Mohammad S. Obaidat

Orcid: 0000-0002-1569-9657

Affiliations:
  • University of Sharjah, College of Computing & Informatics, UAE
  • City College of New York, Department of Electrical Engineering, NY, USA
  • Fordham University, New York City, NY, USA
  • Ohio State University, Columbus, OH, USA (PhD 1986)


According to our database1, Mohammad S. Obaidat authored at least 851 papers between 1988 and 2024.

Collaborative distances:

Awards

IEEE Fellow

IEEE Fellow 2005, "For contributions to adaptive learning, pattern recognition and system simulation.".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Direct Position Determination With a Moving Extended Nested Array by Spatial Sparsity.
IEEE Internet Things J., February, 2024

Robust Multitarget Localization With Uncalibrated UAV Arrays: A Two-Stage Self-Calibration Method.
IEEE Internet Things J., February, 2024

An efficient privacy-preserved authentication technique based on conformable fractional chaotic map for TMIS under smart homes environments.
J. Supercomput., January, 2024

A probably secure biometric-based authentication and key agreement scheme for Internet of Drones.
Trans. Emerg. Telecommun. Technol., January, 2024

Privacy preserving content distribution framework for multidistributor DRM systems.
Secur. Priv., 2024

An Effective Learning Management System for Revealing Student Performance Attributes.
CoRR, 2024

2023
Container-based task scheduling in cloud-edge collaborative environment using priority-aware greedy strategy.
Clust. Comput., December, 2023

Robust Sparse Direct Localization of Smart Vehicle With Partly Calibrated Time Modulated Arrays.
IEEE Trans. Intell. Transp. Syst., November, 2023

Blockchain-based solutions for mobile crowdsensing: A comprehensive survey.
Comput. Sci. Rev., November, 2023

ECC-based Efficient and Secure Access Control Scheme for Content Centric Network-A Next Generation Internet.
Wirel. Pers. Commun., September, 2023

MADP-IIME: malware attack detection protocol in IoT-enabled industrial multimedia environment using machine learning approach.
Multim. Syst., June, 2023

Nondeterministic Evaluation Mechanism for User Recruitment in Mobile Crowd-Sensing.
ACM Trans. Sens. Networks, May, 2023

A Contactless Authentication System Based on WiFi CSI.
ACM Trans. Sens. Networks, May, 2023

A novel efficient and lightweight authentication scheme for secure smart grid communication systems.
J. Supercomput., May, 2023

Fuzzy-EPO Optimization Technique for Optimised Resource Allocation and Minimum Energy Consumption with the Brownout Algorithm.
Wirel. Pers. Commun., April, 2023

A COVID-19 X-ray image classification model based on an enhanced convolutional neural network and hill climbing algorithms.
Multim. Tools Appl., April, 2023

A Delay-Sensitive Multibase-Station Multichannel Access System for Smart Factory.
IEEE Syst. J., March, 2023

Deep Semantics Sorting of Voice-Interaction-Enabled Industrial Control System.
IEEE Internet Things J., February, 2023

AI-Driven Salient Soccer Events Recognition Framework for Next-Generation IoT-Enabled Environments.
IEEE Internet Things J., February, 2023

Edge-Assisted Intelligent Device Authentication in Cyber-Physical Systems.
IEEE Internet Things J., February, 2023

Supporting Science Areas.
Proceedings of the Body of Knowledge for Modeling and Simulation: A Handbook by the Society for Modeling and Simulation International, 2023

M&S Bok Core Areas and the Big Picture.
Proceedings of the Body of Knowledge for Modeling and Simulation: A Handbook by the Society for Modeling and Simulation International, 2023

Obstacle Adaptive Smooth Path Planning for Mobile Data Collector in the Internet of Things.
IEEE Trans. Sustain. Comput., 2023

REORDER++: Enhanced Randomized Real-Time Scheduling Strategy Against Side-Channel Attacks.
IEEE Trans. Netw. Sci. Eng., 2023

Cloud-Assisted Secure and Cost-Effective Authenticated Solution for Remote Wearable Health Monitoring System.
IEEE Trans. Netw. Sci. Eng., 2023

A Lightweight and Efficient Remote Data Authentication Protocol Over Cloud Storage Environment.
IEEE Trans. Netw. Sci. Eng., 2023

A Provably Secure Lightweight Key Agreement Protocol for Wireless Body Area Networks in Healthcare System.
IEEE Trans. Ind. Informatics, 2023

DeepAG: Attack Graph Construction and Threats Prediction With Bi-Directional Deep Learning.
IEEE Trans. Dependable Secur. Comput., 2023

Non-Newtonian fluid simulation and reconstruction from monocular videos.
Simul. Model. Pract. Theory, 2023

An efficient caching security approach for content-centric mobile networks in internet of things systems.
Secur. Priv., 2023

Indoor Visual Re-Localization for Long-Term Autonomous Robots Based on Object-Level Features and Semantic Relationships.
IEEE Robotics Autom. Lett., 2023

Edge-Assisted Real-Time Instance Segmentation for Resource-Limited IoT Devices.
IEEE Internet Things J., 2023

Classical versus reinforcement learning algorithms for unmanned aerial vehicle network communication and coverage path planning: A systematic literature review.
Int. J. Commun. Syst., 2023

A Comprehensive Review on Vision-Based Violence Detection in Surveillance Videos.
ACM Comput. Surv., 2023

Wireless Powered Mobile Edge Computing Networks: A Survey.
ACM Comput. Surv., 2023

Active-Passive Cascaded RIS-Assisted Receiver Design for Anti-Jamming Communications.
Proceedings of the IEEE International Conference on Communications, 2023

SD-Transformer: A System-Level Denoising Transformer for Encrypted Traffic Behavior Identification.
Proceedings of the IEEE Global Communications Conference, 2023

SMSDect: A Prediction Model for Smishing Attack Detection Using Machine Learning and Text Analysis.
Proceedings of the IEEE Global Communications Conference, 2023

Ransomware Attacks Detection Methodology to Protect IoT-Enabled Critical Infrastructures.
Proceedings of the IEEE Global Communications Conference, 2023

A Survey of DDoS Attacks Detection Schemes in SDN Environment.
Proceedings of the International Conference on Computer, 2023

An Efficient Anonymous Authentication Technique for TMIS under the Smart Home Environment.
Proceedings of the International Conference on Computer, 2023

Majority Voting-based Consensus Mechanism for UAVs Decision Making in Battlefield.
Proceedings of the International Conference on Computer, 2023

Multi-frame Correlated Representation Network for Video Super-Resolution.
Proceedings of the International Conference on Computer, 2023

DL-CMFD: Deep Learning-Based Copy-Move Forgery Detection Using Parallel Feature-Extractor.
Proceedings of the International Conference on Computer, 2023

Profit aware Resource Allocation in Fog Computing: A Stackelberg Game Approach.
Proceedings of the International Conference on Computer, 2023

Blockchain and AI-based Engine Fault Detection Scheme for Autonomous Vehicles.
Proceedings of the International Conference on Communications, 2023

SLA-SCA: Secure and Lightweight Authentication and Key Agreement Mechanism for Smart City Applications.
Proceedings of the International Conference on Communications, 2023

A Robust Remote Client Password Authentication Technique for Smart Cities E-Governance Applications.
Proceedings of the International Conference on Communications, 2023

Design of a Secure Machine Learning-Based Malware Detection and Analysis Scheme.
Proceedings of the International Conference on Communications, 2023

Blockchain-Based Energy Trading Scheme for EVs Coordination: A Smart Contract Approach.
Proceedings of the International Conference on Communications, 2023

Cryptanalysis and Improvement of a Blockchain Based Lightweight Authentication and Key Agreement Scheme for Internet of Vehicles.
Proceedings of the International Conference on Communications, 2023

2022
An intelligent system for complex violence pattern analysis and detection.
Int. J. Intell. Syst., December, 2022

On the Security of A Secure Anonymous Identity-Based Scheme in New Authentication Architecture for Mobile Edge Computing.
Wirel. Pers. Commun., 2022

Load-Balanced Topology Rebuilding for Disconnected Wireless Sensor Networks With Delay Constraint.
IEEE Trans. Sustain. Comput., 2022

Efficient design of an authenticated key agreement protocol for dew-assisted IoT systems.
J. Supercomput., 2022

Authenticated Key Agreement Scheme With User Anonymity and Untraceability for 5G-Enabled Softwarized Industrial Cyber-Physical Systems.
IEEE Trans. Intell. Transp. Syst., 2022

An Efficient and Provably Secure Certificateless Protocol for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2022

SEAT: Secure and Energy Efficient Anonymous Authentication With Trajectory Privacy-Preserving Scheme for Marine Traffic Management.
IEEE Trans. Green Commun. Netw., 2022

Secure Edge-Aided Computations for Social Internet-of-Things Systems.
IEEE Trans. Comput. Soc. Syst., 2022

Edge-Learning-Based Hierarchical Prefetching for Collaborative Information Streaming in Social IoT Systems.
IEEE Trans. Comput. Soc. Syst., 2022

Enabling Efficient Data Sharing With Auditable User Revocation for IoV Systems.
IEEE Syst. J., 2022

Service Chain Caching and Workload Scheduling in Mobile Edge Computing.
IEEE Syst. J., 2022

A simulation model to reduce the fuel consumption through efficient road traffic modelling.
Simul. Model. Pract. Theory, 2022

Modeling and simulation of a novel secure quantum key distribution (SQKD) for ensuring data security in cloud environment.
Simul. Model. Pract. Theory, 2022

A hybrid MCDM framework and simulation analysis for the assessment of worst polluted cities.
Simul. Model. Pract. Theory, 2022

FluidMLP: A general method for learning Lagrangian fluid simulation.
Simul. Model. Pract. Theory, 2022

Prediction of heart abnormalities using deep learning model and wearabledevices in smart health homes.
Multim. Tools Appl., 2022

Blockchain-Enhanced Federated Learning Market With Social Internet of Things.
IEEE J. Sel. Areas Commun., 2022

Energy-Efficient and Secure Communication Toward UAV Networks.
IEEE Internet Things J., 2022

An access control protocol for IoT-based critical infrastructure in smart grid environment.
Int. J. Commun. Syst., 2022

A PUF-based lightweight authentication and key agreement protocol for smart UAV networks.
IET Commun., 2022

Fuzzy Logic in Surveillance Big Video Data Analysis: Comprehensive Review, Challenges, and Research Directions.
ACM Comput. Surv., 2022

The Application of the Blockchain Technology in Voting Systems: A Review.
ACM Comput. Surv., 2022

Advanced computing and communication technologies for Internet of Drones.
Comput. Commun., 2022

Efficient privacy-preserving anonymous authentication scheme for human predictive online education system.
Clust. Comput., 2022

Deep Neural Networks for Dynamic Attribute based Encryption in IoT-Fog Environment.
Proceedings of the IEEE International Conference on Communications, 2022

xDIoT: Leveraging Reliable Cross-domain Communication Across IoT Networks.
Proceedings of the IEEE International Conference on Communications, 2022

RAKI: A Robust ECC Based Three-party Authentication and Key Agreement Scheme for Medical IoT.
Proceedings of the IEEE Global Communications Conference, 2022

Network Traffic Prediction for Intelligent Transportation Systems: A Reinforcement Learning Approach.
Proceedings of the IEEE Global Communications Conference, 2022

A Comprehensive Study on Artificial Intelligence and Blockchain Driven Beyond 5G Networks.
Proceedings of the International Conference on Computer, 2022

Clustering-based Optimal Resource Allocation Strategy in Title Insurance Underwriting.
Proceedings of the International Conference on Computer, 2022

SaFaR: Solana Blockchain-based Optimal Route Selection Scheme for Cab Aggregators.
Proceedings of the International Conference on Computer, 2022

Metaverse assisted Telesurgery in Healthcare 5.0: An interplay of Blockchain and Explainable AI.
Proceedings of the International Conference on Computer, 2022

Intrusion Detection System using Aggregation of Machine Learning Algorithms.
Proceedings of the International Conference on Computer, 2022

On the Security of Content key Distribution Framework for DRM systems.
Proceedings of the International Conference on Communications, 2022

An Efficient Authentication Technique using Convolution Chebyshev Chaotic Maps for TMIS.
Proceedings of the International Conference on Communications, 2022

An Efficient Digital Short Signature Scheme using CCM for HC-IoT Environments.
Proceedings of the International Conference on Communications, 2022

On the security of authenticated key agreement schemes for e-healthcare.
Proceedings of the International Conference on Communications, 2022

BeHAutH: A KNN-Based Classification Scheme for Behavior-Based Authentication in Web 3.0.
Proceedings of the International Conference on Communications, 2022

Internet-of-Explainable-Digital-Twins: A Case Study of Versatile Corn Production Ecosystem.
Proceedings of the International Conference on Communications, 2022

An Offline Assistance Tool for Visually Impaired People Based on Image Captioning.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2022

6G Based Green Mobile Edge Computing for Internet of Things (IoT).
Proceedings of the Green Mobile Cloud Computing, 2022

2021
Internet of UAVs Based Remote Health Monitoring: An Online eHealth System.
IEEE Wirel. Commun., 2021

Importance-Different Charging Scheduling Based on Matroid Theory for Wireless Rechargeable Sensor Networks.
IEEE Trans. Wirel. Commun., 2021

