Mohammad S. Obaidat
Orcid: 0000-0002-1569-9657Affiliations:
- University of Sharjah, College of Computing & Informatics, UAE
- City College of New York, Department of Electrical Engineering, NY, USA
- Fordham University, New York City, NY, USA
- Ohio State University, Columbus, OH, USA (PhD 1986)
According to our database1,
Mohammad S. Obaidat
authored at least 874 papers
between 1988 and 2024.
Collaborative distances:
Collaborative distances:
Awards
IEEE Fellow
IEEE Fellow 2005, "For contributions to adaptive learning, pattern recognition and system simulation.".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orkg.org
-
on orcid.org
-
on id.loc.gov
-
on d-nb.info
On csauthors.net:
Bibliography
2024
IEEE Internet Things J., October, 2024
Online Fault Diagnosis of Industrial Robot Using IoRT and Hybrid Deep Learning Techniques: An Experimental Approach.
IEEE Internet Things J., October, 2024
A provably secure authenticated key agreement protocol for industrial sensor network system.
Concurr. Comput. Pract. Exp., October, 2024
IEEE Commun. Mag., October, 2024
Drones as a service (DaaS) for 5G networks and blockchain-assisted IoT-based smart city infrastructure.
Clust. Comput., October, 2024
Traceable Attribute-Based Encryption With Equality Test for Cloud Enabled E-Health System.
IEEE J. Biomed. Health Informatics, September, 2024
An Object-Driven Navigation Strategy Based on Active Perception and Semantic Association.
IEEE Robotics Autom. Lett., August, 2024
Cost-Effective Authenticated Solution (CAS) for 6G-Enabled Artificial Intelligence of Medical Things (AIoMT).
IEEE Internet Things J., July, 2024
Blockchain-Based Mutual Authentication Protocol for IoT-Enabled Decentralized Healthcare Environment.
IEEE Internet Things J., July, 2024
Transferability of Adversarial Attacks on Tiny Deep Learning Models for IoT Unmanned Aerial Vehicles.
IEEE Internet Things J., June, 2024
Real-Time Road Damage Detection and Infrastructure Evaluation Leveraging Unmanned Aerial Vehicles and Tiny Machine Learning.
IEEE Internet Things J., June, 2024
Guest Editorial Data-Driven Innovation and Adversarial Learning Models for Industry 5.0 Toward Consumer Digital Ecosystems.
IEEE Trans. Consumer Electron., May, 2024
Direct Position Determination With a Moving Extended Nested Array by Spatial Sparsity.
IEEE Internet Things J., February, 2024
Robust Multitarget Localization With Uncalibrated UAV Arrays: A Two-Stage Self-Calibration Method.
IEEE Internet Things J., February, 2024
An efficient privacy-preserved authentication technique based on conformable fractional chaotic map for TMIS under smart homes environments.
J. Supercomput., January, 2024
A probably secure biometric-based authentication and key agreement scheme for Internet of Drones.
Trans. Emerg. Telecommun. Technol., January, 2024
Real-time screen space rendering method for particle-based multiphase fluid simulation.
Simul. Model. Pract. Theory, 2024
An efficient provably secure authentication and key agreement protocol for satellite communication networks.
Secur. Priv., 2024
Secur. Priv., 2024
Cross-subject Brain Functional Connectivity Analysis for Multi-task Cognitive State Evaluation.
CoRR, 2024
An Effective Learning Management System for Revealing Student Performance Attributes.
Proceedings of the International Conference on Computer, 2024
Proceedings of the International Conference on Computer, 2024
Proceedings of the International Conference on Computer, 2024
Proceedings of the International Conference on Computer, 2024
Proceedings of the International Conference on Computer, 2024
CNN-based Application Recognition to Enhance Network Governance for Financial Networks.
Proceedings of the International Conference on Computer, 2024
A Study on "Blockchain-Enabled Digital Twins: The Next Wave of Industrial Transformation with Future Research Challenges".
Proceedings of the International Conference on Computer, 2024
EL-FAM: Power System Intrusion Detection with Ensemble Learning for False Alarm Mitigation.
Proceedings of the International Conference on Computer, 2024
2023
Container-based task scheduling in cloud-edge collaborative environment using priority-aware greedy strategy.
Clust. Comput., December, 2023
Robust Sparse Direct Localization of Smart Vehicle With Partly Calibrated Time Modulated Arrays.
IEEE Trans. Intell. Transp. Syst., November, 2023
Comput. Sci. Rev., November, 2023
ECC-based Efficient and Secure Access Control Scheme for Content Centric Network-A Next Generation Internet.
Wirel. Pers. Commun., September, 2023
MADP-IIME: malware attack detection protocol in IoT-enabled industrial multimedia environment using machine learning approach.
Multim. Syst., June, 2023
ACM Trans. Sens. Networks, May, 2023
ACM Trans. Sens. Networks, May, 2023
A novel efficient and lightweight authentication scheme for secure smart grid communication systems.
J. Supercomput., May, 2023
Fuzzy-EPO Optimization Technique for Optimised Resource Allocation and Minimum Energy Consumption with the Brownout Algorithm.
Wirel. Pers. Commun., April, 2023
A COVID-19 X-ray image classification model based on an enhanced convolutional neural network and hill climbing algorithms.
Multim. Tools Appl., April, 2023
IEEE Syst. J., March, 2023
IEEE Internet Things J., February, 2023
AI-Driven Salient Soccer Events Recognition Framework for Next-Generation IoT-Enabled Environments.
IEEE Internet Things J., February, 2023
IEEE Internet Things J., February, 2023
Proceedings of the Body of Knowledge for Modeling and Simulation: A Handbook by the Society for Modeling and Simulation International, 2023
Proceedings of the Body of Knowledge for Modeling and Simulation: A Handbook by the Society for Modeling and Simulation International, 2023
Obstacle Adaptive Smooth Path Planning for Mobile Data Collector in the Internet of Things.
IEEE Trans. Sustain. Comput., 2023
REORDER++: Enhanced Randomized Real-Time Scheduling Strategy Against Side-Channel Attacks.
IEEE Trans. Netw. Sci. Eng., 2023
Cloud-Assisted Secure and Cost-Effective Authenticated Solution for Remote Wearable Health Monitoring System.
IEEE Trans. Netw. Sci. Eng., 2023
A Lightweight and Efficient Remote Data Authentication Protocol Over Cloud Storage Environment.
IEEE Trans. Netw. Sci. Eng., 2023
A Provably Secure Lightweight Key Agreement Protocol for Wireless Body Area Networks in Healthcare System.
IEEE Trans. Ind. Informatics, 2023
DeepAG: Attack Graph Construction and Threats Prediction With Bi-Directional Deep Learning.
IEEE Trans. Dependable Secur. Comput., 2023
Simul. Model. Pract. Theory, 2023
An efficient caching security approach for content-centric mobile networks in internet of things systems.
Secur. Priv., 2023
Indoor Visual Re-Localization for Long-Term Autonomous Robots Based on Object-Level Features and Semantic Relationships.
IEEE Robotics Autom. Lett., 2023
IEEE Internet Things J., 2023
Classical versus reinforcement learning algorithms for unmanned aerial vehicle network communication and coverage path planning: A systematic literature review.
Int. J. Commun. Syst., 2023
ACM Comput. Surv., 2023
Active-Passive Cascaded RIS-Assisted Receiver Design for Anti-Jamming Communications.
Proceedings of the IEEE International Conference on Communications, 2023
SD-Transformer: A System-Level Denoising Transformer for Encrypted Traffic Behavior Identification.
Proceedings of the IEEE Global Communications Conference, 2023
SMSDect: A Prediction Model for Smishing Attack Detection Using Machine Learning and Text Analysis.
Proceedings of the IEEE Global Communications Conference, 2023
Ransomware Attacks Detection Methodology to Protect IoT-Enabled Critical Infrastructures.
Proceedings of the IEEE Global Communications Conference, 2023
Proceedings of the International Conference on Computer, 2023
An Efficient Anonymous Authentication Technique for TMIS under the Smart Home Environment.
Proceedings of the International Conference on Computer, 2023
Proceedings of the International Conference on Computer, 2023
Proceedings of the International Conference on Computer, 2023
DL-CMFD: Deep Learning-Based Copy-Move Forgery Detection Using Parallel Feature-Extractor.
Proceedings of the International Conference on Computer, 2023
Proceedings of the International Conference on Computer, 2023
Proceedings of the International Conference on Communications, 2023
SLA-SCA: Secure and Lightweight Authentication and Key Agreement Mechanism for Smart City Applications.
Proceedings of the International Conference on Communications, 2023
A Robust Remote Client Password Authentication Technique for Smart Cities E-Governance Applications.
Proceedings of the International Conference on Communications, 2023
Proceedings of the International Conference on Communications, 2023
Blockchain-Based Energy Trading Scheme for EVs Coordination: A Smart Contract Approach.
Proceedings of the International Conference on Communications, 2023
Cryptanalysis and Improvement of a Blockchain Based Lightweight Authentication and Key Agreement Scheme for Internet of Vehicles.
Proceedings of the International Conference on Communications, 2023
2022
Int. J. Intell. Syst., December, 2022
On the Security of A Secure Anonymous Identity-Based Scheme in New Authentication Architecture for Mobile Edge Computing.
Wirel. Pers. Commun., 2022
Load-Balanced Topology Rebuilding for Disconnected Wireless Sensor Networks With Delay Constraint.
IEEE Trans. Sustain. Comput., 2022
Efficient design of an authenticated key agreement protocol for dew-assisted IoT systems.
J. Supercomput., 2022
Authenticated Key Agreement Scheme With User Anonymity and Untraceability for 5G-Enabled Softwarized Industrial Cyber-Physical Systems.
IEEE Trans. Intell. Transp. Syst., 2022
An Efficient and Provably Secure Certificateless Protocol for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2022
SEAT: Secure and Energy Efficient Anonymous Authentication With Trajectory Privacy-Preserving Scheme for Marine Traffic Management.
