Isaac Woungang

Orcid: 0000-0003-2484-4649

Affiliations:
  • Toronto Metropolitan University, Canada


According to our database1, Isaac Woungang authored at least 255 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A network communication speedup model using multiple fungible and non-fungible paths.
Internet Things, April, 2024

Survey on securing wireless networks through a blockchain-based framework.
J. High Speed Networks, 2024

Energy efficient random forest classifier-based secure routing for opportunistic internet of things.
Int. J. Ad Hoc Ubiquitous Comput., 2024

Science-Informed Deep Learning (ScIDL) With Applications to Wireless Communications.
CoRR, 2024

Video-Language Critic: Transferable Reward Functions for Language-Conditioned Robotics.
CoRR, 2024

A Graph Clustering-Based Network Anomaly Detection System.
Proceedings of the 20th International Conference on Wireless and Mobile Computing, 2024

A Graph Convolutional Networks-Based DDoS Detection Model.
Proceedings of the IEEE International Systems Conference, 2024

Federated Learning Empowered Routing for Opportunistic Network Environments.
Proceedings of the IEEE International Conference on Communications Workshops, 2024

Deep Graph Learning for DDoS Detection and Multi-Class Classification IDS.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2024

Optical-computing-enabled Network: A New Dawn for Optical-layer Intelligence?
Proceedings of the 8th Asia-Pacific Workshop on Networking, 2024

Game Theory-Based Efficient Message Forwarding Scheme for Opportunistic Networks.
Proceedings of the Advanced Information Networking and Applications, 2024

On Network Design and Planning 2.0 for Optical-Computing-Enabled Networks.
Proceedings of the Advanced Information Networking and Applications, 2024

2023
Admission and Placement Policies for Latency-Compliant Secure Services in 5G Edge-Cloud System.
IEEE Syst. J., June, 2023

Resource allocation and user assignment schemes in cellular supported industrial IoT networks.
Trans. Emerg. Telecommun. Technol., June, 2023

A Resource Allocation Policy for Downlink Communication in Distributed IRS Aided Multiple-Input Single-Output Systems.
IEEE Trans. Commun., April, 2023

Multi-Agent DRL Approach for Energy-Efficient Resource Allocation in URLLC-Enabled Grant-Free NOMA Systems.
IEEE Open J. Commun. Soc., 2023

Double Q-learning based routing protocol for opportunistic networks.
J. High Speed Networks, 2023

A hybrid channel transmission method for effective spectrum access in cognitive radio networks.
Int. J. Ad Hoc Ubiquitous Comput., 2023

User Association Performance Trade-Offs in Integrated RF/mmWave/THz Communications.
Future Internet, 2023

Towards Optimal Association of Coexisting RF, THz and mmWave Users in 6G Networks.
Proceedings of the 34th IEEE Annual International Symposium on Personal, 2023

An Analysis of Theoretical Network Communication Speedup Using Multiple Fungible Paths.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2023

Network Anomaly Detection Using a Graph Neural Network.
Proceedings of the International Conference on Computing, Networking and Communications, 2023

Post-Quantum Based Oblivious Transfer for Authentication in Heterogeneous Internet of Everything.
Proceedings of the IEEE International Conference on Communications, 2023

Deep Q-Network Dueling-Based Opportunistic Data Transmission in Blockchain-Enabled M2M Communication.
Proceedings of the IEEE Global Communications Conference, 2023

A Model to Estimate the Minimum Data Transmission Time in IoT Networks Using Multiple Fungible Paths.
Proceedings of the Advances on Broad-Band and Wireless Computing, Communication and Applications, 2023

Bonet Detection Mechanism Using Graph Neural Network.
Proceedings of the Advanced Information Networking and Applications, 2023

Bandit Algorithms Applied in Online Advertisement to Evaluate Click-Through Rates.
Proceedings of the IEEE AFRICON 2023, Nairobi, Kenya, September 20-22, 2023, 2023

2022
Cloud Firewall Under Bursty and Correlated Data Traffic: A Theoretical Analysis.
IEEE Trans. Cloud Comput., 2022

PINE: Post-Quantum Based Incentive Technique for Non-Cooperating Nodes in Internet of Everything.
Sensors, 2022