Resource Scheduling Based on Priority Ladders for Multiple Performance Requirements in Wireless Body Area Networks.
IEEE Trans. Veh. Technol., 2021

An Unlinkable Authenticated Key Agreement With Collusion Resistant for VANETs.
IEEE Trans. Veh. Technol., 2021

Utility-Aware Charging Scheduling for Multiple Mobile Chargers in Large-Scale Wireless Rechargeable Sensor Networks.
IEEE Trans. Sustain. Comput., 2021

A lightweight anonymous authentication scheme for secure cloud computing services.
J. Supercomput., 2021

Joint Computing and Caching in 5G-Envisioned Internet of Vehicles: A Deep Reinforcement Learning-Based Traffic Control System.
IEEE Trans. Intell. Transp. Syst., 2021

Editorial: Special Section on Pervasive Edge Computing for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2021

Network Traffic Prediction in Industrial Internet of Things Backbone Networks: A Multitask Learning Mechanism.
IEEE Trans. Ind. Informatics, 2021

A Reinforcement Learning-Based Network Traffic Prediction Mechanism in Intelligent Internet of Things.
IEEE Trans. Ind. Informatics, 2021

DiLSe: Lattice-Based Secure and Dependable Data Dissemination Scheme for Social Internet of Vehicles.
IEEE Trans. Dependable Secur. Comput., 2021

An effective mobile-healthcare emerging emergency medical system using conformable chaotic maps.
Soft Comput., 2021

A Strategy to Alleviate Rush Hour Traffics in Urban Areas Based on School-Trip Commute Information.
IEEE Syst. J., 2021

Dynamic Multiworkflow Deadline and Budget Constrained Scheduling in Heterogeneous Distributed Systems.
IEEE Syst. J., 2021

Extending Network Lifetime for Wireless Rechargeable Sensor Network Systems Through Partial Charge.
IEEE Syst. J., 2021

Computational Efficient Authenticated Digital Content Distribution Frameworks for DRM Systems: Review and Outlook.
IEEE Syst. J., 2021

IoT-Enabled Light Intensity-Controlled Seamless Highway Lighting System.
IEEE Syst. J., 2021

New Clustering-Based Semantic Service Selection and User Preferential Model.
IEEE Syst. J., 2021

Chaos-Based Content Distribution Framework for Digital Rights Management System.
IEEE Syst. J., 2021

A Lightweight Provably Secure Digital Short-Signature Technique Using Extended Chaotic Maps for Human-Centered IoT Systems.
IEEE Syst. J., 2021

An Efficient, Robust, and Lightweight Subtree-Based Three-Factor Authentication Procedure for Large-Scale DWSN in Random Oracle.
IEEE Syst. J., 2021

Comment on "Lightweight Secure Message Broadcasting Protocol for Vehicle-to-Vehicle Communication".
IEEE Syst. J., 2021

A Provably Secure and Lightweight Identity-Based Two-Party Authenticated Key Agreement Protocol for IIoT Environments.
IEEE Syst. J., 2021

LAAC: Lightweight Lattice-Based Authentication and Access Control Protocol for E-Health Systems in IoT Environments.
IEEE Syst. J., 2021

SFEEC: Provably Secure Signcryption-Based Big Data Security Framework for Energy-Efficient Computing Environment.
IEEE Syst. J., 2021

Novel Multiparameter Detection and Recovery Technique for Diverse Network Systems.
IEEE Syst. J., 2021

URJA: Usage Jammer as a Resource Allocation for Secure Transmission in a CR-NOMA-Based 5G Femtocell System.
IEEE Syst. J., 2021

Simulation system for collisions and two-way coupling of non-Newtonian fluids and solids.
Simul. Model. Pract. Theory, 2021

Learning automata and reservation based secure smart parking system: Methodology and simulation analysis.
Simul. Model. Pract. Theory, 2021

Modeling and simulation of urban air quality with a 2-phase assessment technique.
Simul. Model. Pract. Theory, 2021

Guest editorial special issue on "P2P computing for deep learning".
Peer-to-Peer Netw. Appl., 2021

A Federated Reinforcement Learning Framework for Incumbent Technologies in Beyond 5G Networks.
IEEE Netw., 2021

Movement-Based Solutions to Energy Limitation in Wireless Sensor Networks: State of the Art and Future Trends.
IEEE Netw., 2021

ATPS: an adaptive trajectory prediction system based on semantic information for dynamic objects.
Neural Comput. Appl., 2021

Efficient Identity-Based Distributed Decryption Scheme for Electronic Personal Health Record Sharing System.
IEEE J. Sel. Areas Commun., 2021

A secure and privacy preserving lightweight authentication scheme for smart-grid communication using elliptic curve cryptography.
J. Syst. Archit., 2021

A high efficient multi-robot simultaneous localization and mapping system using partial computing offloading assisted cloud point registration strategy.
J. Parallel Distributed Comput., 2021

Contact Tracing Incentive for COVID-19 and Other Pandemic Diseases From a Crowdsourcing Perspective.
IEEE Internet Things J., 2021

An Efficient Container Management Scheme for Resource-Constrained Intelligent IoT Devices.
IEEE Internet Things J., 2021

The Role of Internet of Things to Control the Outbreak of COVID-19 Pandemic.
IEEE Internet Things J., 2021

CoMSeC++: PUF-based secured light-weight mutual authentication protocol for Drone-enabled WSN.
Comput. Networks, 2021

AI-Enabled Blockchain-Based Access Control for Malicious Attacks Detection and Mitigation in IoE.
IEEE Consumer Electron. Mag., 2021

IEEE Access Special Section Editorial: Artificial Intelligence (AI)-Empowered Intelligent Transportation Systems.
IEEE Access, 2021

Joint User Pairing and Resource Allocation for SWIPT-Enabled Cooperative D2D Communications.
Proceedings of the ICC 2021, 2021

BCovX: Blockchain-based COVID Diagnosis Scheme using Chest X-Ray for Isolated Location.
Proceedings of the ICC 2021, 2021

MedBlock: An AI-enabled and Blockchain-driven Medical Healthcare System for COVID-19.
Proceedings of the ICC 2021, 2021

SPCS-IoTEH: Secure Privacy-Preserving Communication Scheme for IoT-Enabled e-Health Applications.
Proceedings of the ICC 2021, 2021

Encrypted Medical Image Storage in DNA Domain.
Proceedings of the ICC 2021, 2021

HTFM: Hybrid Traffic-Flow Forecasting Model for Intelligent Vehicular Ad hoc Networks.
Proceedings of the ICC 2021, 2021

Blockchain Based Architecture and Solution for Secure Digital Payment System.
Proceedings of the ICC 2021, 2021

PAMI-Anonymous Password Authentication Protocol for Medical Internet of Things.
Proceedings of the IEEE Global Communications Conference, 2021

TruClu: Trust Based Clustering Mechanism in Software Defined Vehicular Networks.
Proceedings of the IEEE Global Communications Conference, 2021

Location based Routing in Opportunistic Networks using Cascade Learning.
Proceedings of the International Conference on Computer, 2021

Blockchain Enabled Electronics Medical System Proposed Framework with Research Directions.
Proceedings of the International Conference on Computer, 2021

Performance Analysis of the Spectrum Access Strategies in Cognitive Radio Networks.
Proceedings of the International Conference on Computer, 2021

Blockchain and Multiple Linear Regression-based Energy Trading Scheme for Electric Vehicles.
Proceedings of the International Conference on Computer, 2021

Amalgamation of Blockchain and AI to Classify Malicious Behavior of Autonomous Vehicles.
Proceedings of the International Conference on Computer, 2021

Efficient and Secure Design of ID-3PAKA Protocol Using ECC.
Proceedings of the International Conference on Computer, 2021

SCHOOL: Spectrum Allocation for D2D Communication Enabled HetNet using Stackelberg and Coalition Formation Game.
Proceedings of the International Conference on Computer, 2021

Machine Learning-based Currency Information Retrieval for Aiding the Visually Impaired People.
Proceedings of the International Conference on Computer, 2021

Privacy Preserving Location-based Content Distribution Framework for Digital Rights Management Systems.
Proceedings of the International Conference on Communications, 2021

An Effective Fair Off-Line Electronic Cash Protocol using Extended Chaotic Maps with Anonymity Revoking Trustee.
Proceedings of the International Conference on Communications, 2021

XAI-AV: Explainable Artificial Intelligence for Trust Management in Autonomous Vehicles.
Proceedings of the International Conference on Communications, 2021

A Robust Anonymous Authentication Scheme using Biometrics for Digital Rights Management System.
Proceedings of the International Conference on Communications, 2021

Capsule: All you need to know about Tactile Internet in a Nutshell.
Proceedings of the International Conference on Communications, 2021

Classification of Soil Images using Convolution Neural Networks.
Proceedings of the International Conference on Communications, 2021

Study of Power Efficient 5G Mobile Edge Computing.
Mobile Edge Computing, 2021

2020
Efficient and Secure Anonymous Authentication With Location Privacy for IoT-Based WBANs.
IEEE Trans. Ind. Informatics, 2020

When Deep Reinforcement Learning Meets 5G-Enabled Vehicular Networks: A Distributed Offloading Framework for Traffic Big Data.
IEEE Trans. Ind. Informatics, 2020

Intelligent Secure Ecosystem Based on Metaheuristic and Functional Link Neural Network for Edge of Things.
IEEE Trans. Ind. Informatics, 2020

An efficient key authentication procedure for IND-CCA2 secure Paillier-based cryptosystem.
Soft Comput., 2020

An approach for solving fully fuzzy multi-objective linear fractional optimization problems.
Soft Comput., 2020

Loosely Coupled Cloud Robotic Framework for QoS-Driven Resource Allocation-Based Web Service Composition.
IEEE Syst. J., 2020

Cache-Aware Computation Offloading in IoT Systems.
IEEE Syst. J., 2020

PFCBAS: Pairing Free and Provable Certificate-Based Aggregate Signature Scheme for the e-Healthcare Monitoring System.
IEEE Syst. J., 2020

An Efficient Elliptic Curve Cryptography-Based Without Pairing KPABE for Internet of Things.
IEEE Syst. J., 2020

ORCID: Opportunistic Reconnectivity for Network Management in the Presence of Dumb Nodes in Wireless Sensor Networks.
IEEE Syst. J., 2020

WmA-MiFN: A Weighted Majority and Auction Game Based Green Ultra-Dense Micro-Femtocell Network System.
IEEE Syst. J., 2020

MEGAN: Multipurpose Energy-Efficient, Adaptable, and Low-Cost Wireless Sensor Node for the Internet of Things.
IEEE Syst. J., 2020

A Secure Three-Factor User Authentication Protocol With Forward Secrecy for Wireless Medical Sensor Network Systems.
IEEE Syst. J., 2020

A Lightweight Privacy-Preserving Authentication Protocol for VANETs.
IEEE Syst. J., 2020

An Adaptive Grid Frequency Support Mechanism for Energy Management in Cloud Data Centers.
IEEE Syst. J., 2020

Edge Computing Based Healthcare Systems: Enabling Decentralized Health Monitoring in Internet of Medical Things.
IEEE Netw., 2020

PRATIT: a CNN-based emotion recognition system using histogram equalization and data augmentation.
Multim. Tools Appl., 2020

Blockchain-based identity management systems: A review.
J. Netw. Comput. Appl., 2020

An enhanced mutual authentication and key establishment protocol for TMIS using chaotic map.
J. Inf. Secur. Appl., 2020

An efficient and provable certificate-based proxy signature scheme for IIoT environment.
Inf. Sci., 2020

Efficient and Provably Secure Multireceiver Signcryption Scheme for Multicast Communication in Edge Computing.
IEEE Internet Things J., 2020

Corrections to "A Cooperative Quality-Aware Service Access System for Social Internet of Vehicles".
IEEE Internet Things J., 2020

Prolonging lifetime for wireless rechargeable sensor networks through sleeping and charging scheduling.
Int. J. Commun. Syst., 2020

Routing and collision avoidance techniques for unmanned aerial vehicles: Analysis, optimal solutions, and future directions.
Int. J. Commun. Syst., 2020

Power-saving policies for annual energy cost savings in green computing.
Int. J. Commun. Syst., 2020

An efficient authentication and key agreement scheme for secure smart grid communication services.
Int. J. Commun. Syst., 2020

Statistical vertical reduction-based data abridging technique for big network traffic dataset.
Int. J. Commun. Syst., 2020

Comparative analysis of IoT based products, technology and integration of IoT with cloud computing.
IET Networks, 2020

E2CA-SM: an energy-efficient channel allocation with sleep mode for base station in fifth-generation-based cellular network systems.
IET Networks, 2020

Scalable and efficient authentication scheme for secure smart grid communication.
IET Networks, 2020

Gateway-oriented two-server password authenticated key exchange protocol for unmanned aerial vehicles in mobile edge computing.
IET Commun., 2020

A decentralised approach to privacy preserving trajectory mining.
Future Gener. Comput. Syst., 2020

SEAL: Self-adaptive AUV-based localization for sparsely deployed Underwater Sensor Networks.
Comput. Commun., 2020

