Muhammad R. Ahmed

Orcid: 0000-0003-0181-3639

According to our database1, Muhammad R. Ahmed authored at least 13 papers between 2012 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
DBSCAN-Based Malicious Node Detection to Secure Wireless Sensor Networks.
Proceedings of the 5th International Conference on Big Data Engineering and Technology, 2023

2022
An Efficient and Secure Data Deduplication Scheme for Cloud Assisted Storage Systems with Access Control.
TCCE, 2022

Outlier detection to Secure Wireless Sensor Networks Based on iForest.
Proceedings of the 10th International Symposium on Digital Forensics and Security, 2022

A Novel Framework to Detect Anomalous Nodes to Secure Wireless Sensor Networks.
AII, 2022

2019
Toward a Heterogeneous Mist, Fog, and Cloud-Based Framework for the Internet of Healthcare Things.
IEEE Internet Things J., 2019

2018
An Energy Conserving Routing Scheme for Wireless Body Sensor Nanonetwork Communication.
IEEE Access, 2018

2016
Energy-efficiency and reliability in MAC and routing protocols for underwater wireless sensor network: A survey.
J. Netw. Comput. Appl., 2016

Effective algorithm for protecting WSNs from internal attacks in real-time.
Proceedings of the Australasian Computer Science Week Multiconference, 2016

2014
Smart integration of cloud computing and MCMC based secured WSN to monitor environment.
Proceedings of the 4th International Conference on Wireless Communications, 2014

2013
Malicious node detection for the future network security from epistemic uncertainties.
Proceedings of the 16th International Symposium on Wireless Personal Multimedia Communications, 2013

Protecting wireless sensor networks from internal attacks based on uncertain decisions.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

A Novel Evidential Evaluation for Internal Attacks with Dempster-Shafer Theory in WSN.
Proceedings of the 12th IEEE International Conference on Trust, 2013

2012
A novel misbehavior evaluation with dempster-shafer theory in wireless sensor networks.
Proceedings of the Thirteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2012


  Loading...