-Off Connections in Wireless ATM Networks.
Proceedings of the Proceedings 26th Conference on Local Computer Networks, 1999
1998
A Two-Phase Inter-Switch Handoff Scheme for Wireless ATM Networks.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1998), 1998