Mohammad S. Obaidat
Computer engineering professor and scholar
Mohammad S. Obaidat's AcademicInfluence.com Rankings
Download Badge
Computer Science
Mohammad S. Obaidat's Degrees
- Bachelors Computer Science Yarmouk University
Similar Degrees You Can Earn
Why Is Mohammad S. Obaidat Influential?
(Suggest an Edit or Addition)According to Wikipedia, Mohammad Salameh Obaidat is a Jordanian American Academic/ Computer Engineer/computer Scientist and Founding Dean of College of Computing and Informatics at the University of Sharjah, UAE. He is the Past President & Chair of Board of Directors of and a Fellow of the Society for Modeling and Simulation International , and a Fellow of the Institute of Electrical and Electronics Engineers for contributions to adaptive learning, pattern recognition and system simulation . He was born in Jordan to The Obaidat known Family. He is the cousin of the Former Prime Minister of Jordan, Ahmed Obaidat and received his M.S. and Ph.D. in computer engineering from the Ohio State University, Columbus, Ohio, USA. He is known for his contributions in the fields of cybersecurity, Biometrics-based Cybersecurity, wireless networks, modeling and simulation, AI/Data Analytics. He served as President and Char of Board of Directors of the Society for Modeling and Simulation International, SCS, a Tenured Professor & Chair of Department of Computer Science at Monmouth University, Tenured Professor & Chair of Department of computer and Information Sciences at Fordham University, USA, Dean of College of Engineering at Prince Sultan University, and Advisor to the President of Philadelphia University for Research, Development and IT. He has chaired numerous international conferences and has given numerous keynote speeches.
Mohammad S. Obaidat's Published Works
Published Works
- Verification of computer users using keystroke dynamics (1997) (330)
- A Cooperative Quality-Aware Service Access System for Social Internet of Vehicles (2018) (229)
- Lacas: learning automata-based congestion avoidance scheme for healthcare wireless sensor networks (2009) (205)
- Digital watermarking-based DCT and JPEG model (2003) (205)
- BHEEM: A Blockchain-Based Framework for Securing Electronic Health Records (2018) (181)
- Secure and Sustainable Load Balancing of Edge Data Centers in Fog Computing (2018) (172)
- Soft-WSN: Software-Defined WSN Management System for IoT Applications (2018) (149)
- An accurate line of sight propagation performance model for ad-hoc 802.11 wireless LAN (WLAN) devices (2002) (146)
- Wireless sensor network-based fire detection, alarming, monitoring and prevention system for Bord-and-Pillar coal mines (2012) (142)
- On Theoretical Modeling of Sensor Cloud: A Paradigm Shift From Wireless Sensor Network (2017) (133)
- Phonocardiogram signal analysis: techniques and performance comparison. (1993) (132)
- Joint Computing and Caching in 5G-Envisioned Internet of Vehicles: A Deep Reinforcement Learning-Based Traffic Control System (2020) (125)
- Random Early Detection for Congestion Avoidance in Wired Networks: A Discretized Pursuit Learning-Automata-Like Solution (2010) (122)
- Edge Computing-Based Security Framework for Big Data Analytics in VANETs (2019) (120)
- A robust and efficient password-based conditional privacy preserving authentication and group-key agreement protocol for VANETs (2017) (119)
- Guest editorial learning automata: theory, paradigms, and applications (2002) (116)
- TSCA: A Temporal-Spatial Real-Time Charging Scheduling Algorithm for On-Demand Architecture in Wireless Rechargeable Sensor Networks (2018) (116)
- An advanced Internet of Thing based Security Alert System for Smart Home (2017) (114)
- HaBiTs: Blockchain-based Telesurgery Framework for Healthcare 4.0 (2019) (107)
- Fog Computing for Smart Grid Systems in the 5G Environment: Challenges and Solutions (2019) (105)
- Coalition Games for Spatio-Temporal Big Data in Internet of Vehicles Environment: A Comparative Analysis (2015) (101)
- When Deep Reinforcement Learning Meets 5G-Enabled Vehicular Networks: A Distributed Offloading Framework for Traffic Big Data (2020) (97)
- A Deep Learning Based Artificial Neural Network Approach for Intrusion Detection (2017) (97)
- Blockchain-based identity management systems: A review (2020) (96)
- Distributed Home Energy Management System With Storage in Smart Grid Using Game Theory (2017) (96)
- A Learning Automata Based Solution for Preventing Distributed Denial of Service in Internet of Things (2011) (94)
- Collaborative Learning Automata-Based Routing for Rescue Operations in Dense Urban Regions Using Vehicular Sensor Networks (2015) (93)
- Connectivity preserving localized coverage algorithm for area monitoring using wireless sensor networks (2011) (92)
- A Secure Three-Factor User Authentication Protocol With Forward Secrecy for Wireless Medical Sensor Network Systems (2020) (90)
- Social-Oriented Adaptive Transmission in Opportunistic Internet of Smartphones (2017) (89)
- Dimensionality reduction and feature extraction applications in identifying computer users (1991) (89)
- Security of e-Systems and Computer Networks (2007) (88)
- Biometric Authentication Using Mouse Gesture Dynamics (2013) (85)
- A Multilayer Neural Network System for Computer Access Security (1994) (85)
- FACES: Friend-Based Ad Hoc Routing Using Challenges to Establish Security in MANETs Systems (2011) (84)
- Principles of Wireless Sensor Networks (2014) (82)
- Efficient and Secure Anonymous Authentication With Location Privacy for IoT-Based WBANs (2020) (80)
- Learning Automata-Based QoS Framework for Cloud IaaS (2014) (79)
- Quality of Service Optimization in an IoT-Driven Intelligent Transportation System (2019) (78)
- QoS-Guaranteed Bandwidth Shifting and Redistribution in Mobile Cloud Environment (2014) (78)
- An ant swarm-inspired energy-aware routing protocol for wireless ad-hoc networks (2010) (77)
- BloHosT: Blockchain Enabled Smart Tourism and Hospitality Management (2019) (76)
- An adaptive task allocation technique for green cloud computing (2017) (74)
- SeDaTiVe: SDN-Enabled Deep Learning Architecture for Network Traffic Control in Vehicular Cyber-Physical Systems (2018) (74)
- An Authenticated Key Exchange Protocol for Multi-Server Architecture in 5G Networks (2020) (73)
- An online neural network system for computer access security (1993) (71)
- Novel Framework of Risk-Aware Virtual Network Embedding in Optical Data Center Networks (2018) (71)
- Vehicular Security Through Reputation and Plausibility Checks (2014) (69)
- Combining Mouse and Keystroke Dynamics Biometrics for Risk-Based Authentication in Web Environments (2012) (69)
- Learning automata as a utility for power management in smart grids (2013) (68)
- Performance Analysis of IEEE 802.15.6 MAC Protocol under Non-Ideal Channel Conditions and Saturated Traffic Regime (2015) (67)
- Ensuring Privacy and Security in E- Health Records (2018) (67)
- Keystroke Dynamics Based Authentication (1996) (64)
- An ant colony optimization approach for reputation and quality-of-service-based security in wireless sensor networks (2009) (64)
- Clustering and splitting charging algorithms for large scaled wireless rechargeable sensor networks (2016) (64)
- Computer users verification using the perceptron algorithm (1993) (62)
- New Clustering-Based Semantic Service Selection and User Preferential Model (2021) (62)
- Adaptive wireless networks using learning automata (2011) (61)
- Application of Deep Learning to Sentiment Analysis for recommender system on cloud (2017) (60)
- Border Surveillance With WSN Systems in a Distributed Manner (2018) (60)
- Statistical vertical reduction‐based data abridging technique for big network traffic dataset (2019) (60)
- Safety Challenges and Solutions in Mobile Social Networks (2013) (58)
- Authorship verification using deep belief network systems (2017) (57)
- Routing and collision avoidance techniques for unmanned aerial vehicles: Analysis, optimal solutions, and future directions (2020) (57)
- Virtual Backoff Algorithm: An Enhancement to 802.11 Medium-Access Control to Improve the Performance of Wireless Networks (2010) (57)
- A systematic review on security issues in vehicular ad hoc network (2018) (56)
- TILAA: Tactile Internet-based Ambient Assistant Living in fog environment (2019) (56)
- A Lightweight Privacy-Preserving Authentication Protocol for VANETs (2020) (55)
- Comparative analysis of IoT based products, technology and integration of IoT with cloud computing (2020) (55)
- Handbook of Green Information and Communication Systems (2012) (55)
- FORK: A novel two-pronged strategy for an agent-based intrusion detection scheme in ad-hoc networks (2008) (54)
- A Comparative Study on Frameworks, MAC Layer Protocols and Open Research Issues in Internet of Things (2019) (53)
- GTCharge: A game theoretical collaborative charging scheme for wireless rechargeable sensor networks (2016) (53)
- LA-MHR: Learning Automata Based Multilevel Heterogeneous Routing for Opportunistic Shared Spectrum Access to Enhance Lifetime of WSN (2019) (53)
- Smart Cities and Homes: Key Enabling Technologies (2016) (49)
- Learning Automata Based Sentiment Analysis for recommender system on cloud (2013) (49)
- Blind Signatures Based Secured E-Healthcare System (2018) (49)
- Comparative analysis of distributive linear and non-linear optimised spectrum sensing clustering techniques in cognitive radio network systems (2020) (48)
- Learning automata-based bus arbitration for shared-medium ATM switches (2002) (47)
- LAID: a learning automata-based scheme for intrusion detection in wireless sensor networks (2009) (47)
- Selection of intermediate routes for secure data communication systems using graph theory application and grey wolf optimisation algorithm in MANETs (2020) (46)
- Residential Energy Management in Smart Grid: A Markov Decision Process-Based Approach (2013) (46)
- An efficient approach for distributed dynamic channel allocation with queues for real-time and non-real-time traffic in cellular networks (2009) (45)
- Optimized Time Synchronized Multilayer MAC Protocol for WSN Using Relay Nodes (2020) (45)
- Intelligent agents on the Web: a review (2004) (45)
- Jamming in underwater sensor networks: detection and mitigation (2012) (45)
- A Lightweight and Provably Secure Key Agreement System for a Smart Grid With Elliptic Curve Cryptography (2019) (43)
- A robust ElGamal‐based password‐authentication protocol using smart card for client‐server communication (2017) (43)
- Design and Analysis of an Enhanced Patient-Server Mutual Authentication Protocol for Telecare Medical Information System (2015) (40)
- Applied system simulation: methodologies and applications (2003) (40)
- A decentralised approach to privacy preserving trajectory mining (2020) (40)
- Mils-Cloud: A Sensor-Cloud-Based Architecture for the Integration of Military Tri-Services Operations and Decision Making (2016) (40)
- Detecting blackhole attacks on DSR-based mobile ad hoc networks (2012) (40)
- Performance Evaluation of Computer and Telecommunication Systems (1998) (39)
- Multi-Path Trust-Based Secure AOMDV Routing in Ad Hoc Networks (2011) (39)
- Introduction and overview of key enabling technologies for smart cities and homes (2016) (39)
- UWSim: A Simulator for Underwater Sensor Networks (2008) (39)
- Networks of learning automata for the vehicular environment: a performance analysis study (2014) (39)
- A verification methodology for computer systems users (1995) (39)
- Towards a framework for large-scale multimedia data storage and processing on Hadoop platform (2014) (38)
- Local Similarity Imputation Based on Fast Clustering for Incomplete Data in Cyber-Physical Systems (2018) (38)
- On the placement of controllers in software-Defined-WAN using meta-heuristic approach (2018) (37)
- Deep Learning-Based Content Centric Data Dissemination Scheme for Internet of Vehicles (2018) (37)
- Adaptive call admission control in 3GPP LTE networks (2014) (36)
- Existence of dumb nodes in stationary wireless sensor networks (2014) (36)
- TACRM: trust access control and resource management mechanism in fog computing (2019) (36)
- Community detection in an integrated Internet of Things and social network architecture (2012) (36)
- WHOMoVeS: An optimized broadband sensor network for military vehicle tracking (2008) (36)
- Probability-based controlled flooding in opportunistic networks (2015) (36)
- Fundamentals of performance evaluation of computer and telecommunication systems (2010) (35)
- A comparative study of digital watermarking in JPEG and JPEG 2000 environments (2003) (35)
- Synchronization of multihop wireless sensor networks at the application layer (2011) (35)
- MR-Chord: Improved Chord Lookup Performance in Structured Mobile P2P Networks (2015) (35)
- Chinese Remainder Theorem-Based RSA-Threshold Cryptography in MANET Using Verifiable Secret Sharing Scheme (2009) (35)
- Efficient Medium Access Control for Cyber–Physical Systems With Heterogeneous Networks (2015) (34)
- On the use of learning automata in the control of broadcast networks: a methodology (2002) (34)
- An Energy-Efficient On-Demand Routing algorithm for Mobile Ad-Hoc Networks (2008) (34)
- Trust-based Security Protocol against blackhole attacks in opportunistic networks (2013) (34)
- Runtime Verification in Distributed Computing (2011) (34)
- An ant-swarm inspired energy-efficient ad hoc on-demand routing protocol for mobile ad hoc networks (2013) (33)
- Resource-Optimized Multiarmed Bandit-Based Offload Path Selection in Edge UAV Swarms (2019) (33)