IEEE Trans. Green Commun. Netw., 2022
IEEE Trans. Comput. Soc. Syst., 2022
Edge-Learning-Based Hierarchical Prefetching for Collaborative Information Streaming in Social IoT Systems.
IEEE Trans. Comput. Soc. Syst., 2022
IEEE Syst. J., 2022
IEEE Syst. J., 2022
A simulation model to reduce the fuel consumption through efficient road traffic modelling.
Simul. Model. Pract. Theory, 2022
Modeling and simulation of a novel secure quantum key distribution (SQKD) for ensuring data security in cloud environment.
Simul. Model. Pract. Theory, 2022
A hybrid MCDM framework and simulation analysis for the assessment of worst polluted cities.
Simul. Model. Pract. Theory, 2022
Simul. Model. Pract. Theory, 2022
Prediction of heart abnormalities using deep learning model and wearabledevices in smart health homes.
Multim. Tools Appl., 2022
IEEE J. Sel. Areas Commun., 2022
IEEE Internet Things J., 2022
An access control protocol for IoT-based critical infrastructure in smart grid environment.
Int. J. Commun. Syst., 2022
A PUF-based lightweight authentication and key agreement protocol for smart UAV networks.
IET Commun., 2022
Fuzzy Logic in Surveillance Big Video Data Analysis: Comprehensive Review, Challenges, and Research Directions.
ACM Comput. Surv., 2022
ACM Comput. Surv., 2022
Comput. Commun., 2022
Efficient privacy-preserving anonymous authentication scheme for human predictive online education system.
Clust. Comput., 2022
Proceedings of the IEEE International Conference on Communications, 2022
Proceedings of the IEEE International Conference on Communications, 2022
RAKI: A Robust ECC Based Three-party Authentication and Key Agreement Scheme for Medical IoT.
Proceedings of the IEEE Global Communications Conference, 2022
Network Traffic Prediction for Intelligent Transportation Systems: A Reinforcement Learning Approach.
Proceedings of the IEEE Global Communications Conference, 2022
A Comprehensive Study on Artificial Intelligence and Blockchain Driven Beyond 5G Networks.
Proceedings of the International Conference on Computer, 2022
Clustering-based Optimal Resource Allocation Strategy in Title Insurance Underwriting.
Proceedings of the International Conference on Computer, 2022
Proceedings of the International Conference on Computer, 2022
Metaverse assisted Telesurgery in Healthcare 5.0: An interplay of Blockchain and Explainable AI.
Proceedings of the International Conference on Computer, 2022
Proceedings of the International Conference on Computer, 2022
Proceedings of the International Conference on Communications, 2022
An Efficient Authentication Technique using Convolution Chebyshev Chaotic Maps for TMIS.
Proceedings of the International Conference on Communications, 2022
Proceedings of the International Conference on Communications, 2022
Proceedings of the International Conference on Communications, 2022
BeHAutH: A KNN-Based Classification Scheme for Behavior-Based Authentication in Web 3.0.
Proceedings of the International Conference on Communications, 2022
Internet-of-Explainable-Digital-Twins: A Case Study of Versatile Corn Production Ecosystem.
Proceedings of the International Conference on Communications, 2022
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2022
Proceedings of the Green Mobile Cloud Computing, 2022
2021
IEEE Wirel. Commun., 2021
Importance-Different Charging Scheduling Based on Matroid Theory for Wireless Rechargeable Sensor Networks.
IEEE Trans. Wirel. Commun., 2021
Resource Scheduling Based on Priority Ladders for Multiple Performance Requirements in Wireless Body Area Networks.
IEEE Trans. Veh. Technol., 2021
IEEE Trans. Veh. Technol., 2021
Utility-Aware Charging Scheduling for Multiple Mobile Chargers in Large-Scale Wireless Rechargeable Sensor Networks.
IEEE Trans. Sustain. Comput., 2021
J. Supercomput., 2021
Joint Computing and Caching in 5G-Envisioned Internet of Vehicles: A Deep Reinforcement Learning-Based Traffic Control System.
IEEE Trans. Intell. Transp. Syst., 2021
Editorial: Special Section on Pervasive Edge Computing for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2021
Network Traffic Prediction in Industrial Internet of Things Backbone Networks: A Multitask Learning Mechanism.
IEEE Trans. Ind. Informatics, 2021
A Reinforcement Learning-Based Network Traffic Prediction Mechanism in Intelligent Internet of Things.
IEEE Trans. Ind. Informatics, 2021
DiLSe: Lattice-Based Secure and Dependable Data Dissemination Scheme for Social Internet of Vehicles.
IEEE Trans. Dependable Secur. Comput., 2021
An effective mobile-healthcare emerging emergency medical system using conformable chaotic maps.
Soft Comput., 2021
A Strategy to Alleviate Rush Hour Traffics in Urban Areas Based on School-Trip Commute Information.
IEEE Syst. J., 2021
Dynamic Multiworkflow Deadline and Budget Constrained Scheduling in Heterogeneous Distributed Systems.
IEEE Syst. J., 2021
Extending Network Lifetime for Wireless Rechargeable Sensor Network Systems Through Partial Charge.
IEEE Syst. J., 2021
Computational Efficient Authenticated Digital Content Distribution Frameworks for DRM Systems: Review and Outlook.
IEEE Syst. J., 2021
IEEE Syst. J., 2021
IEEE Syst. J., 2021
IEEE Syst. J., 2021
A Lightweight Provably Secure Digital Short-Signature Technique Using Extended Chaotic Maps for Human-Centered IoT Systems.
IEEE Syst. J., 2021
An Efficient, Robust, and Lightweight Subtree-Based Three-Factor Authentication Procedure for Large-Scale DWSN in Random Oracle.
IEEE Syst. J., 2021
Comment on "Lightweight Secure Message Broadcasting Protocol for Vehicle-to-Vehicle Communication".
IEEE Syst. J., 2021
A Provably Secure and Lightweight Identity-Based Two-Party Authenticated Key Agreement Protocol for IIoT Environments.
IEEE Syst. J., 2021
LAAC: Lightweight Lattice-Based Authentication and Access Control Protocol for E-Health Systems in IoT Environments.
IEEE Syst. J., 2021
SFEEC: Provably Secure Signcryption-Based Big Data Security Framework for Energy-Efficient Computing Environment.
IEEE Syst. J., 2021
IEEE Syst. J., 2021
URJA: Usage Jammer as a Resource Allocation for Secure Transmission in a CR-NOMA-Based 5G Femtocell System.
IEEE Syst. J., 2021
Simulation system for collisions and two-way coupling of non-Newtonian fluids and solids.
Simul. Model. Pract. Theory, 2021
Learning automata and reservation based secure smart parking system: Methodology and simulation analysis.
Simul. Model. Pract. Theory, 2021
Simul. Model. Pract. Theory, 2021
Peer-to-Peer Netw. Appl., 2021
A Federated Reinforcement Learning Framework for Incumbent Technologies in Beyond 5G Networks.
IEEE Netw., 2021
Movement-Based Solutions to Energy Limitation in Wireless Sensor Networks: State of the Art and Future Trends.
IEEE Netw., 2021
ATPS: an adaptive trajectory prediction system based on semantic information for dynamic objects.
Neural Comput. Appl., 2021
Efficient Identity-Based Distributed Decryption Scheme for Electronic Personal Health Record Sharing System.
IEEE J. Sel. Areas Commun., 2021
A secure and privacy preserving lightweight authentication scheme for smart-grid communication using elliptic curve cryptography.
J. Syst. Archit., 2021
A high efficient multi-robot simultaneous localization and mapping system using partial computing offloading assisted cloud point registration strategy.
J. Parallel Distributed Comput., 2021
Contact Tracing Incentive for COVID-19 and Other Pandemic Diseases From a Crowdsourcing Perspective.
IEEE Internet Things J., 2021
An Efficient Container Management Scheme for Resource-Constrained Intelligent IoT Devices.
IEEE Internet Things J., 2021
IEEE Internet Things J., 2021
CoMSeC++: PUF-based secured light-weight mutual authentication protocol for Drone-enabled WSN.
Comput. Networks, 2021
AI-Enabled Blockchain-Based Access Control for Malicious Attacks Detection and Mitigation in IoE.
IEEE Consumer Electron. Mag., 2021
IEEE Access Special Section Editorial: Artificial Intelligence (AI)-Empowered Intelligent Transportation Systems.
IEEE Access, 2021
Joint User Pairing and Resource Allocation for SWIPT-Enabled Cooperative D2D Communications.
Proceedings of the ICC 2021, 2021
BCovX: Blockchain-based COVID Diagnosis Scheme using Chest X-Ray for Isolated Location.
Proceedings of the ICC 2021, 2021
MedBlock: An AI-enabled and Blockchain-driven Medical Healthcare System for COVID-19.
Proceedings of the ICC 2021, 2021
SPCS-IoTEH: Secure Privacy-Preserving Communication Scheme for IoT-Enabled e-Health Applications.
Proceedings of the ICC 2021, 2021
HTFM: Hybrid Traffic-Flow Forecasting Model for Intelligent Vehicular Ad hoc Networks.
Proceedings of the ICC 2021, 2021
Proceedings of the ICC 2021, 2021
Proceedings of the IEEE Global Communications Conference, 2021
Proceedings of the IEEE Global Communications Conference, 2021
Proceedings of the International Conference on Computer, 2021
Blockchain Enabled Electronics Medical System Proposed Framework with Research Directions.
Proceedings of the International Conference on Computer, 2021
Proceedings of the International Conference on Computer, 2021
Blockchain and Multiple Linear Regression-based Energy Trading Scheme for Electric Vehicles.
Proceedings of the International Conference on Computer, 2021
Amalgamation of Blockchain and AI to Classify Malicious Behavior of Autonomous Vehicles.
Proceedings of the International Conference on Computer, 2021
Proceedings of the International Conference on Computer, 2021
SCHOOL: Spectrum Allocation for D2D Communication Enabled HetNet using Stackelberg and Coalition Formation Game.
