Sherali Zeadally

According to our database1, Sherali Zeadally authored at least 338 papers between 1994 and 2020.

Collaborative distances:



In proceedings 
PhD thesis 





Design and evaluation of a novel hierarchical trust assessment approach for vehicular networks.
Veh. Commun., 2020

Introduction to the Special Section on Network Science for Internet of Things (IoT).
IEEE Trans. Netw. Sci. Eng., 2020

BPAS: Blockchain-Assisted Privacy-Preserving Authentication System for Vehicular Ad Hoc Networks.
IEEE Trans. Ind. Informatics, 2020

A tutorial survey on vehicle-to-vehicle communications.
Telecommun. Syst., 2020

A Lightweight ECC-Based Authentication Scheme for Internet of Things (IoT).
IEEE Syst. J., 2020

Outsourcing IOTA proof-of-work to volunteer public devices.
Secur. Priv., 2020

Securing Cyberspace of Future Smart Cities with 5G Technologies.
IEEE Netw., 2020

Energy-efficient Workload Allocation and Computation Resource Configuration in Distributed Cloud/Edge Computing Systems With Stochastic Workloads.
IEEE J. Sel. Areas Commun., 2020

Detecting Online Content Deception.
IT Prof., 2020

Securing Internet of Things (IoT) with machine learning.
Int. J. Commun. Syst., 2020

ElectroBlocks: A blockchain-based energy trading scheme for smart grid systems.
Int. J. Commun. Syst., 2020

Modeling Influence with Semantics in Social Networks: A Survey.
ACM Comput. Surv., 2020

Vehicular Communications for ITS: Standardization and Challenges.
IEEE Commun. Stand. Mag., 2020

Multi-Utility Market: Framework for a Blockchain Exchange Platform for Sustainable Development.
CoRR, 2020

Machine learning and data analytics for the IoT.
CoRR, 2020

Efficient Mining Cluster Selection for Blockchain-based Cellular V2X Communications.
CoRR, 2020

Blockchain for Internet of Energy management: Review, solutions, and challenges.
Comput. Commun., 2020

Industrial Control Systems: Cyberattack trends and countermeasures.
Comput. Commun., 2020

SecBCS: a secure and privacy-preserving blockchain-based crowdsourcing system.
Sci. China Inf. Sci., 2020

Health Fog for Smart Healthcare.
IEEE Consumer Electron. Mag., 2020

A survey on congestion detection and control in connected vehicles.
Ad Hoc Networks, 2020

A secure multipath reactive protocol for routing in IoT and HANETs.
Ad Hoc Networks, 2020

Harnessing Artificial Intelligence Capabilities to Improve Cybersecurity.
IEEE Access, 2020

Fog Computing: Data Analytics for Time-Sensitive Applications.
Proceedings of the Convergence of Artificial Intelligence and the Internet of Things, 2020

Data analytics for Cooperative Intelligent Transport Systems.
Veh. Commun., 2019

MASM: A Multiple-Algorithm Service Model for Energy-Delay Optimization in Edge Artificial Intelligence.
IEEE Trans. Ind. Informatics, 2019

Physical Layer Security for the Smart Grid: Vulnerabilities, Threats, and Countermeasures.
IEEE Trans. Ind. Informatics, 2019

Fog Computing for 5G Tactile Industrial Internet of Things: QoE-Aware Resource Allocation Model.
IEEE Trans. Ind. Informatics, 2019

Ideal Lattice-Based Anonymous Authentication Protocol for Mobile Devices.
IEEE Syst. J., 2019

Anonymous and Efficient Message Authentication Scheme for Smart Grid.
Secur. Commun. Networks, 2019

A survey on privacy protection in blockchain system.
J. Netw. Comput. Appl., 2019

Healthcare Data Breaches: Implications for Digital Forensic Readiness.
J. Medical Syst., 2019

Isogeny-Based Cryptography: A Promising Post-Quantum Technique.
IT Prof., 2019

Lightweight Access Control System for Wearable Devices.
IT Prof., 2019

Autonomous Cars: Challenges and Opportunities.
IT Prof., 2019

Blockchain: Trends and future opportunities.
Internet Technol. Lett., 2019

Lattice-Based Public Key Cryptosystem for Internet of Things Environment: Challenges and Solutions.
IEEE Internet Things J., 2019

GSTR: Secure multi-hop message dissemination in connected vehicles using social trust model.
Internet Things, 2019

Efficient Task Scheduling With Stochastic Delay Cost in Mobile Edge Computing.
IEEE Commun. Lett., 2019

25 Years of Bluetooth Technology.
Future Internet, 2019

Integration of VANET and 5G Security: A review of design and implementation issues.
Future Gener. Comput. Syst., 2019

Toward efficient smartification of the Internet of Things (IoT) services.
Future Gener. Comput. Syst., 2019

An empirical investigation of botnet as a service for cyberattacks.
Trans. Emerg. Telecommun. Technol., 2019