- Providing reliable and link stability‐based geocasting model in underwater environment (2012) (33)
- Energy-efficient smart metering for green smart grid communication (2014) (33)
- A probabilistic zonal approach for swarm‐inspired wildfire detection using sensor networks (2008) (33)
- Security analysis and design of an efficient ECC-based two-factor password authentication scheme (2016) (32)
- An adaptive learning approach for fault-tolerant routing in Internet of Things (2012) (32)
- A robust mutual authentication protocol for WSN with multiple base-stations (2018) (32)
- EEAODR: An energy-efficient ad hoc on-demand routing protocol for mobile ad hoc networks (2009) (32)
- GTCCS: A Game Theoretical Collaborative Charging Scheduling for On-Demand Charging Architecture (2018) (31)
- AID: A prototype for Agricultural Intrusion Detection using Wireless Sensor Network (2015) (31)
- Learning automaton-based self-protection algorithm for wireless sensor networks (2018) (30)
- Service Degradability Supported by Forecasting System in Optical Data Center Networks (2019) (30)
- Simulation of queueing models in computer systems (1990) (30)
- Provably Secure and Anonymous Password Authentication Protocol for Roaming Service in Global Mobility Networks Using Extended Chaotic Maps (2015) (30)
- Detection of Identity-Based Attacks in Wireless Sensor Networks Using Signalprints (2010) (30)
- EEAODR: An energy‐efficient ad hoc on‐demand routing protocol for mobile ad hoc networks (2009) (30)
- Node Stability-Based Location Updating in Mobile Ad-Hoc Networks (2008) (30)
- A secure and privacy preserving lightweight authentication scheme for smart-grid communication using elliptic curve cryptography (2020) (29)
- Feedback Suppression in Multicast Satellite Networks Using Game Theory (2012) (29)
- PRATIT: a CNN-based emotion recognition system using histogram equalization and data augmentation (2019) (29)
- Automated Machine Learning: The New Wave of Machine Learning (2020) (29)
- A Provably Secure and Lightweight Identity-Based Two-Party Authenticated Key Agreement Protocol for IIoT Environments (2021) (29)
- Multiwavelength Optical LANs (2003) (29)
- A Simulation Evaluation Study of Neural Network Techniques to Computer User Identification (1997) (29)
- An intelligent simulation methodology to characterize defects in materials (2001) (28)
- Edge Computing Based Healthcare Systems: Enabling Decentralized Health Monitoring in Internet of Medical Things (2020) (28)
- Modeling and Simulation of Computer Networks and Systems: Methodologies and Applications (2015) (28)
- Securing vehicular networks: A reputation and plausibility checks-based approach (2010) (28)
- A novel Geocast technique with hole detection in underwater sensor networks (2010) (28)
- A low-overhead fault-tolerant routing algorithm for mobile ad hoc networks: A scheme and its simulation analysis (2010) (28)
- An anonymous and provably secure authentication scheme for mobile user (2016) (27)
- DLRS: Deep Learning-Based Recommender System for Smart Healthcare Ecosystem (2019) (27)
- Biometric Security and Internet of Things (IoT) (2018) (27)
- Situation-Aware Protocol Switching in Software-Defined Wireless Sensor Network Systems (2018) (27)
- A probabilistic zonal approach for swarm-inspired wildfire detection using sensor networks (2008) (26)
- A Robust Reputation-Based Computational Model for Trust Establishment in Pervasive Systems (2015) (26)
- DRUMS: Demand Response Management in a Smart City Using Deep Learning and SVR (2018) (26)
- Provably Secure Pairing-Free Identity-Based Partially Blind Signature Scheme and Its Application in Online E-cash System (2016) (26)
- Cryptography-Based Misbehavior Detection and Trust Control Mechanism for Opportunistic Network Systems (2018) (26)
- Movement-Based Solutions to Energy Limitation in Wireless Sensor Networks: State of the Art and Future Trends (2021) (26)
- Clustering-driven wireless data broadcasting (2009) (26)
- A Reinforcement Learning-Based Network Traffic Prediction Mechanism in Intelligent Internet of Things (2021) (26)
- Dynamic resource allocation in ATM networks (1998) (26)
- Authenticated Key Agreement Scheme With User Anonymity and Untraceability for 5G-Enabled Softwarized Industrial Cyber-Physical Systems (2021) (26)
- A high efficient node capture attack algorithm in wireless sensor network based on route minimum key set (2013) (26)
- IGFS: A New MAC Protocol Exploiting Heterogeneous Propagation Delays in the Dynamic Bandwidth Allocation on WDM-EPON (2010) (25)
- Online Signature-Based Biometric Recognition (2018) (25)
- Honeypots deployment for the analysis and visualization of malware activity and malicious connections (2014) (25)
- Data Consumption-Aware Load Forecasting Scheme for Smart Grid Systems (2018) (25)
- Cluster-Based Cross-Layer Design for Cooperative Caching in Mobile Ad Hoc Networks (2009) (25)
- DEESR: Dynamic Energy Efficient and Secure Routing Protocol for Wireless Sensor Networks in Urban Environments (2010) (25)
- Extracting mobility pattern from target trajectory in wireless sensor networks (2015) (25)
- Mobi-Flow: Mobility-Aware Adaptive Flow-Rule Placement in Software-Defined Access Network (2019) (25)
- Towards an incentive-compatible, reputation-based framework for stimulating cooperation in opportunistic networks: a survey (2017) (25)
- Multiwavelength Optical LANs: Papadimitriou/Multiwavelength Optical LANs (2005) (24)
- A Fuzzy logic-based Energy Efficient Packet Loss Preventive Routing Protocol (2009) (24)
- An acoustic communication based AQUA-GLOMO simulator for underwater networks (2012) (24)
- Metaheuristic Solutions for Solving Controller Placement Problem in SDN-based WAN Architecture (2017) (24)
- Efficient and Provably Secure Multireceiver Signcryption Scheme for Multicast Communication in Edge Computing (2020) (24)
- D3: distributed approach for the detection of dumb nodes in wireless sensor networks (2017) (24)
- Efficient fast learning automata (2003) (24)
- Smart mobility management in 5G heterogeneous networks (2017) (24)
- Preventing packet dropping and message tampering attacks on AODV-based Mobile Ad Hoc Networks (2012) (23)
- Efficient angular routing protocol for inter-vehicular communication in vehicular ad hoc networks (2010) (23)
- MEGAN: Multipurpose Energy-Efficient, Adaptable, and Low-Cost Wireless Sensor Node for the Internet of Things (2020) (23)
- A DSR-based routing protocol for mitigating blackhole attacks on mobile ad hoc networks (2016) (23)
- Cache-Aware Computation Offloading in IoT Systems (2020) (23)
- Bandwidth-Effective Design of a Satellite-Based Hybrid Wireless Sensor Network for Mobile Target Detection and Tracking (2008) (23)
- GATA: GPS-Arduino based Tracking and Alarm system for protection of wildlife animals (2017) (23)
- GROOV: A geographic routing over VANETs and its performance evaluation (2012) (23)
- HyClass: Hybrid Classification Model for Anomaly Detection in Cloud Environment (2018) (23)
- A cluster-based load balancing algorithm in cloud computing (2014) (23)
- Online risk-based authentication using behavioral biometrics (2014) (22)
- Carrier‐sense‐assisted adaptive learning MAC protocols for distributed wireless LANs (2005) (22)
- Network‐coded multiple‐source cooperation aided relaying for free‐space optical transmission (2012) (22)
- Design of a Certificateless Designated Server Based Searchable Public Key Encryption Scheme (2017) (22)
- Economics of customer's decisions in smart grid (2015) (21)
- Sensor Cloud Based Measurement to Management System for Precise Irrigation (2017) (21)
- A novel node architecture for optical networks: Modeling, analysis and performance evaluation (2007) (21)
- A Novel Multipath Routing Protocol for MANETs (2011) (21)
- DiLSe: Lattice-Based Secure and Dependable Data Dissemination Scheme for Social Internet of Vehicles (2021) (21)
- Learning automata based optimized multipath routingusing leapfrog algorithm for VANETs (2017) (21)
- An Efficient Elliptic Curve Cryptography-Based Without Pairing KPABE for Internet of Things (2020) (21)
- Efficient data acquisition in underwater wireless sensor Ad Hoc networks (2009) (21)
- EnClass: Ensemble-Based Classification Model for Network Anomaly Detection in Massive Datasets (2017) (21)
- BUA: A Blockchain-based Unlinkable Authentication in VANETs (2020) (21)
- Learning automata based decision making algorithm for task offloading in mobile cloud (2016) (20)
- PFCBAS: Pairing Free and Provable Certificate-Based Aggregate Signature Scheme for the e-Healthcare Monitoring System (2020) (20)
- Prioritized payload tuning mechanism for wireless body area network-based healthcare systems (2014) (20)
- Power and Delay-aware Multi-Path Routing Protocol for Ad Hoc Networks (2014) (20)
- Estimating neural networks-based algorithm for adaptive cache replacement (1998) (20)
- An efficient learning automata based task offloading in mobile cloud computing environments (2017) (19)
- International Journal of Communication Systems (2005) (19)
- Context-aware quality of service in wireless sensor networks (2014) (19)
- Universal Mobile Telecommunications System (2011) (19)
- An enhanced mutual authentication and key establishment protocol for TMIS using chaotic map (2020) (19)
- A novel vertical handoff decision making algorithm across Heterogeneous Wireless Networks (2014) (19)
- Applied System Simulation (2003) (19)
- An ID-based Quadratic-Exponentiation Randomized Cryptographic scheme (2015) (19)
- Bayesian Cooperative Coalition Game as a Service for RFID-Based Secure QoS Management in Mobile Cloud (2018) (19)
- Dynamic Sample Size Detection in Learning Command Line Sequence for Continuous Authentication (2012) (19)
- A Secure and Energy-Efficient Scheme for Group-Based Routing in Heterogeneous Ad Hoc Sensor Networks and Its Simulation Analysis (2008) (18)
- Advances in optical networking (2002) (18)
- Smart-Evac: Big Data-Based Decision Making for Emergency Evacuation (2015) (18)
- An approach for solving fully fuzzy multi-objective linear fractional optimization problems (2020) (18)
- Performance of the perceptron algorithm for the classification of computer users (1992) (18)
- Methodologies for characterizing ultrasonic transducers using neural network and pattern recognition techniques (1992) (18)
- Time efficient dynamic threshold-based load balancing technique for Cloud Computing (2017) (18)
- A Greedy Overlap-Based Algorithm for Partial Coverage of Heterogeneous WSNs (2017) (18)
- A reactive Optimized Link State Routing protocol for Mobile ad hoc networks (2010) (18)
- Performance modeling and evaluation of high-performance parallel and distributed systems (2005) (18)
- Learning Automata-Based Fault-Tolerant System for Dynamic Autonomous Unmanned Vehicular Networks (2017) (18)
- A novel security scheme for behavioral authentication systems based on keystroke dynamics (2019) (17)
- WLAN-UMTS Integration: Architecture, Seamless Handoff, and Simulation Analysis (2006) (17)
- An IBE Technique Using Partial Discrete Logarithm (2016) (17)
- QoS-Aware Multipath Communications over MANETs (2013) (17)
- The Role of Internet of Things to Control the Outbreak of COVID-19 Pandemic (2021) (17)
- Contact Tracing Incentive for COVID-19 and Other Pandemic Diseases From a Crowdsourcing Perspective (2021) (17)
- Ethical, Legal, and Social Implications of Biometric Technologies (2018) (17)
- An Unlinkable Authenticated Key Agreement With Collusion Resistant for VANETs (2021) (17)
- Secure socket layer certificate verification: a learning automata approach (2014) (17)
- An efficient and provable certificate-based proxy signature scheme for IIoT environment (2020) (17)
- Estimation of Pitch Period of Speech Signal Using a New Dyadic Wavelet Algorithm (1999) (17)
- A methodology for improving computer access security (1993) (17)
- QDV: A Quality-of-Security-Based Distance Vector Routing Protocol for Wireless Sensor Networks Using Ant Colony Optimization (2008) (17)
- BITS: A Blockchain-driven Intelligent Scheme for Telesurgery System (2020) (17)
- Energy-Efficient Prophet-PRoWait-EDR Protocols for Opportunistic Networks (2017) (17)
- MREA: a minimum resource expenditure node capture attack in wireless sensor networks (2016) (17)
- Finding overlapping communities in a complex network of social linkages and Internet of things (2013) (17)
- An Adaptive Grid Frequency Support Mechanism for Energy Management in Cloud Data Centers (2020) (16)
- Dynamic intelligence towards merging cloud and communication services (2014) (16)
- SEAL: Self-adaptive AUV-based localization for sparsely deployed Underwater Sensor Networks (2020) (16)
- Ultrasonic Transducer Characterization by Neural Networks (1998) (16)
- Intelligent Secure Ecosystem Based on Metaheuristic and Functional Link Neural Network for Edge of Things (2020) (16)
- Reinforcement Learning-Based Routing Protocol for Opportunistic Networks (2020) (16)
- Analysis of reliability and throughput under saturation condition of IEEE 802.15.6 CSMA/CA for wireless body area networks (2014) (16)
- A pairing-free certificateless digital multisignature scheme using elliptic curve cryptography (2017) (16)
- Challenges and techniques in Big data security and privacy: A review (2018) (16)
- A cluster-head selection algorithm for Wireless Sensor Networks (2010) (16)
- Hybrid charging scheduling schemes for three-dimensional underwater wireless rechargeable sensor networks (2018) (16)