Efficient and secure content dissemination architecture for content centric network using ECC-based public key infrastructure.
Comput. Commun., 2020

Optimized Time Synchronized Multilayer MAC Protocol for WSN Using Relay Nodes.
Ad Hoc Sens. Wirel. Networks, 2020

A Novel Identity-based Deniable Authentication Protocol Using Bilinear Pairings for Mobile Ad Hoc Networks.
Ad Hoc Sens. Wirel. Networks, 2020

An Authenticated Key Exchange Protocol for Multi-Server Architecture in 5G Networks.
IEEE Access, 2020

SDN based Network Traffic Routing in Vehicular Networks: A Scheme and Simulation Analysis.
Proceedings of the 10th International Conference on Simulation and Modeling Methodologies, 2020

Amalgamation of Fog Computing and Software Defined Networking in Healthcare 4.0: The Challenges, and a Way Forward.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

A Novel Anonymous Authentication and Key Agreement Scheme for Smart Grid.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

An Enhanced Lightweight Authentication Scheme for Secure Access to Cloud Data.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

Energy-efficient Collaborative Offloading for Multiplayer Games with Cache-Aided MEC.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Towards Wearable Sensing Enabled Healthcare Framework for Elderly Patients.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Adaptive Software Defined Node Deployment for Green Internet of Things.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

BUA: A Blockchain-based Unlinkable Authentication in VANETs.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

CPNDD: Content Placement Approach in Content Centric Networking.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Reinforcement Learning-Based Routing Protocol for Opportunistic Networks.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

SensOrch: QoS-Aware Resource Orchestration for Provisioning Sensors-as-a-Service.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

SAC-FIIoT: Secure Access Control Scheme for Fog-Based Industrial Internet of Things.
Proceedings of the IEEE Global Communications Conference, 2020

Activity-Aware Data Rate Tuning in Wireless Body Area Networks.
Proceedings of the IEEE Global Communications Conference, 2020

Value-driven Cache Replacement Strategy in Mobile Edge Computing.
Proceedings of the IEEE Global Communications Conference, 2020

BDoTs: Blockchain-based Evaluation Scheme for Online Teaching under COVID-19 Environment.
Proceedings of the International Conference on Computer, 2020

Automatic Spine Bone Segmentation and Feature Extraction in Computed Tomography Images for Biometric Recognition.
Proceedings of the International Conference on Computer, 2020

An Efficient Robust Lightweight Remote User Authentication Protocol using Extended Chaotic Maps.
Proceedings of the International Conference on Computer, 2020

New Efficient QERPKC based on Partial Discrete Logarithm Problem.
Proceedings of the International Conference on Computer, 2020

Privacy Assessment of Fitness Tracker Devices.
Proceedings of the International Conference on Computer, 2020

A Secure Authentication Mechanism for Wireless Sensor Networks.
Proceedings of the International Conference on Computer, 2020

BITS: A Blockchain-driven Intelligent Scheme for Telesurgery System.
Proceedings of the International Conference on Computer, 2020

Research on Robot's Indoor Object Finding Strategy Based on Semantic Relatedness.
Proceedings of the International Conference on Communications, 2020

Fast Local Map Construction of Robot Using Semantic Priors.
Proceedings of the International Conference on Communications, 2020

A Novel Approach to Predict the Real Time Sentimental Analysis by Naive Bayes & RNN Algorithm during the COVID Pandemic in UAE.
Proceedings of the International Conference on Communications, 2020

A Post Dynamic Clustering Approach for Classification-based Image Retrieval.
Proceedings of the International Conference on Communications, 2020

Parallelization of Global Sequence Alignment on Graphics Processing Unit.
Proceedings of the International Conference on Communications, 2020

HeaL: A blockchain-envisioned signcryption scheme for healthcare IoT ecosystems.
Proceedings of the International Conference on Communications, 2020

Interplay of Machine Learning and Software Engineering for Quality Estimations.
Proceedings of the International Conference on Communications, 2020

2019
Quality of Service Optimization in an IoT-Driven Intelligent Transportation System.
IEEE Wirel. Commun., 2019

Fog Computing for Smart Grid Systems in the 5G Environment: Challenges and Solutions.
IEEE Wirel. Commun., 2019

Mobi-Flow: Mobility-Aware Adaptive Flow-Rule Placement in Software-Defined Access Network.
IEEE Trans. Mob. Comput., 2019

Quality-Assured Secured Load Sharing in Mobile Cloud Networking Environment.
IEEE Trans. Cloud Comput., 2019

Duality-based branch-bound computational algorithm for sum-of-linear-fractional multi-objective optimization problem.
Soft Comput., 2019

A Lightweight and Provably Secure Key Agreement System for a Smart Grid With Elliptic Curve Cryptography.
IEEE Syst. J., 2019

LA-MHR: Learning Automata Based Multilevel Heterogeneous Routing for Opportunistic Shared Spectrum Access to Enhance Lifetime of WSN.
IEEE Syst. J., 2019

A New Scheme for IoT Service Function Chains Orchestration in SDN-IoT Network Systems.
IEEE Syst. J., 2019

RILoD: Reduction of Information Loss in a WSN System in the Presence of Dumb Nodes.
IEEE Syst. J., 2019

Service Degradability Supported by Forecasting System in Optical Data Center Networks.
IEEE Syst. J., 2019

A New Detection and Prevention System for ARP Attacks Using Static Entry.
IEEE Syst. J., 2019

An Energy Sensitive Computation Offloading Strategy in Cloud Robotic Network Based on GA.
IEEE Syst. J., 2019

Efficient Network Resource Preallocation on Demand in Multitenant Cloud Systems.
IEEE Syst. J., 2019

Comparative Study of Different Cost Functions Between Neighbors for Optimizing Energy Dissipation in WSN.
IEEE Syst. J., 2019

M-MEMHS: Modified Minimization of Error in Multihop System for Localization of Unknown Sensor Nodes.
IEEE Syst. J., 2019

A novel security scheme for behavioral authentication systems based on keystroke dynamics.
Secur. Priv., 2019

Security analysis on "mutual authentication scheme for multimedia medical information systems".
Secur. Priv., 2019

Address resolution protocol spoofing attacks and security approaches: A survey.
Secur. Priv., 2019

Edge Computing-Based Security Framework for Big Data Analytics in VANETs.
IEEE Netw., 2019

Resource-Optimized Multiarmed Bandit-Based Offload Path Selection in Edge UAV Swarms.
IEEE Internet Things J., 2019

Dynamic switch migration with noncooperative game towards control plane scalability in SDN.
Int. J. Commun. Syst., 2019

ADYTIA: Adaptive and Dynamic TCP Interface Architecture for heterogeneous networks.
Int. J. Commun. Syst., 2019

Anonymous identity authentication mechanism for hybrid architecture in mobile crowd sensing networks.
Int. J. Commun. Syst., 2019

An energy sensitive system framework for cloud robotic network.
Int. J. Commun. Syst., 2019

Swarm intelligence-based radio resource management for V2V-based D2D communication.
Int. J. Commun. Syst., 2019

Efficient and secure business model for content centric network using elliptic curve cryptography.
Int. J. Commun. Syst., 2019

ElGamal cryptosystem-based secure authentication system for cloud-based IoT applications.
IET Networks, 2019

TACRM: trust access control and resource management mechanism in fog computing.
Hum. centric Comput. Inf. Sci., 2019

TILAA: Tactile Internet-based Ambient Assistant Living in fog environment.
Future Gener. Comput. Syst., 2019

Partial Computing Offloading Assisted Cloud Point Registration in Multi-robot SLAM.
CoRR, 2019

A Comparative Study on Frameworks, MAC Layer Protocols and Open Research Issues in Internet of Things.
Ad Hoc Sens. Wirel. Networks, 2019

Secure Reactive Fast Proxy MIPv6-Based Network Mobility (SRFP-NEMO) for Vehicular Ad-hoc Networks (VANETs).
Ad Hoc Sens. Wirel. Networks, 2019

Distributed task allocation algorithm based on connected dominating set for WSANs.
Ad Hoc Networks, 2019

Handover Management Approach for 5G Software Defined Vehicular Networks: A Scheme and Simulation Analysis.
Proceedings of the 9th International Conference on Simulation and Modeling Methodologies, 2019

A novel energy optimization approach for artificial intelligence-enabled massive internet of things.
Proceedings of the 2019 Summer Simulation Conference, 2019

Enhancing ANDSF for Extended Wi-Fi Coverage.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019

Service Management Algorithm-based on Security Monitoring Mechanism for Fog IoT Users in Fog Networks.
Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, 2019

Missing Value Imputations by Rule-Based Incomplete Data Fuzzy Modeling.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

WDM-MDM Silicon-Based Optical Switching for Data Center Networks.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

DLRS: Deep Learning-Based Recommender System for Smart Healthcare Ecosystem.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

False-Locality Attack Detection Using CNN in Named Data Networking.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Secure Beamforming Design for MISO SWIPT Systems: An Indirectly Optimized Approach.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

LSTM-Based Detection for Timing Attacks in Named Data Network.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Traffic Measurement Optimization Based on Reinforcement Learning in Large-Scale IP Backbone Networks.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Two-Tier Ensemble Model for Demand Side Prediction in Smart Grid Environment.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

DENSE: Dynamic Edge Node Selection for Safety-as-a-Service.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Anomaly Detection Based on Spatio-Temporal and Sparse Features of Network Traffic in VANETs.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

A Novel Multi-Path Anonymous Randomized Key Distribution Scheme for Geo Distributed Networks.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Multi-Party Secure Collaborative Filtering for Recommendation Generation.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

AClog: Attack Chain Construction Based on Log Correlation.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

The School District Reorganization by Combining with Traffic Congestion Data.
Proceedings of the 2019 International Conference on Computer, 2019

An Efficient EUF-ID-CMA Secure Identity-based Short Signature Scheme using Discrete Logarithm.
Proceedings of the 2019 International Conference on Computer, 2019

A Novel Data Compression Technique Incorporated with Computer Offloading in RGB-D SLAM.
Proceedings of the 2019 International Conference on Computer, 2019

HaBiTs: Blockchain-based Telesurgery Framework for Healthcare 4.0.
Proceedings of the 2019 International Conference on Computer, 2019

A Secure Identity-based Deniable Authentication Protocol for MANETs.
Proceedings of the 2019 International Conference on Computer, 2019

Analysis of Authentication System Based on Keystroke Dynamics.
Proceedings of the 2019 International Conference on Computer, 2019

BloHosT: Blockchain Enabled Smart Tourism and Hospitality Management.
Proceedings of the 2019 International Conference on Computer, 2019

2018
GTCCS: A Game Theoretical Collaborative Charging Scheduling for On-Demand Charging Architecture.
IEEE Trans. Veh. Technol., 2018

TSCA: A Temporal-Spatial Real-Time Charging Scheduling Algorithm for On-Demand Architecture in Wireless Rechargeable Sensor Networks.
IEEE Trans. Mob. Comput., 2018

An adaptive task allocation technique for green cloud computing.
J. Supercomput., 2018

Bayesian Cooperative Coalition Game as a Service for RFID-Based Secure QoS Management in Mobile Cloud.
IEEE Trans. Emerg. Top. Comput., 2018

Learning Automata-Based Data Aggregation Tree Construction Framework for Cyber-Physical Systems.
IEEE Syst. J., 2018

Border Surveillance With WSN Systems in a Distributed Manner.
IEEE Syst. J., 2018

DEMANDS: Distributed Energy Management Using Noncooperative Scheduling in Smart Grid.
IEEE Syst. J., 2018

Situation-Aware Protocol Switching in Software-Defined Wireless Sensor Network Systems.
IEEE Syst. J., 2018

A TAS-Model-Based Algorithm for Rule Redundancy Detection and Scene Scheduling in Smart Home Systems.
IEEE Syst. J., 2018

On the Effects of Communication Range Shrinkage of Sensor Nodes in Mobile Wireless Sensor Networks Due to Adverse Environmental Conditions.
IEEE Syst. J., 2018

Novel Framework of Risk-Aware Virtual Network Embedding in Optical Data Center Networks.
IEEE Syst. J., 2018

Cryptography-Based Misbehavior Detection and Trust Control Mechanism for Opportunistic Network Systems.
IEEE Syst. J., 2018

A Collaborative Filtering Recommendation-Based Scheme for WLANs With Differentiated Access Service.
IEEE Syst. J., 2018

Soft-WSN: Software-Defined WSN Management System for IoT Applications.
IEEE Syst. J., 2018

QoS Aware Predictive Radio Resource Management Approach Based on MIH Protocol.
IEEE Syst. J., 2018

Local Similarity Imputation Based on Fast Clustering for Incomplete Data in Cyber-Physical Systems.
IEEE Syst. J., 2018

State of the art and perspectives on traditional and emerging biometrics: A survey.
Secur. Priv., 2018

A systematic review on security issues in vehicular ad hoc network.
Secur. Priv., 2018

A comparative study and analysis of some pseudorandom number generator algorithms.
Secur. Priv., 2018

Submission and citation practices and Security and Privacy's commitment to integrity and ethics.
Secur. Priv., 2018