A Survey on Hardware-based Security Mechanisms for Internet of Things.
CoRR, 2019

Reliability, failure detection and prevention in cyber-physical systems (CPSs) with agents.
Concurr. Comput. Pract. Exp., 2019

Autonomous Cars: Research Results, Issues, and Future Challenges.
IEEE Commun. Surv. Tutorials, 2019

Privacy aware IOTA ledger: Decentralized mixing and unlinkable IOTA transactions.
Comput. Networks, 2019

Cybersecurity in industrial control systems: Issues, technologies, and challenges.
Comput. Networks, 2019

A Communication Architecture for Crowd Management in Emergency and Disruptive Scenarios.
IEEE Commun. Mag., 2019

Mobile Banking: Evolution and Threats: Malware Threats and Security Solutions.
IEEE Consumer Electron. Mag., 2019

Data collection using unmanned aerial vehicles for Internet of Things platforms.
Comput. Electr. Eng., 2019

Self-Adaptation Techniques in Cyber-Physical Systems (CPSs).
IEEE Access, 2019

Is DNS Ready for Ubiquitous Internet of Things?
IEEE Access, 2019

Lightweight Blockchain for Healthcare.
IEEE Access, 2019

A Traffic-Aware Approach for Enabling Unmanned Aerial Vehicles (UAVs) in Smart City Scenarios.
IEEE Access, 2019

Analysis of Students' Learning Emotions Using EEG.
Proceedings of the Innovative Technologies and Learning - Second International Conference, 2019

Efficient and Secure Three-Factor User Authentication and Key Agreement Using Chaotic Maps.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

Privacy-preserving auditing scheme for shared data in public clouds.
J. Supercomput., 2018

Certificateless Public Key Authenticated Encryption With Keyword Search for Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2018

Certificateless Provable Data Possession Scheme for Cloud-Based Smart Grid Data Management Systems.
IEEE Trans. Ind. Informatics, 2018

Deploying Fog Computing in Industrial Internet of Things and Industry 4.0.
IEEE Trans. Ind. Informatics, 2018

A secure enhanced privacy-preserving key agreement protocol for wireless mobile networks.
Telecommun. Syst., 2018

An efficient and secure searchable public key encryption scheme with privacy protection for cloud storage.
Soft Comput., 2018

Certificateless Public Auditing Scheme for Cloud-Assisted Wireless Body Area Networks.
IEEE Syst. J., 2018

Performance Evaluation of Energy-Autonomous Sensors Using Power-Harvesting Beacons for Environmental Monitoring in Internet of Things (IoT).
Sensors, 2018

Sensor Technologies for Intelligent Transportation Systems.
Sensors, 2018

A review and an empirical analysis of privacy policy and notices for consumer Internet of things.
Secur. Priv., 2018

Wireless energy harvesting: Empirical results and practical considerations for Internet of Things.
J. Netw. Comput. Appl., 2018

Mobile cloud computing: Challenges and future research directions.
J. Netw. Comput. Appl., 2018

Security and Privacy in Ubiquitous Sensor Networks.
J. Inf. Process. Syst., 2018

Privacy Issues and Solutions for Consumer Wearables.
IT Prof., 2018

Autonomous Cars: Social and Economic Implications.
IT Prof., 2018

Internet of Things Forensics: The Need, Process Models, and Open Issues.
IT Prof., 2018

Optimal solution for data collision avoidance in radio frequency identification networks.
Internet Technol. Lett., 2018

Ransomware behavioural analysis on windows platforms.
J. Inf. Secur. Appl., 2018

Efficient and Provably Secure Distributed Signing Protocol for Mobile Devices in Wireless Networks.
IEEE Internet Things J., 2018

Internet of Vehicles: Architecture, Protocols, and Security.
IEEE Internet Things J., 2018

Internet of Things (IoT): Research, Simulators, and Testbeds.
IEEE Internet Things J., 2018

A ReRAM Physically Unclonable Function (ReRAM PUF)-Based Approach to Enhance Authentication Security in Software Defined Wireless Networks.
Int. J. Wirel. Inf. Networks, 2018

IoT technologies for smart cities.
IET Networks, 2018

Privacy and Civilian Drone Use: The Need for Further Regulation.
IEEE Secur. Priv., 2018

Anonymous biometrics-based authentication scheme with key distribution for mobile multi-server environment.
Future Gener. Comput. Syst., 2018

Taxonomy and analysis of security protocols for Internet of Things.
Future Gener. Comput. Syst., 2018

Offloading in fog computing for IoT: Review, enabling technologies, and research opportunities.
Future Gener. Comput. Syst., 2018

Fog computing job scheduling optimization based on bees swarm.
Enterp. Inf. Syst., 2018

RepGuide: Reputation-Based Route Guidance Using Internet of Vehicles.
IEEE Commun. Stand. Mag., 2018

A Survey of Device-to-Device Communications: Research Issues and Challenges.
IEEE Commun. Surv. Tutorials, 2018