- An Energy Sensitive Computation Offloading Strategy in Cloud Robotic Network Based on GA (2019) (16)
- Routing bandwidth guaranteed paths for traffic engineering in WiMAX mesh networks (2014) (16)
- ElGamal cryptosystem-based secure authentication system for cloud-based IoT applications (2019) (16)
- An intelligent system for complex violence pattern analysis and detection (2021) (15)
- An altruism‐based trust‐dependent message forwarding protocol for opportunistic networks (2017) (15)
- Adaptive learning solution for congestion avoidance in wireless sensor networks (2009) (15)
- Markov decision process-based analysis of rechargeable nodes in wireless sensor networks (2010) (15)
- Content-based image segmentation (2002) (15)
- Mobility-Aware Flow-Table Implementation in Software-Defined IoT (2016) (15)
- Wireless sensor networks applications to smart homes and cities (2016) (15)
- An efficient design and validation technique for secure handover between 3GPP LTE and WLANs systems (2014) (15)
- A new scheme for mobility, sensing, and security management in wireless ad hoc sensor networks (2006) (15)
- Web service discovery utilizing logical reasoning and semantic similarity (2018) (15)
- E-Business and Telecommunications (2014) (15)
- DEMANDS: Distributed Energy Management Using Noncooperative Scheduling in Smart Grid (2018) (15)
- Advances in Computer Science and its Applications (CSA 2013) (2013) (14)
- A New Detection and Prevention System for ARP Attacks Using Static Entry (2019) (14)
- Learning Automata-Based Data Aggregation Tree Construction Framework for Cyber-Physical Systems (2018) (14)
- An automated system for characterizing ultrasonic transducers using pattern recognition (1991) (14)
- Cooperative Networking (2011) (14)
- Lightweight Authentication Protocol for RFID-Enabled Systems Based on ECC (2016) (14)
- Fuzzy Logic in Surveillance Big Video Data Analysis (2021) (14)
- Temporal-Correlation-Aware Dynamic Self-Management of Wireless Sensor Networks (2016) (14)
- Secure message communication among vehicles using elliptic curve cryptography in smart cities (2016) (14)
- Efficient and secure business model for content centric network using elliptic curve cryptography (2018) (14)
- Retracted: Comparative analysis of distributive linear and nonlinear optimized spectrum sensing clustering techniques in cognitive radio network systems (2020) (14)
- Energy-efficient connectivity re-establishment in WSN in the presence of dumb nodes (2015) (13)
- Edge-Based Content Delivery for Providing QoE in Wireless Networks Using Quotient Filter (2018) (13)
- A Novel Adaptive Mapping Scheme for IEEE 802.16 Mobile Downlink Framing (2010) (13)
- A Federated Reinforcement Learning Framework for Incumbent Technologies in Beyond 5G Networks (2021) (13)
- Quality-Assured Secured Load Sharing in Mobile Cloud Networking Environment (2019) (13)
- Multilayered Impact Evaluation Model for Attacking Missions (2016) (13)
- Connectivity and coverage in machine-type communications (2017) (13)
- The Application of the Blockchain Technology in Voting Systems (2021) (13)
- Markov model-based adaptive CAC scheme for 3GPP LTE femtocell networks (2015) (13)
- Flexible call admission control with preemption in LTE networks (2016) (13)
- Intelligent network functionalities in wireless 4G networks: Integration scheme and simulation analysis (2008) (13)
- A Distributed Adaptive Admission Control Scheme for Multimedia Wireless Mesh Networks (2015) (13)
- TRAP: a high performance protocol for wireless local area networks (2002) (13)
- Utility-Aware Charging Scheduling for Multiple Mobile Chargers in Large-Scale Wireless Rechargeable Sensor Networks (2021) (13)
- Introduction to Wireless Networks (2003) (13)
- Security in wireless sensor networks (2009) (13)
- Pervasive Computing and Networking: Obaidat/Pervasive Computing and Networking (2011) (13)
- Using Ant-Like Agents for Fault-Tolerant Routing in Mobile Ad-Hoc Networks (2009) (13)
- Fault and intrusion tolerance in wireless ad hoc networks (2005) (13)
- A methodology for evaluating the performance of CISC computer systems under single and two-level cache environments (1994) (13)
- A PKI Adapted Model for Secure Information Dissemination in Industrial Control and Automation 6LoWPANs (2015) (13)
- IoT-Enabled Light Intensity-Controlled Seamless Highway Lighting System (2021) (12)
- Graph colouring technique for efficient channel allocation in cognitive radio networks (2016) (12)
- Integrated dynamic distributed routing and admission control in ATM networks (1997) (12)
- Editorial Artificial Neural Networks To Systems, Man, And Cybernetics: Characteristics, Structures, And Applications (1998) (12)
- Performance Evaluation of Computer and Telecommunication Systems (2008) (12)
- CFR: A cooperative link failure recovery scheme in software‐defined networks (2018) (12)
- Chebyshev chaotic map‐based ID‐based cryptographic model using subtree and fuzzy‐entity data sharing for public key cryptography (2018) (12)
- An analytical study of resource division and its impact on power and performance of multi-core processors (2014) (12)
- Wireless Body Area Networks with varying traffic in epidemic medical emergency situation (2015) (12)
- Efficient online/offline IBSS protocol using partial discrete logarithm for WSNs (2018) (12)
- A Distributed Efficient Algorithm for Self-Protection of Wireless Sensor Networks (2018) (12)
- Impact of hardware impairment on spectrum underlay cognitive multiple relays network (2016) (12)
- Optimized MIH-assisted P-NEMO design for vertical handover over heterogeneous network mobility (2014) (12)
- Performance of the short-time Fourier Transform and Wavelet Transform to phonocardiogram signal analysis (1992) (12)
- A Learning Automaton-Based Controller Placement Algorithm for Software-Defined Networks (2018) (12)
- Trust-enhanced message security protocol for mobile ad hoc networks (2012) (12)
- Address resolution protocol spoofing attacks and security approaches: A survey (2018) (12)
- Wormhole prevention using COTA mechanism in position based environment over MANETs (2015) (12)
- A novel media independent handover‐based approach for vertical handover over heterogeneous wireless networks (2014) (12)
- A web-based integrated environment for simulation and analysis with NS-2 (2013) (12)
- Absolute Transmission Delay Guarantee in Optical Burst-Switched Networks: A Scheme and Performance Evaluation (2007) (12)
- A provably secure and efficient two‐party password‐based explicit authenticated key exchange protocol resistance to password guessing attacks (2015) (12)
- An Energy-Aware Routing Protocol for Ad-Hoc Networks Based on the Foraging Behavior in Ant Swarms (2009) (12)
- A MIH-based approach for best network selection in heterogeneous wireless networks (2014) (11)
- The economics of wireless networks (2004) (11)
- An efficient adaptive bus arbitration scheme for scalable shared-medium ATM switch (2001) (11)
- Loosely Coupled Cloud Robotic Framework for QoS-Driven Resource Allocation-Based Web Service Composition (2020) (11)
- 3GPP LTE-Advanced Congestion Control Based on MIH Protocol (2017) (11)
- A Framework for Sentiment Analysis Based Recommender System for Agriculture Using Deep Learning Approach (2018) (11)
- KORA: a new cache replacement scheme (2000) (11)
- A robust digital watermarking technique (2000) (11)
- Oceanic forces and their impact on the performance of mobile underwater acoustic sensor networks (2017) (11)
- Efficient Identity-Based Distributed Decryption Scheme for Electronic Personal Health Record Sharing System (2021) (11)
- Third generation and beyond wireless systems (2003) (11)
- A cryptography-based protocol against packet dropping and message tampering attacks on mobile ad hoc networks (2014) (11)
- Dynamic adaptation of response-time models for QoS management in autonomic systems (2011) (11)
- Message Security in Multi-Path Ad Hoc Networks Using a Neural Network-Based Cipher (2011) (11)
- Edge-Assisted Intelligent Device Authentication in Cyber–Physical Systems (2023) (11)
- Design and analysis of secure host-based mobility protocol for wireless heterogeneous networks (2014) (11)
- Efficient and secure content dissemination architecture for content centric network using ECC-based public key infrastructure (2020) (11)
- A New Scheme for IoT Service Function Chains Orchestration in SDN-IoT Network Systems (2019) (11)
- Network Traffic Prediction in Industrial Internet of Things Backbone Networks: A Multitask Learning Mechanism (2021) (11)
- SecHealth: An Efficient Fog Based Sender Initiated Secure Data Transmission of Healthcare Sensors for e-Medical System (2017) (11)
- An adaptive protocol model for IEEE 802.11 wireless LANs (2004) (11)
- Internet of Things and Personalized Healthcare Systems (2018) (11)
- Prolonging lifetime for wireless rechargeable sensor networks through sleeping and charging scheduling (2020) (11)
- A Performance Evaluation Study of four Wavelet Algorithms for the Pitch Period Estimation of Speech Signals (1998) (10)
- A comparative simulation study of the performance of single-bus and two-bus multiprocessors (1991) (10)
- Modeling and simulation of urban air quality with a 2-phase assessment technique (2021) (10)
- On the digital watermarking in JPEG 2000 (2001) (10)
- Intrusion Detection in Wireless Sensor Networks: The S-Model Learning Automata Approach (2008) (10)
- Frontier and Innovation in Future Computing and Communications, Proceedings of the 2014 FTRA International Symposium on Frontier and Innovation in Future Computing and Communications, FCC 2014, Auckland, New Zealand, January 13-16, 2014 (2016) (10)
- QualityScan scheme for load balancing efficiency in vehicular ad hoc networks (VANETs) (2015) (10)
- Swarm intelligence‐based radio resource management for V2V‐based D2D communication (2018) (10)
- LAAC: Lightweight Lattice-Based Authentication and Access Control Protocol for E-Health Systems in IoT Environments (2021) (10)
- Power and Delay-Aware Routing Protocol for Ad Hoc Networks (2014) (10)
- Spectrum allocation in cognitive radio networks using chaotic biogeography-based optimisation (2018) (10)
- URJA: Usage Jammer as a Resource Allocation for Secure Transmission in a CR-NOMA-Based 5G Femtocell System (2021) (10)
- Advances in performance evaluation of computer and telecommunications networking (2002) (10)
- QoS Aware Predictive Radio Resource Management Approach Based on MIH Protocol (2018) (10)
- SNR-WPA: an adaptive protocol for mobile 802.11 wireless LANs (2004) (10)
- Energy-efficient tasks scheduling algorithm for real-time multiprocessor embedded systems (2012) (10)
- Simulation of wireless networks (2003) (10)
- Anonymous identity authentication mechanism for hybrid architecture in mobile crowd sensing networks (2019) (10)
- Optimal Secondary Users Selection for Cooperative Spectrum Sensing in Cognitive Radio Networks (2018) (10)
- An anonymous and robust multi‐server authentication protocol using multiple registration servers (2017) (10)
- Performance Evaluation of a Decoupled-Level with QoS-Aware Downlink Scheduling Algorithm for LTE Networks (2015) (10)
- Extending Network Lifetime for Wireless Rechargeable Sensor Network Systems Through Partial Charge (2021) (10)
- Energized geocasting model for underwater wireless sensor networks (2013) (10)
- A Reinforcement learning-based cognitive MAC protocol (2015) (9)
- Software Defined Network Based Fault Detection in Industrial Wireless Sensor Networks (2018) (9)
- SFEEC: Provably Secure Signcryption-Based Big Data Security Framework for Energy-Efficient Computing Environment (2021) (9)
- AI-Enabled Blockchain-Based Access Control for Malicious Attacks Detection and Mitigation in IoE (2021) (9)
- MedBlock: An AI-enabled and Blockchain-driven Medical Healthcare System for COVID-19 (2021) (9)
- State of the art and perspectives on traditional and emerging biometrics: A survey (2018) (9)
- A PUF-based lightweight authentication and key agreement protocol for smart UAV networks (2021) (9)
- Chapter 8 – Green Computing and Communication Architecture (2013) (9)
- Enabling Efficient Data Sharing With Auditable User Revocation for IoV Systems (2022) (9)
- On the Effects of Communication Range Shrinkage of Sensor Nodes in Mobile Wireless Sensor Networks Due to Adverse Environmental Conditions (2018) (9)
- A Lightweight Provably Secure Digital Short-Signature Technique Using Extended Chaotic Maps for Human-Centered IoT Systems (2020) (9)
- Guest Editorial: Performance evaluation of telecommunication systems: models, issues and applications (2001) (9)
- An efficient technique for geocast region holes in underwater sensor networks and its performance evaluation (2011) (9)
- WmA-MiFN: A Weighted Majority and Auction Game Based Green Ultra-Dense Micro-Femtocell Network System (2020) (9)
- Broadcast tree construction framework in tactile internet via dynamic algorithm (2018) (9)
- Base Station Oriented Multi Route Diversity Protocol for Wireless Sensor Networks (2018) (9)
- Secure Edge-Aided Computations for Social Internet-of-Things Systems (2022) (9)
- A fault-tolerant routing protocol for dynamic autonomous unmanned vehicular networks (2013) (9)
- A new injection limitation mechanism for wormhole networks (2002) (9)
- An effective mobile-healthcare emerging emergency medical system using conformable chaotic maps (2021) (9)
- An UF-IBSS-CMA Protected Online/Offline Identity-based Short Signature Technique using PDL (2016) (9)
- Proactive Decision Based Handoff Scheme for Cognitive Radio Networks (2018) (9)