Proceedings of the International Conference on Computer, 2021
Machine Learning-based Currency Information Retrieval for Aiding the Visually Impaired People.
Proceedings of the International Conference on Computer, 2021
Privacy Preserving Location-based Content Distribution Framework for Digital Rights Management Systems.
Proceedings of the International Conference on Communications, 2021
An Effective Fair Off-Line Electronic Cash Protocol using Extended Chaotic Maps with Anonymity Revoking Trustee.
Proceedings of the International Conference on Communications, 2021
XAI-AV: Explainable Artificial Intelligence for Trust Management in Autonomous Vehicles.
Proceedings of the International Conference on Communications, 2021
A Robust Anonymous Authentication Scheme using Biometrics for Digital Rights Management System.
Proceedings of the International Conference on Communications, 2021
Proceedings of the International Conference on Communications, 2021
Proceedings of the International Conference on Communications, 2021
2020
Efficient and Secure Anonymous Authentication With Location Privacy for IoT-Based WBANs.
IEEE Trans. Ind. Informatics, 2020
When Deep Reinforcement Learning Meets 5G-Enabled Vehicular Networks: A Distributed Offloading Framework for Traffic Big Data.
IEEE Trans. Ind. Informatics, 2020
Intelligent Secure Ecosystem Based on Metaheuristic and Functional Link Neural Network for Edge of Things.
IEEE Trans. Ind. Informatics, 2020
An efficient key authentication procedure for IND-CCA2 secure Paillier-based cryptosystem.
Soft Comput., 2020
An approach for solving fully fuzzy multi-objective linear fractional optimization problems.
Soft Comput., 2020
Loosely Coupled Cloud Robotic Framework for QoS-Driven Resource Allocation-Based Web Service Composition.
IEEE Syst. J., 2020
PFCBAS: Pairing Free and Provable Certificate-Based Aggregate Signature Scheme for the e-Healthcare Monitoring System.
IEEE Syst. J., 2020
An Efficient Elliptic Curve Cryptography-Based Without Pairing KPABE for Internet of Things.
IEEE Syst. J., 2020
ORCID: Opportunistic Reconnectivity for Network Management in the Presence of Dumb Nodes in Wireless Sensor Networks.
IEEE Syst. J., 2020
WmA-MiFN: A Weighted Majority and Auction Game Based Green Ultra-Dense Micro-Femtocell Network System.
IEEE Syst. J., 2020
MEGAN: Multipurpose Energy-Efficient, Adaptable, and Low-Cost Wireless Sensor Node for the Internet of Things.
IEEE Syst. J., 2020
A Secure Three-Factor User Authentication Protocol With Forward Secrecy for Wireless Medical Sensor Network Systems.
IEEE Syst. J., 2020
IEEE Syst. J., 2020
An Adaptive Grid Frequency Support Mechanism for Energy Management in Cloud Data Centers.
IEEE Syst. J., 2020
Edge Computing Based Healthcare Systems: Enabling Decentralized Health Monitoring in Internet of Medical Things.
IEEE Netw., 2020
PRATIT: a CNN-based emotion recognition system using histogram equalization and data augmentation.
Multim. Tools Appl., 2020
An enhanced mutual authentication and key establishment protocol for TMIS using chaotic map.
J. Inf. Secur. Appl., 2020
An efficient and provable certificate-based proxy signature scheme for IIoT environment.
Inf. Sci., 2020
Efficient and Provably Secure Multireceiver Signcryption Scheme for Multicast Communication in Edge Computing.
IEEE Internet Things J., 2020
Corrections to "A Cooperative Quality-Aware Service Access System for Social Internet of Vehicles".
IEEE Internet Things J., 2020
Prolonging lifetime for wireless rechargeable sensor networks through sleeping and charging scheduling.
Int. J. Commun. Syst., 2020
Routing and collision avoidance techniques for unmanned aerial vehicles: Analysis, optimal solutions, and future directions.
Int. J. Commun. Syst., 2020
Int. J. Commun. Syst., 2020
An efficient authentication and key agreement scheme for secure smart grid communication services.
Int. J. Commun. Syst., 2020
Statistical vertical reduction-based data abridging technique for big network traffic dataset.
Int. J. Commun. Syst., 2020
Comparative analysis of IoT based products, technology and integration of IoT with cloud computing.
IET Networks, 2020
E2CA-SM: an energy-efficient channel allocation with sleep mode for base station in fifth-generation-based cellular network systems.
IET Networks, 2020
IET Networks, 2020
Gateway-oriented two-server password authenticated key exchange protocol for unmanned aerial vehicles in mobile edge computing.
IET Commun., 2020
Future Gener. Comput. Syst., 2020
SEAL: Self-adaptive AUV-based localization for sparsely deployed Underwater Sensor Networks.
Comput. Commun., 2020
Efficient and secure content dissemination architecture for content centric network using ECC-based public key infrastructure.
Comput. Commun., 2020
Ad Hoc Sens. Wirel. Networks, 2020
A Novel Identity-based Deniable Authentication Protocol Using Bilinear Pairings for Mobile Ad Hoc Networks.
Ad Hoc Sens. Wirel. Networks, 2020
IEEE Access, 2020
SDN based Network Traffic Routing in Vehicular Networks: A Scheme and Simulation Analysis.
Proceedings of the 10th International Conference on Simulation and Modeling Methodologies, 2020
Amalgamation of Fog Computing and Software Defined Networking in Healthcare 4.0: The Challenges, and a Way Forward.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020
Energy-efficient Collaborative Offloading for Multiplayer Games with Cache-Aided MEC.
Proceedings of the 2020 IEEE International Conference on Communications, 2020
Proceedings of the 2020 IEEE International Conference on Communications, 2020
Proceedings of the 2020 IEEE International Conference on Communications, 2020
Proceedings of the 2020 IEEE International Conference on Communications, 2020
Proceedings of the 2020 IEEE International Conference on Communications, 2020
Proceedings of the 2020 IEEE International Conference on Communications, 2020
Proceedings of the 2020 IEEE International Conference on Communications, 2020
Proceedings of the IEEE Global Communications Conference, 2020
Proceedings of the IEEE Global Communications Conference, 2020
Proceedings of the IEEE Global Communications Conference, 2020
BDoTs: Blockchain-based Evaluation Scheme for Online Teaching under COVID-19 Environment.
Proceedings of the International Conference on Computer, 2020
Automatic Spine Bone Segmentation and Feature Extraction in Computed Tomography Images for Biometric Recognition.
Proceedings of the International Conference on Computer, 2020
An Efficient Robust Lightweight Remote User Authentication Protocol using Extended Chaotic Maps.
Proceedings of the International Conference on Computer, 2020
Proceedings of the International Conference on Computer, 2020
Proceedings of the International Conference on Computer, 2020
Proceedings of the International Conference on Computer, 2020
Proceedings of the International Conference on Computer, 2020
Proceedings of the International Conference on Communications, 2020
Proceedings of the International Conference on Communications, 2020
A Novel Approach to Predict the Real Time Sentimental Analysis by Naive Bayes & RNN Algorithm during the COVID Pandemic in UAE.
Proceedings of the International Conference on Communications, 2020
Proceedings of the International Conference on Communications, 2020
Proceedings of the International Conference on Communications, 2020
Proceedings of the International Conference on Communications, 2020
Proceedings of the International Conference on Communications, 2020
2019
IEEE Wirel. Commun., 2019
Fog Computing for Smart Grid Systems in the 5G Environment: Challenges and Solutions.
IEEE Wirel. Commun., 2019
Mobi-Flow: Mobility-Aware Adaptive Flow-Rule Placement in Software-Defined Access Network.
IEEE Trans. Mob. Comput., 2019
IEEE Trans. Cloud Comput., 2019
Duality-based branch-bound computational algorithm for sum-of-linear-fractional multi-objective optimization problem.
Soft Comput., 2019
A Lightweight and Provably Secure Key Agreement System for a Smart Grid With Elliptic Curve Cryptography.
IEEE Syst. J., 2019
LA-MHR: Learning Automata Based Multilevel Heterogeneous Routing for Opportunistic Shared Spectrum Access to Enhance Lifetime of WSN.
IEEE Syst. J., 2019
A New Scheme for IoT Service Function Chains Orchestration in SDN-IoT Network Systems.
IEEE Syst. J., 2019
IEEE Syst. J., 2019
Service Degradability Supported by Forecasting System in Optical Data Center Networks.
IEEE Syst. J., 2019
IEEE Syst. J., 2019
An Energy Sensitive Computation Offloading Strategy in Cloud Robotic Network Based on GA.
IEEE Syst. J., 2019
IEEE Syst. J., 2019
Comparative Study of Different Cost Functions Between Neighbors for Optimizing Energy Dissipation in WSN.
IEEE Syst. J., 2019
M-MEMHS: Modified Minimization of Error in Multihop System for Localization of Unknown Sensor Nodes.
IEEE Syst. J., 2019
A novel security scheme for behavioral authentication systems based on keystroke dynamics.
Secur. Priv., 2019
Security analysis on "mutual authentication scheme for multimedia medical information systems".
Secur. Priv., 2019
Secur. Priv., 2019
IEEE Netw., 2019
Resource-Optimized Multiarmed Bandit-Based Offload Path Selection in Edge UAV Swarms.
IEEE Internet Things J., 2019
Dynamic switch migration with noncooperative game towards control plane scalability in SDN.
Int. J. Commun. Syst., 2019
Int. J. Commun. Syst., 2019
Anonymous identity authentication mechanism for hybrid architecture in mobile crowd sensing networks.
Int. J. Commun. Syst., 2019
Int. J. Commun. Syst., 2019
Int. J. Commun. Syst., 2019
Efficient and secure business model for content centric network using elliptic curve cryptography.
Int. J. Commun. Syst., 2019
ElGamal cryptosystem-based secure authentication system for cloud-based IoT applications.