Trust-based security adaptation mechanism for Vehicular Sensor Networks.
Comput. Networks, 2018

5G for Vehicular Communications.
IEEE Commun. Mag., 2018

Securing Internet of Things with Software Defined Networking.
IEEE Commun. Mag., 2018

Interference-Aided Vehicular Networks: Future Research Opportunities and Challenges.
IEEE Commun. Mag., 2018

Fog Computing Architecture, Evaluation, and Future Research Directions.
IEEE Commun. Mag., 2018

Structural analysis and classification of search interfaces for the deep web.
Comput. J., 2018

Crowd social media computing: Applying crowd computing techniques to social media.
Appl. Soft Comput., 2018

A Hierarchical Spectrum Access Scheme for TV White Space Coexistence in Heterogeneous Networks.
IEEE Access, 2018

Compact Hardware Implementation of a SHA-3 Core for Wireless Body Sensor Networks.
IEEE Access, 2018

Approaches for Preventing Honeypot Detection and Compromise.
Proceedings of the 2018 Global Information Infrastructure and Networking Symposium, 2018

Mobile Payment Systems - Secure Network Architectures and Protocols
Computer Communications and Networks, Springer, ISBN: 978-3-319-23032-0, 2017

Lightweight Data Aggregation Scheme against Internal Attackers in Smart Grid Using Elliptic Curve Cryptography.
Wirel. Commun. Mob. Comput., 2017

Container-as-a-Service at the Edge: Trade-off between Energy Efficiency and Service Availability at Fog Nano Data Centers.
IEEE Wirel. Commun., 2017

Efficient and Privacy-Preserving Data Aggregation Scheme for Smart Grid Against Internal Adversaries.
IEEE Trans. Smart Grid, 2017

Introduction to the topical issue on semantic social networks and media applications.
Soc. Netw. Anal. Min., 2017

Exploiting Trust: Stealthy Attacks Through Socioware and Insider Threats.
IEEE Syst. J., 2017

Enabling Technologies for Green Internet of Things.
IEEE Syst. J., 2017

Cloud-Assisted Context-Aware Vehicular Cyber-Physical System for PHEVs in Smart Grid.
IEEE Syst. J., 2017

Anonymous Authentication for Wireless Body Area Networks With Provable Security.
IEEE Syst. J., 2017

A seven-layered model architecture for Internet of Vehicles.
J. Inf. Telecommun., 2017

Bystanders' Privacy.
IT Prof., 2017

Mobile Forensics: Advances, Challenges, and Research Opportunities.
IEEE Secur. Priv., 2017

FASPM: Fuzzy logic-based adaptive security protocol for multihop data dissemination in intelligent transport systems.
Trans. Emerg. Telecommun. Technol., 2017

A brief overview of intelligent mobility management for future wireless mobile networks.
EURASIP J. Wirel. Commun. Netw., 2017

Special Issue: Foundations and Practice of Security in Emerging ICT Applications.
Comput. Syst. Sci. Eng., 2017

Viral content propagation in Online Social Networks.
CoRR, 2017

A Cloud-Integrated, Multilayered, Agent-Based Cyber-Physical System Architecture.
Computer, 2017

Special Issue on 5G Wireless Networks for IoT and Body Sensors.
Comput. Networks, 2017

Analysis of handover authentication protocols for mobile wireless networks using identity-based public key cryptography.
Comput. Networks, 2017

Cybercrime at a Scale: A Practical Study of Deployments of HTTP-Based Botnet Command and Control Panels.
IEEE Commun. Mag., 2017

Cybersecurity and Privacy Solutions in Smart Cities.
IEEE Commun. Mag., 2017

Network Service Chaining in Fog and Cloud Computing for the 5G Environment: Data Management and Security Challenges.
IEEE Commun. Mag., 2017

Lightweight authentication protocols for wearable devices.
Comput. Electr. Eng., 2017

Network layer inter-operation of Device-to-Device communication technologies in Internet of Things (IoT).
Ad Hoc Networks, 2017

Lightweight and efficient privacy-preserving data aggregation approach for the Smart Grid.
Ad Hoc Networks, 2017

Multiple Attributes Decision Fusion for Wireless Sensor Networks Based on Intuitionistic Fuzzy Set.
IEEE Access, 2017

Distributed All-IP Mobility Management Architecture Supported by the NDN Overlay.
IEEE Access, 2017

Lightweight Three-Factor Authentication and Key Agreement Protocol for Internet-Integrated Wireless Sensor Networks.
IEEE Access, 2017

Efficient Revocable ID-Based Signature With Cloud Revocation Server.
IEEE Access, 2017

PEAR: A Privacy-Enabled Architecture for Crowdsensing.
Proceedings of the International Conference on Research in Adaptive and Convergent Systems, 2017

Multi-agent architecture for reliable Cyber-Physical Systems (CPS).
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017

Investigating Security for Ubiquitous Sensor Networks.
Proceedings of the 8th International Conference on Ambient Systems, 2017