- FMD: A DoS mitigation scheme based on flow migration in software‐defined networking (2018) (9)
- Fire monitoring in coal mines using Wireless Sensor Networks (2011) (9)
- Optimizing Power Utilization in Vehicular Ad Hoc Networks through Angular Routing: A Protocol and Its Performance Evaluation (2009) (9)
- Optimizing Energy through Parabola Based Routing in Underwater Sensor Networks (2011) (9)
- CPNDD:Content Placement Approach in Content Centric Networking (2020) (9)
- WDM-MDM Silicon-Based Optical Switching for Data Center Networks (2019) (9)
- Distributed task allocation algorithm based on connected dominating set for WSANs (2019) (8)
- A priority based message forwarding scheme for Opportunistic Networks (2016) (8)
- Efficient privacy-preserving anonymous authentication scheme for human predictive online education system (2021) (8)
- On the Security of a Lightweight Privacy-Preserving Authentication Protocol for VANETs (2021) (8)
- Performance analysis of distributed software systems: A model-driven approach (2010) (8)
- A new scheme for distributed channel allocation in cellular networks (2009) (8)
- Advances in Computer Science and its Applications (2020) (8)
- Protocol for token ring-local computer networks and its performance (1991) (8)
- Playing the Smart Grid Game: Performance Analysis of Intelligent Energy Harvesting and Traffic Flow Forecasting for Plug-In Electric Vehicles (2015) (8)
- HeaL: A blockchain-envisioned signcryption scheme for healthcare IoT ecosystems (2020) (8)
- A hybrid MCDM framework and simulation analysis for the assessment of worst polluted cities (2022) (8)
- Efficient design of an authenticated key agreement protocol for dew-assisted IoT systems (2021) (8)
- Application of Neural Networks to Cache Replacement (1999) (8)
- Bandwidth allocation and call admission control in ATM networks (1998) (8)
- UML-based performance modeling of distributed software systems (2010) (8)
- An Efficient and Secure Routing Protocol for Wireless Sensor Networks Using Multicasting (2010) (8)
- UCGNet: wireless sensor network‐based active aquifer contamination monitoring and control system for underground coal gasification (2017) (8)
- Efficient Multipath Routing Protocol with Quality of Service for Mobile Ad Hoc Networks (2018) (8)
- Introduction to the Special Issue: ATM Systems and Networks: Basics, Issues, and Performance Modeling and Simulation (2002) (8)
- Modeling and simulation of IEEE 802.11 WLAN mobile ad hoc networks using topology broadcast reverse-path forwarding (TBRPF) (2003) (8)
- A QoS-Based Scheme for Planning and Dimensioning of Optical Label Switched Networks (2007) (8)
- A Collaborative Filtering Recommendation-Based Scheme for WLANs With Differentiated Access Service (2018) (8)
- Design of provably secure and efficient certificateless blind signature scheme using bilinear pairing (2015) (8)
- An efficient 802.11 medium access control method and its simulation analysis (2009) (8)
- A Hash-Based Distributed Storage Strategy of FlowTables in SDN-IoT Networks (2017) (8)
- Probabilistic response‐time analysis for real‐time systems in body area sensor networks (2015) (8)
- Efficient Cooperative Caching with Improved Performance in Wireless Mesh Networks (2010) (8)
- Importance-Different Charging Scheduling Based on Matroid Theory for Wireless Rechargeable Sensor Networks (2021) (8)
- Mobility, sensing, and security management in wireless ad hoc sensor systems (2006) (7)
- An Efficient Container Management Scheme for Resource-Constrained Intelligent IoT Devices (2021) (7)
- Performance Evaluation of Computer and Telecommunications Systems (1999) (7)
- Performance analysis of a dynamic QoS scheme in optical label-switched networks (2007) (7)
- XAI-AV: Explainable Artificial Intelligence for Trust Management in Autonomous Vehicles (2021) (7)
- ProIDS: Probabilistic Data Structures Based Intrusion Detection System for Network Traffic Monitoring (2017) (7)
- A framework for the design of bank communications systems (2003) (7)
- Resource Scheduling Based on Priority Ladders for Multiple Performance Requirements in Wireless Body Area Networks (2021) (7)
- Dynamic switch migration with noncooperative game towards control plane scalability in SDN (2019) (7)
- Novel Neurocomputing-based Scheme to Authenticate WLAN Users Employing Distance Proximity Threshold (2008) (7)
- Software Performance Modeling using the UML: a Case Study (2012) (7)
- Improving TCP QoS over OBS networks: A scheme based on optical segment retransmission (2008) (7)
- SAT05-2: Designing a Wireless Sensor Network for Mobile Target Localization and Tracking (2006) (7)
- A new secure and efficient scheme for network mobility management (2015) (7)
- Design for Architecture and Router of 3D Free-Space Optical Network-on-Chip (2018) (7)
- On the characterization of ultrasonic transducers using pattern recognition (1993) (7)
- Methodologies for characterizing traffic in wide area networks: Analysis and benchmarking (1995) (7)
- Simulation system for collisions and two-way coupling of non-Newtonian fluids and solids (2021) (7)
- Learning automata and reservation based secure smart parking system: Methodology and simulation analysis (2021) (7)
- FS2RNN: Feature Selection Scheme for Web Spam Detection Using Recurrent Neural Networks (2018) (7)
- Learning Automata-Based Channel Reservation Scheme to Enhance QoS in Vehicular Adhoc Networks (2016) (7)
- DRA: a new buffer management scheme for wireless atm networks using aggregative large deviation principle (2003) (6)
- Optical Switching Techniques in WDM Optical Networks (2011) (6)
- An Adaptive Neural Network-Based Method for WWW Proxy Caches (2009) (6)
- Secure Authentication Protocol for 5G Enabled IoT Network (2018) (6)
- KORA-2: a new cache replacement policy and its performance (1999) (6)
- Radio resource management for heterogeneous wireless networks: Schemes and simulation analysis (2015) (6)
- A Simulation Methodology to Study Input Buffering in ATM Switches (1999) (6)
- Performance comparison of neural networks and pattern recognition techniques for classifying ultrasonic transducers (1992) (6)
- Adaptive bandwidth allocation schemes for lightwave LANs with asymmetric traffic (2001) (6)
- A dynamic and static microcomputer-based stereogram generator (1991) (6)
- Coding-error based defects in enterprise resource planning software: Prevention, discovery, elimination and mitigation (2012) (6)
- A new multi-rat scheduling algorithm for heterogeneous wireless networks (2016) (6)
- Application of Ant Colony Optimization to develop Energy efficient protocol in mobile Ad-Hoc Networks (2011) (6)
- SQAP: A simple QoS supportive adaptive polling protocol for wireless LANs (2006) (6)
- Anonymous and expeditious mobile user authentication scheme for GLOMONET environments (2018) (6)
- High Speed Networking: Performance Simulation Modeling and Applications (1995) (6)
- Cloud-Based Optimal Energy Forecasting for Enabling Green Smart Grid Communication (2014) (6)
- A comparative simulation study on the power–performance of multi-core architecture (2014) (6)
- The Internet of Things Service Recommendation Based on Tripartite Graph with Mass Diffusion (2018) (6)
- Intelligent services integration in mobile ATM networks (1999) (6)
- Adaptive and Learning Systems (2010) (6)
- CHSEO: An Energy Optimization Approach for Communication in the Internet of Things (2017) (6)
- Performance optimization of an adaptive wireless push system in environments with locality of demand (2006) (6)
- SAC-FIIoT: Secure Access Control Scheme for Fog-Based Industrial Internet of Things (2020) (6)
- Re-authentication protocol from WLAN to LTE (ReP WLAN-LTE) (2013) (6)
- Improved Dual Authentication and Key Management Techniques in Vehicular Ad Hoc Networks (2017) (6)
- A lightweight anonymous authentication scheme for secure cloud computing services (2020) (6)
- A survey on enabling wireless local area network technologies for smart cities (2016) (6)
- A Provably Secure Lightweight Key Agreement Protocol for Wireless Body Area Networks in Healthcare System (2023) (6)
- Optimizing handover decision and target selection in LTE-A network-based on MIH protocol (2014) (6)
- Improved IPSec tunnel establishment for 3GPP–WLAN interworking (2015) (6)
- A lightweight mutual authentication mechanism for improving fast PMIPV6-based network mobility scheme (2014) (6)
- Call admission control and adaptive bandwidth management approach for HWNs (2014) (6)
- Accurate indoor localization with crowd sensing (2016) (6)
- Supporting Quality-of-Service Scheduling in a TT-FR WDM System (2008) (6)
- Computer Science and Convergence (2012) (6)
- Fast learning automata for high-speed real-time applications (2000) (6)
- A timed and secured monitoring implementation against wormhole attacks in AODV-based Mobile Ad Hoc Networks (2013) (6)
- A methodology to analyze the performance of a parallel frame synchronization scheme in SDH high speed networks (1999) (5)
- A QoS-Oriented Protocol for Burst Admission Control in OBS Networks (2007) (5)
- Metaverse assisted Telesurgery in Healthcare 5.0: An interplay of Blockchain and Explainable AI (2022) (5)
- Secure and Reliable Multi-Path Routing Protocol for Multi-Hop Wireless Networks (2017) (5)
- Power‐saving policies for annual energy cost savings in green computing (2019) (5)
- Scalable and efficient authentication scheme for secure smart grid communication (2020) (5)
- Chaos-Based Content Distribution Framework for Digital Rights Management System (2021) (5)
- Efficient Bandwidth Call Admission Control in 3GPP LTE Networks (2016) (5)
- A Simulation Methodology for RISC Computer Systems (1993) (5)
- Recent advances in computer communications networking (2003) (5)
- E-Business and Telecommunications (2011) (5)
- DeepAG: Attack Graph Construction and Threats Prediction With Bi-Directional Deep Learning (2023) (5)
- Analysis of Authentication System Based on Keystroke Dynamics (2019) (5)
- A comparative study and analysis of some pseudorandom number generator algorithms (2018) (5)
- Secure Grid-Based Multi-Party Micropayment System in 4G Networks (2007) (5)
- Genetic algorithm and probability based routing protocol for Opportunistic Networks (2017) (5)
- Fairness and throughput optimization in wireless mesh networks (2009) (5)
- Dynamic relay selection for MAC-level retransmission in Vehicular Ad Hoc Networks (2013) (5)
- A methodology to optimize the design of telecommunication systems (2000) (5)
- Adaptive Skip Graph Framework for Peer-to-Peer Networks: Search Time Complexity Analysis (2018) (5)
- BDoTs: Blockchain-based Evaluation Scheme for Online Teaching under COVID-19 Environment (2020) (5)
- CASPER: Congestion Aware Selection of Path with Efficient Routing in Multimedia Networks (2011) (5)
- Network Selection in Heterogeneous Wireless System Environments (2016) (5)
- An Effective Fair Off-Line Electronic Cash Protocol using Extended Chaotic Maps with Anonymity Revoking Trustee (2021) (5)
- Enhanced handover architecture in IEEE 802.21-enabled heterogeneous wireless networks (2013) (5)
- Survivable ATM mesh networks: Techniques and performance evaluation (2010) (5)
- Computational Efficient Authenticated Digital Content Distribution Frameworks for DRM Systems: Review and Outlook (2021) (5)
- Wavelet algorithm for the estimation of pitch period of speech signal (1996) (5)
- Performance Evaluation of Computer and Telecommunication Systems (1998) (5)
- Attack Graph Generation with Infused Fuzzy Clustering (2018) (5)
- MTR: a modified token ring protocol and its performance (1992) (5)
- Constructing data supply chain based on layered PROV (2017) (5)
- Telecommunication systems for the new millennium (1999) (5)
- New Efficient QERPKC based on Partial Discrete Logarithm Problem (2020) (5)
- Adaptive protocols for optical LANs with bursty and correlated traffic (2002) (5)
- A Robust Anonymous Authentication Scheme using Biometrics for Digital Rights Management System (2021) (5)
- QAIR: Quality Assessment Scheme for Information Retrieval in IoT Infrastructures (2018) (5)
- Advances in Key Stroke Dynamics-Based Security Schemes (2018) (5)
- ATM Systems and Networks: Basics, Issues, and Performance Modeling and Simulation (2002) (5)
- Trust management in opportunistic pervasive healthcare systems (2009) (5)
- PMH: A Stability Based Predictive Multi-Hop Routing Protocol for Vehicular Ad Hoc Networks (2010) (5)
- Real time TCP QoS monitoring in wireless ATM CDMA networks using aggregative large deviation principle (2001) (4)
- Routing as a Bayesian Coalition Game in Smart Grid Neighborhood Area Networks: Learning Automata-based approach (2014) (4)
- Partial Charging Scheduling in Wireless Rechargeable Sensor Networks (2018) (4)
- On the Importance of the DCT Phase for Image Steganography Schemes (2020) (4)
- A new scheme for proactive out of band signaling solution for IP traceback in Wireless Mesh Network (2015) (4)
- Recent advances in wireless networks and systems (2006) (4)
- Protecting the Integrity of Elections Using Biometrics (2018) (4)
- A new counter disassociation mechanism (CDM) for 802.11b/g wireless local area networks (2009) (4)
- Efficient Network Resource Preallocation on Demand in Multitenant Cloud Systems (2019) (4)
- Advanced computer mathematics based cryptography and security technologies (2013) (4)
- ZOMA: a preemptive deadlock recovery mechanism for fully adaptive routing in wormhole networks (2001) (4)
- A TAS-Model-Based Algorithm for Rule Redundancy Detection and Scene Scheduling in Smart Home Systems (2018) (4)