IET Networks, 2019
Hum. centric Comput. Inf. Sci., 2019
Future Gener. Comput. Syst., 2019
CoRR, 2019
A Comparative Study on Frameworks, MAC Layer Protocols and Open Research Issues in Internet of Things.
Ad Hoc Sens. Wirel. Networks, 2019
Secure Reactive Fast Proxy MIPv6-Based Network Mobility (SRFP-NEMO) for Vehicular Ad-hoc Networks (VANETs).
Ad Hoc Sens. Wirel. Networks, 2019
Ad Hoc Networks, 2019
Handover Management Approach for 5G Software Defined Vehicular Networks: A Scheme and Simulation Analysis.
Proceedings of the 9th International Conference on Simulation and Modeling Methodologies, 2019
A novel energy optimization approach for artificial intelligence-enabled massive internet of things.
Proceedings of the 2019 Summer Simulation Conference, 2019
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019
Service Management Algorithm-based on Security Monitoring Mechanism for Fog IoT Users in Fog Networks.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Traffic Measurement Optimization Based on Reinforcement Learning in Large-Scale IP Backbone Networks.
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Anomaly Detection Based on Spatio-Temporal and Sparse Features of Network Traffic in VANETs.
Proceedings of the 2019 IEEE Global Communications Conference, 2019
A Novel Multi-Path Anonymous Randomized Key Distribution Scheme for Geo Distributed Networks.
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Proceedings of the 2019 IEEE Global Communications Conference, 2019
Proceedings of the 2019 International Conference on Computer, 2019
An Efficient EUF-ID-CMA Secure Identity-based Short Signature Scheme using Discrete Logarithm.
Proceedings of the 2019 International Conference on Computer, 2019
A Novel Data Compression Technique Incorporated with Computer Offloading in RGB-D SLAM.
Proceedings of the 2019 International Conference on Computer, 2019
Proceedings of the 2019 International Conference on Computer, 2019
Proceedings of the 2019 International Conference on Computer, 2019
Proceedings of the 2019 International Conference on Computer, 2019
Proceedings of the 2019 International Conference on Computer, 2019
2018
GTCCS: A Game Theoretical Collaborative Charging Scheduling for On-Demand Charging Architecture.
IEEE Trans. Veh. Technol., 2018
TSCA: A Temporal-Spatial Real-Time Charging Scheduling Algorithm for On-Demand Architecture in Wireless Rechargeable Sensor Networks.
IEEE Trans. Mob. Comput., 2018
J. Supercomput., 2018
Bayesian Cooperative Coalition Game as a Service for RFID-Based Secure QoS Management in Mobile Cloud.
IEEE Trans. Emerg. Top. Comput., 2018
Learning Automata-Based Data Aggregation Tree Construction Framework for Cyber-Physical Systems.
IEEE Syst. J., 2018
DEMANDS: Distributed Energy Management Using Noncooperative Scheduling in Smart Grid.
IEEE Syst. J., 2018
Situation-Aware Protocol Switching in Software-Defined Wireless Sensor Network Systems.
IEEE Syst. J., 2018
A TAS-Model-Based Algorithm for Rule Redundancy Detection and Scene Scheduling in Smart Home Systems.
IEEE Syst. J., 2018
On the Effects of Communication Range Shrinkage of Sensor Nodes in Mobile Wireless Sensor Networks Due to Adverse Environmental Conditions.
IEEE Syst. J., 2018
Novel Framework of Risk-Aware Virtual Network Embedding in Optical Data Center Networks.
IEEE Syst. J., 2018
Cryptography-Based Misbehavior Detection and Trust Control Mechanism for Opportunistic Network Systems.
IEEE Syst. J., 2018
A Collaborative Filtering Recommendation-Based Scheme for WLANs With Differentiated Access Service.
IEEE Syst. J., 2018
IEEE Syst. J., 2018
IEEE Syst. J., 2018
Local Similarity Imputation Based on Fast Clustering for Incomplete Data in Cyber-Physical Systems.
IEEE Syst. J., 2018
Secur. Priv., 2018
Secur. Priv., 2018
Secur. Priv., 2018
Submission and citation practices and Security and Privacy's commitment to integrity and ethics.
Secur. Priv., 2018
Chebyshev chaotic map-based ID-based cryptographic model using subtree and fuzzy-entity data sharing for public key cryptography.
Secur. Priv., 2018
Secur. Priv., 2018
SeDaTiVe: SDN-Enabled Deep Learning Architecture for Network Traffic Control in Vehicular Cyber-Physical Systems.
IEEE Netw., 2018
On the placement of controllers in software-Defined-WAN using meta-heuristic approach.
J. Syst. Softw., 2018
J. Syst. Softw., 2018
Hybrid charging scheduling schemes for three-dimensional underwater wireless rechargeable sensor networks.
J. Syst. Softw., 2018
IEEE Internet Things J., 2018
Int. J. Commun. Syst., 2018
Int. J. Commun. Syst., 2018
Secure cognitive radio-based synchronized transmission of 5G signals using massive MIMO-OFDM-ES.
Int. J. Commun. Syst., 2018
Anonymous and expeditious mobile user authentication scheme for GLOMONET environments.
Int. J. Commun. Syst., 2018
Deployment and validation of out of band IP traceback approach (OBTA) in wireless mesh network.
Int. J. Commun. Syst., 2018
MIMO antenna selection using biogeography-based optimization with nonlinear migration models.
Int. J. Commun. Syst., 2018
Int. J. Commun. Syst., 2018
Spectrum allocation in cognitive radio networks using chaotic biogeography-based optimisation.
IET Networks, 2018
IET Networks, 2018
IET Networks, 2018
A robust and efficient password-based conditional privacy preserving authentication and group-key agreement protocol for VANETs.
Future Gener. Comput. Syst., 2018
IEEE Commun. Mag., 2018
Reversible Image Mosaic Technology Providing Large Protection Size and High Image Quality.
Ad Hoc Sens. Wirel. Networks, 2018
Mitigating the Effect of Blackhole Attack on MANETs Using AODV Protocol Under Transmission Control Protocol.
Ad Hoc Sens. Wirel. Networks, 2018
Ad Hoc Networks, 2018
Proceedings of the 2018 International Symposium on Performance Evaluation of Computer and Telecommunication Systems, 2018
Proceedings of 8th International Conference on Simulation and Modeling Methodologies, 2018
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018
A Distributed Access Control Scheme based on Risk and Trust for Fog-cloud Environments.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Proceedings of the 2018 IEEE International Conference on Communications, 2018
The Internet of Things Service Recommendation Based on Tripartite Graph with Mass Diffusion.
Proceedings of the 2018 IEEE International Conference on Communications Workshops, 2018
Efficient Multipath Routing Protocol with Quality of Service for Mobile Ad Hoc Networks.
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Deep Learning-Based Content Centric Data Dissemination Scheme for Internet of Vehicles.
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Edge-Based Content Delivery for Providing QoE in Wireless Networks Using Quotient Filter.
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Proceedings of the IEEE Global Communications Conference, 2018
Proceedings of the IEEE Global Communications Conference, 2018
Proceedings of the IEEE Global Communications Conference, 2018
Proceedings of the IEEE Globecom Workshops, 2018
Proceedings of the IEEE Globecom Workshops, 2018
iDVSP: Intelligent Dynamic Virtual Sensor Provisioning in Sensor-Cloud Infrastructure.
Proceedings of the IEEE Global Communications Conference, 2018
Proceedings of the IEEE Globecom Workshops, 2018
A Learning Automaton-Based Controller Placement Algorithm for Software-Defined Networks.
Proceedings of the IEEE Global Communications Conference, 2018
Proceedings of the IEEE Global Communications Conference, 2018
FS2RNN: Feature Selection Scheme for Web Spam Detection Using Recurrent Neural Networks.
Proceedings of the IEEE Global Communications Conference, 2018
Proceedings of the IEEE Global Communications Conference, 2018
Proceedings of the IEEE Globecom Workshops, 2018
Proceedings of the IEEE Global Communications Conference, 2018
Appropriate Service Degradability for Virtualized Inter-Data-Center Optical Networks.
Proceedings of the IEEE Global Communications Conference, 2018
Proceedings of the IEEE Globecom Workshops, 2018
Adaptive Skip Graph Framework for Peer-to-Peer Networks: Search Time Complexity Analysis.
Proceedings of the IEEE Global Communications Conference, 2018
Optimal Secondary Users Selection for Cooperative Spectrum Sensing in Cognitive Radio Networks.
Proceedings of the IEEE Globecom Workshops, 2018
Software Defined Network Based Fault Detection in Industrial Wireless Sensor Networks.
Proceedings of the IEEE Global Communications Conference, 2018
Proceedings of the 2018 International Conference on Computer, 2018
Proceedings of the 2018 International Conference on Computer, 2018
Context-Aware Middleware Architectural Framework for Intelligent Smart Grid Data Management.
Proceedings of the 2018 International Conference on Computer, 2018
Proceedings of the 2018 International Conference on Computer, 2018
Proceedings of the 2018 International Conference on Computer, 2018
Proceedings of the 2018 International Conference on Computer, 2018
2017
IEEE Trans. Ind. Informatics, 2017
Distributed Home Energy Management System With Storage in Smart Grid Using Game Theory.
IEEE Syst. J., 2017
Learning Automata-Based Fault-Tolerant System for Dynamic Autonomous Unmanned Vehicular Networks.
IEEE Syst. J., 2017
On Theoretical Modeling of Sensor Cloud: A Paradigm Shift From Wireless Sensor Network.
IEEE Syst. J., 2017
D3: distributed approach for the detection of dumb nodes in wireless sensor networks.
Int. J. Commun. Syst., 2017
Oceanic forces and their impact on the performance of mobile underwater acoustic sensor networks.
Int. J. Commun. Syst., 2017
A robust ElGamal-based password-authentication protocol using smart card for client-server communication.
Int. J. Commun. Syst., 2017
An altruism-based trust-dependent message forwarding protocol for opportunistic networks.
