Fazirulhisyam Hashim

Orcid: 0000-0003-1880-5643

According to our database1, Fazirulhisyam Hashim authored at least 101 papers between 2005 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
HOOPOE: High Performance and Efficient Anonymous Handover Authentication Protocol for Flying Out of Zone UAVs.
IEEE Trans. Veh. Technol., August, 2023

Machine and Deep Learning-based XSS Detection Approaches: A Systematic Literature Review.
J. King Saud Univ. Comput. Inf. Sci., July, 2023

Dynamic feature selection model for adaptive cross site scripting attack detection using developed multi-agent deep Q learning model.
J. King Saud Univ. Comput. Inf. Sci., June, 2023

Efficient Tag Grouping RFID Anti-Collision Algorithm for Internet of Things Applications Based on Improved K-Means Clustering.
IEEE Access, 2023

Feature Drift Aware for Intrusion Detection System Using Developed Variable Length Particle Swarm Optimization in Data Stream.
IEEE Access, 2023

Cloudlet Based Computing Optimization Using Variable-Length Whale Optimization and Differential Evolution.
IEEE Access, 2023

Joint Scheduling and Routing Optimization for Deterministic Hybrid Traffic in Time-Sensitive Networks Using Constraint Programming.
IEEE Access, 2023

2022
Worst-Case Latency Analysis for AVB Traffic Under Overlapping-Based Time-Triggered Windows in Time-Sensitive Networks.
IEEE Access, 2022

A Multi-Objective Routing Mechanism for Energy Management Optimization in SDN Multi-Control Architecture.
IEEE Access, 2022

2021
SELAMAT: A New Secure and Lightweight Multi-Factor Authentication Scheme for Cross-Platform Industrial IoT Systems.
Sensors, 2021

A lightweight and secure online/offline cross-domain authentication scheme for VANET systems in Industrial IoT.
PeerJ Comput. Sci., 2021

Critical Offset Optimizations for Overlapping-Based Time-Triggered Windows in Time-Sensitive Network.
IEEE Access, 2021

Heuristic Resource Allocation Algorithm for Controller Placement in Multi-Control 5G Based on SDN/NFV Architecture.
IEEE Access, 2021

6G Wireless Communications Networks: A Comprehensive Survey.
IEEE Access, 2021

Sustainable Peatland Management with IoT and Data Analytics.
Proceedings of the Smart and Sustainable Collaborative Networks 4.0, 2021

Performance Analyses of Adaptive Handover Decision Algorithm using Spectrum Aggregation in Long Term Evolution - Advanced Network.
Proceedings of the 26th IEEE Asia-Pacific Conference on Communications, 2021

A Modified Genetic Algorithm for Controller Placement Problem in SDN Distributed Network.
Proceedings of the 26th IEEE Asia-Pacific Conference on Communications, 2021

2020
Hybrid Multi-Level Detection and Mitigation of Clone Attacks in Mobile Wireless Sensor Network (MWSN).
Sensors, 2020

A three-dimensional pattern recognition localization system based on a Bayesian graphical model.
Int. J. Distributed Sens. Networks, 2020

Efficient authentication and re-authentication protocols for 4G/5G heterogeneous networks.
EURASIP J. Wirel. Commun. Netw., 2020

Normalized Advancement Based Totally Opportunistic Routing Algorithm With Void Detection and Avoiding Mechanism for Underwater Wireless Sensor Network.
IEEE Access, 2020

Fair Energy-Efficient Resource Allocation for Downlink NOMA Heterogeneous Networks.
IEEE Access, 2020

2019
Channel Coding Scheme for 5G Mobile Communication System for Short Length Message Transmission.
Wirel. Pers. Commun., 2019

Probability-based opportunity dynamic adaptation (PODA) of contention window for home M2M networks.
J. Netw. Comput. Appl., 2019

Resource allocation in heterogeneous cognitive radio sensor networks.
Int. J. Distributed Sens. Networks, 2019

Collaborative Adaptive Filtering Approach for the Identification of Complex-Valued Improper Signals.
Circuits Syst. Signal Process., 2019

Robust 3D Indoor Positioning System Based on Radio Map Using Bayesian Network.
Proceedings of the 5th IEEE World Forum on Internet of Things, 2019

Performance Evaluation of Backoff Misbehaviour in IEEE 802.11ah Using Evolutionary Game Theory.
Proceedings of the 89th IEEE Vehicular Technology Conference, 2019

2018
An Analysis of Periodogram Based on a Discrete Cosine Transform for Spectrum Sensing.
Wirel. Pers. Commun., 2018

Low Complexity Iterative-QR (IQR) Precoder Design Based on Structure Blocks for Massive MIMO System.
Wirel. Pers. Commun., 2018

6LoWPAN Route-Over with End-to-End Fragmentation and Reassembly Using Cross-Layer Adaptive Backoff Exponent.
Wirel. Pers. Commun., 2018