Inaugural Editorial: A Message from the Founding Editor-in-Chief.
Secur. Priv., 2018

Chebyshev chaotic map-based ID-based cryptographic model using subtree and fuzzy-entity data sharing for public key cryptography.
Secur. Priv., 2018

Challenges and techniques in Big data security and privacy: A review.
Secur. Priv., 2018

SeDaTiVe: SDN-Enabled Deep Learning Architecture for Network Traffic Control in Vehicular Cyber-Physical Systems.
IEEE Netw., 2018

A 3D neural network for moving microorganism extraction.
Neural Comput. Appl., 2018

On the placement of controllers in software-Defined-WAN using meta-heuristic approach.
J. Syst. Softw., 2018

Broadcast tree construction framework in tactile internet via dynamic algorithm.
J. Syst. Softw., 2018

Hybrid charging scheduling schemes for three-dimensional underwater wireless rechargeable sensor networks.
J. Syst. Softw., 2018

A Cooperative Quality-Aware Service Access System for Social Internet of Vehicles.
IEEE Internet Things J., 2018

FMD: A DoS mitigation scheme based on flow migration in software-defined networking.
Int. J. Commun. Syst., 2018

CFR: A cooperative link failure recovery scheme in software-defined networks.
Int. J. Commun. Syst., 2018

Secure cognitive radio-based synchronized transmission of 5G signals using massive MIMO-OFDM-ES.
Int. J. Commun. Syst., 2018

Anonymous and expeditious mobile user authentication scheme for GLOMONET environments.
Int. J. Commun. Syst., 2018

Deployment and validation of out of band IP traceback approach (OBTA) in wireless mesh network.
Int. J. Commun. Syst., 2018

MIMO antenna selection using biogeography-based optimization with nonlinear migration models.
Int. J. Commun. Syst., 2018

Web service discovery utilizing logical reasoning and semantic similarity.
Int. J. Commun. Syst., 2018

Spectrum allocation in cognitive radio networks using chaotic biogeography-based optimisation.
IET Networks, 2018

Smart mobility management in 5G heterogeneous networks.
IET Networks, 2018

Learning automaton-based self-protection algorithm for wireless sensor networks.
IET Networks, 2018

Efficient online/offline IBSS protocol using partial discrete logarithm for WSNs.
IET Networks, 2018

A robust and efficient password-based conditional privacy preserving authentication and group-key agreement protocol for VANETs.
Future Gener. Comput. Syst., 2018

Secure and Sustainable Load Balancing of Edge Data Centers in Fog Computing.
IEEE Commun. Mag., 2018

Reversible Image Mosaic Technology Providing Large Protection Size and High Image Quality.
Ad Hoc Sens. Wirel. Networks, 2018

Improved Mutual Authentication in VANETs.
Ad Hoc Sens. Wirel. Networks, 2018

Mitigating the Effect of Blackhole Attack on MANETs Using AODV Protocol Under Transmission Control Protocol.
Ad Hoc Sens. Wirel. Networks, 2018

A robust mutual authentication protocol for WSN with multiple base-stations.
Ad Hoc Networks, 2018

Performance Assessment of Dynamic Analysis Based Energy Estimation Tools.
Proceedings of the 2018 International Symposium on Performance Evaluation of Computer and Telecommunication Systems, 2018

New Approach for Mobility Management in Openflow/Software-Defined Networks.
Proceedings of 8th International Conference on Simulation and Modeling Methodologies, 2018

A Chain Topology for Efficient Monitoring of Food Grain Storage using Smart Sensors.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

A Distributed Access Control Scheme based on Risk and Trust for Fog-cloud Environments.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

Staged Incentive Mechanism for Mobile Crowd Sensing.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

An Active Updating Strategy for Caching Periodic Data in the Internet of Things.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

The Internet of Things Service Recommendation Based on Tripartite Graph with Mass Diffusion.
Proceedings of the 2018 IEEE International Conference on Communications Workshops, 2018

Efficient Multipath Routing Protocol with Quality of Service for Mobile Ad Hoc Networks.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

An Optimized and Secure Authentication Scheme for Vehicular Ad Hoc Networks.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

A Distributed Efficient Algorithm for Self-Protection of Wireless Sensor Networks.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Proactive Decision Based Handoff Scheme for Cognitive Radio Networks.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Design for Architecture and Router of 3D Free-Space Optical Network-on-Chip.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Deep Learning-Based Content Centric Data Dissemination Scheme for Internet of Vehicles.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

Edge-Based Content Delivery for Providing QoE in Wireless Networks Using Quotient Filter.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

HyClass: Hybrid Classification Model for Anomaly Detection in Cloud Environment.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

The Community Characteristic Based Controller Deployment Strategy for SDNs.
Proceedings of the IEEE Global Communications Conference, 2018

A QoS and Cost Aware Fault Tolerant Scheme Insult-Controller SDNs.
Proceedings of the IEEE Global Communications Conference, 2018

Partial Charging Scheduling in Wireless Rechargeable Sensor Networks.
Proceedings of the IEEE Global Communications Conference, 2018

BHEEM: A Blockchain-Based Framework for Securing Electronic Health Records.
Proceedings of the IEEE Globecom Workshops, 2018

Base Station Oriented Multi Route Diversity Protocol for Wireless Sensor Networks.
Proceedings of the IEEE Globecom Workshops, 2018

iDVSP: Intelligent Dynamic Virtual Sensor Provisioning in Sensor-Cloud Infrastructure.
Proceedings of the IEEE Global Communications Conference, 2018

DLopC: Data Locality Independency-Aware VM Clustering in Cloud Computing.
Proceedings of the IEEE Globecom Workshops, 2018

A Learning Automaton-Based Controller Placement Algorithm for Software-Defined Networks.
Proceedings of the IEEE Global Communications Conference, 2018

Graph-Based Symmetric Crypto-System for Data Confidentiality.
Proceedings of the IEEE Global Communications Conference, 2018

FS2RNN: Feature Selection Scheme for Web Spam Detection Using Recurrent Neural Networks.
Proceedings of the IEEE Global Communications Conference, 2018

QAIR: Quality Assessment Scheme for Information Retrieval in IoT Infrastructures.
Proceedings of the IEEE Global Communications Conference, 2018

Data Consumption-Aware Load Forecasting Scheme for Smart Grid Systems.
Proceedings of the IEEE Globecom Workshops, 2018

DRUMS: Demand Response Management in a Smart City Using Deep Learning and SVR.
Proceedings of the IEEE Global Communications Conference, 2018

Appropriate Service Degradability for Virtualized Inter-Data-Center Optical Networks.
Proceedings of the IEEE Global Communications Conference, 2018

AdCaS: Adaptive Caching for Storage Space Analysis Using Content Centric Networking.
Proceedings of the IEEE Globecom Workshops, 2018

Adaptive Skip Graph Framework for Peer-to-Peer Networks: Search Time Complexity Analysis.
Proceedings of the IEEE Global Communications Conference, 2018

Optimal Secondary Users Selection for Cooperative Spectrum Sensing in Cognitive Radio Networks.
Proceedings of the IEEE Globecom Workshops, 2018

Software Defined Network Based Fault Detection in Industrial Wireless Sensor Networks.
Proceedings of the IEEE Global Communications Conference, 2018

Ensuring Privacy and Security in E- Health Records.
Proceedings of the 2018 International Conference on Computer, 2018

Blind Signatures Based Secured E-Healthcare System.
Proceedings of the 2018 International Conference on Computer, 2018

Context-Aware Middleware Architectural Framework for Intelligent Smart Grid Data Management.
Proceedings of the 2018 International Conference on Computer, 2018

First Score Auction for Pricing-Based Resource Selection in Vehicular Cloud.
Proceedings of the 2018 International Conference on Computer, 2018

Wireless Sensor Enabled Breast Self-Examination Assistance to Detect Abnormality.
Proceedings of the 2018 International Conference on Computer, 2018

A Fingerprinting Technique for Identification of Wireless Devices.
Proceedings of the 2018 International Conference on Computer, 2018

2017
Constructing data supply chain based on layered PROV.
J. Supercomput., 2017

Social-Oriented Adaptive Transmission in Opportunistic Internet of Smartphones.
IEEE Trans. Ind. Informatics, 2017

Distributed Home Energy Management System With Storage in Smart Grid Using Game Theory.
IEEE Syst. J., 2017

Learning Automata-Based Fault-Tolerant System for Dynamic Autonomous Unmanned Vehicular Networks.
IEEE Syst. J., 2017

On Theoretical Modeling of Sensor Cloud: A Paradigm Shift From Wireless Sensor Network.
IEEE Syst. J., 2017

3GPP LTE-Advanced Congestion Control Based on MIH Protocol.
IEEE Syst. J., 2017

D3: distributed approach for the detection of dumb nodes in wireless sensor networks.
Int. J. Commun. Syst., 2017

Oceanic forces and their impact on the performance of mobile underwater acoustic sensor networks.
Int. J. Commun. Syst., 2017

A robust ElGamal-based password-authentication protocol using smart card for client-server communication.
Int. J. Commun. Syst., 2017

An altruism-based trust-dependent message forwarding protocol for opportunistic networks.
Int. J. Commun. Syst., 2017

Authorship verification using deep belief network systems.
Int. J. Commun. Syst., 2017

UCGNet: wireless sensor network-based active aquifer contamination monitoring and control system for underground coal gasification.
Int. J. Commun. Syst., 2017

An anonymous and robust multi-server authentication protocol using multiple registration servers.
Int. J. Commun. Syst., 2017

A pairing-free certificateless digital multisignature scheme using elliptic curve cryptography.
Int. J. Comput. Math., 2017

Towards an incentive-compatible, reputation-based framework for stimulating cooperation in opportunistic networks: a survey.
IET Networks, 2017

Secure and Reliable Multi-Path Routing Protocol for Multi-Hop Wireless Networks.
Ad Hoc Sens. Wirel. Networks, 2017

Energy Optimisation using Distance and Hop-based Transmission (DHBT) in Wireless Sensor Networks - Scheme and Simulation Analysis.
Proceedings of the 7th International Conference on Simulation and Modeling Methodologies, 2017

A Deep Learning Based Artificial Neural Network Approach for Intrusion Detection.
Proceedings of the Mathematics and Computing - Third International Conference, 2017

Design of a Certificateless Designated Server Based Searchable Public Key Encryption Scheme.
Proceedings of the Mathematics and Computing - Third International Conference, 2017

Metaheuristic Solutions for Solving Controller Placement Problem in SDN-based WAN Architecture.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

Adaptive and safe presentation strategy of image information on social platform.
Proceedings of the IEEE International Conference on Communications, 2017

Learning automata based optimized multipath routingusing leapfrog algorithm for VANETs.
Proceedings of the IEEE International Conference on Communications, 2017

Connectivity and coverage in machine-type communications.
Proceedings of the IEEE International Conference on Communications, 2017

QoS prediction method for data supply chain based on context.
Proceedings of the IEEE International Conference on Communications, 2017

An efficient learning automata based task offloading in mobile cloud computing environments.
Proceedings of the IEEE International Conference on Communications, 2017

Monitoring the status of iBeacons with crowd sensing.
Proceedings of the IEEE International Conference on Communications, 2017

Synchronized power saving mechanism for WiMAX networks.
Proceedings of the IEEE International Conference on Communications, 2017

Sensor Cloud Based Measurement to Management System for Precise Irrigation.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

A Hash-Based Distributed Storage Strategy of FlowTables in SDN-IoT Networks.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

A Greedy Overlap-Based Algorithm for Partial Coverage of Heterogeneous WSNs.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Operating Mode Optimization for Nodes of Data Supply Chain.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

CHSEO: An Energy Optimization Approach for Communication in the Internet of Things.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

ProIDS: Probabilistic Data Structures Based Intrusion Detection System for Network Traffic Monitoring.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

SecHealth: An Efficient Fog Based Sender Initiated Secure Data Transmission of Healthcare Sensors for e-Medical System.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

EnClass: Ensemble-Based Classification Model for Network Anomaly Detection in Massive Datasets.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

Energy-Efficient Prophet-PRoWait-EDR Protocols for Opportunistic Networks.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

An advanced Internet of Thing based Security Alert System for Smart Home.
Proceedings of the International Conference on Computer, 2017

Genetic algorithm and probability based routing protocol for Opportunistic Networks.
Proceedings of the International Conference on Computer, 2017

Deadline-constraint services in cloud with heterogeneous servers.
Proceedings of the International Conference on Computer, 2017

Application of Deep Learning to Sentiment Analysis for recommender system on cloud.
Proceedings of the International Conference on Computer, 2017

CITS 2017 general chairs' message.
Proceedings of the International Conference on Computer, 2017

Time efficient dynamic threshold-based load balancing technique for Cloud Computing.
Proceedings of the International Conference on Computer, 2017

GATA: GPS-Arduino based Tracking and Alarm system for protection of wildlife animals.
Proceedings of the International Conference on Computer, 2017

Supernova and Hypernova Misbehavior Detection Scheme for Opportunistic Networks.
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, 2017

Improved Dual Authentication and Key Management Techniques in Vehicular Ad Hoc Networks.
Proceedings of the 14th IEEE/ACS International Conference on Computer Systems and Applications, 2017

