Shahabuddin Muhammad

Orcid: 0000-0001-6253-0873

According to our database1, Shahabuddin Muhammad authored at least 21 papers between 2004 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Security Analysis of a Digital Twin Framework Using Probabilistic Model Checking.
IEEE Access, 2023

2022
Inter-slice resource management for 5G radio access network using markov decision process.
Telecommun. Syst., 2022

2021
Modeling Operator Performance in Human-in-the-Loop Autonomous Systems.
IEEE Access, 2021

2020
Dual Connectivity-Based Mobility Management and Data Split Mechanism in 4G/5G Cellular Networks.
IEEE Access, 2020

Model Checking Based Unmanned Aerial Vehicle (UAV) Security Analysis.
Proceedings of the International Conference on Communications, 2020

2019
Designing Human Assisted Wireless Sensor and Robot Networks Using Probabilistic Model Checking.
J. Intell. Robotic Syst., 2019

Formal Analysis of Human-Assisted Smart City Emergency Services.
IEEE Access, 2019

Analysis of In-vehicle Security System of Smart Vehicles.
Proceedings of the Future Network Systems and Security - 5th International Conference, 2019

2017
Design and modeling of energy efficient WSN architecture for tactical applications.
Proceedings of the 2017 Military Communications and Information Systems Conference, 2017

2016
A mining-based approach for efficient enumeration of algebraic structures.
Int. J. Data Sci. Anal., 2016

2014
Identifying performance issues based on method invocation patterns of an API.
Proceedings of the 18th International Conference on Evaluation and Assessment in Software Engineering, 2014

2013
Applying authentication tests to discover Man-In-The-Middle attack in security protocols.
Proceedings of the Eighth International Conference on Digital Information Management (ICDIM 2013), 2013

Design and implementation of reliable auctioning algorithms for multi-robot systems.
Proceedings of the International Conference on Advances in Computing, 2013

2012
Modeling and Analyzing MAC Frame Aggregation Techniques in 802.11n Using Bi-dimensional Markovian Model.
Proceedings of the Networked Digital Technologies - 4th International Conference, 2012

2006
Logic-Based Formal Analysis of Cryptographic Protocols.
Proceedings of the 14th IEEE International Conference on Networks, 2006

A Parameterized Analysis of Public-Key Protocols: Needham-Schroeder and Kerberos-5.
Proceedings of the 14th IEEE International Conference on Networks, 2006

Designing Authentication Protocols: Trends and Issues.
Proceedings of the Fifth International Conference on Networking and the International Conference on Systems (ICN / ICONS / MCL 2006), 2006

Formal Verification of 802.11i using Strand Space Formalism.
Proceedings of the Fifth International Conference on Networking and the International Conference on Systems (ICN / ICONS / MCL 2006), 2006

Understanding the intruder through attacks on cryptographic protocols.
Proceedings of the 44st Annual Southeast Regional Conference, 2006

2005
Wireless sensor network security: a secure sink node architecture.
Proceedings of the 24th IEEE International Performance Computing and Communications Conference, 2005

2004
A Heuristic State Space Search Model for Security Protocol Verification.
Proceedings of the ICETE 2004, 2004


  Loading...