Distributed mobility management in named data networking.
Wirel. Commun. Mob. Comput., 2016

Mobile cloud networking for efficient energy management in smart grid cyber-physical systems.
IEEE Wirel. Commun., 2016

Handling big data: research challenges and future directions.
J. Supercomput., 2016

Efficient and Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography for Multi-Server Architectures.
IEEE Trans. Inf. Forensics Secur., 2016

An Empirical Study of HTTP-based Financial Botnets.
IEEE Trans. Dependable Secur. Comput., 2016

Privacy Policy Analysis of Popular Web Platforms.
IEEE Technol. Soc. Mag., 2016

Intelligent Device-to-Device Communication in the Internet of Things.
IEEE Syst. J., 2016

Attribution in cyberspace: techniques and legal implications.
Secur. Commun. Networks, 2016

Security Attacks and Solutions in Electronic Health (E-health) Systems.
J. Medical Syst., 2016

Analysis of Security Protocols for Mobile Healthcare.
J. Medical Syst., 2016

Wearable Computing for Health Care.
J. Medical Syst., 2016

The Challenge of Improving Credibility of User-Generated Content in Online Social Networks.
ACM J. Data Inf. Qual., 2016

Drive-By Download Attacks: A Comparative Study.
IT Prof., 2016

Interventions in Cyberspace: Status and Trends.
IT Prof., 2016

An Improved Privacy Solution for the Smart Grid.
Int. J. Netw. Secur., 2016

A Classification and Characterization of Security Threats in Cloud Computing.
Int. J. Next Gener. Comput., 2016

Solving vehicular <i>ad hoc</i> network challenges with Big Data solutions.
IET Networks, 2016

A Taxonomy of Domain-Generation Algorithms.
IEEE Secur. Priv., 2016

Performance analysis of data intensive cloud systems based on data management and replication: a survey.
Distributed Parallel Databases, 2016

A survey and taxonomy on energy efficient resource allocation techniques for cloud computing systems.
Computing, 2016

Managing Trust in the Cloud: State of the Art and Research Challenges.
Computer, 2016

Vehicular delay-tolerant networks for smart grid data management using mobile edge computing.
IEEE Commun. Mag., 2016

Bio-inspired cybersecurity for wireless sensor networks.
IEEE Commun. Mag., 2016

Smart cities: concepts, architectures, research opportunities.
Commun. ACM, 2016

Cognitive radio spectrum sensing framework based on multi-agent arc hitecture for 5G networks.
IEEE Wirel. Commun., 2015

Integration challenges of intelligent transportation systems with connected vehicle, cloud computing, and internet of things technologies.
IEEE Wirel. Commun., 2015

Toward self-authenticable wearable devices.
IEEE Wirel. Commun., 2015

VANET-cloud: a generic cloud computing model for vehicular Ad Hoc networks.
IEEE Wirel. Commun., 2015

Teaching Cybersecurity Using the Cloud.
IEEE Trans. Learn. Technol., 2015

Sustainable Transportation Management System for a Fleet of Electric Vehicles.
IEEE Trans. Intell. Transp. Syst., 2015

An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks.
IEEE Trans. Inf. Forensics Secur., 2015

QoS-Aware Hierarchical Web Caching Scheme for Online Video Streaming Applications in Internet-Based Vehicular Ad Hoc Networks.
IEEE Trans. Ind. Electron., 2015

Special issue on recent developments in Cognitive Radio Sensor Networks.
Pervasive Mob. Comput., 2015

Performance analysis of Bayesian coalition game-based energy-aware virtual machine migration in vehicular mobile cloud.
IEEE Netw., 2015

Enabling Cyber Physical Systems with Wireless Sensor Networking Technologies, Multiagent System Paradigm, and Natural Ecosystems.
Mobile Information Systems, 2015

Gigabit Wireless Networking with IEEE 802.11ac: Technical Overview and Challenges.
J. Networks, 2015

Integration of Cognitive Radio Technology with unmanned aerial vehicles: Issues, opportunities, and future research challenges.
J. Netw. Comput. Appl., 2015

Lifespan and propagation of information in On-line Social Networks: A case study based on Reddit.
J. Netw. Comput. Appl., 2015

Data Quality Challenges in Cyber-Physical Systems.
ACM J. Data Inf. Qual., 2015

An Analysis of RFID Authentication Schemes for Internet of Things in Healthcare Environment Using Elliptic Curve Cryptography.
IEEE Internet Things J., 2015

Detecting and Preventing Online Identity Deception in Social Networking Services.
IEEE Internet Comput., 2015

Ancillary Impacts of Multipath TCP on Current and Future Network Security.
IEEE Internet Comput., 2015

An analysis of tools for online anonymity.
Int. J. Pervasive Comput. Commun., 2015

Critical infrastructure protection: Requirements and challenges for the 21st century.
Int. J. Crit. Infrastructure Prot., 2015