2016
User Experience and Quality-of-Service in Internet of Things: Practice and Trends.
Wirel. Pers. Commun., 2016

Temporal-Correlation-Aware Dynamic Self-Management of Wireless Sensor Networks.
IEEE Trans. Ind. Informatics, 2016

Multilayered Impact Evaluation Model for Attacking Missions.
IEEE Syst. J., 2016

Mils-Cloud: A Sensor-Cloud-Based Architecture for the Integration of Military Tri-Services Operations and Decision Making.
IEEE Syst. J., 2016

A DSR-based routing protocol for mitigating blackhole attacks on mobile ad hoc networks.
Secur. Commun. Networks, 2016

Security analysis and design of an efficient ECC-based two-factor password authentication scheme.
Secur. Commun. Networks, 2016

MREA: a minimum resource expenditure node capture attack in wireless sensor networks.
Secur. Commun. Networks, 2016

A new multi-rat scheduling algorithm for heterogeneous wireless networks.
J. Syst. Softw., 2016

Clustering and splitting charging algorithms for large scaled wireless rechargeable sensor networks.
J. Syst. Softw., 2016

GTCharge: A game theoretical collaborative charging scheme for wireless rechargeable sensor networks.
J. Syst. Softw., 2016

An anonymous and provably secure authentication scheme for mobile user.
Int. J. Commun. Syst., 2016

Enhanced IEEE 802.21 Handover Design for QoS Support in Next Generation Wireless Networks.
Ad Hoc Sens. Wirel. Networks, 2016

Channel Allocation in Cognitive Radio Networks using Evolutionary Technique.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

HITH: Hybrid IP Traceback for Heterogeneous Wireless Networks.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

Cooperative Radio Resources Allocation in LTE_A Networks within MIH Framework: A Scheme and Simulation Analysis.
Proceedings of the 6th International Conference on Simulation and Modeling Methodologies, 2016

Cooperative Radio Resources Allocation and Congestion Prevention Scheme for LTE-A.
Proceedings of the Simulation and Modeling Methodologies, Technologies and Applications, 2016

Graph colouring technique for efficient channel allocation in cognitive radio networks.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Reservation and contention reduced channel access method with effective quality of service for wireless mesh networks.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Impact of hardware impairment on spectrum underlay cognitive multiple relays network.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Accurate indoor localization with crowd sensing.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Sequential detection and average sample number for cognitive radio with multiple primary transmit power levels.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

User admission maximization based on ressource allocation in wireless networks.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Flexible call admission control with preemption in LTE networks.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Resource Allocation for Wireless Body Area Networks in Presence of Selfish Agents.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Learning Automata-Based Channel Reservation Scheme to Enhance QoS in Vehicular Adhoc Networks.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Lightweight Authentication Protocol for RFID-Enabled Systems Based on ECC.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Mobility-Aware Flow-Table Implementation in Software-Defined IoT.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Efficient Bandwidth Call Admission Control in 3GPP LTE Networks.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

A Min-Actor algorithm for connected dominating set formation in WSAN.
Proceedings of the International Conference on Computer, 2016

A priority based message forwarding scheme for Opportunistic Networks.
Proceedings of the International Conference on Computer, 2016

Learning automata based decision making algorithm for task offloading in mobile cloud.
Proceedings of the International Conference on Computer, 2016

A distributed coverage optimization and connectivity maintenance strategy based on unknown sensors in WSAN.
Proceedings of the International Conference on Computer, 2016

Secure message communication among vehicles using elliptic curve cryptography in smart cities.
Proceedings of the International Conference on Computer, 2016

2015
Provably Secure and Anonymous Password Authentication Protocol for Roaming Service in Global Mobility Networks Using Extended Chaotic Maps.
Wirel. Pers. Commun., 2015

Playing the Smart Grid Game: Performance Analysis of Intelligent Energy Harvesting and Traffic Flow Forecasting for Plug-In Electric Vehicles.
IEEE Veh. Technol. Mag., 2015

Performance Analysis of IEEE 802.15.6 MAC Protocol under Non-Ideal Channel Conditions and Saturated Traffic Regime.
IEEE Trans. Computers, 2015

MR-Chord: Improved Chord Lookup Performance in Structured Mobile P2P Networks.
IEEE Syst. J., 2015

Safety Challenges and Solutions in Mobile Social Networks.
IEEE Syst. J., 2015

Efficient Medium Access Control for Cyber-Physical Systems With Heterogeneous Networks.
IEEE Syst. J., 2015

Collaborative Learning Automata-Based Routing for Rescue Operations in Dense Urban Regions Using Vehicular Sensor Networks.
IEEE Syst. J., 2015

A Robust Reputation-Based Computational Model for Trust Establishment in Pervasive Systems.
IEEE Syst. J., 2015

A Distributed Adaptive Admission Control Scheme for Multimedia Wireless Mesh Networks.
IEEE Syst. J., 2015

A new secure and efficient scheme for network mobility management.
Secur. Commun. Networks, 2015

Design of provably secure and efficient certificateless blind signature scheme using bilinear pairing.
Secur. Commun. Networks, 2015

QualityScan scheme for load balancing efficiency in vehicular ad hoc networks (VANETs).
J. Syst. Softw., 2015

Guest Editorial.
J. Networks, 2015

Guest Editorial.
J. Networks, 2015

Guest Editorial.
J. Networks, 2015

Capacity Analysis in the Next Generation Wireless Networks Based on SINR Constraints.
J. Networks, 2015

Network Selection in Heterogeneous Wireless System Environments.
J. Networks, 2015

Integration of Fixed and Mobile Infrastructure for Message Passing in Opportunistic Networks.
J. Networks, 2015

Design and Analysis of an Enhanced Patient-Server Mutual Authentication Protocol for Telecare Medical Information System.
J. Medical Syst., 2015

Advanced Mathematics and Numerical Modeling of IoT.
J. Appl. Math., 2015

Coalition Games for Spatio-Temporal Big Data in Internet of Vehicles Environment: A Comparative Analysis.
IEEE Internet Things J., 2015

Improved IPSec tunnel establishment for 3GPP-WLAN interworking.
Int. J. Commun. Syst., 2015

Probabilistic response-time analysis for real-time systems in body area sensor networks.
Int. J. Commun. Syst., 2015

Extracting mobility pattern from target trajectory in wireless sensor networks.
Int. J. Commun. Syst., 2015

Economics of customer's decisions in smart grid.
IET Networks, 2015

A provably secure and efficient two-party password-based explicit authenticated key exchange protocol resistance to password guessing attacks.
Concurr. Comput. Pract. Exp., 2015

Smart-Evac: Big Data-Based Decision Making for Emergency Evacuation.
IEEE Cloud Comput., 2015

A PKI Adapted Model for Secure Information Dissemination in Industrial Control and Automation 6LoWPANs.
IEEE Access, 2015

Probability-based Controlled Flooding in Opportunistic Networks.
Proceedings of the WINSYS 2015, 2015

An Efficient and Secure Mutual Authentication Mechanism in NEMO-based PMIPv6 Networks: A Methodology and Simulation Analysis.
Proceedings of the SIMULTECH 2015 - Proceedings of the 5th International Conference on Simulation and Modeling Methodologies, Technologies and Applications, Colmar, Alsace, France, 21, 2015

Wormhole prevention using COTA mechanism in position based environment over MANETs.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Wireless Body Area Networks with varying traffic in epidemic medical emergency situation.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

AID: A prototype for Agricultural Intrusion Detection using Wireless Sensor Network.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Energy-efficient connectivity re-establishment in WSN in the presence of dumb nodes.
Proceedings of the IEEE International Conference on Communication, 2015

A Reinforcement learning-based cognitive MAC protocol.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

All-in-one binary word solution for IP traceback in Wireless Mesh Network.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

Markov model-based adaptive CAC scheme for 3GPP LTE femtocell networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

A PSNR-Controllable Data Hiding Algorithm Based on LSBs Substitution.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Secure and Optimal Routing Protocol for Multi-Hop Cellular Networks.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

An Adaptive Algorithm for Joint Data Detection and Channel Estimation for Meteor Burst Communications Based on Per-Survivor Processing.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Learning Automata-Based Cross Layer Framework with Context Awareness for Wireless Systems.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Context-Aware Estimation Approach Based on Participatory Sensing.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Cloud-Based Optimal Energy Forecasting for Enabling Green Smart Grid Communication.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Performance Evaluation of a Decoupled-Level with QoS-Aware Downlink Scheduling Algorithm for LTE Networks.
Proceedings of the IEEE International Conference on Data Science and Data Intensive Systems, 2015

Markovian Model Based Channel Allocation in Cognitive Radio Networks.
Proceedings of the IEEE International Conference on Data Science and Data Intensive Systems, 2015

A MSCTP-Based Authentication Protocol: MSCTPAP.
Proceedings of the IEEE International Conference on Data Science and Data Intensive Systems, 2015

New Elastic Node Addressing Schemes for Next-Generation Networks.
Proceedings of the IEEE International Conference on Data Science and Data Intensive Systems, 2015

Enhanced MIH Architecture-Aware Radio Resource Management Approach in NGWNs.
Proceedings of the IEEE International Conference on Data Science and Data Intensive Systems, 2015

An ID-based Quadratic-Exponentiation Randomized Cryptographic scheme.
Proceedings of the International Conference on Computer, 2015

Learning automaton based context oriented middleware architecture for precision agriculture.
Proceedings of the International Conference on Computer, 2015

A new scheme for proactive out of band signaling solution for IP traceback in Wireless Mesh Network.
Proceedings of the International Conference on Computer, 2015

2014
Networks of learning automata for the vehicular environment: a performance analysis study.
IEEE Wirel. Commun., 2014

Learning Automata-Based QoS Framework for Cloud IaaS.
IEEE Trans. Netw. Serv. Manag., 2014

A comparative simulation study on the power-performance of multi-core architecture.
J. Supercomput., 2014

An analytical study of resource division and its impact on power and performance of multi-core processors.
J. Supercomput., 2014

Towards a framework for large-scale multimedia data storage and processing on Hadoop platform.
J. Supercomput., 2014

Design and analysis of secure host-based mobility protocol for wireless heterogeneous networks.
J. Supercomput., 2014

QoS-Guaranteed Bandwidth Shifting and Redistribution in Mobile Cloud Environment.
IEEE Trans. Cloud Comput., 2014

Vehicular Security Through Reputation and Plausibility Checks.
IEEE Syst. J., 2014

A cryptography-based protocol against packet dropping and message tampering attacks on mobile ad hoc networks.
Secur. Commun. Networks, 2014

Security of e-systems.
Secur. Commun. Networks, 2014

Secure socket layer certificate verification: a learning automata approach.
Secur. Commun. Networks, 2014

Online risk-based authentication using behavioral biometrics.
Multim. Tools Appl., 2014

A MIH-based approach for best network selection in heterogeneous wireless networks.
J. Syst. Softw., 2014

Existence of dumb nodes in stationary wireless sensor networks.
J. Syst. Softw., 2014

An efficient design and validation technique for secure handover between 3GPP LTE and WLANs systems.
J. Syst. Softw., 2014

Smart devices and spaces for pervasive computing.
J. Syst. Archit., 2014

Dynamic intelligence towards merging cloud and communication services.
Inf. Syst. Frontiers, 2014

Adaptive call admission control in 3GPP LTE networks.
Int. J. Commun. Syst., 2014

A novel media independent handover-based approach for vertical handover over heterogeneous wireless networks.
Int. J. Commun. Syst., 2014

Routing bandwidth guaranteed paths for traffic engineering in WiMAX mesh networks.
Int. J. Commun. Syst., 2014

Context-aware quality of service in wireless sensor networks.
IEEE Commun. Mag., 2014

Improved Secure Neighbor Discovery Protocol (ISEND) for New Wireless Networks Generations.
Proceedings of the WINSYS 2014, 2014

Foreword.
Proceedings of the 4th International Conference On Simulation And Modeling Methodologies, 2014

Secure micro mobility protocol for new generation wireless network.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2014

Secure macro mobility protocol for new generation access network.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2014

A SCTP-based Authentication Protocol: SCTPAP.
Proceedings of the DCNET 2014, 2014

A Robust Stream Control Transmission Protocol (SCTP)-Based Authentication Protocol.
Proceedings of the E-Business and Telecommunications - 11th International Joint Conference, 2014

ISEND: An Improved Secure Neighbor Discovery Protocol for Wireless Networks.
Proceedings of the E-Business and Telecommunications - 11th International Joint Conference, 2014

Optimized MIH-assisted P-NEMO design for vertical handover over heterogeneous network mobility.
Proceedings of the IEEE International Conference on Communications, 2014

Routing as a Bayesian Coalition Game in Smart Grid Neighborhood Area Networks: Learning Automata-based approach.
Proceedings of the IEEE International Conference on Communications, 2014

Honeypots deployment for the analysis and visualization of malware activity and malicious connections.
Proceedings of the IEEE International Conference on Communications, 2014

Optimizing handover decision and target selection in LTE-A network-based on MIH protocol.
Proceedings of the IEEE International Conference on Communications, 2014

A cluster-based load balancing algorithm in cloud computing.
Proceedings of the IEEE International Conference on Communications, 2014