- Staged Incentive Mechanism for Mobile Crowd Sensing (2018) (4)
- Performance simulation analysis of RISC-based multiprocessors under uniform and nonuniform traffic (1993) (4)
- QoS routing with wavelengths conversion and call admission connection in DWDM networks (2001) (4)
- AClog: Attack Chain Construction Based on Log Correlation (2019) (4)
- Multi-Hop Synchronization at the Application Layer of Wireless and Satellite Networks (2008) (4)
- A Fingerprinting Technique for Identification of Wireless Devices (2018) (4)
- A new deadlock recovery mechanism for fully adaptive routing algorithms (2000) (4)
- A PSNR-Controllable Data Hiding Algorithm Based on LSBs Substitution (2014) (4)
- Modeling and Simulation of Computer Systems and Networks: Part II: Computer Systems (1997) (4)
- Cloud computing systems for smart cities and homes (2016) (4)
- Trans-DF: A Transfer Learning-based end-to-end Deepfake Detector (2020) (4)
- Computational intelligence applied to wildfire prediction using wireless sensor networks (2011) (4)
- CoMSeC++: PUF-based secured light-weight mutual authentication protocol for Drone-enabled WSN (2021) (4)
- Wireless Sensor Enabled Breast Self-Examination Assistance to Detect Abnormality (2018) (4)
- Mitigating the Effect of Blackhole Attack on MANETs Using AODV Protocol Under Transmission Control Protocol (2018) (4)
- Context-Aware Middleware Architectural Framework for Intelligent Smart Grid Data Management (2018) (4)
- A computerized random element stereogram generator: Design and experiments (1988) (4)
- A microcomputer-based video-pattern generator for binocular vision test (1994) (4)
- Schemes for mobility management of wireless ATM networks (1999) (4)
- Mobility and security issues in wireless ad-hoc sensor networks (2005) (4)
- Comparative Study of Different Cost Functions Between Neighbors for Optimizing Energy Dissipation in WSN (2019) (4)
- Network layer based secure routing protocol for wireless ad hoc sensor networks in urban environments (2010) (4)
- Social Network Forensics, Cyber Security, and Machine Learning (2018) (4)
- Cooperative Networking: Obaidat/Cooperative Networking (2011) (4)
- Security Enhancement of Multimedia Copyright Protection (2006) (4)
- Guest editorial performance evaluation of ATM systems (1998) (4)
- PARALLEL FRAME SYNCHRONOUS SCHEME FOR STM‐1 IN SDH NETWORKS (1996) (4)
- A Counter Disassociation Mechanism (CDM) for Wireless LANs and its Performance Simulation Analysis (2010) (4)
- On Increasing Information Availability in Gnutella-Like Peer-to-Peer Networks (2009) (4)
- Performance Evaluation of Wireless Networks and Communications (2006) (4)
- Performance evaluation of telecommunication systems: models, issues and applications (Guest Editorial) (2001) (4)
- An Active Updating Strategy for Caching Periodic Data in the Internet of Things (2018) (4)
- A new protocol for wireless LANs (2002) (4)
- All-in-one binary word solution for IP traceback in Wireless Mesh Network (2015) (4)
- Markovian Model Based Channel Allocation in Cognitive Radio Networks (2015) (4)
- An Efficient Robust Lightweight Remote User Authentication Protocol using Extended Chaotic Maps (2020) (4)
- Wireless Communications Principles and Fundamentals (2003) (4)
- User Experience and Quality-of-Service in Internet of Things: Practice and Trends (2016) (4)
- Energy-efficient Collaborative Offloading for Multiplayer Games with Cache-Aided MEC (2020) (4)
- A Comprehensive Review on Vision-Based Violence Detection in Surveillance Videos (2022) (4)
- DENSE: Dynamic Edge Node Selection for Safety-as-a-Service (2019) (4)
- Blockchain Based Architecture and Solution for Secure Digital Payment System (2021) (4)
- On forecasting the ONU sleep period in XG-PON systems using exponential smoothing techniques (2014) (4)
- A simulation model to reduce the fuel consumption through efficient road traffic modelling (2022) (4)
- On the problem of capacity allocation and flow assignment in self-healing ATM networks (2007) (4)
- QoS-aware multipath routing protocol for delay sensitive applications in MANETs A cross-layer approach (2011) (4)
- Prediction of heart abnormalities using deep learning model and wearabledevices in smart health homes (2021) (4)
- Wireless Networks (2002) (3)
- Chapter 13 – Energy-Efficient Sensor Networks (2013) (3)
- Relational-based calculus for trust management in networked services (2004) (3)
- Anomaly Detection Based on Spatio-Temporal and Sparse Features of Network Traffic in VANETs (2019) (3)
- A joint call admission control-based approach for initial RAT selection in HetNets (2013) (3)
- Performance evaluation of a TDMA-based randomly addressed polling protocol for wireless LANs (2002) (3)
- An Efficient Provably Secure IBS Technique Using Integer Factorization Problem (2020) (3)
- High Performance Computing/Computers: Simulation Modeling and Applications (1993) (3)
- Research and Development in Information and Communications Technologies (2003) (3)
- Event-Aware Topology Management in Wireless Sensor Networks (2013) (3)
- A distributed coverage optimization and connectivity maintenance strategy based on unknown sensors in WSAN (2016) (3)
- Performance evaluation of a novel scheme for QoS provision in UTRA TDD (2006) (3)
- Optimization classification and techniques of WSNs in smart grid (2016) (3)
- An efficient power-aware broadcast technique for wireless ad hoc networks (2009) (3)
- Cross-Layer Based Data Management in Mobile Ad Hoc Networks (2009) (3)
- Friend-based secure routing through challenges in mobile ad hoc networks (2010) (3)
- Radio-based Cooperation Scheme for DDoS Detection (2007) (3)
- PAMI-Anonymous Password Authentication Protocol for Medical Internet of Things (2021) (3)
- Simulation Study of a Novel Cache Replacement Algorithm (1997) (3)
- Security and Privacy in Pervasive Networks (2011) (3)
- An adaptive approach to manage traffic in CDMA ATM networks (2000) (3)
- An Efficient and Provably Secure Certificateless Protocol for Industrial Internet of Things (2022) (3)
- A SCTP-based authentication protocol: SCTPAP (2014) (3)
- QOS SCHEME BASED IEEE 802.21 MIH IN HETEROGENEOUS WIRELESS NETWO RKS (HWNS) (2013) (3)
- DLopC: Data Locality Independency-Aware VM Clustering in Cloud Computing (2018) (3)
- Synchronized power saving mechanism for WiMAX networks (2017) (3)
- Security Analysis on an Efficient and Provably Secure Authenticated Key Agreement Protocol for Fog-Based Vehicular Ad-Hoc Networks (2021) (3)
- Adaptive QoS schemes in DWDM networks (2002) (3)
- Wireless and mobile technologies and protocols and their performance evaluation (2015) (3)
- M-MEMHS: Modified Minimization of Error in Multihop System for Localization of Unknown Sensor Nodes (2019) (3)
- A watermarking technique for geometric manipulation attacks (2005) (3)
- Gateway-oriented two-server password authenticated key exchange protocol for unmanned aerial vehicles in mobile edge computing (2020) (3)
- Modeling and Simulation of Adaptive Available Bit Rate Voice over Asynchronous Transfer Mode Networks (2002) (3)
- A Distributed Access Control Scheme based on Risk and Trust for Fog-cloud Environments (2018) (3)
- An adaptive learning-like solution of random early detection for congestion avoidance in computer networks (2009) (3)
- First Score Auction for Pricing-Based Resource Selection in Vehicular Cloud (2018) (3)
- MADP-IIME: malware attack detection protocol in IoT-enabled industrial multimedia environment using machine learning approach (2021) (3)
- Corrections to "A Cooperative Quality-Aware Service Access System for Social Internet of Vehicles" (2020) (3)
- Comment on “Lightweight Secure Message Broadcasting Protocol for Vehicle-to-Vehicle Communication” (2021) (3)
- Simulating Peer-to-Peer networks (2009) (3)
- 3G wireless systems and beyond: a review (2002) (3)
- AdCaS: Adaptive Caching for Storage Space Analysis Using Content Centric Networking (2018) (3)
- Integration of Fixed and Mobile Infrastructure for Message Passing in Opportunistic Networks (2016) (3)
- Secure and Optimal Routing Protocol for Multi-Hop Cellular Networks (2014) (3)
- Towards Wearable Sensing Enabled Healthcare Framework for Elderly Patients (2020) (3)
- Capacity analysis of heterogeneous wireless networks under SINR interference constraints (2013) (3)
- Supernova and Hypernova Misbehavior Detection Scheme for Opportunistic Networks (2017) (3)
- Multi-Party Secure Collaborative Filtering for Recommendation Generation (2019) (3)
- Effects of Wind-Induced Near-Surface Bubble Plumes on the Performance of Underwater Wireless Acoustic Sensor Networks (2016) (3)
- A Wildfire Prediction Based on Fuzzy Inference System for Wireless Sensor Networks (2011) (3)
- Effect of tehina processing and storage in the physical-chemical quality (2016) (3)
- Design and Implementation of a Fault Tolerant Multiple Master Cloud Computing System (2011) (3)
- On the dynamic quality of service in wireless computing environments (2000) (3)
- An efficient key authentication procedure for IND-CCA2 secure Paillier-based cryptosystem (2020) (3)
- Energy-Efficient and Secure Communication Toward UAV Networks (2022) (3)
- End-to-end delay distribution in wireless heterogeneous networks (2013) (3)
- Architecture and design of a computerised stereogram generator for vision test (1990) (3)
- A Dynamic QoS-Based Scheme for Admission Control in OBS Networks (2007) (3)
- Security enhancements for UDDI (2011) (3)
- ATPS: an adaptive trajectory prediction system based on semantic information for dynamic objects (2021) (3)
- Evolutionary algorithms for wireless network resource allocation (2015) (2)
- An Adaptive Algorithm for Joint Data Detection and Channel Estimation for Meteor Burst Communications Based on Per-Survivor Processing (2014) (2)
- On the Security of Authenticated Key Agreement Scheme for Fog-driven IoT Healthcare System (2021) (2)
- A Lightweight and Efficient Remote Data Authentication Protocol Over Cloud Storage Environment (2023) (2)
- Duality-based branch–bound computational algorithm for sum-of-linear-fractional multi-objective optimization problem (2018) (2)
- Puzzle solving-based authentication method for enhanced security in spins and its performance evaluation (2011) (2)
- Decentralized management of online user reviews with immutability using IPFS and Ethereum blockchain (2022) (2)
- An Efficient EUF-ID-CMA Secure Identity-based Short Signature Scheme using Discrete Logarithm (2019) (2)
- User admission maximization based on ressource allocation in wireless networks (2016) (2)
- Blockchain and Multiple Linear Regression-based Energy Trading Scheme for Electric Vehicles (2021) (2)
- QoS prediction method for data supply chain based on context (2017) (2)
- On the Security of A Secure Anonymous Identity-Based Scheme in New Authentication Architecture for Mobile Edge Computing (2021) (2)
- WSN08-1: Performance Acceleration of Adaptive Wireless Data Broadcasting System for High Data Rate Environments (2006) (2)
- A Min-Actor algorithm for connected dominating set formation in WSAN (2016) (2)
- Advances in Performance Evaluation of Computer and Telecommunication Systems (2007) (2)
- Sequential detection and average sample number for cognitive radio with multiple primary transmit power levels (2016) (2)
- Deadline-constraint services in cloud with heterogeneous servers (2017) (2)
- A 3D neural network for moving microorganism extraction (2018) (2)
- Performance evaluation of high performance computing/computers (2000) (2)
- E-Business and Telecommunication Networks - Third International Conference, ICETE 2006, Setúbal, Portugal, August 7-10, 2006. Selected Papers (2008) (2)
- A Secure Identity-Based Three-Party Authenticated Key Agreement Protocol Using Bilinear Pairings (2019) (2)
- Adaptive protocols for single-hop photonic networks with bursty traffic (2001) (2)
- RILoD: Reduction of Information Loss in a WSN System in the Presence of Dumb Nodes (2019) (2)
- A Strategy to Alleviate Rush Hour Traffics in Urban Areas Based on School-Trip Commute Information (2021) (2)
- A Performance Simulation Study of the Ethernet and Token Bus Local Computer Networks (1995) (2)
- Fast and Secure Handover into Visited WLAN Networks (2013) (2)
- Missing Value Imputations by Rule-Based Incomplete Data Fuzzy Modeling (2019) (2)
- Capsule: All you need to know about Tactile Internet in a Nutshell (2021) (2)
- Performance of RISC-based multiprocessors (1993) (2)
- Formal methods of attack modeling and detection (2015) (2)
- Efficient Resource Reservation for Optical Burst Switching Networks (2009) (2)
- An Efficient, Robust, and Lightweight Subtree-Based Three-Factor Authentication Procedure for Large-Scale DWSN in Random Oracle (2021) (2)
- Graph-Based Symmetric Crypto-System for Data Confidentiality (2018) (2)
- Issue Information (2018) (2)
- Amalgamation of Blockchain and AI to Classify Malicious Behavior of Autonomous Vehicles (2021) (2)
- AER filtering using GLIDER: VHDL cellular automata description (2008) (2)
- Blockchain Enabled Electronics Medical System Proposed Framework with Research Directions (2021) (2)
- The Community Characteristic Based Controller Deployment Strategy for SDNs (2018) (2)
- Traffic optimization through information dissemination (2012) (2)
- Power-controlled reduction of exposed terminals in ad-hoc wireless LANs (2012) (2)
- Smart devices and spaces for pervasive computing (2014) (2)
- Fast multi-step addition algorithm (1991) (2)
- SensOrch: QoS-Aware Resource Orchestration for Provisioning Sensors-as-a-Service (2020) (2)