Attribute-based authorization for structured Peer-to-Peer (P2P) networks.
Comput. Stand. Interfaces, 2015

Bio-Inspired Routing Algorithms Survey for Vehicular Ad Hoc Networks.
IEEE Commun. Surv. Tutorials, 2015

Authentication protocol for an ambient assisted living system.
IEEE Commun. Mag., 2015

Flexible architecture for cluster evolution in cloud computing.
Comput. Electr. Eng., 2015

A Novel Architecture for Roaming between 3G and Wireless LANs.
Proceedings of the 1st International ICST Conference on Multimedia Services Access Networks, 2015

CloudNA 2015.
Proceedings of the 40th IEEE Local Computer Networks Conference Workshops, 2015

A real-time video quality estimator for emerging wireless multimedia systems.
Wirel. Networks, 2014

Multiple Account Identity Deception Detection in Social Media Using Nonverbal Behavior.
IEEE Trans. Inf. Forensics Secur., 2014

Design and Performance Analysis of a Virtual Ring Architecture for Smart Grid Privacy.
IEEE Trans. Inf. Forensics Secur., 2014

QoE-Based Server Selection for Content Distribution Networks.
IEEE Trans. Computers, 2014

Cyberwar: The What, When, Why, and How [Commentary].
IEEE Technol. Soc. Mag., 2014

IEEE Syst. J., 2014

Secure Mobile Payment Systems.
IT Prof., 2014

Editorial: Cloud computing service and architecture models.
Inf. Sci., 2014

A Novel Vehicular Information Network Architecture Based on Named Data Networking (NDN).
IEEE Internet Things J., 2014

Design, implementation, and performance analysis of a secure payment protocol in a payment gateway centric model.
Computing, 2014

Achieving Quality of Service (QoS) Using Resource Allocation and Adaptive Scheduling in Cloud Computing with Grid Support.
Comput. J., 2014

Introduction to the special issue on "Wireless systems: New technologies, resource optimization and security".
Comput. Electr. Eng., 2014

Online deception in social media.
Commun. ACM, 2014

Performance analysis of a cross-layered incremental redundancy hybrid automatic repeat request (CL IR-HARQ) mechanism.
Ad Hoc Networks, 2014

Energy-aware sensor node relocation in mobile sensor networks.
Ad Hoc Networks, 2014

A Directional Geocast Warning Dissemination Protocol for Vehicular Ad Hoc NETworks (VANETs).
Proceedings of the Wired/Wireless Internet Communications - 12th International Conference, 2014

ABAMA: An Agent-based Architecture for Mapping Natural Ecosystems onto Wireless Sensor Networks.
Proceedings of the 9th International Conference on Future Networks and Communications (FNC'14) / The 11th International Conference on Mobile Systems and Pervasive Computing (MobiSPC'14) / Affiliated Workshops, 2014

Towards Privacy Protection in Smart Grid.
Wirel. Pers. Commun., 2013

Modeling Object Flows from Distributed and Federated RFID Data Streams for Efficient Tracking and Tracing.
IEEE Trans. Parallel Distrib. Syst., 2013

A state-dependent time evolving multi-constraint routing algorithm.
ACM Trans. Auton. Adapt. Syst., 2013

Comparative study of trust and reputation systems for wireless sensor networks.
Secur. Commun. Networks, 2013

HyBR: A Hybrid Bio-inspired Bee swarm Routing protocol for safety applications in Vehicular Ad hoc NETworks (VANETs).
J. Syst. Archit., 2013

Using Cloud Computing to Implement a Security Overlay Network.
IEEE Secur. Priv., 2013

A dynamic QoE routing system for user-centric applications.
Trans. Emerg. Telecommun. Technol., 2013

Virtualization: Issues, security threats, and solutions.
ACM Comput. Surv., 2013

Trust management of services in cloud environments: Obstacles and solutions.
ACM Comput. Surv., 2013

Energy-efficient beaconless geographic routing in energy harvested wireless sensor networks.
Concurr. Comput. Pract. Exp., 2013

Spectrum Assignment in Cognitive Radio Networks: A Comprehensive Survey.
IEEE Commun. Surv. Tutorials, 2013

Securing Cyberspace in the 21st Century.
Computer, 2013

Critical Control System Protection in the 21st Century.
Computer, 2013

Analyzing the security of Windows 7 and Linux for cloud computing.
Comput. Secur., 2013

A survey on Green communications using Adaptive Link Rate.
Cluster Computing, 2013

Mobile social networking applications.
Commun. ACM, 2013

Impact of neighbor awareness at the MAC layer in a Vehicular Ad-Hoc Network (VANET).
Proceedings of the 5th IEEE International Symposium on Wireless Vehicular Communications, 2013

Key management solutions in the smart grid environment.
Proceedings of the 6th Joint IFIP Wireless and Mobile Networking Conference, 2013

Energy-efficient networking: past, present, and future.
J. Supercomput., 2012

Green networks.
J. Supercomput., 2012

Vehicular ad hoc networks (VANETS): status, results, and challenges.
Telecommun. Syst., 2012