Predictive intelligence in secure data processing, management, and forecasting.
Inf. Process. Manag., 2022

A jamming attack detection technique for opportunistic networks.
Internet Things, 2022

Channel Allocation in Cognitive Radio Networks: A Game-Theoretic Approach.
Proceedings of the Advances in Network-Based Information Systems, 2022

Multivariate Gaussian Mixture-based Prediction Model for Opportunistic Networks.
Proceedings of the IEEE International Conference on Communications, 2022

Edge-Assisted Secure and Dependable Optimal Policies for the 5G Cloudified Infrastructure.
Proceedings of the IEEE International Conference on Communications, 2022

Reinforcement Learning Based Congestion Control Mechanism for Opportunistic Networks.
Proceedings of the IEEE Globecom 2022 Workshops, 2022

Intrusion Detection using a Graphical Fingerprint Model.
Proceedings of the 22nd IEEE International Symposium on Cluster, 2022

Geocommunity Based Data Forwarding in Social Delay Tolerant Networks.
Proceedings of the Advances in Computing, Informatics, Networking and Cybersecurity, 2022

Game Theory-Based Energy Efficient Routing in Opportunistic Networks.
Proceedings of the Advanced Information Networking and Applications, 2022

2021
Short-Packet Communications for MIMO NOMA Systems Over Nakagami-m Fading: BLER and Minimum Blocklength Analysis.
IEEE Trans. Veh. Technol., 2021

Energy Efficient Downlink Resource Allocation in Cellular IoT Supported H-CRANs.
IEEE Trans. Veh. Technol., 2021

Optimal Security Risk Management Mechanism for the 5G Cloudified Infrastructure.
IEEE Trans. Netw. Serv. Manag., 2021

Optimal Security-Aware Virtual Machine Management for Mobile Edge Computing Over 5G Networks.
IEEE Syst. J., 2021

Securing Opportunistic Networks: An Encounter-based Trust-driven Barter Mechanism.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2021

Preventing Data Loss by Harnessing Semantic Similarity and Relevance.
J. Internet Serv. Inf. Secur., 2021

A fuzzy-based check-and-spray geocast routing protocol for opportunistic networks.
J. High Speed Networks, 2021

Internet of Things Design, Architectures and Protocols.
Internet Things, 2021

Reinforcement learning-based fuzzy geocast routing protocol for opportunistic networks.
Internet Things, 2021

Preventing Data Leak through Semantic Analysis.
Internet Things, 2021

Random forest classifier-based safe and reliable routing for opportunistic IoT networks.
Int. J. Commun. Syst., 2021

Q-Learning-Based SCMA for Efficient Random Access in mMTC Networks With Short Packets.
Proceedings of the 32nd IEEE Annual International Symposium on Personal, 2021

Unsupervised Anomaly Detection Using a New Knowledge Graph Model for Network Activity and Events.
Proceedings of the Machine Learning for Networking - 4th International Conference, 2021

Energy Efficient Multi-Objectives Optimized Routing for Opportunistic Networks.
Proceedings of the ICC 2021, 2021

Learning-Based Multiplexing of Grant-Based and Grant-Free Heterogeneous Services with Short Packets.
Proceedings of the IEEE Global Communications Conference, 2021

Energy-Efficient Fuzzy Geocast Routing Protocol for Opportunistic Networks.
Proceedings of the Advanced Information Networking and Applications, 2021

2020
Efficient Resource Allocation in SCMA-Enabled Device-to-Device Communication for 5G Networks.
IEEE Trans. Veh. Technol., 2020

Towards an Epidemic SMS-based Cellular Botnet.
J. Internet Serv. Inf. Secur., 2020

Pareto set based optimized routing in opportunistic network.
J. Ambient Intell. Humaniz. Comput., 2020

Energy-Efficient Check-and-Spray Geocast Routing Protocol for Opportunistic Networks.
Inf., 2020

Policies and mechanisms for enhancing the resource management in cloud computing: a performance perspective.
Int. J. Grid Util. Comput., 2020

An SDN approach to route massive data flows of sensor networks.
Int. J. Commun. Syst., 2020