- On the use of population-based incremental learning in the medium access control of broadcast communication systems (2003) (2)
- Guest Editorial: Modeling and Simulation of Computer Systems and Networks: Part I: Networks (1997) (2)
- New Approach for Mobility Management in Openflow/Software-Defined Networks (2018) (2)
- A Secure Identity-based Deniable Authentication Protocol for MANETs (2019) (2)
- A decimal multiplication algorithm for microcomputers (1992) (2)
- Authentication Optimization for Vertical Handover in Heterogeneous Wireless Networks (2018) (2)
- LTE and 5G systems (2016) (2)
- AI-Driven Salient Soccer Events Recognition Framework for Next-Generation IoT-Enabled Environments (2023) (2)
- ADYTIA: Adaptive and Dynamic TCP Interface Architecture for heterogeneous networks (2018) (2)
- Multiple connections in data communication and advanced applications (1997) (2)
- Deep Semantics Sorting of Voice-Interaction-Enabled Industrial Control System (2021) (2)
- Multimedia P2P networking: Protocols, solutions and future directions (2012) (2)
- Admission control and resource management of uncertain duration traffic in optical networks (2003) (2)
- MOCLO: A Cloud Framework for Mobile Devices (2013) (2)
- Secure cognitive radio‐based synchronized transmission of 5G signals using massive MIMO‐OFDM‐ES (2018) (2)
- MIMO antenna selection using biogeography‐based optimization with nonlinear migration models (2018) (2)
- Energy efficient routing for wireless sensor networks in urban environments (2010) (2)
- iDVSP: Intelligent Dynamic Virtual Sensor Provisioning in Sensor-Cloud Infrastructure (2018) (2)
- Edge-Learning-Based Hierarchical Prefetching for Collaborative Information Streaming in Social IoT Systems (2022) (2)
- Distributed Trust-Based Monitoring Approach for Fog/Cloud Networks (2020) (2)
- SEAT: Secure and Energy Efficient Anonymous Authentication With Trajectory Privacy-Preserving Scheme for Marine Traffic Management (2022) (2)
- SPCS-IoTEH: Secure Privacy-Preserving Communication Scheme for IoT-Enabled e-Health Applications (2021) (2)
- Modeling and simulation of ATM systems and networks (2003) (2)
- Contention Resolution for Transmission Control Protocol over Optical Burst-Switching Networks Using Random Segment Dropping (2010) (2)
- An Efficient Object Navigation Strategy for Mobile Robots Based on Semantic Information (2022) (2)
- Enhanced IEEE 802.21 Handover Design for QoS Support in Next Generation Wireless Networks (2016) (2)
- Interplay of Machine Learning and Software Engineering for Quality Estimations (2020) (2)
- Location Management in Wireless Fourth Generation Networks (2007) (2)
- A methodology for evaluating the performance of RISC processors (1991) (2)
- An advance dynamic resource reservation algorithm for OBS networks: Design and performance (2005) (2)
- Blockchain-Enhanced Federated Learning Market With Social Internet of Things (2022) (2)
- Secure macro mobility protocol for new generation access network (2014) (2)
- Personal Area Networks (PANs) (2003) (1)
- A MSCTP-Based Authentication Protocol: MSCTPAP (2015) (1)
- Partial Computing Offloading Assisted Cloud Point Registration in Multi-robot SLAM (2019) (1)
- Secure micro mobility protocol for new generation wireless network (2014) (1)
- Handover Management Approach for 5G Software Defined Vehicular Networks: A Scheme and Simulation Analysis (2019) (1)
- Simulation and Modeling Methodologies, Technologies and Applications - International Conference, SIMULTECH 2012 Rome, Italy, July 28-31, 2012 Revised Selected Papers (2014) (1)
- ISE: An Intelligent and Efficient Steganalysis Engine for Image Database in Big Data Systems (2018) (1)
- SELECTION ALGORITHM FOR WIRELESS SENSOR NETWORKS (2010) (1)
- Enhanced MIH Architecture-Aware Radio Resource Management Approach in NGWNs (2015) (1)
- E-Business and Telecommunications - International Joint Conference, ICETE 2012, Rome, Italy, July 24-27, 2012, Revised Selected Papers (2014) (1)
- Medium access control protocols for wireless LANs [Guest Editorial] (2008) (1)
- ISEND: An Improved Secure Neighbor Discovery Protocol for Wireless Networks (2014) (1)
- Advanced Mathematics and Numerical Modeling of IoT (2015) (1)
- e-Business and Telecommunications: 7th International Joint Conference, ICETE, Athens, Greece, July 26-28, 2010, Revised Selected Papers (2018) (1)
- Capacity Analysis in the Next Generation Wireless Networks Based on SINR Constraints (2015) (1)
- Mathematics and Computing (2015) (1)
- Retracted: Selection of intermediate routes for secure data communication systems using graph theory application and grey wolf optimization algorithm in MANETs (2020) (1)
- A novel medium access Control Protocol for radio-over-fiber access networks (2012) (1)
- A mechanism for reducing congestion while routing bulky data in Mobile Ad Hoc Networks (2010) (1)
- An energy sensitive system framework for cloud robotic network (2019) (1)
- Guest Editorial: Recent Advances in Modeling and Simulation of Network Systems (2006) (1)
- Robust Watermarking System Using Security Enhancement on Content Based Image Segmentation (2007) (1)
- Guest editorial: Performance evaluation of communication networks (2008) (1)
- Research on Robot's Indoor Object Finding Strategy Based on Semantic Relatedness (2020) (1)
- Principles of Wireless Sensor Networks: Wireless mobile sensor networks (2014) (1)
- A priority Ethernet LAN protocol and its performance (1993) (1)
- Internet-of-Explainable-Digital-Twins: A Case Study of Versatile Corn Production Ecosystem (2022) (1)
- Edge-Assisted Real-Time Instance Segmentation for Resource-Limited IoT Devices (2023) (1)
- A real-time TCP management scheme over OLS networks (2008) (1)
- ICETE 2017: Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (2017) (1)
- A Chain Topology for Efficient Monitoring of Food Grain Storage using Smart Sensors. (2018) (1)
- Secured and Seamless Handoff in Wireless Fourth Generation Systems (2006) (1)
- Implementation Study and Performances Evaluation of an 802.11ad Model Under NS-3 (2020) (1)
- Secure Reactive Fast Proxy MIPv6-Based Network Mobility (SRFP-NEMO) for Vehicular Ad-hoc Networks (VANETs) (2019) (1)
- Routing in wireless sensor networks (2014) (1)
- Energy aware wireless network protocols (2012) (1)
- An access control protocol for IoT‐based critical infrastructure in smart grid environment (2022) (1)
- Security of e-Systems and Computer Networks: E-commerce security (2007) (1)
- Computer Science and Convergence: CSA 2011 & WCC 2011 Proceedings (2011) (1)
- Smart Cities and Homes (2016) (1)
- Efficient and Secure Design of ID-3PAKA Protocol Using ECC (2021) (1)
- Reservation and contention reduced channel access method with effective quality of service for wireless mesh networks (2016) (1)
- Principles of Wireless Sensor Networks: Inside a wireless sensor node: structure and operations (2014) (1)
- Determination of buffer capacity for payload multiplexing in SDH systems (1997) (1)
- A Novel Identity-based Deniable Authentication Protocol Using Bilinear Pairings for Mobile Ad Hoc Networks (2020) (1)
- A COVID-19 X-ray image classification model based on an enhanced convolutional neural network and hill climbing algorithms (2022) (1)
- Automatic Spine Bone Segmentation and Feature Extraction in Computed Tomography Images for Biometric Recognition (2020) (1)
- New Techniques to Enhance the Capabilities of the Socks Network Security Protocol (2008) (1)
- Provably Secure Pairing-Free Identity-Based Partially Blind Signature Scheme and Its Application in Online E-cash System (2016) (1)
- Security analysis on “mutual authentication scheme for multimedia medical information systems” (2019) (1)
- A performance analysis scheme for intelligent wireless ATM networks (1999) (1)
- Secured and fast handoff in wireless mesh networks (2013) (1)
- New enhancements to the SOCKS communication network security protocol: Schemes and performance evaluation (2009) (1)
- Dynamic Multiworkflow Deadline and Budget Constrained Scheduling in Heterogeneous Distributed Systems (2021) (1)
- Transport protocols for wireless sensor networks (2014) (1)
- Performance Evaluation of ZOMA Preemptive Deadlock Recovery Mechanism for Wormhole Networks (2001) (1)
- Secure Beamforming Design for MISO SWIPT Systems: An Indirectly Optimized Approach (2019) (1)
- Future and Challenges of the Security of e-Systems and Computer Networks (2007) (1)
- A CCEPTED F ROM O PEN C ALL (2009) (1)
- An Optimized and Secure Authentication Scheme for Vehicular Ad Hoc Networks (2018) (1)
- SAGA: An Adaptive Infrastructure for Secure Available Grid on Ad-hoc Networks (2006) (1)
- Guest editorial: Fog computing enabled Internet of everything (2019) (1)
- Privacy Preserving Location-based Content Distribution Framework for Digital Rights Management Systems (2021) (1)
- Adaptive and safe presentation strategy of image information on social platform (2017) (1)
- The School District Reorganization by Combining with Traffic Congestion Data (2019) (1)
- Parallelization of Global Sequence Alignment on Graphics Processing Unit (2020) (1)
- Managing traffic in CDMA ATM networks (1999) (1)
- A comparative performance study of neural network paradigms for identifying computer users (1994) (1)
- Biometrics Based on Healthcare Sensors (2018) (1)
- A trace-driven simulation study of two-level cache systems (1995) (1)
- Behavioral Biometrics Based on Human-Computer Interaction Devices (2018) (1)
- Joint User Pairing and Resource Allocation for SWIPT-Enabled Cooperative D2D Communications (2021) (1)
- Deployment and validation of out of band IP traceback approach (OBTA) in wireless mesh network (2018) (1)
- E-Business and Telecommunications - 11th International Joint Conference, ICETE 2014, Vienna, Austria, August 28-30, 2014, Revised Selected Papers (2015) (1)
- Localization in Wireless Networks (2011) (1)
- Internet of UAVs Based Remote Health Monitoring: An Online eHealth System (2021) (1)
- A high efficient multi-robot simultaneous localization and mapping system using partial computing offloading assisted cloud point registration strategy (2021) (1)
- Cloud-assisted Secure and Cost-effective Authenticated Solution for Remote Wearable Health Monitoring System (2022) (1)
- Simulation and Modeling Methodologies, Technologies and Applications: International Conference, SIMULTECH 2013 Reykjavk, Iceland, July 29-31, 2013 (2014) (1)
- Value-driven Cache Replacement Strategy in Mobile Edge Computing (2020) (1)
- Simulation of Wireless Network Systems (2003) (1)
- A neural-based MAC protocol for distributed wireless LANs (2003) (1)
- Security Enhancement for Watermarking Technique Using Content based Image Segmentation (2007) (1)
- A Chain Topology for Efficient Monitoring of Food Grain Storage using Smart Sensors (2018) (1)
- Privacy Assessment of Fitness Tracker Devices (2020) (1)
- An evaluation study of protocols used in cable TV networks (1997) (1)
- Encrypted Medical Image Storage in DNA Domain (2021) (1)
- Amalgamation of Fog Computing and Software Defined Networking in Healthcare 4.0: The Challenges, and a Way Forward (2020) (1)
- Context-Aware Estimation Approach Based on Participatory Sensing (2014) (1)
- Performance analysis of intelligent mobile ATM networks (1999) (1)
- BCovX: Blockchain-based COVID Diagnosis Scheme using Chest X-Ray for Isolated Location (2021) (1)
- A neural approach to adaptive MAC protocols for wireless LANs (2004) (1)
- An efficient authentication and key agreement scheme for secure smart grid communication services (2020) (1)
- WBTPE: a priority Ethernet LAN protocol (1993) (1)
- Activity-Aware Data Rate Tuning in Wireless Body Area Networks (2020) (1)
- Quality of service provision in high-speed networks: an active approach (2002) (1)
- Response-Aware Scheduling of Big Data Applications in Cloud Environments (2018) (1)
- Admission Control in Optical Label Switched Networks: A Dynamic QoS-Based Approach (2007) (1)
- Performance Assessment of Dynamic Analysis Based Energy Estimation Tools (2018) (1)
- A simulation approach to the performance of DQDB metropolitan area computer networks (1995) (1)
- HSOP: A neural network paradigm and its applications (1994) (1)
- Basics of Queueing Theory (2010) (1)
- An implementation for ATM Adaptation Layer 5 (2002) (1)
- Proceedings of the 4th International Conference on Simulation and Modeling Methodologies, Technologies and Applications (2014) (1)
- Supporting adaptive QoS for multiple classes of service in DWDM networks (2001) (1)
- International Journal of Communication Systems: Editorials (2005) (1)
- Design and analysis of a multi-core whispering gallery mode bio-sensor for detecting cancer cells and diabetes tear cells (2021) (1)
- Resource management schemes in optical networks (2003) (1)
- A QoS and Cost Aware Fault Tolerant Scheme Insult-Controller SDNs (2018) (1)
- ORCID: Opportunistic Reconnectivity for Network Management in the Presence of Dumb Nodes in Wireless Sensor Networks (2020) (1)
- Guest Editorial: Performance Evaluation of Wireless Systems (2005) (1)
- Monitoring the status of iBeacons with crowd sensing (2017) (1)
- Wireless Powered Mobile Edge Computing Networks: A Survey (2023) (1)
- Performance evaluation of CISC computer systems under single- and two-level cache environments (1994) (1)
- E-business and Telecommunications - 4th International Conference, ICETE 2007, Barcelona, Spain, July 28-31, 2007, Revised Selected Papers (2008) (1)
- LSTM-Based Detection for Timing Attacks in Named Data Network (2019) (1)