Analysis of reliability and throughput under saturation condition of IEEE 802.15.6 CSMA/CA for wireless body area networks.
Proceedings of the IEEE Global Communications Conference, 2014

On forecasting the ONU sleep period in XG-PON systems using exponential smoothing techniques.
Proceedings of the IEEE Global Communications Conference, 2014

Call admission control and adaptive bandwidth management approach for HWNs.
Proceedings of the IEEE Global Communications Conference, 2014

Prioritized payload tuning mechanism for wireless body area network-based healthcare systems.
Proceedings of the IEEE Global Communications Conference, 2014

Energy-efficient smart metering for green smart grid communication.
Proceedings of the IEEE Global Communications Conference, 2014

Power and Delay-aware Multi-Path Routing Protocol for Ad Hoc Networks.
Proceedings of the International Conference on Computer, 2014

A novel vertical handoff decision making algorithm across Heterogeneous Wireless Networks.
Proceedings of the International Conference on Computer, 2014

Power and Delay-Aware Routing Protocol for Ad Hoc Networks.
Proceedings of the 14th IEEE International Conference on Computer and Information Technology, 2014

2013
A web-based integrated environment for simulation and analysis with NS-2.
IEEE Wirel. Commun., 2013

Finding overlapping communities in a complex network of social linkages and Internet of things.
J. Supercomput., 2013

Biometric Authentication Using Mouse Gesture Dynamics.
IEEE Syst. J., 2013

Energized geocasting model for underwater wireless sensor networks.
Simul. Model. Pract. Theory, 2013

Secured and fast handoff in wireless mesh networks.
Secur. Commun. Networks, 2013

A high efficient node capture attack algorithm in wireless sensor network based on route minimum key set.
Secur. Commun. Networks, 2013

Guest Editorial.
J. Networks, 2013

QoS-Aware Multipath Communications over MANETs.
J. Networks, 2013

Advanced computer mathematics based cryptography and security technologies.
Int. J. Comput. Math., 2013

Learning automata as a utility for power management in smart grids.
IEEE Commun. Mag., 2013

Trust-based Security Protocol against blackhole attacks in opportunistic networks.
Proceedings of the 9th IEEE International Conference on Wireless and Mobile Computing, 2013

HIP_IKEv2: A Proposal to Improve Internet Key Exchange Protocol-based on Host Identity Protocol.
Proceedings of the SIMULTECH 2013, 2013

Capacity Analysis of Heterogeneous Wireless Networks under SINR Interference Constraints.
Proceedings of the SIGMAP and WINSYS 2013, 2013

An ant-swarm inspired energy-efficient ad hoc on-demand routing protocol for mobile ad hoc networks.
Proceedings of IEEE International Conference on Communications, 2013

A fault-tolerant routing protocol for dynamic autonomous unmanned vehicular networks.
Proceedings of IEEE International Conference on Communications, 2013

End-to-end delay distribution in wireless heterogeneous networks.
Proceedings of IEEE International Conference on Communications, 2013

Residential Energy Management in Smart Grid: A Markov Decision Process-Based Approach.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

MOCLO: A Cloud Framework for Mobile Devices.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

Re-authentication protocol from WLAN to LTE (ReP WLAN-LTE).
Proceedings of the 2013 IEEE Global Communications Conference, 2013

A timed and secured monitoring implementation against wormhole attacks in AODV-based Mobile Ad Hoc Networks.
Proceedings of the International Conference on Computer, 2013

Enhanced handover architecture in IEEE 802.21-enabled heterogeneous wireless networks.
Proceedings of the International Conference on Computer, 2013

Learning Automata Based Sentiment Analysis for recommender system on cloud.
Proceedings of the International Conference on Computer, 2013

A joint call admission control-based approach for initial RAT selection in HetNets.
Proceedings of the International Conference on Computer, 2013

Secure and integrated handover authentication scheme with FMIPv6.
Proceedings of the International Conference on Computer, 2013

2012
Dynamic Sample Size Detection in Learning Command Line Sequence for Continuous Authentication.
IEEE Trans. Syst. Man Cybern. Part B, 2012

Energy-efficient tasks scheduling algorithm for real-time multiprocessor embedded systems.
J. Supercomput., 2012

Feedback Suppression in Multicast Satellite Networks Using Game Theory.
IEEE Syst. J., 2012

Multimedia P2P networking: Protocols, solutions and future directions.
Peer-to-Peer Netw. Appl., 2012

Coding-error based defects in enterprise resource planning software: Prevention, discovery, elimination and mitigation.
J. Syst. Softw., 2012

Wireless sensor network-based fire detection, alarming, monitoring and prevention system for Bord-and-Pillar coal mines.
J. Syst. Softw., 2012

Software Performance Modeling using the UML: a Case Study.
J. Networks, 2012

Guest Editorial.
J. Networks, 2012

Network-coded multiple-source cooperation aided relaying for free-space optical transmission.
Int. J. Commun. Syst., 2012

Providing reliable and link stability-based geocasting model in underwater environment.
Int. J. Commun. Syst., 2012

Jamming in underwater sensor networks: detection and mitigation.
IET Commun., 2012

An acoustic communication based AQUA-GLOMO simulator for underwater networks.
Hum. centric Comput. Inf. Sci., 2012

An adaptive learning approach for fault-tolerant routing in Internet of Things.
Proceedings of the 2012 IEEE Wireless Communications and Networking Conference, 2012

Optimizing Energy using Probabilistic Routing in Underwater Sensor Network.
Proceedings of the SIMULTECH 2012 - Proceedings of the 2nd International Conference on Simulation and Modeling Methodologies, Technologies and Applications, Rome, Italy, 28, 2012

Authentication Optimization for Vertical Handover in Heterogeneous Wireless Networks.
Proceedings of the SIGMAP and WINSYS 2012, 2012

Trust-enhanced message security protocol for mobile ad hoc networks.
Proceedings of IEEE International Conference on Communications, 2012

Design of an effective QoS-aware mapping scheme using persistent allocation probing.
Proceedings of IEEE International Conference on Communications, 2012

Traffic optimization through information dissemination.
Proceedings of IEEE International Conference on Communications, 2012

A novel medium access Control Protocol for radio-over-fiber access networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Community detection in an integrated Internet of Things and social network architecture.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

GROOV: A geographic routing over VANETs and its performance evaluation.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

2011
Adaptive wireless networks using learning automata.
IEEE Wirel. Commun., 2011

Synchronization of multihop wireless sensor networks at the application layer.
IEEE Wirel. Commun., 2011

FACES: Friend-Based Ad Hoc Routing Using Challenges to Establish Security in MANETs Systems.
IEEE Syst. J., 2011

An efficient technique for geocast region holes in underwater sensor networks and its performance evaluation.
Simul. Model. Pract. Theory, 2011

Security enhancements for UDDI.
Secur. Commun. Networks, 2011

Dynamic adaptation of response-time models for QoS management in autonomic systems.
J. Syst. Softw., 2011

Comparison of the Design Characteristics of MMI Wavelength Demultiplexers Using Different Approaches by Computing the Effective Index.
J. Networks, 2011

CASPER: Congestion Aware Selection of Path with Efficient Routing in Multimedia Networks.
J. Inf. Process. Syst., 2011

Connectivity preserving localized coverage algorithm for area monitoring using wireless sensor networks.
Comput. Commun., 2011

Stable Move Algorithm (SMA) for BW allocation in wireless mobile WiMAX networks 802.16e.
Proceedings of the 2011 Wireless Telecommunications Symposium, 2011

QoS-aware Multipath Routing Protocol for Delay Sensitive Applications in MANETs - A Cross-layer Approach.
Proceedings of the WINSYS 2011, 2011

Application of Ant Colony Optimization to Develop Energy Efficient Protocol in Mobile Ad-Hoc Networks.
Proceedings of the WINSYS 2011, 2011

Puzzle solving-based authentication method for enhanced security in spins and its performance evaluation.
Proceedings of the 2011 Spring Simulation Multi-conference, 2011

Design and Implementation of a Fault Tolerant Multiple Master Cloud Computing System.
Proceedings of the 2011 IEEE International Conference on Internet of Things (iThings) & 4th IEEE International Conference on Cyber, 2011

A Learning Automata Based Solution for Preventing Distributed Denial of Service in Internet of Things.
Proceedings of the 2011 IEEE International Conference on Internet of Things (iThings) & 4th IEEE International Conference on Cyber, 2011

Time Stamp-Based Algorithm for Task Scheduling in a Distributed Computing System with Multiple Master Multiple Slave Architecture.
Proceedings of the 2011 IEEE International Conference on Internet of Things (iThings) & 4th IEEE International Conference on Cyber, 2011

A Wildfire Prediction Based on Fuzzy Inference System for Wireless Sensor Networks.
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2011

Computational Intelligence Applied to Wildfire Prediction using Wireless Sensor Networks.
Proceedings of the DCNET 2011 and OPTICS 2011, 2011

Message Security in Multi-Path Ad Hoc Networks Using a Neural Network-Based Cipher.
Proceedings of the Global Communications Conference, 2011

Multi-Path Trust-Based Secure AOMDV Routing in Ad Hoc Networks.
Proceedings of the Global Communications Conference, 2011

Optimizing Energy through Parabola Based Routing in Underwater Sensor Networks.
Proceedings of the Global Communications Conference, 2011

ServiceChord: A Scalable Service Capability Interaction Framework for IMS.
Proceedings of the Global Communications Conference, 2011

2010
Virtual Backoff Algorithm: An Enhancement to 802.11 Medium-Access Control to Improve the Performance of Wireless Networks.
IEEE Trans. Veh. Technol., 2010

Adaptive and Learning Systems.
IEEE Trans. Syst. Man Cybern. Part B, 2010

Random Early Detection for Congestion Avoidance in Wired Networks: A Discretized Pursuit Learning-Automata-Like Solution.
IEEE Trans. Syst. Man Cybern. Part B, 2010

IGFS: A New MAC Protocol Exploiting Heterogeneous Propagation Delays in the Dynamic Bandwidth Allocation on WDM-EPON.
IEEE Syst. J., 2010

A Counter Disassociation Mechanism (CDM) for Wireless LANs and its Performance Simulation Analysis.
IEEE Syst. J., 2010

Contention Resolution for Transmission Control Protocol over Optical Burst-Switching Networks Using Random Segment Dropping.
Simul., 2010

A low-overhead fault-tolerant routing algorithm for mobile ad hoc networks: A scheme and its simulation analysis.
Simul. Model. Pract. Theory, 2010

Survivable ATM mesh networks: Techniques and performance evaluation.
J. Syst. Softw., 2010

An ant swarm-inspired energy-aware routing protocol for wireless ad-hoc networks.
J. Syst. Softw., 2010

DEESR: Dynamic Energy Efficient and Secure Routing Protocol for Wireless Sensor Networks in Urban Environments.
J. Inf. Process. Syst., 2010

Efficient angular routing protocol for inter-vehicular communication in vehicular ad hoc networks.
IET Commun., 2010

Network Layer based Secure Routing Protocol for Wireless Ad Hoc Sensor Networks in Urban Environments.
Proceedings of the WINSYS 2010 - Proceedings of the International Conference on Wireless Information Networks and Systems, Athens, Greece, July 26, 2010

Markov decision process-based analysis of rechargeable nodes in wireless sensor networks.
Proceedings of the 2010 Spring Simulation Multiconference, 2010

A reactive Optimized Link State Routing protocol for Mobile ad hoc networks.
Proceedings of the 17th IEEE International Conference on Electronics, 2010

A mechanism for reducing congestion while routing bulky data in Mobile Ad Hoc Networks.
Proceedings of the 17th IEEE International Conference on Electronics, 2010

A cluster-head selection algorithm for Wireless Sensor Networks.
Proceedings of the 17th IEEE International Conference on Electronics, 2010

Efficient Cooperative Caching with Improved Performance in Wireless Mesh Networks.
Proceedings of IEEE International Conference on Communications, 2010

GreenCom 2010 Keynote Speech: Mohammad S. Obaidat.
Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications, 2010

Detection of Identity-Based Attacks in Wireless Sensor Networks Using Signalprints.
Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications, 2010

An Efficient and Secure Routing Protocol for Wireless Sensor Networks Using Multicasting.
Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications, 2010

A Novel Adaptive Mapping Scheme for IEEE 802.16 Mobile Downlink Framing.
Proceedings of the Global Communications Conference, 2010

Predictive multi-hop stable routing in Vehicular Ad Hoc Networks.
Proceedings of the 8th ACS/IEEE International Conference on Computer Systems and Applications, 2010

A novel Geocast technique with hole detection in underwater sensor networks.
Proceedings of the 8th ACS/IEEE International Conference on Computer Systems and Applications, 2010

2009
Clustering-driven wireless data broadcasting.
IEEE Wirel. Commun., 2009

Efficient data acquisition in underwater wireless sensor Ad Hoc networks.
IEEE Wirel. Commun., 2009

Cluster-Based Cross-Layer Design for Cooperative Caching in Mobile Ad Hoc Networks.
IEEE Syst. J., 2009

Guest Editorial: Performance Evaluation of Computer and Telecommunication Systems.
Simul., 2009