Int. J. Commun. Syst., 2017
Int. J. Commun. Syst., 2017
UCGNet: wireless sensor network-based active aquifer contamination monitoring and control system for underground coal gasification.
Int. J. Commun. Syst., 2017
An anonymous and robust multi-server authentication protocol using multiple registration servers.
Int. J. Commun. Syst., 2017
A pairing-free certificateless digital multisignature scheme using elliptic curve cryptography.
Int. J. Comput. Math., 2017
Towards an incentive-compatible, reputation-based framework for stimulating cooperation in opportunistic networks: a survey.
IET Networks, 2017
Ad Hoc Sens. Wirel. Networks, 2017
Energy Optimisation using Distance and Hop-based Transmission (DHBT) in Wireless Sensor Networks - Scheme and Simulation Analysis.
Proceedings of the 7th International Conference on Simulation and Modeling Methodologies, 2017
Proceedings of the Mathematics and Computing - Third International Conference, 2017
Design of a Certificateless Designated Server Based Searchable Public Key Encryption Scheme.
Proceedings of the Mathematics and Computing - Third International Conference, 2017
Metaheuristic Solutions for Solving Controller Placement Problem in SDN-based WAN Architecture.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017
Proceedings of the IEEE International Conference on Communications, 2017
Learning automata based optimized multipath routingusing leapfrog algorithm for VANETs.
Proceedings of the IEEE International Conference on Communications, 2017
Proceedings of the IEEE International Conference on Communications, 2017
Proceedings of the IEEE International Conference on Communications, 2017
An efficient learning automata based task offloading in mobile cloud computing environments.
Proceedings of the IEEE International Conference on Communications, 2017
Proceedings of the IEEE International Conference on Communications, 2017
Proceedings of the IEEE International Conference on Communications, 2017
Proceedings of the 2017 IEEE Global Communications Conference, 2017
Proceedings of the 2017 IEEE Global Communications Conference, 2017
Proceedings of the 2017 IEEE Global Communications Conference, 2017
Proceedings of the 2017 IEEE Global Communications Conference, 2017
Proceedings of the 2017 IEEE Global Communications Conference, 2017
ProIDS: Probabilistic Data Structures Based Intrusion Detection System for Network Traffic Monitoring.
Proceedings of the 2017 IEEE Global Communications Conference, 2017
SecHealth: An Efficient Fog Based Sender Initiated Secure Data Transmission of Healthcare Sensors for e-Medical System.
Proceedings of the 2017 IEEE Global Communications Conference, 2017
EnClass: Ensemble-Based Classification Model for Network Anomaly Detection in Massive Datasets.
Proceedings of the 2017 IEEE Global Communications Conference, 2017
Proceedings of the 2017 IEEE Global Communications Conference, 2017
Proceedings of the International Conference on Computer, 2017
Proceedings of the International Conference on Computer, 2017
Proceedings of the International Conference on Computer, 2017
Proceedings of the International Conference on Computer, 2017
Proceedings of the International Conference on Computer, 2017
Proceedings of the International Conference on Computer, 2017
GATA: GPS-Arduino based Tracking and Alarm system for protection of wildlife animals.
Proceedings of the International Conference on Computer, 2017
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, 2017
Improved Dual Authentication and Key Management Techniques in Vehicular Ad Hoc Networks.
Proceedings of the 14th IEEE/ACS International Conference on Computer Systems and Applications, 2017
2016
Wirel. Pers. Commun., 2016
IEEE Trans. Ind. Informatics, 2016
Mils-Cloud: A Sensor-Cloud-Based Architecture for the Integration of Military Tri-Services Operations and Decision Making.
IEEE Syst. J., 2016
A DSR-based routing protocol for mitigating blackhole attacks on mobile ad hoc networks.
Secur. Commun. Networks, 2016
Security analysis and design of an efficient ECC-based two-factor password authentication scheme.
Secur. Commun. Networks, 2016
MREA: a minimum resource expenditure node capture attack in wireless sensor networks.
Secur. Commun. Networks, 2016
J. Syst. Softw., 2016
Clustering and splitting charging algorithms for large scaled wireless rechargeable sensor networks.
J. Syst. Softw., 2016
GTCharge: A game theoretical collaborative charging scheme for wireless rechargeable sensor networks.
J. Syst. Softw., 2016
Int. J. Commun. Syst., 2016
Enhanced IEEE 802.21 Handover Design for QoS Support in Next Generation Wireless Networks.
Ad Hoc Sens. Wirel. Networks, 2016
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016
Cooperative Radio Resources Allocation in LTE_A Networks within MIH Framework: A Scheme and Simulation Analysis.
Proceedings of the 6th International Conference on Simulation and Modeling Methodologies, 2016
Proceedings of the Simulation and Modeling Methodologies, Technologies and Applications, 2016
Graph colouring technique for efficient channel allocation in cognitive radio networks.
Proceedings of the 2016 IEEE International Conference on Communications, 2016
Reservation and contention reduced channel access method with effective quality of service for wireless mesh networks.
Proceedings of the 2016 IEEE International Conference on Communications, 2016
Impact of hardware impairment on spectrum underlay cognitive multiple relays network.
Proceedings of the 2016 IEEE International Conference on Communications, 2016
Proceedings of the 2016 IEEE International Conference on Communications, 2016
Sequential detection and average sample number for cognitive radio with multiple primary transmit power levels.
Proceedings of the 2016 IEEE International Conference on Communications, 2016
Proceedings of the 2016 IEEE International Conference on Communications, 2016
Proceedings of the 2016 IEEE International Conference on Communications, 2016
Proceedings of the 2016 IEEE Global Communications Conference, 2016
Learning Automata-Based Channel Reservation Scheme to Enhance QoS in Vehicular Adhoc Networks.
Proceedings of the 2016 IEEE Global Communications Conference, 2016
Proceedings of the 2016 IEEE Global Communications Conference, 2016
Proceedings of the 2016 IEEE Global Communications Conference, 2016
Proceedings of the 2016 IEEE Global Communications Conference, 2016
Proceedings of the International Conference on Computer, 2016
Proceedings of the International Conference on Computer, 2016
Learning automata based decision making algorithm for task offloading in mobile cloud.
Proceedings of the International Conference on Computer, 2016
A distributed coverage optimization and connectivity maintenance strategy based on unknown sensors in WSAN.
Proceedings of the International Conference on Computer, 2016
Secure message communication among vehicles using elliptic curve cryptography in smart cities.
Proceedings of the International Conference on Computer, 2016
2015
Provably Secure and Anonymous Password Authentication Protocol for Roaming Service in Global Mobility Networks Using Extended Chaotic Maps.
Wirel. Pers. Commun., 2015
Playing the Smart Grid Game: Performance Analysis of Intelligent Energy Harvesting and Traffic Flow Forecasting for Plug-In Electric Vehicles.
IEEE Veh. Technol. Mag., 2015
Performance Analysis of IEEE 802.15.6 MAC Protocol under Non-Ideal Channel Conditions and Saturated Traffic Regime.
IEEE Trans. Computers, 2015
IEEE Syst. J., 2015
Efficient Medium Access Control for Cyber-Physical Systems With Heterogeneous Networks.
IEEE Syst. J., 2015
Collaborative Learning Automata-Based Routing for Rescue Operations in Dense Urban Regions Using Vehicular Sensor Networks.
IEEE Syst. J., 2015
A Robust Reputation-Based Computational Model for Trust Establishment in Pervasive Systems.
IEEE Syst. J., 2015
A Distributed Adaptive Admission Control Scheme for Multimedia Wireless Mesh Networks.
IEEE Syst. J., 2015
Secur. Commun. Networks, 2015
Design of provably secure and efficient certificateless blind signature scheme using bilinear pairing.
Secur. Commun. Networks, 2015
QualityScan scheme for load balancing efficiency in vehicular ad hoc networks (VANETs).
J. Syst. Softw., 2015
Capacity Analysis in the Next Generation Wireless Networks Based on SINR Constraints.
J. Networks, 2015
Integration of Fixed and Mobile Infrastructure for Message Passing in Opportunistic Networks.
J. Networks, 2015
Design and Analysis of an Enhanced Patient-Server Mutual Authentication Protocol for Telecare Medical Information System.
J. Medical Syst., 2015
Coalition Games for Spatio-Temporal Big Data in Internet of Vehicles Environment: A Comparative Analysis.
IEEE Internet Things J., 2015
Int. J. Commun. Syst., 2015
Probabilistic response-time analysis for real-time systems in body area sensor networks.
Int. J. Commun. Syst., 2015
Int. J. Commun. Syst., 2015
A provably secure and efficient two-party password-based explicit authenticated key exchange protocol resistance to password guessing attacks.
Concurr. Comput. Pract. Exp., 2015
IEEE Cloud Comput., 2015
A PKI Adapted Model for Secure Information Dissemination in Industrial Control and Automation 6LoWPANs.
IEEE Access, 2015
Proceedings of the WINSYS 2015, 2015
An Efficient and Secure Mutual Authentication Mechanism in NEMO-based PMIPv6 Networks: A Methodology and Simulation Analysis.
Proceedings of the SIMULTECH 2015 - Proceedings of the 5th International Conference on Simulation and Modeling Methodologies, Technologies and Applications, Colmar, Alsace, France, 21, 2015
Proceedings of the 2015 IEEE International Conference on Communications, 2015
Wireless Body Area Networks with varying traffic in epidemic medical emergency situation.
Proceedings of the 2015 IEEE International Conference on Communications, 2015
Proceedings of the 2015 IEEE International Conference on Communications, 2015
Proceedings of the IEEE International Conference on Communication, 2015
Proceedings of the 2015 IEEE International Conference on Communications, 2015
Proceedings of the 2015 IEEE International Conference on Communications, 2015
Proceedings of the 2015 IEEE International Conference on Communications, 2015
Proceedings of the 2015 IEEE Global Communications Conference, 2015
Proceedings of the 2015 IEEE Global Communications Conference, 2015
An Adaptive Algorithm for Joint Data Detection and Channel Estimation for Meteor Burst Communications Based on Per-Survivor Processing.
Proceedings of the 2015 IEEE Global Communications Conference, 2015
Learning Automata-Based Cross Layer Framework with Context Awareness for Wireless Systems.
Proceedings of the 2015 IEEE Global Communications Conference, 2015
Proceedings of the 2015 IEEE Global Communications Conference, 2015
Proceedings of the 2015 IEEE Global Communications Conference, 2015
Performance Evaluation of a Decoupled-Level with QoS-Aware Downlink Scheduling Algorithm for LTE Networks.
Proceedings of the IEEE International Conference on Data Science and Data Intensive Systems, 2015
Proceedings of the IEEE International Conference on Data Science and Data Intensive Systems, 2015
Proceedings of the IEEE International Conference on Data Science and Data Intensive Systems, 2015
Proceedings of the IEEE International Conference on Data Science and Data Intensive Systems, 2015
Proceedings of the IEEE International Conference on Data Science and Data Intensive Systems, 2015
Proceedings of the International Conference on Computer, 2015
Learning automaton based context oriented middleware architecture for precision agriculture.
Proceedings of the International Conference on Computer, 2015
A new scheme for proactive out of band signaling solution for IP traceback in Wireless Mesh Network.
Proceedings of the International Conference on Computer, 2015
2014
Networks of learning automata for the vehicular environment: a performance analysis study.
IEEE Wirel. Commun., 2014
IEEE Trans. Netw. Serv. Manag., 2014
J. Supercomput., 2014
An analytical study of resource division and its impact on power and performance of multi-core processors.
J. Supercomput., 2014
Towards a framework for large-scale multimedia data storage and processing on Hadoop platform.
J. Supercomput., 2014
Design and analysis of secure host-based mobility protocol for wireless heterogeneous networks.
J. Supercomput., 2014
IEEE Trans. Cloud Comput., 2014
A cryptography-based protocol against packet dropping and message tampering attacks on mobile ad hoc networks.
Secur. Commun. Networks, 2014
Secur. Commun. Networks, 2014
Multim. Tools Appl., 2014
J. Syst. Softw., 2014
J. Syst. Softw., 2014
An efficient design and validation technique for secure handover between 3GPP LTE and WLANs systems.
J. Syst. Softw., 2014
Inf. Syst. Frontiers, 2014
A novel media independent handover-based approach for vertical handover over heterogeneous wireless networks.
Int. J. Commun. Syst., 2014
Int. J. Commun. Syst., 2014
IEEE Commun. Mag., 2014
Improved Secure Neighbor Discovery Protocol (ISEND) for New Wireless Networks Generations.
Proceedings of the WINSYS 2014, 2014
Proceedings of the 4th International Conference On Simulation And Modeling Methodologies, 2014
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2014
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2014
Proceedings of the E-Business and Telecommunications - 11th International Joint Conference, 2014
Proceedings of the E-Business and Telecommunications - 11th International Joint Conference, 2014
Optimized MIH-assisted P-NEMO design for vertical handover over heterogeneous network mobility.
Proceedings of the IEEE International Conference on Communications, 2014
Routing as a Bayesian Coalition Game in Smart Grid Neighborhood Area Networks: Learning Automata-based approach.
Proceedings of the IEEE International Conference on Communications, 2014
Honeypots deployment for the analysis and visualization of malware activity and malicious connections.
Proceedings of the IEEE International Conference on Communications, 2014
Optimizing handover decision and target selection in LTE-A network-based on MIH protocol.
Proceedings of the IEEE International Conference on Communications, 2014
Proceedings of the IEEE International Conference on Communications, 2014
Analysis of reliability and throughput under saturation condition of IEEE 802.15.6 CSMA/CA for wireless body area networks.
Proceedings of the IEEE Global Communications Conference, 2014
On forecasting the ONU sleep period in XG-PON systems using exponential smoothing techniques.
Proceedings of the IEEE Global Communications Conference, 2014
Proceedings of the IEEE Global Communications Conference, 2014
Prioritized payload tuning mechanism for wireless body area network-based healthcare systems.
Proceedings of the IEEE Global Communications Conference, 2014
Proceedings of the IEEE Global Communications Conference, 2014
Proceedings of the International Conference on Computer, 2014
A novel vertical handoff decision making algorithm across Heterogeneous Wireless Networks.
Proceedings of the International Conference on Computer, 2014
Proceedings of the 14th IEEE International Conference on Computer and Information Technology, 2014
2013
IEEE Wirel. Commun., 2013
Finding overlapping communities in a complex network of social linkages and Internet of things.
J. Supercomput., 2013
Simul. Model. Pract. Theory, 2013
A high efficient node capture attack algorithm in wireless sensor network based on route minimum key set.
Secur. Commun. Networks, 2013
Int. J. Comput. Math., 2013
IEEE Commun. Mag., 2013
Proceedings of the 9th IEEE International Conference on Wireless and Mobile Computing, 2013
HIP_IKEv2: A Proposal to Improve Internet Key Exchange Protocol-based on Host Identity Protocol.
Proceedings of the SIMULTECH 2013, 2013
Capacity Analysis of Heterogeneous Wireless Networks under SINR Interference Constraints.
Proceedings of the SIGMAP and WINSYS 2013, 2013
An ant-swarm inspired energy-efficient ad hoc on-demand routing protocol for mobile ad hoc networks.
Proceedings of IEEE International Conference on Communications, 2013
A fault-tolerant routing protocol for dynamic autonomous unmanned vehicular networks.
Proceedings of IEEE International Conference on Communications, 2013
Proceedings of IEEE International Conference on Communications, 2013
Residential Energy Management in Smart Grid: A Markov Decision Process-Based Approach.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013
Proceedings of the 2013 IEEE Global Communications Conference, 2013
A timed and secured monitoring implementation against wormhole attacks in AODV-based Mobile Ad Hoc Networks.
Proceedings of the International Conference on Computer, 2013
Enhanced handover architecture in IEEE 802.21-enabled heterogeneous wireless networks.
Proceedings of the International Conference on Computer, 2013
Proceedings of the International Conference on Computer, 2013
Proceedings of the International Conference on Computer, 2013
Proceedings of the International Conference on Computer, 2013
2012
Dynamic Sample Size Detection in Learning Command Line Sequence for Continuous Authentication.
IEEE Trans. Syst. Man Cybern. Part B, 2012
Energy-efficient tasks scheduling algorithm for real-time multiprocessor embedded systems.
J. Supercomput., 2012
IEEE Syst. J., 2012
Peer-to-Peer Netw. Appl., 2012
Coding-error based defects in enterprise resource planning software: Prevention, discovery, elimination and mitigation.
J. Syst. Softw., 2012
Wireless sensor network-based fire detection, alarming, monitoring and prevention system for Bord-and-Pillar coal mines.
J. Syst. Softw., 2012
Network-coded multiple-source cooperation aided relaying for free-space optical transmission.
Int. J. Commun. Syst., 2012
Providing reliable and link stability-based geocasting model in underwater environment.
Int. J. Commun. Syst., 2012
Hum. centric Comput. Inf. Sci., 2012
Proceedings of the 2012 IEEE Wireless Communications and Networking Conference, 2012
Optimizing Energy using Probabilistic Routing in Underwater Sensor Network.
Proceedings of the SIMULTECH 2012 - Proceedings of the 2nd International Conference on Simulation and Modeling Methodologies, Technologies and Applications, Rome, Italy, 28, 2012
Authentication Optimization for Vertical Handover in Heterogeneous Wireless Networks.
Proceedings of the SIGMAP and WINSYS 2012, 2012
Proceedings of IEEE International Conference on Communications, 2012
Proceedings of IEEE International Conference on Communications, 2012
Proceedings of IEEE International Conference on Communications, 2012
Proceedings of the 2012 IEEE Global Communications Conference, 2012
Community detection in an integrated Internet of Things and social network architecture.
Proceedings of the 2012 IEEE Global Communications Conference, 2012
Proceedings of the 2012 IEEE Global Communications Conference, 2012
2011
IEEE Wirel. Commun., 2011
FACES: Friend-Based Ad Hoc Routing Using Challenges to Establish Security in MANETs Systems.
IEEE Syst. J., 2011
An efficient technique for geocast region holes in underwater sensor networks and its performance evaluation.
Simul. Model. Pract. Theory, 2011
J. Syst. Softw., 2011
Comparison of the Design Characteristics of MMI Wavelength Demultiplexers Using Different Approaches by Computing the Effective Index.
J. Networks, 2011
CASPER: Congestion Aware Selection of Path with Efficient Routing in Multimedia Networks.
J. Inf. Process. Syst., 2011
Connectivity preserving localized coverage algorithm for area monitoring using wireless sensor networks.
Comput. Commun., 2011
Stable Move Algorithm (SMA) for BW allocation in wireless mobile WiMAX networks 802.16e.
Proceedings of the 2011 Wireless Telecommunications Symposium, 2011
QoS-aware Multipath Routing Protocol for Delay Sensitive Applications in MANETs - A Cross-layer Approach.
Proceedings of the WINSYS 2011, 2011
Application of Ant Colony Optimization to Develop Energy Efficient Protocol in Mobile Ad-Hoc Networks.
Proceedings of the WINSYS 2011, 2011
Puzzle solving-based authentication method for enhanced security in spins and its performance evaluation.
Proceedings of the 2011 Spring Simulation Multi-conference, 2011
Design and Implementation of a Fault Tolerant Multiple Master Cloud Computing System.
Proceedings of the 2011 IEEE International Conference on Internet of Things (iThings) & 4th IEEE International Conference on Cyber, 2011
A Learning Automata Based Solution for Preventing Distributed Denial of Service in Internet of Things.
Proceedings of the 2011 IEEE International Conference on Internet of Things (iThings) & 4th IEEE International Conference on Cyber, 2011
Time Stamp-Based Algorithm for Task Scheduling in a Distributed Computing System with Multiple Master Multiple Slave Architecture.