Impact of Packet Size in Adaptive Cognitive Radio Sensor Network.
Wirel. Commun. Mob. Comput., 2018

Clustering Transmission Opportunity Length (CTOL) Model over Cognitive Radio Network.
Sensors, 2018

An Adaptive Multi-Channel Assignment and Coordination Scheme for IEEE 802.11P/1609.4 in Vehicular Ad-Hoc Networks.
IEEE Access, 2018

2017
QoE-Driven Cross-Layer Downlink Scheduling for Heterogeneous Traffics Over 4G Networks.
Wirel. Pers. Commun., 2017

Feasibility of Green Network Deployment for Heterogeneous Networks.
Wirel. Pers. Commun., 2017

Erratum to: An overview of spectrum sensing techniques for cognitive LTE and LTE-A radio systems.
Telecommun. Syst., 2017

An overview of spectrum sensing techniques for cognitive LTE and LTE-A radio systems.
Telecommun. Syst., 2017

Design and simulation analysis of network-based fully distributed mobility management in flattened network architecture.
Telecommun. Syst., 2017

An effective approach for managing power consumption in cloud computing infrastructure.
J. Comput. Sci., 2017

On the authentication and re-authentication protocols in LTE-WLAN interworking architecture.
Trans. Emerg. Telecommun. Technol., 2017

Wireless network power optimisation using relay stations blossoming and withering technique.
Trans. Emerg. Telecommun. Technol., 2017

Detecting sybil attacks in clustered wireless sensor networks based on energy trust system (ETS).
Comput. Commun., 2017

Global Communications Newsletter.
IEEE Commun. Mag., 2017

Global Communications Newsletter.
IEEE Commun. Mag., 2017

Energy-Aware Fault Tolerant Task offloading of Mobile Cloud Computing.
Proceedings of the 5th IEEE International Conference on Mobile Cloud Computing, 2017

Analysis of Impact of RSS over Different Time Durations in an Indoor Localization System.
Proceedings of the Computational Science and Its Applications - ICCSA 2017, 2017

2016
Analysis on Target Detection and Classification in LTE Based Passive Forward Scattering Radar.
Sensors, 2016

Authentication process enhancements in WiMAX networks.
Secur. Commun. Networks, 2016

Review of Adaptive Cell Selection Techniques in LTE-Advanced Heterogeneous Networks.
J. Comput. Networks Commun., 2016

A comprehensive simulation study of a network-based distributed mobility management framework.
Int. J. Wirel. Mob. Comput., 2016

Hybrid channel gain prioritized access-aware cell association with interference mitigation in LTE-Advanced HetNets.
Int. J. Commun. Syst., 2016

A Survey and Taxonomy on Medium Access Control Strategies for Cooperative Communication in Wireless Networks: Research Issues and Challenges.
IEEE Commun. Surv. Tutorials, 2016

Efficient beamforming and spectral efficiency maximization in a joint transmission system using an adaptive particle swarm optimization algorithm.
Appl. Soft Comput., 2016

A new cooperative spectrum sensing scheme based on discrete cosine transform.
Proceedings of the IEEE 3rd International Symposium on Telecommunication Technologies, 2016

Distributed power control and beamforming for cognitive two-way relay networks using a game-theoretic approach.
Proceedings of the IEEE 3rd International Symposium on Telecommunication Technologies, 2016

Medium access prioritizing in the heterogeneous low-rate wireless PANs.
Proceedings of the IEEE 3rd International Symposium on Telecommunication Technologies, 2016

2015
An Adaptive Rate Allocation System to Mitigate Starvation Dilemma in Multi-Radio Multi-Hop Wireless Mesh Networks.
Wirel. Pers. Commun., 2015

An Adaptive Threshold Feedback Compression Scheme Based on Channel Quality Indicator (CQI) in Long Term Evolution (LTE) System.
Wirel. Pers. Commun., 2015

Design and evaluation of distributed and dynamic mobility management approach based on PMIPv6 and MIH protocols.
Wirel. Networks, 2015

An Energy-Aware Cross-Layer Cooperative MAC Protocol for Wireless Ad Hoc Networks.
J. Netw. Comput. Appl., 2015

Secure and Self-healing Control Centers of Critical Infrastructures using Intrusion Tolerance.
Int. J. Netw. Secur., 2015

Modeling of widely-linear quaternion valued systems using hypercomplex algorithms.
Proceedings of the 10th Asian Control Conference, 2015

2014
Performance Evaluation of Cost-Effective Multicast-Unicast Key Management Method.
Wirel. Pers. Commun., 2014

Malware analysis performance enhancement using cloud computing.
J. Comput. Virol. Hacking Tech., 2014

Multicast-Unicast Data Delivery Method in Wireless IPv6 Networks.
J. Netw. Syst. Manag., 2014

Lightweight decentralized multicast-unicast key management method in wireless IPv6 networks.
J. Netw. Comput. Appl., 2014

