Yawar Abbas Bangash

Orcid: 0000-0002-6013-062X

Affiliations:
  • Huazhong University of Science and Technology, School of Computer Science and Technology, Wuhan, China


According to our database1, Yawar Abbas Bangash authored at least 21 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Lightweight secure authentication protocol for automatic dependent surveillance broadcast system.
Clust. Comput., December, 2024

Reliability through an optimal SDS controller's placement in a SDDC and smart city.
Clust. Comput., September, 2024

PQCAIE: Post quantum cryptographic authentication scheme for IoT-based e-health systems.
Internet Things, 2024

Exploring Security Dynamics in SDN Controller Architectures: Threat Landscape and Implications.
IEEE Access, 2024

FGNN-Based Improved Resource Distribution Framework for V2X Wireless Networks.
Proceedings of the 99th IEEE Vehicular Technology Conference, 2024

2023
Detection and prediction of traffic accidents using deep learning techniques.
Clust. Comput., February, 2023

Vadsec-a Lightweight Protection Scheme for Secure Topology Discovery in SDN.
Proceedings of the 12th International Conference on Networks, Communication and Computing, 2023

2022
Using 5G in smart cities: A systematic mapping study.
Intell. Syst. Appl., 2022

CACS: A Context-Aware and Anonymous Communication Framework for an Enterprise Network Using SDN.
IEEE Internet Things J., 2022

Application Threats to Exploit Northbound Interface Vulnerabilities in Software Defined Networks.
ACM Comput. Surv., 2022

2021
ALAM: Anonymous Lightweight Authentication Mechanism for SDN-Enabled Smart Homes.
IEEE Internet Things J., 2021

Dynamic distributed trust management scheme for the Internet of Things.
Turkish J. Electr. Eng. Comput. Sci., 2021

2020
Delay Reduction Through Optimal Controller Placement to Boost Scalability in an SDDC.
IEEE Syst. J., 2020

Incremental Composition Process for the Construction of Component-Based Management Systems.
Sensors, 2020

An In-Depth Analysis of IoT Security Requirements, Challenges, and Their Countermeasures via Software-Defined Security.
IEEE Internet Things J., 2020

SS7 Vulnerabilities - A Survey and Implementation of Machine Learning vs Rule Based Filtering for Detection of SS7 Network Attacks.
IEEE Commun. Surv. Tutorials, 2020

2019
MARC: A Novel Framework for Detecting MITM Attacks in eHealthcare BLE Systems.
J. Medical Syst., 2019

Flow Constraint Language for Coordination by Exogenous Connectors.
IEEE Access, 2019

Incast Mitigation in a Data Center Storage Cluster Through a Dynamic Fair-Share Buffer Policy.
IEEE Access, 2019

2017
MimiBS: Mimicking Base-Station to Provide Location Privacy Protection in Wireless Sensor Networks.
J. Comput. Sci. Technol., 2017

2016
Lpsdn: Sink-Node Location Privacy in WSNs via SDN Approach.
Proceedings of the IEEE International Conference on Networking, 2016


  Loading...