Foreword - Special issue on vehicular communications, networks and applications.
Telecommun. Syst., 2012

An Anonymous Secure Payment Protocol in a Payment Gateway Centric Model.
Proceedings of the 3rd International Conference on Ambient Systems, 2012

Guest editorial special issue on quality of experience for multimedia applications.
Multim. Tools Appl., 2012

Mitigating starvation of Linux CPU-bound processes in the presence of network I/O.
J. Syst. Softw., 2012

Mobile Multimedia Applications: Delivery Technologies.
IT Prof., 2012

Machine-to-Machine (M2M) Communications in Vehicular Networks.
KSII Trans. Internet Inf. Syst., 2012

Detecting Insider Threats: Solutions and Trends.
Inf. Secur. J. A Glob. Perspect., 2012

Enabling Cyber Physical Systems with Wireless Sensor Networking Technologies.
Int. J. Distributed Sens. Networks, 2012

Cyber Physical Systems Using Sensor Technologies.
Int. J. Distributed Sens. Networks, 2012

Hop-based approach for holes and boundary detection in wireless sensor networks.
IET Wirel. Sens. Syst., 2012

Performance comparison of media access control protocols for vehicular ad hoc networks.
IET Networks, 2012

Balancing energy consumption with mobile agents in wireless sensor networks.
Future Gener. Comput. Syst., 2012

A lightweight secure mobile Payment protocol for vehicular ad-hoc networks (VANETs).
Electron. Commer. Res., 2012

Network Forensics: An Analysis of Techniques, Tools, and Trends.
Computer, 2012

Zero Configuration Networking: Implementation, performance, and security.
Comput. Electr. Eng., 2012

Improving Trust and Privacy Models in Social Networks.
Proceedings of the 5th International Conference on New Technologies, 2012

A novel sensor node relocation approach to maintain connectivity with a center of interest.
Proceedings of the 15th ACM International Conference on Modeling, 2012

Smart Grid Privacy: Issues and Solutions.
Proceedings of the 21st International Conference on Computer Communications and Networks, 2012

An assessment of U.S. legislation on cybersecurity.
Proceedings of the 2012 International Conference on Cyber Security, 2012

A Chain-Based Relocation Approach to Maintain Connectivity with a Center of Interest.
Proceedings of the 15th IEEE International Conference on Computational Science and Engineering, 2012

Real-time QoE prediction for multimedia applications in Wireless Mesh Networks.
Proceedings of the 2012 IEEE Consumer Communications and Networking Conference (CCNC), 2012

Performance modeling of MPEG-4 video streaming over IEEE 802.11 using distribution coordination function.
Wirel. Commun. Mob. Comput., 2011

Internet Protocol Television (IPTV): Architecture, Trends, and Challenges.
IEEE Syst. J., 2011

Impact of denial of service solutions on network quality of service.
Secur. Commun. Networks, 2011

Service level agreements (SLAs) parameter negotiation between heterogeneous 4G wireless network operators.
Pervasive Mob. Comput., 2011

Recent advances in multimedia networking.
Multim. Tools Appl., 2011

Guest editorial special issue on "Future multimedia networking".
Multim. Tools Appl., 2011

RFID technology, systems, and applications.
J. Netw. Comput. Appl., 2011

Multimedia applications over metropolitan area networks (MANs).
J. Netw. Comput. Appl., 2011

TMS-RFID: Temporal management of large-scale RFID applications.
Inf. Syst. Frontiers, 2011

Survey of media access control protocols for vehicular ad hoc networks.
IET Commun., 2011

A Bio-Inspired Quality of Service (QoS) Routing Algorithm.
IEEE Commun. Lett., 2011

RFID enabled traceability networks: a survey.
Distributed Parallel Databases, 2011

Concurrent multipath transmission combining forward error correction and path interleaving for video streaming.
Comput. Commun., 2011

Guest Editors' Introduction to the Special Issue on "Modern trends in applied security: Architectures, implementations and applications".
Comput. Electr. Eng., 2011

On Linux starvation of CPU-bound processes in the presence of network I/O.
Comput. Electr. Eng., 2011

Recent advances in wireless communications and networks.
Wirel. Commun. Mob. Comput., 2010

A programmable network address translator: Design, implementation, and performance.
ACM Trans. Internet Techn., 2010

Wireless multimedia delivery over 802.11e with cross-layer optimization techniques.
Multim. Tools Appl., 2010

Ubiquitous RFID: Where are we?
Inf. Syst. Frontiers, 2010

Guest editorial: Advances in RFID technology.
Inf. Syst. Frontiers, 2010

Assessing and Improving Authentication Confidence Management.
Inf. Manag. Comput. Secur., 2010

Dynamic pricing for load-balancing in user-centric joint call admission control of next-generation wireless networks.
Int. J. Commun. Syst., 2010