- Location based Routing in Opportunistic Networks using Cascade Learning (2021) (1)
- HIP_IKEv2: A Proposal to Improve Internet Key Exchange Protocol-based on Host Identity Protocol (2013) (1)
- Wireless Local Area Networks (2003) (1)
- Book Reviews : ADVANCED COMPUTER ARCHITECTURE: Parallelism, Scalability, and Programmability by Kai Hwang McGraw-Hill, New York, N.Y., 1993. 770 pages, Price: $56.95, ISBN: 0-07-031622-8 (1993) (1)
- Designing and Prototyping Utility Management Using Hybrid Wireless-Wired Network Technologies (2017) (1)
- Proceedings of the 12th international conference on Symposium on Performance Evaluation of Computer & Telecommunication Systems (2009) (1)
- Two-Tier Ensemble Model for Demand Side Prediction in Smart Grid Environment (2019) (0)
- Guest Editorial (2013) (0)
- Call for papers (1995) (0)
- E-Business and Telecommunications - International Joint Conference, ICETE 2013, Reykjavik, Iceland, July 29-31, 2013, Revised Selected Papers (2014) (0)
- A Contactless Authentication System based on WiFi CSI (2022) (0)
- Introduction and Basic Concepts (2010) (0)
- An analytical study of resource division and its impact on power and performance of multi-core processors (2014) (0)
- New Elastic Node Addressing Schemes for Next-Generation Networks (2015) (0)
- PMAC-PDG'05 Reviewers (2005) (0)
- Issue Information (2018) (0)
- Radio-Based Cooperation for Wireless Intrusion Detection (2007) (0)
- A Novel Scheme for Traffic Monitoring in Optical Burst-Switched Networks (2007) (0)
- Security of e-Systems and Computer Networks: Virtual private networks (2007) (0)
- A Novel Grid-Based Micropayment System for Heterogeneous Multi-party Accounting (2007) (0)
- Performance Modeling and Simulation of ATM Systems and Networks (2001) (0)
- ServiceChord: A Scalable Service Capability Interaction Framework for IMS (2011) (0)
- Guest editorial special issue on “P2P computing for deep learning” (2021) (0)
- 2015 International Symposium on Performance Evaluation of Computer and Telecommunicatio n Systems (SPECTS) (2015) (0)
- Hypermedia systems: an approach to reduce network latency and server load (1997) (0)
- Introduction to applied system simulation (2003) (0)
- Commonly Used Distributions in Simulation and their Applications (2010) (0)
- Security of e-Systems and Computer Networks: E-government security (2007) (0)
- Advanced computing and communication technologies for Internet of Drones (2022) (0)
- Introduction (2018) (0)
- Fundamentals of Wireless Network Systems (2004) (0)
- e-Business and Telecommunications - International Conference, ICETE 2008, Porto, Portugal, July 26-29, 2008, Revised Selected Papers (2009) (0)
- Security of e-Systems and Computer Networks: Computer and network security risk management (2007) (0)
- A 3D neural network for moving microorganism extraction (2017) (0)
- E-Business and Telecommunications (2016) (0)
- REORDER++: Enhanced Randomized Real-Time Scheduling Strategy Against Side-Channel Attacks (2023) (0)
- Simulation and Modeling Methodologies, Technologies and Applications: International Conference, SIMULTECH 2015 Colmar, France, July 21-23, 2015 (2016) (0)
- First Generation (1G) Cellular Systems (2003) (0)
- Organizing and steering committees (2010) (0)
- Security of e-Systems and Computer Networks: Trust management in communication networks (2007) (0)
- Security Aware Routing Protocol for Intelligent Transportation Distributed Multi-Agent System (2018) (0)
- Indoor Visual Re-Localization for Long-Term Autonomous Robots Based on Object-Level Features and Semantic Relationships (2023) (0)
- Virtual Private Networks (2012) (0)
- Appendix A: Table of Standard Normal (Z) Distribution (2010) (0)
- Committees (2018) (0)
- Advances in computer communications (2004) (0)
- An Efficient and Secure Mutual Authentication Mechanism in NEMO-based PMIPv6 Networks: A Methodology and Simulation Analysis (2015) (0)
- ICE-B 2014 - Proceedings of the 11th International Conference on e-Business, Vienna, Austria, 28-30 August, 2014 (2014) (0)
- Special issue on performance evaluation of communication networks and systems. Guest editorial (2011) (0)
- Performance Modeling and Simulation of ATM Systems and Networks (2001) (0)
- User Experience and Quality-of-Service in Internet of Things: Practice and Trends (2016) (0)
- A Novel Approach to Predict the Real Time Sentimental Analysis by Naive Bayes & RNN Algorithm during the COVID Pandemic in UAE (2020) (0)
- Introduction to the Special Issue : Performance Evaluation of Computer and Telecommunications Systems (1999) (0)
- BeHAutH: A KNN-Based Classification Scheme for Behavior-Based Authentication in Web 3.0 (2022) (0)
- An efficient caching security approach for content‐centric mobile networks in internet of things systems (2023) (0)
- Proceedings of the 15th International Joint Conference on e-Business and Telecommunications (Volume 2) (2018) (0)
- Container-based task scheduling in cloud-edge collaborative environment using priority-aware greedy strategy (2022) (0)
- Design of an effective QoS-aware mapping scheme using persistent allocation probing (2012) (0)
- Simulation and Modeling Methodologies, Technologies and Applications: International Conference, SIMULTECH 2012 Rome, Italy, July 28-31, 2012 Revised (2013) (0)
- Estimation of error blocks in SDH networks (1998) (0)
- Guest Editorial (2015) (0)
- Classification of Soil Images using Convolution Neural Networks (2021) (0)
- ICE-B 2015 - Proceedings of the 12th International Conference on e-Business, Colmar, Alsace, France, 20-22 July, 2015 (2015) (0)
- E-security applications (2007) (0)
- Learning automaton based context oriented middleware architecture for precision agriculture (2015) (0)
- Dynamic intelligence towards merging cloud and communication services (2014) (0)
- Special Issue: Performance Modeling and Evaluation of Computer and Telecommunication Systems (2012) (0)
- Guest Editorial. Special Issue on Selected Extended Best Papers from ICETE-2011 (2013) (0)
- A New Security Access Scheme for WLANs and Its Performance Simulation Analysis (2008) (0)
- Optimum design of telecommunication systems (1998) (0)
- Data Representation and Advanced Topics on Validation Modeling (2010) (0)
- Duality-based branch–bound computational algorithm for sum-of-linear-fractional multi-objective optimization problem (2018) (0)
- Principles of Wireless Sensor Networks: Preface (2014) (0)
- On the security of authenticated key agreement schemes for e-healthcare (2022) (0)
- Intrusion detection systems (2007) (0)
- An Enhanced Lightweight Authentication Scheme for Secure Access to Cloud Data (2020) (0)
- Copyright page (2018) (0)
- E-Business and Telecommunications: 15th International Joint Conference, ICETE 2018, Porto, Portugal, July 26–28, 2018, Revised Selected Papers (2019) (0)
- Security of e-systems (2014) (0)
- Cooperative Radio Resources Allocation and Congestion Prevention Scheme for LTE-A (2016) (0)
- Board of Associate Editors (2010) (0)
- Performance analysis of parallel frame synchronization scheme in SDH systems (1997) (0)
- A Real-Time Admission Control and Planning of OLS Networks (2007) (0)
- Security of e-Systems and Computer Networks: Biometric-based security systems (2007) (0)
- A new token ring protocol and its performance for single and dual ring lan systems (1994) (0)
- An SDN/NFV Based Approach for Mobility Management in 5G Networks (2018) (0)
- HE guest editors wish to thank all the reviewers who provided valuable evaluations and recommendations. Their names are listed below. (2002) (0)
- Networks and Its Simulation Analysis A Secure and Energy-Efficient Scheme for Group-Based Routing in Heterogeneous Ad Hoc Sensor (2008) (0)
- Issue Information (2018) (0)
- Electronic Government and Commerce: Design, Modeling, Analysis and Security - Proceedings of the 1st International Workshop on Electronic Government and Commerce: Design, Modeling, Analysis and Security, EGCDMAS 2004, In conjunction with ICETE 2004, Setúbal, Portugal, August 2004 (2004) (0)
- Fuzzy-EPO Optimization Technique for Optimised Resource Allocation and Minimum Energy Consumption with the Brownout Algorithm (2023) (0)
- Security of e-Systems and Computer Networks: Introduction to e-security (2007) (0)
- Principles of Wireless Sensor Networks: Introduction to wireless sensor networks (2014) (0)
- Guest Editorial (2012) (0)
- A Post Dynamic Clustering Approach for Classification-based Image Retrieval (2020) (0)
- Proceedings of the 5th International Conference on Simulation and Modeling Methodologies, Technologies and Applications (2015) (0)
- Learning Automata-Based Cross Layer Framework with Context Awareness for Wireless Systems (2014) (0)
- Proceedings of the 2001 International Symposium on Performance Evaluation of Computer and Telecommunication Systems, Orland, Florida, July 15-19, 2001, Orlando Airport Marriott (2001) (0)
- Call for Papers: Special Issue on Mobile Internet: Content, Security, and Terminal (2013) (0)
- Fundamentals and Issues with Cooperation in Networking (2011) (0)
- A new high rate adaptive wireless data dissemination scheme (2007) (0)
- A New Approach to the Simulation of HIPERLAN Wireless Networks (2003) (0)
- A quality of service scheduling technique for optical LANs (2009) (0)
- Call for Papers: Wiley's Security and Communication Networks Special Issue on Security of e-Systems (2012) (0)
- A Delay-Sensitive Multibase-Station Multichannel Access System for Smart Factory (2023) (0)
- Principles of Wireless Sensor Networks: Topology management and control (2014) (0)
- Adaptive Software Defined Node Deployment for Green Internet of Things (2020) (0)
- Optimal Resource Allocation for Quality-of-Service in D2D Communication Underlying Imperfect CSI (2021) (0)
- Time Stamp-Based Algorithm for Task Scheduling in a Distributed Computing System with Multiple Master Multiple Slave Architecture (2011) (0)
- An intelligent video pattern generator for use in ophthalmology (1993) (0)
- A real-time video pattern generator for use in ophthalmology. (1999) (0)
- Inaugural Editorial: A Message from the Founding Editor‐in‐Chief (2018) (0)
- Wavelength Division Multiplexing (2011) (0)
- Learning Automata based Cache Update Policy in Fog-enabled Vehicular Adhoc Networks (2022) (0)
- Second Generation (2G) Cellular Systems (2003) (0)
- Security of e-Systems and Computer Networks: Wireless LANs security (2007) (0)
- ICECS 2007 Keynote Speech Trends and Challenges in Wireless Systems (2007) (0)
- HITH: Hybrid IP Traceback for Heterogeneous Wireless Networks (2016) (0)
- A learning automata-based bus arbitration scheme for scalable shared-medium ATM switches (2001) (0)
- Security of e-Systems and Computer Networks: Preface (2007) (0)
- Novel cache replacement algorithms for high performance computer systems (1996) (0)
- SCHOOL: Spectrum Allocation for D2D Communication Enabled HetNet using Stackelberg and Coalition Formation Game (2021) (0)
- Call for Papers (1998) (0)
- Copyright page (2010) (0)
- QoS management in wireless ATM networks using large deviation principle (2000) (0)
- 10 KEYSTROKE DYNAMICS BASED AUTHENTICATION (2004) (0)
- Enhancing ANDSF for Extended Wi-Fi Coverage (2019) (0)
- Multimedia P2P networking: Protocols, solutions and future directions (2012) (0)
- Simulation and Modeling Methodologies, Technologies and Applications: International Conference, SIMULTECH 2014 Vienna, Austria, August 28-30, 2014 (2016) (0)
- ATPS: an adaptive trajectory prediction system based on semantic information for dynamic objects (2021) (0)
- Measurement/Testing Technique (2010) (0)
- Probability Theory Review (2010) (0)
- Foreword (2014) (0)
- A Novel Anonymous Authentication and Key Agreement Scheme for Smart Grid (2020) (0)
- E2CA-SM: an energy-efficient channel allocation with sleep mode for base station in fifth-generation-based cellular network systems (2020) (0)
- M&S Bok Core Areas and the Big Picture (2023) (0)
- HTFM: Hybrid Traffic-Flow Forecasting Model for Intelligent Vehicular Ad hoc Networks (2021) (0)
- A dynamic self-healing routing strategy for ATM networks (1997) (0)
- Introduction to Simulation Technique (2010) (0)
- Service Chain Caching and Workload Scheduling in Mobile Edge Computing (2022) (0)
- GreenCom 2010 Keynote Speech: Mohammad S. Obaidat (2011) (0)
- Issue Information (2018) (0)
- The proceedings of the 1998 Summer Computer Simulation Conference : simulation and modeling technology for the twenty-first century, Reno, Nevada, July 19-22, 1998, John Ascuaga's Nugget Hotel (1998) (0)
- Principles of Wireless Sensor Networks: Security issues in wireless sensor networks (2014) (0)
- Security of e-Systems and Computer Networks: Protecting against malware (2007) (0)
- Wireless ATM and Ad Hoc Routing (2003) (0)
- On the performance of neural networks and pattern recognition paradigms for classifying ultrasonic transducers (1992) (0)
- Guest Editorial (2011) (0)
- Book Reviews : Discrete Event Simulation: A Practical Approach by Udo W. Pooch and James A. Wall CRC Press,1993. 412 pages, Price: $64.95 , ISBN: 0-8493-7174-0 (1994) (0)
- Trends and challenges in wireless networks (2005) (0)
- Fast Local Map Construction of Robot Using Semantic Priors (2020) (0)
- On the performance of adaptive TDMA protocols in WDM passive star networks with fixed transmitters and tunable receivers (2005) (0)
- Stable Move Algorithm (SMA) for BW allocation in wireless mobile WiMAX networks 802.16e (2011) (0)
- Appendix D: Quantiles of Student's T‐Distribution withV Degrees of Freedom (2010) (0)