Proceedings of the 2011 IEEE International Conference on Internet of Things (iThings) & 4th IEEE International Conference on Cyber, 2011
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2011
Computational Intelligence Applied to Wildfire Prediction using Wireless Sensor Networks.
Proceedings of the DCNET 2011 and OPTICS 2011, 2011
Proceedings of the Global Communications Conference, 2011
Proceedings of the Global Communications Conference, 2011
Proceedings of the Global Communications Conference, 2011
Proceedings of the Global Communications Conference, 2011
2010
Virtual Backoff Algorithm: An Enhancement to 802.11 Medium-Access Control to Improve the Performance of Wireless Networks.
IEEE Trans. Veh. Technol., 2010
Random Early Detection for Congestion Avoidance in Wired Networks: A Discretized Pursuit Learning-Automata-Like Solution.
IEEE Trans. Syst. Man Cybern. Part B, 2010
IGFS: A New MAC Protocol Exploiting Heterogeneous Propagation Delays in the Dynamic Bandwidth Allocation on WDM-EPON.
IEEE Syst. J., 2010
A Counter Disassociation Mechanism (CDM) for Wireless LANs and its Performance Simulation Analysis.
IEEE Syst. J., 2010
Contention Resolution for Transmission Control Protocol over Optical Burst-Switching Networks Using Random Segment Dropping.
Simul., 2010
A low-overhead fault-tolerant routing algorithm for mobile ad hoc networks: A scheme and its simulation analysis.
Simul. Model. Pract. Theory, 2010
J. Syst. Softw., 2010
J. Syst. Softw., 2010
DEESR: Dynamic Energy Efficient and Secure Routing Protocol for Wireless Sensor Networks in Urban Environments.
J. Inf. Process. Syst., 2010
Efficient angular routing protocol for inter-vehicular communication in vehicular ad hoc networks.
IET Commun., 2010
Network Layer based Secure Routing Protocol for Wireless Ad Hoc Sensor Networks in Urban Environments.
Proceedings of the WINSYS 2010 - Proceedings of the International Conference on Wireless Information Networks and Systems, Athens, Greece, July 26, 2010
Markov decision process-based analysis of rechargeable nodes in wireless sensor networks.
Proceedings of the 2010 Spring Simulation Multiconference, 2010
Proceedings of the 17th IEEE International Conference on Electronics, 2010
A mechanism for reducing congestion while routing bulky data in Mobile Ad Hoc Networks.
Proceedings of the 17th IEEE International Conference on Electronics, 2010
Proceedings of the 17th IEEE International Conference on Electronics, 2010
Proceedings of IEEE International Conference on Communications, 2010
Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications, 2010
Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications, 2010
An Efficient and Secure Routing Protocol for Wireless Sensor Networks Using Multicasting.
Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications, 2010
Proceedings of the Global Communications Conference, 2010
Proceedings of the 8th ACS/IEEE International Conference on Computer Systems and Applications, 2010
Proceedings of the 8th ACS/IEEE International Conference on Computer Systems and Applications, 2010
2009
IEEE Wirel. Commun., 2009
IEEE Syst. J., 2009
Simul., 2009
LAID: a learning automata-based scheme for intrusion detection in wireless sensor networks.
Secur. Commun. Networks, 2009
An ant colony optimization approach for reputation and quality-of-service-based security in wireless sensor networks.
Secur. Commun. Networks, 2009
New enhancements to the SOCKS communication network security protocol: Schemes and performance evaluation.
J. Syst. Softw., 2009
An efficient approach for distributed dynamic channel allocation with queues for real-time and non-real-time traffic in cellular networks.
J. Syst. Softw., 2009
Lacas: learning automata-based congestion avoidance scheme for healthcare wireless sensor networks.
IEEE J. Sel. Areas Commun., 2009
EEAODR: An energy-efficient ad hoc on-demand routing protocol for mobile ad hoc networks.
Int. J. Commun. Syst., 2009
Chinese Remainder Theorem-Based RSA-Threshold Cryptography in MANET Using Verifiable Secret Sharing Scheme.
Proceedings of the 5th IEEE International Conference on Wireless and Mobile Computing, 2009
An experimental analysis study of bandwidth allocation with QoS in wireless networks.
Proceedings of the 2009 Spring Simulation Multiconference, SpringSim 2009, 2009
Proceedings of the 2009 Spring Simulation Multiconference, SpringSim 2009, 2009
Proceedings of the 2009 Spring Simulation Multiconference, SpringSim 2009, 2009
Attack Graph Generation with Infused Fuzzy Clustering.
Proceedings of the SECRYPT 2009, 2009
Proceedings of the 16th IEEE International Conference on Electronics, 2009
Proceedings of the 16th IEEE International Conference on Electronics, 2009
Proceedings of IEEE International Conference on Communications, 2009
Proceedings of IEEE International Conference on Communications, 2009
An Energy-Aware Routing Protocol for Ad-Hoc Networks Based on the Foraging Behavior in Ant Swarms.
Proceedings of IEEE International Conference on Communications, 2009
Optimizing Power Utilization in Vehicular Ad Hoc Networks through Angular Routing: A Protocol and Its Performance Evaluation.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009
Proceedings of the 7th IEEE/ACS International Conference on Computer Systems and Applications, 2009
Proceedings of the 7th IEEE/ACS International Conference on Computer Systems and Applications, 2009
An adaptive learning-like solution of random early detection for congestion avoidance in computer networks.
Proceedings of the 7th IEEE/ACS International Conference on Computer Systems and Applications, 2009
Proceedings of the 7th IEEE/ACS International Conference on Computer Systems and Applications, 2009
A new counter disassociation mechanism (CDM) for 802.11b/g wireless local area networks.
Proceedings of the 7th IEEE/ACS International Conference on Computer Systems and Applications, 2009
Proceedings of the 7th IEEE/ACS International Conference on Computer Systems and Applications, 2009
2008
IEEE Wirel. Commun., 2008
Guest Editorial Recent Advances in Global Navigation and Communication Satellite Systems.
IEEE Syst. J., 2008
IEEE Syst. J., 2008
Bandwidth-Effective Design of a Satellite-Based Hybrid Wireless Sensor Network for Mobile Target Detection and Tracking.
IEEE Syst. J., 2008
A Secure and Energy-Efficient Scheme for Group-Based Routing in Heterogeneous Ad Hoc Sensor Networks and Its Simulation Analysis.
Simul., 2008
Simul., 2008
A probabilistic zonal approach for swarm-inspired wildfire detection using sensor networks.
Int. J. Commun. Syst., 2008
Int. J. Commun. Syst., 2008
FORK: A novel two-pronged strategy for an agent-based intrusion detection scheme in ad-hoc networks.
Comput. Commun., 2008
Comput. Commun., 2008
Intelligent network functionalities in wireless 4G networks: Integration scheme and simulation analysis.
Comput. Commun., 2008
Intrusion Detection in Wireless Sensor Networks: The S-Model Learning Automata Approach.
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008
QDV: A Quality-of-Security-Based Distance Vector Routing Protocol for Wireless Sensor Networks Using Ant Colony Optimization.
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008
New Techniques to Enhance the Capabilities of the Socks Network Security Protocol.
Proceedings of the SECRYPT 2008, 2008
Novel Neurocomputing-based Scheme to Authenticate WLAN Users Employing Distance Proximity Threshold.
Proceedings of the SECRYPT 2008, 2008
Proceedings of the 15th IEEE International Conference on Electronics, Circuits and Systems, 2008
Proceedings of the 15th IEEE International Conference on Electronics, Circuits and Systems, 2008
Proceedings of the 15th IEEE International Conference on Electronics, Circuits and Systems, 2008
Multi-Hop Synchronization at the Application Layer of Wireless and Satellite Networks.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008
Proceedings of the Proceedings 41st Annual Simulation Symposium (ANSS-41 2008), 2008
2007
Simul., 2007
Absolute Transmission Delay Guarantee in Optical Burst-Switched Networks: A Scheme and Performance Evaluation.
Simul., 2007
On the problem of capacity allocation and flow assignment in self-healing ATM networks.
Comput. Commun., 2007
Comput. Commun., 2007
A novel node architecture for optical networks: Modeling, analysis and performance evaluation.
Comput. Commun., 2007
Future and Challenges of the Security of e-Systems and Computer Networks.
Proceedings of the SECRYPT 2007, 2007
Proceedings of the E-business and Telecommunications - 4th International Conference, 2007
Secure Grid-Based Multi-Party Micropayment System in 4G Networks.
Proceedings of the ICE-B 2007, 2007
Robust Watermarking System Using Security Enhancement on Content Based Image Segmentation.
Proceedings of the 14th IEEE International Conference on Electronics, 2007
Proceedings of the 14th IEEE International Conference on Electronics, 2007
Proceedings of the 14th IEEE International Conference on Electronics, 2007
Proceedings of the 14th IEEE International Conference on Electronics, 2007
Proceedings of IEEE International Conference on Communications, 2007
Proceedings of IEEE International Conference on Communications, 2007
Proceedings of the Global Communications Conference, 2007
Proceedings of the Global Communications Conference, 2007
Proceedings of the Proceedings 40th Annual Simulation Symposium (ANSS-40 2007), 2007
Security Enhancement for Watermarking Technique Using Content based Image Segmentation.
Proceedings of the 2007 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2007), 2007
Proceedings of the 2007 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2007), 2007
Proceedings of the 2007 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2007), 2007
Congestion Avoidance Mechanism for Optical Label Switched Networks: A Dynamic QoS-based Approach.
Proceedings of the 2007 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2007), 2007
2006
Simul., 2006
Simul., 2006
Comput. Commun., 2006
Comput. Commun., 2006
Performance optimization of an adaptive wireless push system in environments with locality of demand.
Comput. Commun., 2006
Comput. Commun., 2006
Comput. Electr. Eng., 2006
Proceedings of the IEEE International Conference on Systems, 2006
Proceedings of the International Symposium on Computer Networks, 2006
SAGA: An Adaptive Infrastructure for Secure Available Grid on Ad-hoc Networks.