Message trust-based secure multipath routing protocol for opportunistic networks.
Int. J. Commun. Syst., 2020

Toward Tactile Internet in Beyond 5G Era: Recent Advances, Current Issues, and Future Directions.
IEEE Access, 2020

Energy Efficient SCMA Supported Downlink Cloud-RANs for 5G Networks.
IEEE Access, 2020

When Agile Security Meets 5G.
IEEE Access, 2020

Malware Detection Using Machine Learning Models.
Proceedings of the Advances in Networked-Based Information Systems, 2020

Tsunami Prediction and Impact Estimation using Classifiers on Historical Data.
Proceedings of the International Conference on Intelligent Data Science Technologies and Applications, 2020

Reinforcement Learning-Based Routing Protocol for Opportunistic Networks.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Optimal Security Cost for Latency-Aware Service Provisioning in Mobile Edge Computing.
Proceedings of the International Conference on Communications, 2020

A RSA-Biometric Based User Authentication Scheme for Smart Homes Using Smartphones.
Proceedings of the Advanced Information Networking and Applications, 2020

2019
Two-Tier Architecture for Spectrum Auction in SDN-Enabled Cloud Radio Access Network.
IEEE Trans. Veh. Technol., 2019

Mobile Cloud Storage Over 5G: A Mechanism Design Approach.
IEEE Syst. J., 2019

Anonymous mutual IoT interdevice authentication and key agreement scheme based on the ZigBee technique.
Internet Things, 2019

Joint optimisation of radio and infrastructure resources for energy-efficient massive data storage in the mobile cloud over 5G HetNet.
IET Wirel. Sens. Syst., 2019

Energy aware routing for efficient green communication in opportunistic networks.
IET Networks, 2019

T_CAFE: A Trust based Security approach for Opportunistic IoT.
IET Commun., 2019

Towards Tactile Internet in Beyond 5G Era: Recent Advances, Current Issues and Future Directions.
CoRR, 2019

Data Loss Prevention Using Document Semantic Signature.
Proceedings of the 2nd International Conference on Wireless Intelligent and Distributed Environment for Communication, 2019

Arguments Against Using the 1998 DARPA Dataset for Cloud IDS Design and Evaluation and Some Alternative.
Proceedings of the Machine Learning for Networking, 2019

Design and Implementation of a Lightweight Authentication Framework for the Internet of Things (IoT).
Proceedings of the Sixth International Conference on Internet of Things: Systems, 2019

Fetal Birth Weight Estimation in High-Risk Pregnancies Through Machine Learning Techniques.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Priority Based Buffer Management Technique for Opportunistic Networks.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Anonymous IoT Mutual Inter-Device Authentication Scheme Based on Incremental Counter (AIMIA-IC).
Proceedings of the 7th International Conference on Future Internet of Things and Cloud, 2019

Fuzzy Geocasting in Opportunistic Networks.
Proceedings of the Advances on Broad-Band Wireless Computing, Communication and Applications, 2019

Centrality Based Geocasting for Opportunistic Networks.
Proceedings of the Advanced Information Networking and Applications, 2019

An Efficient Data Transmission Technique for Big Video Files over HetNet in Emerging 5G Networks.
Proceedings of the Advanced Information Networking and Applications, 2019

Geometric Shapes-based PSO Approach for Routing in Vehicular Networks.
Proceedings of the 2019 IEEE AFRICON, Accra, Ghana, September 25-27, 2019, 2019

2018
A genetic algorithm-based method for optimizing the energy consumption and performance of multiprocessor systems.
Soft Comput., 2018

A Machine Learning-Based Protocol for Efficient Routing in Opportunistic Networks.
IEEE Syst. J., 2018

Special Issue on security and privacy in Internet of Things and cloud computing systems.
Secur. Priv., 2018

Passphrase protected device-to-device mutual authentication schemes for smart homes.
Secur. Priv., 2018

A location Prediction-based routing scheme for opportunistic networks in an IoT scenario.
J. Parallel Distributed Comput., 2018

DEEP: Distance and encounter based energy-efficient protocol for opportunistic networks.
J. High Speed Networks, 2018

Analysis of joint parallelism in wireless and cloud domains on mobile edge computing over 5G systems.
J. Commun. Networks, 2018

A multi-objectives based technique for optimized routing in opportunistic networks.
J. Ambient Intell. Humaniz. Comput., 2018

On the target channel sequence selection for multiple handoffs in cognitive radio-based wireless regional area networks.
Int. J. Space Based Situated Comput., 2018

A survey of overlay and underlay paradigms in cognitive radio networks.
Int. J. Commun. Syst., 2018

A user-centric cooperative edge caching scheme for minimizing delay in 5G content delivery networks.
Trans. Emerg. Telecommun. Technol., 2018

Subcarriers assignment scheme for multiple secondary users in OFDMA-based IEEE 802.22 WRAN: A game theoretic approach.
Trans. Emerg. Telecommun. Technol., 2018

Energy Efficiency on Fully Cloudified Mobile Networks: Survey, Challenges, and Open Issues.
IEEE Commun. Surv. Tutorials, 2018

Design and Analysis of a Survivable ATM Network.
Proceedings of the International Conference on Learning and Optimization Algorithms: Theory and Applications, 2018

Railways Networks - Challenges for IoT Underground Wireless Communications.
Proceedings of the 10th IEEE Latin-American Conference on Communications, 2018

An RSA-Based User Authentication Scheme for Smart-Homes Using Smart Card.
Proceedings of the Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments, 2018

Fair sub-carrier allocation in OFDMA and cognitive radio based IEEE 802.22 WRAN.
Proceedings of the IEEE INFOCOM 2018, 2018

Proactive Decision Based Handoff Scheme for Cognitive Radio Networks.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

An Energy-Efficient Location Prediction-Based Forwarding Scheme for Opportunistic Networks.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Performance Evaluation of LTE and 5G Modeling over OFDM and GFDM Physical Layers.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Optimal Secondary Users Selection for Cooperative Spectrum Sensing in Cognitive Radio Networks.
Proceedings of the IEEE Globecom Workshops, 2018

Online Signature Verification Using the Information Set Based Models.
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018

2017
An ant-based QoS-aware routing protocol for heterogeneous wireless sensor networks.
Soft Comput., 2017

Intercloud and HetNet for Mobile Cloud Computing in 5G Systems: Design Issues, Challenges, and Optimization.
IEEE Netw., 2017

A* search based next hop selection for routing in opportunistic networks.
Int. J. Space Based Situated Comput., 2017

An altruism-based trust-dependent message forwarding protocol for opportunistic networks.
Int. J. Commun. Syst., 2017

An energy-efficient history-based routing scheme for opportunistic networks.
Int. J. Commun. Syst., 2017

Authorship verification using deep belief network systems.
Int. J. Commun. Syst., 2017

Security threats in M2M networks: a survey with case study.
Comput. Syst. Sci. Eng., 2017

A game theoretic context-based routing protocol for opportunistic networks in an IoT scenario.
Comput. Networks, 2017

GD-CAR: A Genetic Algorithm Based Dynamic Context Aware Routing Protocol for Opportunistic Networks.
Proceedings of the Advances in Network-Based Information Systems, 2017

An Inter-device Authentication Scheme for Smart Homes Using One-Time-Password Over Infrared Channel.
Proceedings of the Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments, 2017

Holistic Model for HTTP Botnet Detection Based on DNS Traffic Analysis.
Proceedings of the Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments, 2017

A Semi-Markov Decision Model-based brokering mechanism for mobile cloud market.
Proceedings of the IEEE International Conference on Communications, 2017

Performance Assessment of Decision Tree-Based Predictive Classifiers for Risk Pregnancy Care.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Game Theoretic Analysis of Post Handoff Target Channel Sharing in Cognitive Radio Networks.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Energy-Efficient Prophet-PRoWait-EDR Protocols for Opportunistic Networks.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Interference Aware Metric-Based Routing Protocol in Cognitive Radio Networks.
Proceedings of the Advances on Broad-Band Wireless Computing, 2017

Supernova and Hypernova Misbehavior Detection Scheme for Opportunistic Networks.
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, 2017

2016
QoS-Aware Energy-Efficient Joint Radio Resource Management in Multi-RAT Heterogeneous Networks.
IEEE Trans. Veh. Technol., 2016

A DSR-based routing protocol for mitigating blackhole attacks on mobile ad hoc networks.
Secur. Commun. Networks, 2016

Impact Study of a Mobile Botnet over LTE Networks.
J. Internet Serv. Inf. Secur., 2016

Secure image deduplication through image compression.
J. Inf. Secur. Appl., 2016

Co-tier downlink interference management in dense femtocell networks.
Int. J. Commun. Syst., 2016

Innovative security technologies against insider threats and data leakage.
Int. J. Comput. Math., 2016

Guest Editorial.
IET Inf. Secur., 2016

Introduction to the special section on cognitive radios as next-generation wireless networks.
Comput. Electr. Eng., 2016

Node Placement in Wireless Mesh Networks: A Comparison Study of WMN-SA and WMN-PSO Simulation Systems.
Proceedings of the 19th International Conference on Network-Based Information Systems, 2016

Power Control Scheme for Underlay Approach in Cognitive Radio Networks.
Proceedings of the 19th International Conference on Network-Based Information Systems, 2016

Impact of base transceiver station selection mechanisms on a mobile botnet over a LTE network.
Proceedings of the 11th International Conference on Malicious and Unwanted Software, 2016

An Energy-Efficient Routing Protocol for Infrastructure-Less Opportunistic Networks.
Proceedings of the 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2016

Graph colouring technique for efficient channel allocation in cognitive radio networks.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Efficient Ubiquitous Big Data Storage Strategy for Mobile Cloud Computing over HetNet.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Game Theory-Based Channel Allocation in Cognitive Radio Networks.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Investigation of Fitness Function Weight-Coefficients for Optimization in WMN-PSO Simulation System.
Proceedings of the 10th International Conference on Complex, 2016

Experimental Results of a Raspberry Pi Based Wireless Mesh Network Testbed Considering TCP and LoS Scenario.
Proceedings of the 10th International Conference on Complex, 2016

Performance Evaluation of an Ambient Intelligence Testbed for Improving Quality of Life: Evaluation Using Clustering Approach.
Proceedings of the 10th International Conference on Complex, 2016

A Centrality-Based History Prediction Routing Protocol for Opportunistic Networks.
Proceedings of the 10th International Conference on Complex, 2016

An efficient method for mobile big data transfer over HetNet in emerging 5G systems.
Proceedings of the 21st IEEE International Workshop on Computer Aided Modelling and Design of Communication Links and Networks, 2016

A Probabilistic Encounter and Distance-based Routing Protocol for Opportunistic Networks.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

EDR: An Encounter and Distance Based Routing Protocol for Opportunistic Networks.
Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications, 2016

2015
An energy-efficient utility-based distributed data routing scheme for heterogenous sensor networks.
Wirel. Commun. Mob. Comput., 2015

Efficient routing based on past information to predict the future location for message passing in infrastructure-less opportunistic networks.
J. Supercomput., 2015

MR-Chord: Improved Chord Lookup Performance in Structured Mobile P2P Networks.
IEEE Syst. J., 2015

A Distributed Adaptive Admission Control Scheme for Multimedia Wireless Mesh Networks.
IEEE Syst. J., 2015

Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach.
IEEE Syst. J., 2015

Integration of Fixed and Mobile Infrastructure for Message Passing in Opportunistic Networks.
J. Networks, 2015

Authorship verification of e-mail and tweet messages applied for continuous authentication.
J. Comput. Syst. Sci., 2015

An optimizing pipeline stall reduction algorithm for power and performance on multi-core CPUs.
Hum. centric Comput. Inf. Sci., 2015

An energy-delay product study on chip multi-processors for variable stage pipelining.
Hum. centric Comput. Inf. Sci., 2015

Erratum to: An optimizing pipeline stall reduction algorithm for power and performance on multi-core CPUs.
Hum. centric Comput. Inf. Sci., 2015

A Centrality-Based ACK Forwarding Mechanism for Efficient Routing in Infrastructureless Opportunistic Networks.
Proceedings of the Internet of Things. IoT Infrastructures, 2015

Optimal Cloud Broker Method for Cloud Selection in Mobile Inter-cloud Computing.
Proceedings of the 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2015

Wormhole prevention using COTA mechanism in position based environment over MANETs.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Modified Floyd-Warshall algorithm for equal cost multipath in software-defined data center.
Proceedings of the IEEE International Conference on Communication, 2015

Markovian Model Based Channel Allocation in Cognitive Radio Networks.
Proceedings of the IEEE International Conference on Data Science and Data Intensive Systems, 2015

A Secure Video Deduplication Scheme in Cloud Storage Environments Using H.264 Compression.
Proceedings of the First IEEE International Conference on Big Data Computing Service and Applications, 2015

Proof of Storage for Video Deduplication in the Cloud.
Proceedings of the 2015 IEEE International Congress on Big Data, New York City, NY, USA, June 27, 2015

An Analysis of Machine-Type-Communication on Human-Type-Communication over Wireless Communication Networks.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015

Base Station Selection in M2M Communication Using Q-Learning Algorithm in LTE-A Networks.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

E-MAnt Net: An ACO-Based Energy Efficient Routing Protocol for Mobile Ad Hoc Networks.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

2014
Ant Colony Optimization Based Sub-channel Allocation Algorithm for Small Cell HetNets.
Wirel. Pers. Commun., 2014

A schedule-based medium access control protocol for mobile wireless sensor networks.
Wirel. Commun. Mob. Comput., 2014

Utility-driven construction of balanced data routing trees in wireless sensor networks.
Wirel. Commun. Mob. Comput., 2014

Analysis of Sub-Band Allocation in Multi-Service Cognitive Radio Access Networks.
IEEE Wirel. Commun. Lett., 2014

A comparative simulation study on the power-performance of multi-core architecture.
J. Supercomput., 2014

An analytical study of resource division and its impact on power and performance of multi-core processors.
J. Supercomput., 2014

GAER: genetic algorithm-based energy-efficient routing protocol for infrastructure-less opportunistic networks.
J. Supercomput., 2014

A cryptography-based protocol against packet dropping and message tampering attacks on mobile ad hoc networks.
Secur. Commun. Networks, 2014

Online risk-based authentication using behavioral biometrics.
Multim. Tools Appl., 2014

Verifying Online User Identity using Stylometric Analysis for Short Messages.
J. Networks, 2014

Fault tolerant, energy efficient and secure clustering scheme for mobile machine-to-machine communications.
Trans. Emerg. Telecommun. Technol., 2014

A cluster-based load balancing algorithm in cloud computing.
Proceedings of the IEEE International Conference on Communications, 2014

Proof of Retrieval and Ownership Protocols for Images through SPIHT Compression.
Proceedings of the 2014 IEEE International Conference on High Performance Computing and Communications, 2014

C-SCAN: An Energy-Efficient Network Layer Security Protocol for Mobile Ad Hoc Networks.
Proceedings of the 28th International Conference on Advanced Information Networking and Applications Workshops, 2014

Toward a Framework for Continuous Authentication Using Stylometry.
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014

2013
An ant-swarm inspired dynamic multiresolution data dissemination protocol for wireless sensor networks.
J. Supercomput., 2013

EOBDBR: an Efficient Optimum Branching-Based Distributed Broadcast Routing protocol for wireless ad hoc networks.
Telecommun. Syst., 2013

Biometric Authentication Using Mouse Gesture Dynamics.
IEEE Syst. J., 2013

Energy-based Performance Evaluation of Various Routing Protocols in Infrastructure-less Opportunistic Networks.
J. Internet Serv. Inf. Secur., 2013

A semi-Markov decision process-based joint call admission control for inter-RAT cell re-selection in next generation wireless networks.
Comput. Networks, 2013

Introduction to Special issue on Recent Advanced Technologies and Theories for Grid and Cloud Computing.
Comput. Electr. Eng., 2013

Trust-based Security Protocol against blackhole attacks in opportunistic networks.
Proceedings of the 9th IEEE International Conference on Wireless and Mobile Computing, 2013

Mobility Models-Based Performance Evaluation of the History Based Prediction for Routing Protocol for Infrastructure-Less Opportunistic Networks.
Proceedings of the Mobile and Ubiquitous Systems: Computing, Networking, and Services, 2013

An ant-swarm inspired energy-efficient ad hoc on-demand routing protocol for mobile ad hoc networks.
Proceedings of IEEE International Conference on Communications, 2013

An Energy-Aware Secured Routing Protocol for Mobile Ad Hoc Networks Using Trust-Based Multipath.
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013

An Optimal Radio Access Network Selection Method for Heterogeneous Wireless Networks.
Proceedings of the Grid and Pervasive Computing - 8th International Conference, 2013

An energy efficient, fault tolerant and secure clustering scheme for M2M communication networks.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2013

A timed and secured monitoring implementation against wormhole attacks in AODV-based Mobile Ad Hoc Networks.
Proceedings of the International Conference on Computer, 2013

A joint call admission control-based approach for initial RAT selection in HetNets.
Proceedings of the International Conference on Computer, 2013

Authorship verification for short messages using stylometry.
Proceedings of the International Conference on Computer, 2013

Proof of retrieval and ownership protocols for enterprise-level data deduplication.
Proceedings of the Center for Advanced Studies on Collaborative Research, 2013

A Priority Based Differentiation for Contention Mechanism in Legacy DCF Method.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

GAODV: A Modified AODV Against Single and Collaborative Black Hole Attacks in MANETs.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

HBPR: History Based Prediction for Routing in Infrastructure-less Opportunistic Networks.
Proceedings of the 27th IEEE International Conference on Advanced Information Networking and Applications, 2013

Secure Enterprise Data Deduplication in the Cloud.
Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, June 28, 2013

2012
Performance of a Distributed Full Inversion Power Control and Base Station Assignment Scheme in a Cellular CDMA Network with Hot-spots.
Wirel. Pers. Commun., 2012

Dynamic Sample Size Detection in Learning Command Line Sequence for Continuous Authentication.
IEEE Trans. Syst. Man Cybern. Part B, 2012

Energy-efficient tasks scheduling algorithm for real-time multiprocessor embedded systems.
J. Supercomput., 2012

Revisiting relative neighborhood graph-based broadcasting algorithms for multimedia ad hoc wireless networks.
J. Supercomput., 2012

Coding-error based defects in enterprise resource planning software: Prevention, discovery, elimination and mitigation.
J. Syst. Softw., 2012

Software Performance Modeling using the UML: a Case Study.
J. Networks, 2012

Ubiquitous computing for communications and broadcasting.
Int. J. Commun. Syst., 2012

A secure data deduplication framework for cloud environments.
Proceedings of the Tenth Annual International Conference on Privacy, Security and Trust, 2012

Trust-enhanced message security protocol for mobile ad hoc networks.
Proceedings of IEEE International Conference on Communications, 2012

MR-Chord: A scheme for enhancing Chord lookup accuracy and performance in mobile P2P network.
Proceedings of IEEE International Conference on Communications, 2012

Comparison of two security protocols for preventing packet dropping and message tampering attacks on AODV-based mobile ad Hoc networks.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2012

Mitigating Collaborative Blackhole Attacks on DSR-Based Mobile Ad Hoc Networks.
Proceedings of the Foundations and Practice of Security - 5th International Symposium, 2012

A Rate Adaptive Admission Control Protocol for Multimedia Wireless Mesh Networks.
Proceedings of the IEEE 26th International Conference on Advanced Information Networking and Applications, 2012

E2SIW: An Energy Efficient Scheme Immune to Wormhole Attacks in Wireless Ad Hoc Networks.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

2011
Special issue on "Theory and practice of high-performance computing, communications, and security".
J. Supercomput., 2011

Special Issue On: Telecommunications Software Engineering: Emerging Methods, Models and Tools.
Math. Comput. Model., 2011

Using bee algorithm for peer-to-peer file searching in mobile ad hoc networks.
J. Netw. Comput. Appl., 2011

Open network service technologies and applications.
Comput. Commun., 2011

Trust management in ubiquitous computing: A Bayesian approach.
Comput. Commun., 2011

Using ant-based agents for congestion control in ad-hoc wireless sensor networks.
Clust. Comput., 2011

Versatile medium access control (VMAC) protocol for mobile sensor networks.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011

