Normalia Samian
Orcid: 0000-0002-0905-8140
According to our database1,
Normalia Samian
authored at least 18 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
ADLM - stega: A Universal Adaptive Token Selection Algorithm for Improving Steganographic Text Quality via Information Entropy.
CoRR, 2024
RTTV-TCP: Adaptive congestion control algorithm based on RTT variations for mmWave networks.
Ad Hoc Networks, 2024
Investigating and Analyzing Simulation Tools of Wireless Sensor Networks: A Comprehensive Survey.
IEEE Access, 2024
2023
Dual-Phase Resource Allocation Algorithm in Software-Defined Network SDN-Enabled Cloud.
IEEE Access, 2023
Friendship Degree and Tenth Man Strategy: A New Method for Differentiating Between Erroneous Readings and True Events in Wireless Sensor Networks.
IEEE Access, 2023
Proceedings of the 23rd IEEE International Conference on Software Quality, 2023
2022
Fault Tolerance Structures in Wireless Sensor Networks (WSNs): Survey, Classification, and Future Directions.
Sensors, 2022
2021
Symmetry, 2021
Proceedings of the Fifth International Conference on Information Retrieval and Knowledge Management, 2021
2017
Trust-based Scheme for Cheating and Collusion Detection in Wireless Multihop Networks.
Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2017
2016
Recharge-as-Reward Mechanism to Incentivize Cooperative Nodes in Mobile Ad Hoc Networks.
Proceedings of the 41st IEEE Conference on Local Computer Networks, 2016
2015
J. Netw. Comput. Appl., 2015
Proceedings of the Seventh International Conference on Ubiquitous and Future Networks, 2015
2014
Mob. Networks Appl., 2014
2013
Mob. Networks Appl., 2013
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, 2013
2008
Proceedings of the Second Asia International Conference on Modelling and Simulation, 2008
Proceedings of the Proccedings of the Fourth International Conference on Information Assurance and Security, 2008