Proceedings of the ICE-B 2006, 2006
Proceedings of the 13th IEEE International Conference on Electronics, 2006
Performance Acceleration of Adaptive Wireless Data Broadcasting System for High Data Rate Environments.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006
A New Scheme for Mobility, Sensing, and Security Management in Wireless Ad Hoc Sensor Networks.
Proceedings of the Proceedings 39th Annual Simulation Symposium (ANSS-39 2006), 2006
2005
On the performance of adaptive TDMA protocols in WDM passive star networks with fixed transmitters and tunable receivers.
Perform. Evaluation, 2005
Performance modeling and evaluation of high-performance parallel and distributed systems.
Perform. Evaluation, 2005
Carrier-sense-assisted adaptive learning MAC protocols for distributed wireless LANs.
Int. J. Commun. Syst., 2005
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005
Trends and challenges in wireless networks.
Proceedings of the ICETE 2005, 2005
Proceedings of the 12th IEEE International Conference on Electronics, 2005
An advance dynamic resource reservation algorithm for OBS networks: Design and performance.
Proceedings of the 12th IEEE International Conference on Electronics, 2005
On regional performance improvement of an adaptive wireless push system in environments with locality of demand.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005
2004
Simul., 2004
Comput. Commun., 2004
On carrier-sense integration in learning automata-based MAC protocols for ad-hoc wireless LANs.
Proceedings of the 23rd IEEE International Performance Computing and Communications Conference, 2004
Fundamentals of Wireless Network Systems.
Proceedings of the ICETE 2004, 2004
Proceedings of IEEE International Conference on Communications, 2004
Proceedings of IEEE International Conference on Communications, 2004
On the Security Enhancement of Multimedia Copyright Protection for E-Business.
Proceedings of the Electronic Government and Commerce: Design, Modeling, Analysis and Security, 2004
Design Alternatives for Virtual Private Networks.
Proceedings of the Electronic Government and Commerce: Design, Modeling, Analysis and Security, 2004
2003
Inf. Sci., 2003
DRA: a new buffer management scheme for wireless atm networks using aggregative large deviation principle.
Comput. Commun., 2003
Modeling and simulation of IEEE 802.11 WLAN mobile ad hoc networks using topology broadcast reverse-path forwarding (TBRPF).
Comput. Commun., 2003
Proceedings of the IEEE International Conference on Systems, 2003
Proceedings of the 23rd International Conference of the Chilean Computer Science Society (SCCC 2003), 2003
Proceedings of the 2003 10th IEEE International Conference on Electronics, 2003
On the use of population-based incremental learning in the medium access control of broadcast communication systems.
Proceedings of the 2003 10th IEEE International Conference on Electronics, 2003
Admission control and resource management of uncertain duration traffic in optical networks.
Proceedings of the 2003 10th IEEE International Conference on Electronics, 2003
2002
IEEE Trans. Syst. Man Cybern. Part B, 2002
IEEE Trans. Syst. Man Cybern. Part B, 2002
IEEE Trans. Syst. Man Cybern. Part B, 2002
Modeling and Simulation of Adaptive Available Bit Rate Voice over Asynchronous Transfer Mode Networks.
Simul., 2002
Introduction to the Special Issue: ATM Systems and Networks: Basics, Issues, and Performance Modeling and Simulation.
Simul., 2002
Int. J. Commun. Syst., 2002
Comput. Commun., 2002
Comput. Commun., 2002
A comparative evaluation study of the performance of DQRAP and DQDB in metropolitan area networks.
Comput. Electr. Eng., 2002
Performance evaluation of a TDMA-based randomly addressed polling protocol for wireless LANs.
Proceedings of the 2002 9th IEEE International Conference on Electronics, 2002
Proceedings of the 2002 9th IEEE International Conference on Electronics, 2002
Proceedings of the 2002 9th IEEE International Conference on Electronics, 2002
Proceedings of the IEEE International Conference on Communications, 2002
An accurate line of sight propagation performance model for ad-hoc 802.11 wireless LAN (WLAN) devices.
Proceedings of the IEEE International Conference on Communications, 2002
Proceedings of the IEEE International Conference on Communications, 2002
2001
Performance Evaluation of ZOMA Preemptive Deadlock Recovery Mechanism for Wormhole Networks.
Simul., 2001
Inf. Sci., 2001
Comput. Commun., 2001
Performance evaluation of telecommunication systems: models, issues and applications (Guest Editorial).
Comput. Commun., 2001
On a congestion management scheme for high speed networks using aggregated large deviations principle.
Comput. Commun., 2001
Proceedings of the 30th International Workshops on Parallel Processing (ICPP 2001 Workshops), 2001
Proceedings of the 2001 International Conference on Parallel Processing, 2001
Proceedings of the 2001 8th IEEE International Conference on Electronics, 2001
A learning automata-based bus arbitration scheme for scalable shared-medium ATM switches.
Proceedings of the 2001 8th IEEE International Conference on Electronics, 2001
2000
Comput. Commun., 2000
Proceedings of the 2000 IEEE Wireless Communications and Networking Conference, 2000
Proceedings of the 2000 7th IEEE International Conference on Electronics, 2000
Proceedings of the 2000 7th IEEE International Conference on Electronics, 2000
1999
Inf. Sci., 1999
Int. J. Commun. Syst., 1999
Int. J. Commun. Syst., 1999
A methodology to analyze the performance of a parallel frame synchronization scheme in SDH high speed networks.
Comput. Commun., 1999
Proceedings of the 1999 ACM Symposium on Applied Computing, 1999
Proceedings of the IEEE International Performance Computing and Communications Conference, 1999
Proceedings of the IEEE International Performance Computing and Communications Conference, 1999
Proceedings of the 6th IEEE International Conference on Electronics, Circuits and Systems, 1999
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1999), 1999
1998
IEEE Trans. Syst. Man Cybern. Part B, 1998
Editorial Artificial Neural Networks To Systems, Man, And Cybernetics: Characteristics, Structures, And Applications.
IEEE Trans. Syst. Man Cybern. Part B, 1998
A Performance Evaluation Study of four Wavelet Algorithms for the Pitch Period Estimation of Speech Signals.
Inf. Sci., 1998
Int. J. Commun. Syst., 1998
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1998), 1998
1997
IEEE Trans. Syst. Man Cybern. Part B, 1997
Simul., 1997
Guest Editorial: Modeling and Simulation of Computer Systems and Networks: Part I: Networks.
Simul., 1997
A Simulation Evaluation Study of Neural Network Techniques to Computer User Identification.
Inf. Sci., 1997
Int. J. Commun. Syst., 1997
Int. J. Commun. Syst., 1997
Comput. Commun., 1997
Proceedings of the 1997 ACM symposium on Applied Computing, 1997
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1997), 1997
1996
A simulation study of the mechanisms to enhance TCP protocol in wide area computer networks.
Proceedings of the 1996 ACM Symposium on Applied Computing, 1996
Proceedings of Third International Conference on Electronics, Circuits, and Systems, 1996
1995
A Performance Simulation Study of the Ethernet and Token Bus Local Computer Networks.
Simul., 1995
Simul., 1995
A simulation approach to the performance of DQDB metropolitan area computer networks.
Int. J. Comput. Simul., 1995
Proceedings of the 1995 ACM symposium on applied computing, 1995
1994
IEEE Trans. Syst. Man Cybern. Syst., 1994
Book Reviews : Discrete Event Simulation: A Practical Approach by Udo W. Pooch and James A. Wall CRC Press, 1993, 412 pages, Price: $64.95 , ISBN: 0-8493-7174-0.
Simul., 1994
A methodology for evaluating the performance of CISC computer systems under single and two-level cache environments.
Microprocess. Microprogramming, 1994
Performance Evaluation of CISC Computer Systems Under Single- and Two-Level Cache Environments.
Proceedings of the ACM 22rd Annual Computer Science Conference on Scaling up: Meeting the Challenge of Complexity in Real-World Computing Applications, 1994
1993
IEEE Trans. Syst. Man Cybern., 1993
IEEE Trans. Syst. Man Cybern., 1993
IEEE Trans. Ind. Electron., 1993
Book Reviews: Advanced Computer Architecture: Parallelism, Scalability, and Programmability by Kai Hwang McGraw-Hill, New York, N.Y., 1993. Price: $56.95, ISBN: 0-07-031622-8.
Simul., 1993
Simul., 1993
Performance simulation analysis of RISC-based multiprocessors under uniform and nonuniform traffic.
Inf. Sci., 1993
Proceedings of the 1993 ACM/SIGAPP Symposium on Applied Computing: States of the Art and Practice, 1993
Proceedings of the ACM 21th Conference on Computer Science, 1993
1992
Methodologies for characterizing ultrasonic transducers using neural network and pattern recognition techniques.
IEEE Trans. Ind. Electron., 1992
Performance of the short-time Fourier Transform and Wavelet Transform to phonocardiogram signal analysis.
Proceedings of the 1992 ACM/SIGAPP Symposium on Applied Computing: Technological Challenges of the 1990's, 1992
Performance comparison of neural networks and pattern recognition techniques for classifying ultrasonic transducers.
Proceedings of the 1992 ACM/SIGAPP Symposium on Applied Computing: Technological Challenges of the 1990's, 1992
Proceedings of the 1992 ACM/SIGAPP Symposium on Applied Computing: Technological Challenges of the 1990's, 1992
Proceedings of the ACM 20th Annual Conference on Computer Science, 1992
1991
IEEE Trans. Syst. Man Cybern., 1991
Dimensionality reduction and feature extraction applications in identifying computer users.
IEEE Trans. Syst. Man Cybern., 1991
A comparative simulation study of the performance of single-bus and two-bus multiprocessors.
Simul., 1991
1988
Proceedings of the First Annual IEEE Symposium on Computer-Based Medical Systems (CBMS'88), 1988