Design and Implementation of a Fault Tolerant Multiple Master Cloud Computing System.
Proceedings of the 2011 IEEE International Conference on Internet of Things (iThings) & 4th IEEE International Conference on Cyber, 2011

Time Stamp-Based Algorithm for Task Scheduling in a Distributed Computing System with Multiple Master Multiple Slave Architecture.
Proceedings of the 2011 IEEE International Conference on Internet of Things (iThings) & 4th IEEE International Conference on Cyber, 2011

Message Security in Multi-Path Ad Hoc Networks Using a Neural Network-Based Cipher.
Proceedings of the Global Communications Conference, 2011

Multi-Path Trust-Based Secure AOMDV Routing in Ad Hoc Networks.
Proceedings of the Global Communications Conference, 2011

Performance evaluation of various routing protocols in Opportunistic Networks.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2011

ServiceChord: A Scalable Service Capability Interaction Framework for IMS.
Proceedings of the Global Communications Conference, 2011

A Dot Net framework based physical testbed for ad hoc network routing protocols.
Proceedings of the 24th Canadian Conference on Electrical and Computer Engineering, 2011

2010
Foreword to special issue on wireless ad hoc, sensor and mesh networks.
Telecommun. Syst., 2010

Geographic server distribution model for key revocation.
Telecommun. Syst., 2010

An enhanced MPR-based solution for flooding of broadcast messages in OLSR wireless ad hoc networks.
Mob. Inf. Syst., 2010

Survivable ATM mesh networks: Techniques and performance evaluation.
J. Syst. Softw., 2010

Wireless ad hoc, sensor and mesh networks.
Comput. Electr. Eng., 2010

2009
Deterministic Trust Management in Pervasive Computing.
J. Mobile Multimedia, 2009

Special issue on ubiquitous wireless mesh networks.
Int. J. Commun. Syst., 2009

Trust management in opportunistic pervasive healthcare systems.
Proceedings of the 16th IEEE International Conference on Electronics, 2009

Tarantula - A Scalable and Extensible Web Spider.
Proceedings of the KMIS 2009 - Proceedings of the International Conference on Knowledge Management and Information Sharing, Funchal, 2009

A Trust Management Scheme for Enhancing Security in Pervasive Wireless Networks.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

Survivability in Existing ATM-Based Mesh Networks.
Proceedings of the IEEE 23rd International Conference on Advanced Information Networking and Applications, 2009

Dividing PKI in strongest availability zones.
Proceedings of the 7th IEEE/ACS International Conference on Computer Systems and Applications, 2009

A Swarm Intelligence-based P2P file sharing protocol using Bee Algorithm.
Proceedings of the 7th IEEE/ACS International Conference on Computer Systems and Applications, 2009

Ant colony optimization-based congestion control in Ad-hoc wireless sensor networks.
Proceedings of the 7th IEEE/ACS International Conference on Computer Systems and Applications, 2009

2008
Call for Papers: '<i>Ubiquitous Wireless Mesh Networks</i>'.
Int. J. Commun. Syst., 2008

REEP: data-centric, energy-efficient and reliable routing protocol for wireless sensor networks.
IET Commun., 2008

Security in mobile ad-hoc networks using soft encryption and trust-based multi-path routing.
Comput. Commun., 2008

Algorithmic and theoretical aspects of wireless ad hoc and sensor networks.
Comput. Commun., 2008

Message from the STWiMob Workshop Organizing Technical Co-chairs.
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008

2007
On the problem of capacity allocation and flow assignment in self-healing ATM networks.
Comput. Commun., 2007

A Paradigm for Object-Oriented Conceptual Modeling of Optical Networks.
J. Comput. Inf. Technol., 2007

Rubble Search with Canine Augmentation Technology.
Proceedings of the 2nd IEEE International Conference on System of Systems Engineering, 2007

Canine as Robot in Directed Search.
Proceedings of the 2nd IEEE International Conference on System of Systems Engineering, 2007

2006
Symmetric Cipher Design Using Recurrent Neural Networks.
Proceedings of the International Joint Conference on Neural Networks, 2006

2004
Bounds on the minimum distances of a class of q-ary images of q<sup>m</sup>-ary irreducible cyclic codes.
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004


  Loading...