Security in wireless sensor networks.
Secur. Commun. Networks, 2009

LAID: a learning automata-based scheme for intrusion detection in wireless sensor networks.
Secur. Commun. Networks, 2009

An ant colony optimization approach for reputation and quality-of-service-based security in wireless sensor networks.
Secur. Commun. Networks, 2009

New enhancements to the SOCKS communication network security protocol: Schemes and performance evaluation.
J. Syst. Softw., 2009

An efficient approach for distributed dynamic channel allocation with queues for real-time and non-real-time traffic in cellular networks.
J. Syst. Softw., 2009

Lacas: learning automata-based congestion avoidance scheme for healthcare wireless sensor networks.
IEEE J. Sel. Areas Commun., 2009

Guest Editorial.
J. Networks, 2009

Guest Editorial.
J. Networks, 2009

EEAODR: An energy-efficient ad hoc on-demand routing protocol for mobile ad hoc networks.
Int. J. Commun. Syst., 2009

Chinese Remainder Theorem-Based RSA-Threshold Cryptography in MANET Using Verifiable Secret Sharing Scheme.
Proceedings of the 5th IEEE International Conference on Wireless and Mobile Computing, 2009

An experimental analysis study of bandwidth allocation with QoS in wireless networks.
Proceedings of the 2009 Spring Simulation Multiconference, SpringSim 2009, 2009

A new scheme for distributed channel allocation in cellular networks.
Proceedings of the 2009 Spring Simulation Multiconference, SpringSim 2009, 2009

An efficient power-aware broadcast technique for wireless ad hoc networks.
Proceedings of the 2009 Spring Simulation Multiconference, SpringSim 2009, 2009

Attack Graph Generation with Infused Fuzzy Clustering.
Proceedings of the SECRYPT 2009, 2009

Trust management in opportunistic pervasive healthcare systems.
Proceedings of the 16th IEEE International Conference on Electronics, 2009

Fairness and throughput optimization in wireless mesh networks.
Proceedings of the 16th IEEE International Conference on Electronics, 2009

Using Ant-Like Agents for Fault-Tolerant Routing in Mobile Ad-Hoc Networks.
Proceedings of IEEE International Conference on Communications, 2009

On Increasing Information Availability in Gnutella-Like Peer-to-Peer Networks.
Proceedings of IEEE International Conference on Communications, 2009

An Energy-Aware Routing Protocol for Ad-Hoc Networks Based on the Foraging Behavior in Ant Swarms.
Proceedings of IEEE International Conference on Communications, 2009

Optimizing Power Utilization in Vehicular Ad Hoc Networks through Angular Routing: A Protocol and Its Performance Evaluation.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

Cross-Layer Based Data Management in Mobile Ad Hoc Networks.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

Efficient Resource Reservation for Optical Burst Switching Networks.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

A quality of service scheduling technique for optical LANs.
Proceedings of the 7th IEEE/ACS International Conference on Computer Systems and Applications, 2009

Adaptive learning solution for congestion avoidance in wireless sensor networks.
Proceedings of the 7th IEEE/ACS International Conference on Computer Systems and Applications, 2009

An adaptive learning-like solution of random early detection for congestion avoidance in computer networks.
Proceedings of the 7th IEEE/ACS International Conference on Computer Systems and Applications, 2009

An efficient 802.11 medium access control method and its simulation analysis.
Proceedings of the 7th IEEE/ACS International Conference on Computer Systems and Applications, 2009

A new counter disassociation mechanism (CDM) for 802.11b/g wireless local area networks.
Proceedings of the 7th IEEE/ACS International Conference on Computer Systems and Applications, 2009

Simulating Peer-to-Peer networks.
Proceedings of the 7th IEEE/ACS International Conference on Computer Systems and Applications, 2009

2008
Medium access control protocols for wireless LANs [Guest Editorial].
IEEE Wirel. Commun., 2008

Supporting Quality-of-Service Scheduling in a TT-FR WDM System.
IEEE Syst. J., 2008

Guest Editorial Recent Advances in Global Navigation and Communication Satellite Systems.
IEEE Syst. J., 2008

Node Stability-Based Location Updating in Mobile <i>Ad-Hoc</i> Networks.
IEEE Syst. J., 2008

Bandwidth-Effective Design of a Satellite-Based Hybrid Wireless Sensor Network for Mobile Target Detection and Tracking.
IEEE Syst. J., 2008

A Secure and Energy-Efficient Scheme for Group-Based Routing in Heterogeneous Ad Hoc Sensor Networks and Its Simulation Analysis.
Simul., 2008

A New Security Access Scheme for WLANs and Its Performance Simulation Analysis.
Simul., 2008

UWSim: A Simulator for Underwater Sensor Networks.
Simul., 2008

A probabilistic zonal approach for swarm-inspired wildfire detection using sensor networks.
Int. J. Commun. Syst., 2008

WHOMoVeS: An optimized broadband sensor network for military vehicle tracking.
Int. J. Commun. Syst., 2008

FORK: A novel two-pronged strategy for an agent-based intrusion detection scheme in ad-hoc networks.
Comput. Commun., 2008

Guest editorial: Performance evaluation of communication networks.
Comput. Commun., 2008

Intelligent network functionalities in wireless 4G networks: Integration scheme and simulation analysis.
Comput. Commun., 2008

Intrusion Detection in Wireless Sensor Networks: The S-Model Learning Automata Approach.
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008

QDV: A Quality-of-Security-Based Distance Vector Routing Protocol for Wireless Sensor Networks Using Ant Colony Optimization.
Proceedings of the IEEE International Conference on Wireless and Mobile Computing, 2008

New Techniques to Enhance the Capabilities of the Socks Network Security Protocol.
Proceedings of the SECRYPT 2008, 2008

Novel Neurocomputing-based Scheme to Authenticate WLAN Users Employing Distance Proximity Threshold.
Proceedings of the SECRYPT 2008, 2008

Fundamentals of wireless networks systems.
Proceedings of the 15th IEEE International Conference on Electronics, Circuits and Systems, 2008

AER filtering using GLIDER: VHDL cellular automata description.
Proceedings of the 15th IEEE International Conference on Electronics, Circuits and Systems, 2008

An Energy-Efficient On-Demand Routing algorithm for Mobile Ad-Hoc Networks.
Proceedings of the 15th IEEE International Conference on Electronics, Circuits and Systems, 2008

Multi-Hop Synchronization at the Application Layer of Wireless and Satellite Networks.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

An Efficient Approach for Location Updating in Mobile Ad Hoc Networks.
Proceedings of the Proceedings 41st Annual Simulation Symposium (ANSS-41 2008), 2008

2007
Advances in Performance Evaluation of Computer and Telecommunication Systems.
Simul., 2007

Absolute Transmission Delay Guarantee in Optical Burst-Switched Networks: A Scheme and Performance Evaluation.
Simul., 2007

On the problem of capacity allocation and flow assignment in self-healing ATM networks.
Comput. Commun., 2007

Guest Editorial: Advances in Communication Networking.
Comput. Commun., 2007

Performance analysis of a dynamic QoS scheme in optical label-switched networks.
Comput. Commun., 2007

Advances in computer communication networks.
Comput. Commun., 2007

A new high rate adaptive wireless data dissemination scheme.
Comput. Commun., 2007

A novel node architecture for optical networks: Modeling, analysis and performance evaluation.
Comput. Commun., 2007

Future and Challenges of the Security of e-Systems and Computer Networks.
Proceedings of the SECRYPT 2007, 2007

A Novel Grid-Based Micropayment System for Heterogeneous Multi-party Accounting.
Proceedings of the E-business and Telecommunications - 4th International Conference, 2007

Secure Grid-Based Multi-Party Micropayment System in 4G Networks.
Proceedings of the ICE-B 2007, 2007

Robust Watermarking System Using Security Enhancement on Content Based Image Segmentation.
Proceedings of the 14th IEEE International Conference on Electronics, 2007

Trends and Challenges in Wireless Systems.
Proceedings of the 14th IEEE International Conference on Electronics, 2007

Radio-based Cooperation Scheme for DDoS Detection.
Proceedings of the 14th IEEE International Conference on Electronics, 2007

A Real-Time Admission Control and Planning of OLS Networks.
Proceedings of the 14th IEEE International Conference on Electronics, 2007

A Dynamic QoS-Based Scheme for Admission Control in OBS Networks.
Proceedings of IEEE International Conference on Communications, 2007

A QoS-Based Scheme for Planning and Dimensioning of Optical Label Switched Networks.
Proceedings of IEEE International Conference on Communications, 2007

Location Management in Wireless Fourth Generation Networks.
Proceedings of the Global Communications Conference, 2007

Radio-Based Cooperation for Wireless Intrusion Detection.
Proceedings of the Global Communications Conference, 2007

Admission Control in Optical Label Switched Networks: A Dynamic QoS-Based Approach.
Proceedings of the Proceedings 40th Annual Simulation Symposium (ANSS-40 2007), 2007

Security Enhancement for Watermarking Technique Using Content based Image Segmentation.
Proceedings of the 2007 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2007), 2007

A QoS-Oriented Protocol for Burst Admission Control in OBS Networks.
Proceedings of the 2007 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2007), 2007

A Novel Scheme for Traffic Monitoring in Optical Burst-Switched Networks.
Proceedings of the 2007 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2007), 2007

Congestion Avoidance Mechanism for Optical Label Switched Networks: A Dynamic QoS-based Approach.
Proceedings of the 2007 IEEE/ACS International Conference on Computer Systems and Applications (AICCSA 2007), 2007

2006
WLAN-UMTS Integration: Architecture, Seamless Handoff, and Simulation Analysis.
Simul., 2006

Guest Editorial: Recent Advances in Modeling and Simulation of Network Systems.
Simul., 2006

Performance evaluation of a novel scheme for QoS provision in UTRA TDD.
Comput. Commun., 2006

Performance Evaluation of Wireless Networks and Communications.
Comput. Commun., 2006

Performance optimization of an adaptive wireless push system in environments with locality of demand.
Comput. Commun., 2006

SQAP: A simple QoS supportive adaptive polling protocol for wireless LANs.
Comput. Commun., 2006

Recent advances in wireless networks and systems.
Comput. Electr. Eng., 2006

Mobility, sensing, and security management in wireless ad hoc sensor systems.
Comput. Electr. Eng., 2006

Security Enhancement of Multimedia Copyright Protection.
Proceedings of the IEEE International Conference on Systems, 2006

Recent trends and challenges in wireless networks.
Proceedings of the International Symposium on Computer Networks, 2006

SAGA: An Adaptive Infrastructure for Secure Available Grid on Ad-hoc Networks.
Proceedings of the ICE-B 2006, 2006

Secured and Seamless Handoff in Wireless Fourth Generation Systems.
Proceedings of the 13th IEEE International Conference on Electronics, 2006

Performance Acceleration of Adaptive Wireless Data Broadcasting System for High Data Rate Environments.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

Designing a Wireless Sensor Network for Mobile Target Localization and Tracking.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

A New Scheme for Mobility, Sensing, and Security Management in Wireless Ad Hoc Sensor Networks.
Proceedings of the Proceedings 39th Annual Simulation Symposium (ANSS-39 2006), 2006

2005
Guest Editorial: Performance Evaluation of Wireless Systems.
Simul., 2005

On the performance of adaptive TDMA protocols in WDM passive star networks with fixed transmitters and tunable receivers.
Perform. Evaluation, 2005

Performance modeling and evaluation of high-performance parallel and distributed systems.
Perform. Evaluation, 2005

Carrier-sense-assisted adaptive learning MAC protocols for distributed wireless LANs.
Int. J. Commun. Syst., 2005

International Journal of Communication Systems.
Int. J. Commun. Syst., 2005

Fault and intrusion tolerance in wireless ad hoc networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005

Trends and challenges in wireless networks.
Proceedings of the ICETE 2005, 2005

A watermarking technique for geometric manipulation attacks.
Proceedings of the 12th IEEE International Conference on Electronics, 2005

An advance dynamic resource reservation algorithm for OBS networks: Design and performance.
Proceedings of the 12th IEEE International Conference on Electronics, 2005

On regional performance improvement of an adaptive wireless push system in environments with locality of demand.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

Mobility and security issues in wireless ad-hoc sensor networks.
Proceedings of the Global Telecommunications Conference, 2005. GLOBECOM '05, St. Louis, Missouri, USA, 28 November, 2005

2004
A Simulation Study of Scalable Broadcast in High-Performance Regular Networks.
Simul., 2004

Intelligent agents on the Web: a review.
Comput. Sci. Eng., 2004

An adaptive protocol model for IEEE 802.11 wireless LANs.
Comput. Commun., 2004

Advances in computer communications.
Comput. Commun., 2004

Relational-based calculus for trust management in networked services.
Comput. Commun., 2004

The economics of wireless networks.
Commun. ACM, 2004

On carrier-sense integration in learning automata-based MAC protocols for ad-hoc wireless LANs.
Proceedings of the 23rd IEEE International Performance Computing and Communications Conference, 2004

Fundamentals of Wireless Network Systems.
Proceedings of the ICETE 2004, 2004

SNR-WPA: an adaptive protocol for mobile 802.11 wireless LANs.
Proceedings of IEEE International Conference on Communications, 2004