Next Generation Networks (NGNs).
Int. J. Commun. Syst., 2010

Security attacks and solutions for vehicular ad hoc networks.
IET Commun., 2010

Implementation and performance evaluation of a payment protocol for vehicular ad hoc networks.
Electron. Commer. Res., 2010

Editorial for special issue of Telecommunication Systems on "Mobility management and wireless access".
Telecommun. Syst., 2009

An adaptive cross-layer mapping algorithm for MPEG-4 video transmission over IEEE 802.11e WLAN.
Telecommun. Syst., 2009

Guest editorial.
Telecommun. Syst., 2009

A secure two-factor authentication scheme for single sign-on services.
Secur. Commun. Networks, 2009

Cross-Layer Support for Energy Efficient Routing in Wireless Sensor Networks.
J. Sensors, 2009

Design, implementation, and evaluation of a Programmable Bandwidth Aggregation System for home networks.
J. Netw. Comput. Appl., 2009

RFID Infrastructure Design: A Case Study of Two Australian RFID Projects.
IEEE Internet Comput., 2009

A dynamic network discovery and selection method for heterogeneous wireless networks.
Int. J. Internet Protoc. Technol., 2009

Call for Papers: on '<i>Next Generation Networks</i> (<i>NGNs</i>)'.
Int. J. Commun. Syst., 2009

Green Networking for Major Components of Information Communication Technology Systems.
EURASIP J. Wirel. Commun. Netw., 2009

Enabling Wireless Technologies for Green Pervasive Computing.
EURASIP J. Wirel. Commun. Netw., 2009

Design and performance analysis of an inductive QoS routing algorithm.
Comput. Commun., 2009

Message from the Workshop Co-Organizers.
Proceedings of the Seventh Annual IEEE International Conference on Pervasive Computing and Communications, 2009

A Novel Distributed Sensor Positioning System Using the Dual of Target Tracking.
IEEE Trans. Computers, 2008

Ubiquitous Wireless Connectivity across Cellular and Wireless Local Area Networks.
J. Inf. Sci. Eng., 2008

An efficient wireless network discovery scheme for heterogeneous access environments.
Int. J. Pervasive Comput. Commun., 2008

Internet access to heterogeneous home area network devices with an OSGi-based residential gateway.
Int. J. Ad Hoc Ubiquitous Comput., 2008

An agent-based architecture for fast context transfers during handoffs.
Int. J. Ad Hoc Ubiquitous Comput., 2008

A novel centralised clustering algorithm for energy efficient wireless sensor networks.
Int. J. Auton. Adapt. Commun. Syst., 2008

Enabling Next-Generation RFID Applications: Solutions and Challenges.
Computer, 2008

End-to-end support over Heterogeneous Wired-Wireless Networks.
Comput. Commun., 2008

A secure vehicle-to-roadside communication payment protocol in vehicular ad hoc networks.
Comput. Commun., 2008

Mobility protocols for ITS/VANET.
Comput. Commun., 2008

Foreword: Routing and QoS over heterogeneous networks.
Ann. des Télécommunications, 2008

Quality of service models for heterogeneous networks: overview and challenges.
Ann. des Télécommunications, 2008

A Novel Distributed Authentication Framework for Single Sign-On Services.
Proceedings of the IEEE International Conference on Sensor Networks, 2008

An enhanced uplink scheduling scheme for IEEE 802.16 metropolitan area networks.
Proceedings of the 5th International Conference on Mobile Technology, 2008

Experimental Evaluation and Characterization of Long-Distance 802.11g Links.
Proceedings of the Seventh International Conference on Networking (ICN 2008), 2008

An Empirical Analysis of Handoff Performance for SIP, Mobile IP, and SCTP Protocols.
Wirel. Pers. Commun., 2007

End-to-End Security Across Wired-Wireless Networks for Mobile Users.
Inf. Secur. J. A Glob. Perspect., 2007

Enabling End-to-End QoS over Hybrid Wired-Wireless Networks.
Wirel. Pers. Commun., 2006

Mobility management across hybrid wireless networks: Trends and challenges.
Comput. Commun., 2006

Fast Handover over Micro-MPLS-Based Wireless Networks.
Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC 2006), 2006

Mobility Protocols for Handoff Management in Heterogeneous Networks.
Proceedings of the Personal Wireless Communications, 2006

Defending against Distributed Denial of Service (DDoS) Attacks with Queue Traffic Differentiation over Micro-MPLS-based Wireless Networks.
Proceedings of the International Conference on Systems and Networks Communications (ICSNC 2006), October 29, 2006

SCTP Multihoming Support for Handoffs across Heterogeneous Networks.
Proceedings of the Fourth Annual Conference on Communication Networks and Services Research (CNSR 2006), 2006

Adaptive Queue Management on Micro-MPLS-Based Wireless Networks for Multimedia Traffic.
Proceedings of the Fourth Annual Conference on Communication Networks and Services Research (CNSR 2006), 2006

