Ejaz Ahmed

According to our database1, Ejaz Ahmed authored at least 28 papers between 2005 and 2021.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2021
Robust and Scalable Routing with Multi-Agent Deep Reinforcement Learning for MANETs.
CoRR, 2021

2019
TOSG: A Topology Optimization Scheme With Global Small World for Industrial Heterogeneous Internet of Things.
IEEE Trans. Ind. Informatics, 2019

Anti-malarial, cytotoxicity and molecular docking studies of quinolinyl chalcones as potential anti-malarial agent.
J. Comput. Aided Mol. Des., 2019

Enabling IoT platforms for social IoT applications: Vision, feature mapping, and challenges.
Future Gener. Comput. Syst., 2019

Robust Inference after Random Projections via Hellinger Distance for Location-Scale Family.
Entropy, 2019

Social media big data analytics: A survey.
Comput. Hum. Behav., 2019

2018
Cooperative Vehicular Networking: A Survey.
IEEE Trans. Intell. Transp. Syst., 2018

Recent advances in fog and mobile edge computing.
Trans. Emerg. Telecommun. Technol., 2018

Analysis of Online Social Network Connections for Identification of Influential Users: Survey and Open Research Issues.
ACM Comput. Surv., 2018

2016
Analysis of factors influencing acceptance of personal, academic and professional development e-portfolios.
Comput. Hum. Behav., 2016

Investigating the influence of the most commonly used external variables of TAM on students' Perceived Ease of Use (PEOU) and Perceived Usefulness (PU) of e-portfolios.
Comput. Hum. Behav., 2016

The future of mobile cloud computing: Integrating cloudlets and Mobile Edge Computing.
Proceedings of the 23rd International Conference on Telecommunications, 2016

A Survey and Design of a Scalable Mobile Edge Cloud Platform for the Smart IoT Devices and It's Applications.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2016

2015
High-throughput transmission-quality-aware broadcast routing in cognitive radio networks.
Wirel. Networks, 2015

2014
Knowing a Good HOG Filter When You See It: Efficient Selection of Filters for Detection.
Proceedings of the Computer Vision - ECCV 2014, 2014

Semantic Object Selection.
Proceedings of the 2014 IEEE Conference on Computer Vision and Pattern Recognition, 2014

Poisoned GOOSE: Exploiting the GOOSE Protocol.
Proceedings of the Twelfth Australasian Information Security Conference, 2014

2013
Object extraction from T2 weighted brain MR image using histogram based gradient calculation.
Pattern Recognit. Lett., 2013

Quantifying the Multiple Cognitive Radio Interfaces Advantage.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

2012
Mitigating On-Off attacks in reputation-based secure data aggregation for wireless sensor networks.
Secur. Commun. Networks, 2012

Unified channel assignment for unicast and broadcast traffic in Cognitive Radio Networks.
Proceedings of the 37th Annual IEEE Conference on Local Computer Networks, 2012

2011
Parametric Differences between a Real-world Distributed Denial-of-Service Attack and a Flash Event.
Proceedings of the Sixth International Conference on Availability, 2011

2010
Use of IP Addresses for High Rate Flooding Attack Detection.
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010

Risk Modelling the Transition of SCADA System to IPv6.
Proceedings of the What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience, 2010

A Distributed Denial of Service Testbed.
Proceedings of the What Kind of Information Society? Governance, Virtuality, Surveillance, Sustainability, Resilience, 2010

2009
Characterising Anomalous Events Using Change - Point Correlation on Unsolicited Network Traffic.
Proceedings of the Identity and Privacy in the Internet Age, 2009

2008
A Novel Sliding Window Based Change Detection Algorithm for Asymmetric Traffic.
Proceedings of the IFIP International Conference on Network and Parallel Computing, 2008

2005
TCP-DR an Effective Protocol for Infrastructure based Wireless Networks.
Proceedings of the 2005 International Conference on Wireless Networks, 2005


  Loading...