Review of Channel Quality Indicator Estimation Schemes for Multi-User MIMO in 3GPP LTE/LTE-A Systems.
KSII Trans. Internet Inf. Syst., 2014

Node Replication Attacks in Mobile Wireless Sensor Network: A Survey.
Int. J. Distributed Sens. Networks, 2014

Impact of the Deafness Problem on Clock Synchronization in a Wireless Sensor Network.
Proceedings of the 6th International Conference on Management of Emergent Digital EcoSystems, 2014

Performance analysis of Coordinated MultiPoint (CoMP) in long term evolution-advanced.
Proceedings of the IEEE 2nd International Symposium on Telecommunication Technologies, 2014

Distributed channel assignment based on congestion information in wireless mesh network.
Proceedings of the IEEE 2nd International Symposium on Telecommunication Technologies, 2014

Base station blossoming and withering technique for heterogeneous wireless networks using fuzzy logic.
Proceedings of the IEEE 2nd International Symposium on Telecommunication Technologies, 2014

A channel quality indicator (CQI) prediction scheme using feed forward neural network (FF-NN) technique for MU-MIMO LTE system.
Proceedings of the IEEE 2nd International Symposium on Telecommunication Technologies, 2014

A review of cloud security based on cryptographic mechanisms.
Proceedings of the 2014 International Symposium on Biometrics and Security Technologies, 2014

Multicast-unicast key management scheme in IPv6 networks.
Proceedings of the IEEE International Conference on Communications, 2014

2013
Reliable Key Management and Data Delivery Method in Multicast Over Wireless IPv6 Networks.
Wirel. Pers. Commun., 2013

FLAME: A Flexible and Low-Power Architecture for Wireless Mesh Networks.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Networks, 2013

Elastic fair Rate Allocation Scheme for Multi-Radio Wireless Mesh Networks.
Proceedings of the 24th IEEE Annual International Symposium on Personal, 2013

Base station location optimisation in LTE using Genetic Algorithm.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2013

Depth error concealment based on decision making.
Proceedings of the 2013 IEEE International Conference on Signal and Image Processing Applications, 2013

Second and subsequent fragments headers compression scheme for IPv6 header in 6LoWPAN network.
Proceedings of the Seventh International Conference on Sensing Technology, 2013

2012
On the negative selection and the danger theory inspired security for heterogeneous networks.
IEEE Wirel. Commun., 2012

Highly Available Smart Grid Control Centers through Intrusion Tolerance
CoRR, 2012

Secure group communication scheme in wireless IPv6 networks: An experimental test-bed.
Proceedings of the International Symposium on Communications and Information Technologies, 2012

Towards a Secure and Available Smart Grid Using Intrusion Tolerance.
Proceedings of the Internet and Distributed Computing Systems, 2012

An investigation of vegetation effect on the performance of IEEE 802.11n technology at 5.18 GHz.
Proceedings of the IET International Conference on Wireless Communications and Applications, 2012

Modeling of efficient key management method in multicast networks.
Proceedings of the 6th International Conference on Signal Processing and Communication Systems, 2012

An intrusion tolerant system for improving availability in smart grid control centers.
Proceedings of the 18th IEEE International Conference on Networks, 2012

An overview of attacks against digital watermarking and their respective countermeasures.
Proceedings of the 2012 International Conference on Cyber Security, 2012

2011
A generic sampling framework for improving anomaly detection in the next generation network.
Secur. Commun. Networks, 2011

Quality-improved and secure multicast delivery method in mobile IPv6 networks.
Proceedings of the 16th IEEE Symposium on Computers and Communications, 2011

The effect of fragmentation and header compression on IP-based sensor networks (6LoWPAN).
Proceedings of the IEEE 17th Asia-Pacific Conference on Communications, 2011

Effects of emission from different UWB short-range communication devices.
Proceedings of the IEEE 17th Asia-Pacific Conference on Communications, 2011

2010
Biologically Inspired Anomaly Detection and Security Control Frameworks for Complex Heterogeneous Networks.
IEEE Trans. Netw. Serv. Manag., 2010

A Biologically Inspired Framework for Mitigating Epidemic and Pandemic Attacks in the NGMN.
Proceedings of the 2010 IEEE Wireless Communications and Networking Conference, 2010

2009
On Accurate and Scalable Anomaly Detection in Next Generation Mobile Network.
Proceedings of IEEE International Conference on Communications, 2009

Forecasting-Based Sampling Decision for Accurate and Scalable Anomaly Detection.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

2008
Securing the next generation mobile network.
Secur. Commun. Networks, 2008

A Detection and Recovery Architecture Against DoS and Worm Attacks in NGMN.
Proceedings of IEEE International Conference on Communications, 2008

2005
Local Connectivity Scheme Analysis in Ad hoc On-demand Distance Vector (AODV) Routing Protocol.
Proceedings of the 4th International Conference on IT in Asia, 2005


  Loading...