J2EE support for wireless services.
J. Syst. Softw., 2005

Design, implementation, and evaluation of the audio/video distribution transport protocol (AVDTP) for high quality audio support over Bluetooth.
Comput. Commun., 2005

Landscape: a high performance distributed positioning scheme for outdoor sensor networks.
Proceedings of the 2005 IEEE International Conference on Wireless And Mobile Computing, 2005

QoS Path Selection Exploiting Minimum Link Delays in MPLS-Based Networks.
Proceedings of the Systems Communications 2005 (ICW / ICHSN / ICMCS / SENET 2005), 2005

Design Architectures for 3G and IEEE 802.11 WLAN Integration.
Proceedings of the Networking, 2005

Priority-Based Congestion Control in MPLS-Based Networks.
Proceedings of the Telecommunications 2005: Advanced Industrial Conference on Telecommunications / Service Assurance with Partial and Intermittent Resources Conference / E-Learning on Telecommunications Workshop (AICT / SAPIR / ELETE 2005), 2005

A framework for efficient resource management in IEEE 802.11 WLANs.
Wirel. Commun. Mob. Comput., 2004

Enabling gigabit network access to end users.
Proceedings of the IEEE, 2004

Network application programming interfaces (APIs) performance on commodity operating systems.
Inf. Softw. Technol., 2004

Improving Bluetooth performance in 802.11 interference environments.
Comput. Commun., 2004

HARMONICA: Enhanced QoS Support with Admission Control for IEEE 802.11 Contention-based Access.
Proceedings of the 10th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS 2004), 2004

SIP and mobile IP integration to support seamless mobility.
Proceedings of the IEEE 15th International Symposium on Personal, 2004

Design and Implementation of a Wireless Prescription System.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004

Seamless Bluetooth Connectivity to IPv6 Networks.
Proceedings of the Embedded and Ubiquitous Computing, 2004

Design and implementation of a Jini-J2EE bridge to enable access to enterprise services.
Proceedings of the 1st IEEE Consumer Communications and Networking Conference, 2004

Design and Implementation of a SIP-based VoIP Architecture.
Proceedings of the 18th International Conference on Advanced Information Networking and Applications (AINA 2004), 2004

Evaluating IPv6 on Windows and Solaris.
IEEE Internet Comput., 2003

QoS Support in Wireless LANs Using Dynamic Adaptation of Channel Access Parameters.
Proceedings of the Mobile and Wireless Communications Networks, 2003

A Novel Secure Handoff Approach for Wireless LANs.
Proceedings of the Mobile and Wireless Communications Networks, 2003

A Performance Comparison of Communication APIs on Solaris and Windows Operating Systems.
Proceedings of the 2003 International Symposium on Information Technology (ITCC 2003), 2003

Enabling User Prioritization of Multimedia Applications.
Proceedings of the 2003 International Symposium on Information Technology (ITCC 2003), 2003

Design and Implementation of a User-level Prioritization Service.
Proceedings of the Eighth IEEE Symposium on Computers and Communications (ISCC 2003), 30 June, 2003

Using Wireless Sensor Networks to Narrow the Gap Between Low-Level Information and Context-Awareness.
Proceedings of the ISCA 17th International Conference Computers and Their Applications, 2002

Application-to-Application Priority with STREAMS.
Proceedings of the 26th Annual IEEE Conference on Local Computer Networks (LCN 2001), 2001

Performance evaluation of a Java-based networking Application Programming Interface (API).
Inf. Process. Lett., 2000

Impact of ATM switch architectures on CBR video performance.
Comput. Commun., 2000

Implementation and Performance of QoS-aware Java Applications over ATM Networks.
Comput. J., 2000

Design and Implementation of a QoS-aware Networking Application Programming Interface.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 1999

Towards native ATM services: Where are we?
Proceedings of the Computers and Their Applications (CATA-99), 1999

Experiences with multimedia applications over native ATM.
J. Netw. Comput. Appl., 1998

Best-effort delivery of live video across a local area ATM network.
Proceedings of the Computers and Their Applications (CATA-98), 1998

An Evaluation of the Real-Time Performance of SVR4.0 and SVR4.2.
ACM SIGOPS Oper. Syst. Rev., 1997

Improving End System Performance for Multimedia Applications over High Bandwidth Networks.
Multim. Tools Appl., 1997

An ATM multimedia architecture: Design, implementation, and performance.
J. High Speed Networks, 1997

A UNIX-based ATM multimedia architecture.
Proceedings of the Second IEEE Symposium on Computers and Communications (ISCC 1997), 1997

Throughout optimization for multimedia applications over high speed networks.
Proceedings of the High Performance Networking VII, IFIP TC6 Seventh International Conference on High Performance Networking (HPN'97), White Plains, New York, USA, 28th April, 1997

An Analysis of Process and Memory Models to Support High-Speed Networking in a UNIX Environment.
Proceedings of the USENIX Annual Technical Conference, 1996

The CHARISMA ATM Horst Interface.
Proceedings of the Broadband Islands '94, 1994