Syed Adeel Ali Shah

Orcid: 0000-0002-8610-3144

According to our database1, Syed Adeel Ali Shah authored at least 18 papers between 2014 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
65 nm CMOS 8 mV/fC, 14.6 ns Rising Time Analog Front-End for ATLAS Muon Drift Tubes Detectors.
Proceedings of the 18th Conference on Ph.D Research in Microelectronics and Electronics, 2023

2021
TARS: A Novel Mechanism for Truly Autonomous Resource Selection in LTE-V2V Mode 4.
Sensors, 2021

IoT-based botnet attacks systematic mapping study of literature.
Scientometrics, 2021

2020
A decade of big data literature: analysis of trends in light of bibliometrics.
J. Supercomput., 2020

Optimization-based workload distribution in geographically distributed data centers: A survey.
Int. J. Commun. Syst., 2020

Design of Energy-Efficient Electrocorticography Recording System for Intractable Epilepsy in Implantable Environments.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2020

2019
An effective back-off selection technique for reliable beacon reception in VANETs.
Int. J. Commun. Syst., 2019

2018
Shapely Value Perspective on Adapting Transmit Power for Periodic Vehicular Communications.
IEEE Trans. Intell. Transp. Syst., 2018

Adaptive Beaconing Approaches for Vehicular Ad Hoc Networks: A Survey.
IEEE Syst. J., 2018

Coverage Differentiation Based Adaptive Tx-Power for Congestion and Awareness Control in VANETs.
Mob. Networks Appl., 2018

VANET-LTE based heterogeneous vehicular clustering for driving assistance and route planning applications.
Comput. Networks, 2018

5G for Vehicular Communications.
IEEE Commun. Mag., 2018

2015
A Study on the Critical Analysis of Computational Offloading Frameworks for Mobile Cloud Computing.
J. Netw. Comput. Appl., 2015

Mobile Botnet Attacks - an Emerging Threat: Classification, Review and Open Issues.
KSII Trans. Internet Inf. Syst., 2015

DeDroid: A Mobile Botnet Detection Approach Based on Static Analysis.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

2014
Unicast routing protocols for urban vehicular networks: review, taxonomy, and open research issues.
J. Zhejiang Univ. Sci. C, 2014

Botnet detection techniques: review, future trends, and issues.
J. Zhejiang Univ. Sci. C, 2014

Mobile Botnet Attacks: A Thematic Taxonomy.
Proceedings of the New Perspectives in Information Systems and Technologies, 2014


  Loading...