A neural approach to adaptive MAC protocols for wireless LANs.
Proceedings of IEEE International Conference on Communications, 2004

On the Security Enhancement of Multimedia Copyright Protection for E-Business.
Proceedings of the Electronic Government and Commerce: Design, Modeling, Analysis and Security, 2004

Design Alternatives for Virtual Private Networks.
Proceedings of the Electronic Government and Commerce: Design, Modeling, Analysis and Security, 2004

2003
Digital watermarking-based DCT and JPEG model.
IEEE Trans. Instrum. Meas., 2003

A comparative study of digital watermarking in JPEG and JPEG 2000 environments.
Inf. Sci., 2003

Efficient fast learning automata.
Inf. Sci., 2003

A framework for the design of bank communications systems.
Comput. Commun., 2003

DRA: a new buffer management scheme for wireless atm networks using aggregative large deviation principle.
Comput. Commun., 2003

Recent advances in computer communications networking.
Comput. Commun., 2003

Modeling and simulation of IEEE 802.11 WLAN mobile ad hoc networks using topology broadcast reverse-path forwarding (TBRPF).
Comput. Commun., 2003

Third generation and beyond wireless systems.
Commun. ACM, 2003

A neural-based MAC protocol for distributed wireless LANs.
Proceedings of the IEEE International Conference on Systems, 2003

Resource Management Schemes in Optical Networks.
Proceedings of the 23rd International Conference of the Chilean Computer Science Society (SCCC 2003), 2003

Adaptive distributed bus arbitration schemes for shared-medium ATM switches.
Proceedings of the 2003 10th IEEE International Conference on Electronics, 2003

On the use of population-based incremental learning in the medium access control of broadcast communication systems.
Proceedings of the 2003 10th IEEE International Conference on Electronics, 2003

Admission control and resource management of uncertain duration traffic in optical networks.
Proceedings of the 2003 10th IEEE International Conference on Electronics, 2003

2002
On the use of learning automata in the control of broadcast networks: a methodology.
IEEE Trans. Syst. Man Cybern. Part B, 2002

Learning automata-based bus arbitration for shared-medium ATM switches.
IEEE Trans. Syst. Man Cybern. Part B, 2002

Guest editorial learning automata: theory, paradigms, and applications.
IEEE Trans. Syst. Man Cybern. Part B, 2002

Modeling and Simulation of Adaptive Available Bit Rate Voice over Asynchronous Transfer Mode Networks.
Simul., 2002

Introduction to the Special Issue: ATM Systems and Networks: Basics, Issues, and Performance Modeling and Simulation.
Simul., 2002

Adaptive protocols for optical LANs with bursty and correlated traffic.
Int. J. Commun. Syst., 2002

Advances in optical networking.
Int. J. Commun. Syst., 2002

An implementation for ATM Adaptation Layer 5.
Comput. Commun., 2002

A new injection limitation mechanism for wormhole networks.
Comput. Commun., 2002

Advances in performance evaluation of computer and telecommunications networking.
Comput. Commun., 2002

TRAP: a high performance protocol for wireless local area networks.
Comput. Commun., 2002

A comparative evaluation study of the performance of DQRAP and DQDB in metropolitan area networks.
Comput. Electr. Eng., 2002

Performance evaluation of a TDMA-based randomly addressed polling protocol for wireless LANs.
Proceedings of the 2002 9th IEEE International Conference on Electronics, 2002

3G wireless systems and beyond: a review.
Proceedings of the 2002 9th IEEE International Conference on Electronics, 2002

Quality of service provision in high-speed networks: an active approach.
Proceedings of the 2002 9th IEEE International Conference on Electronics, 2002

A new protocol for wireless LANs.
Proceedings of the IEEE International Conference on Communications, 2002

An accurate line of sight propagation performance model for ad-hoc 802.11 wireless LAN (WLAN) devices.
Proceedings of the IEEE International Conference on Communications, 2002

Adaptive QoS schemes in DWDM networks.
Proceedings of the IEEE International Conference on Communications, 2002

2001
Performance Modeling and Simulation of ATM Systems and Networks.
Simul., 2001

SCS News: Mohammad S. Obaidat Elected Fellow of SCS.
Simul., 2001

Performance Evaluation of ZOMA Preemptive Deadlock Recovery Mechanism for Wormhole Networks.
Simul., 2001

An intelligent simulation methodology to characterize defects in materials.
Inf. Sci., 2001

An efficient adaptive bus arbitration scheme for scalable shared-medium ATM switch.
Comput. Commun., 2001

Performance evaluation of telecommunication systems: models, issues and applications (Guest Editorial).
Comput. Commun., 2001

On a congestion management scheme for high speed networks using aggregated large deviations principle.
Comput. Commun., 2001

Supporting Adaptive QoS for Multiple Classes of Service in DWDM Networks.
Proceedings of the 30th International Workshops on Parallel Processing (ICPP 2001 Workshops), 2001

Adaptive Protocols for Single-Hop Photonic Networks with Bursty Traffic.
Proceedings of the 2001 International Conference on Parallel Processing, 2001

On the digital watermarking in JPEG 2000.
Proceedings of the 2001 8th IEEE International Conference on Electronics, 2001

A learning automata-based bus arbitration scheme for scalable shared-medium ATM switches.
Proceedings of the 2001 8th IEEE International Conference on Electronics, 2001

2000
An adaptive approach to manage traffic in CDMA ATM networks.
Comput. Commun., 2000

A methodology to optimize the design of telecommunication systems.
Comput. Commun., 2000

QoS management in wireless ATM networks using large deviation principle.
Proceedings of the 2000 IEEE Wireless Communications and Networking Conference, 2000

A robust digital watermarking technique.
Proceedings of the 2000 7th IEEE International Conference on Electronics, 2000

Fast learning automata for high-speed real-time applications.
Proceedings of the 2000 7th IEEE International Conference on Electronics, 2000

1999
A Simulation Methodology to Study Input Buffering in ATM Switches.
Simul., 1999

Performance Evaluation of Computer and Telecommunications Systems.
Simul., 1999

Application of Neural Networks to Cache Replacement.
Neural Comput. Appl., 1999

Estimation of Pitch Period of Speech Signal Using a New Dyadic Wavelet Algorithm.
Inf. Sci., 1999

Schemes for mobility management of wireless ATM networks.
Int. J. Commun. Syst., 1999

Telecommunication systems for the new millennium.
Int. J. Commun. Syst., 1999

A performance analysis scheme for intelligent wireless ATM networks.
Int. J. Commun. Syst., 1999

A methodology to analyze the performance of a parallel frame synchronization scheme in SDH high speed networks.
Comput. Commun., 1999

Intelligent Services Integration in Mobile ATM Networks.
Proceedings of the 1999 ACM Symposium on Applied Computing, 1999

Managing mobility in a wireless ATM network.
Proceedings of the IEEE International Performance Computing and Communications Conference, 1999

Performance analysis of intelligent mobile ATM networks.
Proceedings of the IEEE International Performance Computing and Communications Conference, 1999

KORA-2: a new cache replacement policy and its performance.
Proceedings of the 6th IEEE International Conference on Electronics, Circuits and Systems, 1999

Managing traffic in CDMA ATM networks.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1999), 1999

1998
Estimating neural networks-based algorithm for adaptive cache replacement.
IEEE Trans. Syst. Man Cybern. Part B, 1998

Editorial Artificial Neural Networks To Systems, Man, And Cybernetics: Characteristics, Structures, And Applications.
IEEE Trans. Syst. Man Cybern. Part B, 1998

Performance Evaluation of Computer and Telecommunication Systems.
Simul., 1998

Performance Evaluation of Computer and Telecommunication Systems.
Simul., 1998

Ultrasonic Transducer Characterization by Neural Networks.
Inf. Sci., 1998

A Performance Evaluation Study of four Wavelet Algorithms for the Pitch Period Estimation of Speech Signals.
Inf. Sci., 1998

Guest editorial performance evaluation of ATM systems.
Int. J. Commun. Syst., 1998

Bandwidth allocation and call admission control in ATM networks.
Int. J. Commun. Syst., 1998

Optimum Design of Telecommunication Systems.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1998), 1998

1997
Verification of computer users using keystroke dynamics.
IEEE Trans. Syst. Man Cybern. Part B, 1997

Modeling and Simulation of Computer Systems and Networks: Part II: Computer Systems.
Simul., 1997

Guest Editorial: Modeling and Simulation of Computer Systems and Networks: Part I: Networks.
Simul., 1997

Simulation Study of a Novel Cache Replacement Algorithm.
Simul., 1997

A Simulation Evaluation Study of Neural Network Techniques to Computer User Identification.
Inf. Sci., 1997

Determination of buffer capacity for payload multiplexing in SDH systems.
Int. J. Commun. Syst., 1997

Integrated dynamic distributed routing and admission control in ATM networks.
Int. J. Commun. Syst., 1997

Multiple connections in data communication and advanced applications.
Comput. Commun., 1997

An evaluation study of protocols used in cable TV networks.
Proceedings of the 1997 ACM symposium on Applied Computing, 1997

Performance analysis of parallel frame synchronization scheme in SDH systems.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 1997), 1997

1996
A simulation study of the mechanisms to enhance TCP protocol in wide area computer networks.
Proceedings of the 1996 ACM Symposium on Applied Computing, 1996

Wavelet algorithm for the estimation of pitch period of speech signal.
Proceedings of Third International Conference on Electronics, Circuits, and Systems, 1996

1995
A Performance Simulation Study of the Ethernet and Token Bus Local Computer Networks.
Simul., 1995

High Speed Networking: Performance Simulation Modeling and Applications.
Simul., 1995

High-Performance Protocols for Ring LAN and MAN Computer Networks.
Inf. Sci., 1995

A verification methodology for computer systems users.
Proceedings of the 1995 ACM symposium on applied computing, 1995

1994
A Multilayer Neural Network System for Computer Access Security.
IEEE Trans. Syst. Man Cybern. Syst., 1994

Book Reviews : Discrete Event Simulation: A Practical Approach by Udo W. Pooch and James A. Wall CRC Press, 1993, 412 pages, Price: $64.95 , ISBN: 0-8493-7174-0.
Simul., 1994

HSOP: A Neural Network Paradigm and its Applications.
Neural Comput. Appl., 1994

A methodology for evaluating the performance of CISC computer systems under single and two-level cache environments.
Microprocess. Microprogramming, 1994

Performance Evaluation of CISC Computer Systems Under Single- and Two-Level Cache Environments.
Proceedings of the ACM 22rd Annual Computer Science Conference on Scaling up: Meeting the Challenge of Complexity in Real-World Computing Applications, 1994

1993
On the characterization of ultrasonic transducers using pattern recognition.
IEEE Trans. Syst. Man Cybern., 1993

Computer users verification using the perceptron algorithm.
IEEE Trans. Syst. Man Cybern., 1993

An online neural network system for computer access security.
IEEE Trans. Ind. Electron., 1993

Book Reviews: Advanced Computer Architecture: Parallelism, Scalability, and Programmability by Kai Hwang McGraw-Hill, New York, N.Y., 1993. Price: $56.95, ISBN: 0-07-031622-8.
Simul., 1993

A Simulation Methodology for RISC Computer Systems.
Simul., 1993

High Performance Computing/Computers: Simulation Modeling and Applications.
Simul., 1993

Performance simulation analysis of RISC-based multiprocessors under uniform and nonuniform traffic.
Inf. Sci., 1993

A methodology for improving computer access security.
Comput. Secur., 1993

An Intelligent Video Pattern Generator for Use in Ophthalmology.
Proceedings of the 1993 ACM/SIGAPP Symposium on Applied Computing: States of the Art and Practice, 1993

WBTPE: A Priority Ethernet LAN Protocol.
Proceedings of the ACM 21th Conference on Computer Science, 1993

1992
Methodologies for characterizing ultrasonic transducers using neural network and pattern recognition techniques.
IEEE Trans. Ind. Electron., 1992

Performance of the short-time Fourier Transform and Wavelet Transform to phonocardiogram signal analysis.
Proceedings of the 1992 ACM/SIGAPP Symposium on Applied Computing: Technological Challenges of the 1990's, 1992

Performance comparison of neural networks and pattern recognition techniques for classifying ultrasonic transducers.
Proceedings of the 1992 ACM/SIGAPP Symposium on Applied Computing: Technological Challenges of the 1990's, 1992

Performance of the perceptron algorithm for the classification of computer users.
Proceedings of the 1992 ACM/SIGAPP Symposium on Applied Computing: Technological Challenges of the 1990's, 1992

MTR: A Modified Token Ring Protocol and Its Performance.
Proceedings of the ACM 20th Annual Conference on Computer Science, 1992

1991
A dynamic and static microcomputer-based stereogram generator.
IEEE Trans. Syst. Man Cybern., 1991

Dimensionality reduction and feature extraction applications in identifying computer users.
IEEE Trans. Syst. Man Cybern., 1991

A comparative simulation study of the performance of single-bus and two-bus multiprocessors.
Simul., 1991

1988
A computerized random element stereogram generator: Design and experiments.
Proceedings of the First Annual IEEE Symposium on Computer-Based Medical Systems (CBMS'88), 1988


  Loading...