Hamid Barati
Orcid: 0000-0003-0028-3568
According to our database1,
Hamid Barati
authored at least 38 papers
between 2015 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Clust. Comput., December, 2024
A lightweight hierarchical method for improving security in the internet of things using fuzzy logic.
Concurr. Comput. Pract. Exp., March, 2024
L2AI: lightweight three-factor authentication and authorization in IOMT blockchain-based environment.
CoRR, 2024
2023
Comput. Networks, November, 2023
Correction to: A distributed energy-efficient coverage holes detection and recovery method in wireless sensor networks using the grasshopper optimization algorithm.
J. Ambient Intell. Humaniz. Comput., October, 2023
A distributed energy-efficient coverage holes detection and recovery method in wireless sensor networks using the grasshopper optimization algorithm.
J. Ambient Intell. Humaniz. Comput., October, 2023
2022
Microprocess. Microsystems, April, 2022
An overlapping routing approach for sending data from things to the cloud inspired by fog technology in the large-scale IoT ecosystem.
Wirel. Networks, 2022
J. Supercomput., 2022
A two-level clustering based on fuzzy logic and content-based routing method in the internet of things.
Peer-to-Peer Netw. Appl., 2022
J. Parallel Distributed Comput., 2022
A cluster-based routing method with authentication capability in Vehicular Ad hoc Networks (VANETs).
J. Parallel Distributed Comput., 2022
Int. J. Commun. Syst., 2022
A hierarchical key management and authentication method for wireless sensor networks.
Int. J. Commun. Syst., 2022
J. Grid Comput., 2022
A wrapper method based on a modified two-step league championship algorithm for detecting botnets in IoT environments.
Computing, 2022
An efficient gray system theory-based routing protocol for energy consumption management in the Internet of Things using fog and cloud computing.
Computing, 2022
2021
A hierarchical secure data aggregation method using the dragonfly algorithm in wireless sensor networks.
Peer-to-Peer Netw. Appl., 2021
Multipath routing through the firefly algorithm and fuzzy logic in wireless sensor networks.
Peer-to-Peer Netw. Appl., 2021
Peer-to-Peer Netw. Appl., 2021
Secure data aggregation methods and countermeasures against various attacks in wireless sensor networks: A comprehensive review.
J. Netw. Comput. Appl., 2021
J. Ambient Intell. Humaniz. Comput., 2021
Int. J. Commun. Syst., 2021
A multi-level routing method in vehicular ad hoc networks using unnamed aerial vehicle nodes.
Int. J. Commun. Syst., 2021
Robust Image Watermarking in Wavelet Domain using GBT-DWT-SVD and Whale Optimization Algorithm.
CoRR, 2021
Computing, 2021
2020
DSKMS: a dynamic smart key management system based on fuzzy logic in wireless sensor networks.
Wirel. Networks, 2020
Wirel. Networks, 2020
EGRPM: Energy efficient geographic routing protocol based on mobile sink in wireless sensor networks.
Sustain. Comput. Informatics Syst., 2020
3DEOR: an opportunity routing protocol using evidence theory appropriate for 3D urban environments in VANETs.
IET Commun., 2020
Computing, 2020
2019
An efficient and secure RFID authentication protocol using elliptic curve cryptography.
Wirel. Networks, 2019
Distributed energy efficient algorithm for ensuring coverage of wireless sensor networks.
IET Commun., 2019
Comput. Commun., 2019
Proceedings of the 3rd International Conference on Advances in Artificial Intelligence, 2019
2017
Telecommun. Syst., 2017
2016
CGC: centralized genetic-based clustering protocol for wireless sensor networks using onion approach.
Telecommun. Syst., 2016
2015
EACHP: Energy Aware Clustering Hierarchy Protocol for Large Scale Wireless Sensor Networks.
Wirel. Pers. Commun., 2015