- IEEE Access Special Section Editorial: Artificial Intelligence (AI)-Empowered Intelligent Transportation Systems (2021) (0)
- Guest Editorial (2012) (0)
- 57. Wireless LANs (2011) (0)
- Future Trends: Fourth Generation (4G) Systems and Beyond (2003) (0)
- Performance Modeling and Simulation of ATM Systems and Networks (2001) (0)
- Security of e-Systems and Computer Networks: E-security (2007) (0)
- The proceedings of the 1999 Summer Computer Simulation Conference , Chicago, Illinois, July 11-15, 1999, Hotel Inter-Continental (1999) (0)
- Security of e-Systems and Computer Networks: Public key infrastructure (PKI) systems (2007) (0)
- Organizing and steering committees (2010) (0)
- Congestion Avoidance Mechanism for Optical Label Switched Networks: A Dynamic QoS-based Approach (2007) (0)
- Benchmarking and Capacity Planning (2010) (0)
- On the Advances and Challenges in Smart Homes and Cities and Samples of our Recent Related Works (2014) (0)
- Prediction of heart abnormalities using deep learning model and wearabledevices in smart health homes (2021) (0)
- An adaptive task allocation technique for green cloud computing (2017) (0)
- Network Traffic Prediction for Intelligent Transportation Systems: A Reinforcement Learning Approach (2022) (0)
- Improved Mutual Authentication in VANETs (2018) (0)
- Managing mobility in a wireless ATM network (1999) (0)
- Security of e-Systems and Computer Networks: Public key cryptosystems (2007) (0)
- An Efficient Approach for Location Updating in Mobile Ad Hoc Networks (2008) (0)
- Operational and Mean Value Analysis (2010) (0)
- Finding overlapping communities in a complex network of social linkages and Internet of things (2013) (0)
- The proceedings of the 1997 Summer Computer Simulation Conference : simulation and modeling technology for the twenty-first century, Arlington, Virginia, July 13-17, 1997, Key Bridge Marriott (1997) (0)
- Security of e-Systems and Computer Networks: Authentication and digital signature (2007) (0)
- Deep Neural Networks for Dynamic Attribute based Encryption in IoT-Fog Environment (2022) (0)
- Organizing & Program Committees (2007) (0)
- A Robust Stream Control Transmission Protocol (SCTP)-Based Authentication Protocol (2014) (0)
- TruClu: Trust Based Clustering Mechanism in Software Defined Vehicular Networks (2021) (0)
- A Comprehensive Study on Artificial Intelligence and Blockchain Driven Beyond 5G Networks (2022) (0)
- Appendix B: Commonly Used Normal Quantiles (2010) (0)
- Performance Analysis of the Spectrum Access Strategies in Cognitive Radio Networks (2021) (0)
- A clustering technique for long local computer networks (1994) (0)
- Guest Editorial (2009) (0)
- Non-Newtonian fluid simulation and reconstruction from monocular videos (2022) (0)
- Machine Learning-based Currency Information Retrieval for Aiding the Visually Impaired People (2021) (0)
- Neural network and pattern recognition techniques for characterizing ultrasonic transducers (1992) (0)
- Optimization of Multi-Dimensional Metrics through Task Scheduling in Cloud Computing Systems (2018) (0)
- A Secure Authentication Mechanism for Wireless Sensor Networks (2020) (0)
- Online risk-based authentication using behavioral biometrics (2013) (0)
- Chapter 24 – Using Ant Colony Agentsfor Designing Energy-Efficient Protocols for Wireless Ad Hoc and Sensor Networks (2013) (0)
- Fundamentals of wireless networks systems (2008) (0)
- Traffic Measurement Optimization Based on Reinforcement Learning in Large-Scale IP Backbone Networks (2019) (0)
- Constructing data supply chain based on layered PROV (2016) (0)
- SCS News: Mohammad S. Obaidat Elected Fellow of SCS (2001) (0)
- Adaptive distributed bus arbitration schemes for shared-medium ATM switches (2003) (0)
- Recent trends and challenges in wireless networks (2006) (0)
- E-system and network security tools (2007) (0)
- On regional performance improvement of an adaptive wireless push system in environments with locality of demand (2005) (0)
- Simulation Software and Case Studies (2010) (0)
- Medium access in wireless sensor networks (2012) (0)
- Wireless sensor network applications: overview and case studies (2012) (0)
- Appropriate Service Degradability for Virtualized Inter-Data-Center Optical Networks (2018) (0)
- An approach for solving fully fuzzy multi-objective linear fractional optimization problems (2019) (0)
- Smart Devices, Systems and Intelligent Environments (2011) (0)
- Cooperative radio resources allocation in LTE_A networks within MIH framework: A scheme and simulation analysis (2016) (0)
- A Novel Multi-Path Anonymous Randomized Key Distribution Scheme for Geo Distributed Networks (2019) (0)
- A lightweight anonymous authentication scheme for secure cloud computing services (2020) (0)
- Economics of Wireless Networks (2003) (0)
- An Efficient Authentication Technique using Convolution Chebyshev Chaotic Maps for TMIS (2022) (0)
- Study of Power Efficient 5G Mobile Edge Computing (2021) (0)
- Guest Editorial: Performance Evaluation of Computer and Telecommunication Systems (2009) (0)
- Predictive multi-hop stable routing in Vehicular Ad Hoc Networks (2010) (0)
- Stochastic Power Modeling of Wireless Sensor Networks for Mission Critical Systems (2018) (0)
- E-Business and Telecommunications: 16th International Conference, ICETE 2019, Prague, Czech Republic, July 26–28, 2019, Revised Selected Papers (2020) (0)
- Construction of Lightweight Content key Distribution Framework for DRM systems (2021) (0)
- Principles of Wireless Sensor Networks: Performance evaluation of wireless sensor networks (2014) (0)
- Provably Secure and Anonymous Password Authentication Protocol for Roaming Service in Global Mobility Networks Using Extended Chaotic Maps (2015) (0)
- Energy-efficient tasks scheduling algorithm for real-time multiprocessor embedded systems (2012) (0)
- On the Security Enhancement of Multimedia Copyright Protection for E-Business (2016) (0)
- Intrusion Detection System using Aggregation of Machine Learning Algorithms (2022) (0)
- Third Generation (3G) Cellular Systems (2003) (0)
- Introduction to the Special Issue: ATM Systems and Networks: Basics, Issues, and Performance Modeling and Simulation (2002) (0)
- Principles of Wireless Sensor Networks: Localization and tracking (2014) (0)
- A versatile video pattern generator for vision test (1993) (0)
- Security of e-Systems and Computer Networks: Protecting enterprises (2007) (0)
- An intelligent tutoring system for basic electronics (1991) (0)
- An Efficient Digital Short Signature Scheme using CCM for HC-IoT Environments (2022) (0)
- Channel Allocation in Cognitive Radio Networks using Evolutionary Technique (2016) (0)
- Trends and Challenges in Wireless Systems (2007) (0)
- Special issue on Selected Best Papers of SPECTS 2014 (2015) (0)
- Wireless multimedia sensor networks (2012) (0)
- Optimizing Energy using Probabilistic Routing in Underwater Sensor Network (2012) (0)
- Service Management Algorithm-based on Security Monitoring Mechanism for Fog IoT Users in Fog Networks (2019) (0)
- A scheme to determine buffer capacity for SDH multiplexing (1997) (0)
- Secure and integrated handover authentication scheme with FMIPv6 (2013) (0)
- Organizing and steering committees (2022) (0)
- E-Business and Telecommunications (2017) (0)
- Improved secure Neighbor Discovery Protocol (ISEND) for new wireless networks generations (2014) (0)
- Guest Editorial (2009) (0)
- Feature selection for anomaly detection in vehicular ad hoc networks (2018) (0)
- Title pages (2010) (0)
- On the Security of Content key Distribution Framework for DRM systems (2022) (0)
- RAKI:A Robust ECC Based Three-party Authentication and Key Agreement Scheme for Medical IoT (2022) (0)
- CITS 2017 general chairs' message (2017) (0)
- A video pattern generator for vision test (1992) (0)
- Towards a framework for large-scale multimedia data storage and processing on Hadoop platform (2013) (0)
- A comparative simulation study on the power–performance of multi-core architecture (2014) (0)
- On a congestion management scheme for high speed networks using aggregated large deviations principle (2001) (0)
- Fixed Wireless Access Systems (2003) (0)
- Novel Multiparameter Detection and Recovery Technique for Diverse Network Systems (2021) (0)
- An experimental analysis study of bandwidth allocation with QoS in wireless networks (2009) (0)
- Security Issues in Wireless Systems (2003) (0)
- Supporting Science Areas (2023) (0)
- Reversible Image Mosaic Technology Providing Large Protection Size and High Image Quality (2018) (0)
- Guest Editorial: Advances in Communication Networking (2007) (0)
- e-Business and Telecommunications - 6th International Joint Conference, ICETE 2009, Milan, Italy, July 7-10, 2009. Revised Selected Papers (2011) (0)
- Classical versus reinforcement learning algorithms for unmanned aerial vehicle network communication and coverage path planning: A systematic literature review (2022) (0)
- A 68000 based modular multiprocessor system: design and simulation analysis (1986) (0)
- On carrier-sense integration in learning automata-based MAC protocols for ad-hoc wireless LANs (2004) (0)
- Design and analysis of secure host-based mobility protocol for wireless heterogeneous networks (2014) (0)
- SDN based Network Traffic Routing in Vehicular Networks: A Scheme and Simulation Analysis (2020) (0)
- CITS 2012 general chair's message (2012) (0)
- Comparison of the Design Characteristics of MMI Wavelength Demultiplexers Using Different Approaches by Computing the Effective Index (2011) (0)
- An Offline Assistance Tool for Visually Impaired People Based on Image Captioning (2022) (0)
- Guest Editorial (2015) (0)
- A simulation study of the mechanisms to enhance TCP protocol in wide area computer networks (1996) (0)
- IEEE TRANSACTIONS ® ON SYSTEMS, MAN, AND CYBERNETICS Editor-in-Chief (2009) (0)
- WINSYS 2006 - Proceedings of the International Conference on Wireless Information Networks and Systems, Setúbal, Portugal, August 7-10, 2006, WINSYS is part of ICETE - The International Joint Conference on e-Business and Telecommunications (2006) (0)
- 6G Based Green Mobile Edge Computing for Internet of Things (IoT) (2022) (0)
- Adaptive Varying Contention Window MAC Protocol Based on Underwater Acoustic Propagation Delay (2023) (0)
- ORCID: Opportunistic Re-Connectivity for Network Management in the Presence of Dumb Nodes in Wireless Sensor Networks (2019) (0)
- False-Locality Attack Detection Using CNN in Named Data Networking (2019) (0)
- High-Performance Protocols for Ring LAN and MAN Computer Networks (1995) (0)
- A Simulation Study of Scalable Broadcast in High-Performance Regular Networks (2004) (0)
- Advances in computer communication networks (2007) (0)
- Modeling and simulation of a novel secure quantum key distribution (SQKD) for ensuring data security in cloud environment (2022) (0)
- xDIoT: Leveraging Reliable Cross-domain Communication Across IoT Networks (2022) (0)
- Construction of Efficient Authenticated Key Agreement Protocol for Intelligent Transportation System (2022) (0)
- Editorial: Special Section on Pervasive Edge Computing for Industrial Internet of Things (2021) (0)
- Guest Editorial (2015) (0)
- Clustering-based Optimal Resource Allocation Strategy in Title Insurance Underwriting (2022) (0)
- A novel efficient and lightweight authentication scheme for secure smart grid communication systems (2022) (0)
- Principles of Wireless Sensor Networks: Wireless underground sensor networks (2014) (0)
- Security of e-Systems and Computer Networks: E-services security (2007) (0)
- Load-Balanced Topology Rebuilding for Disconnected Wireless Sensor Networks With Delay Constraint (2022) (0)
- Organizing and steering committees (2020) (0)
- SaFaR: Solana Blockchain-based Optimal Route Selection Scheme for Cab Aggregators (2022) (0)
- The relative influence of Jordanian wives and husbands during purchase decision making stages (1989) (0)
- Principles of Wireless Sensor Networks: Underwater sensor networks (2014) (0)
- An efficient key authentication procedure for IND-CCA2 secure Paillier-based cryptosystem (2020) (0)
- Operating Mode Optimization for Nodes of Data Supply Chain (2017) (0)
- Guest Editorial Recent Advances in Global Navigation and Communication Satellite Systems (2008) (0)
- A Novel Data Compression Technique Incorporated with Computer Offloading in RGB-D SLAM (2019) (0)
- Energy Optimisation using Distance and Hop-based Transmission (DHBT) in Wireless Sensor Networks - Scheme and Simulation Analysis (2017) (0)
- FluidMLP: A general method for learning Lagrangian fluid simulation (2022) (0)
- Submission and citation practices and Security and Privacy's commitment to integrity and ethics (2018) (0)
- Design Alternatives for Virtual Private Networks (2016) (0)
- Appendix C: Quantiles of Unit Normal Distribution (2010) (0)
- Chairs and committee (2022) (0)
- Analysis of Simulation Results (2010) (0)
- A comparative evaluation study of the performance of DQRAP and DQDB in metropolitan area networks (2002) (0)
- On the use of genetic algorithms in the medium access control of broadcast communication networks (2003) (0)
- Multimodal Biometric Invariant Fusion Techniques (2018) (0)
- Resource Allocation for Wireless Body Area Networks in Presence of Selfish Agents (2016) (0)
- A new approach to the design of MAC protocols for WDM-EPONs (2010) (0)
This paper list is powered by the following services:
Other Resources About Mohammad S. Obaidat
What Schools Are Affiliated With Mohammad S. Obaidat?
Mohammad S. Obaidat is affiliated with the following schools: