Sherali Zeadally
#98,359
Most Influential Person Now
Sherali Zeadally's AcademicInfluence.com Rankings
Sherali Zeadallycomputer-science Degrees
Computer Science
#3457
World Rank
#3629
Historical Rank
Database
#834
World Rank
#875
Historical Rank

Download Badge
Computer Science
Why Is Sherali Zeadally Influential?
(Suggest an Edit or Addition)Sherali Zeadally's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- Vehicular ad hoc networks (VANETS): status, results, and challenges (2012) (1206)
- Energy harvesting in wireless sensor networks: A comprehensive review (2016) (858)
- An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks (2015) (504)
- A survey on privacy protection in blockchain system (2019) (429)
- Intelligent Device-to-Device Communication in the Internet of Things (2016) (420)
- Spectrum Assignment in Cognitive Radio Networks: A Comprehensive Survey (2013) (387)
- Anonymous Authentication for Wireless Body Area Networks With Provable Security (2017) (386)
- Internet of Vehicles: Architecture, Protocols, and Security (2018) (383)
- A Survey of Device-to-Device Communications: Research Issues and Challenges (2018) (354)
- Integration challenges of intelligent transportation systems with connected vehicle, cloud computing, and internet of things technologies (2015) (332)
- A survey and taxonomy on energy efficient resource allocation techniques for cloud computing systems (2016) (327)
- Deploying Fog Computing in Industrial Internet of Things and Industry 4.0 (2018) (327)
- An Analysis of RFID Authentication Schemes for Internet of Things in Healthcare Environment Using Elliptic Curve Cryptography (2015) (291)
- Sensor Technologies for Intelligent Transportation Systems (2018) (290)
- Autonomous Cars: Research Results, Issues, and Future Challenges (2019) (276)
- VANET-cloud: a generic cloud computing model for vehicular Ad Hoc networks (2015) (272)
- Enabling Technologies for Green Internet of Things (2017) (270)
- Lightweight Three-Factor Authentication and Key Agreement Protocol for Internet-Integrated Wireless Sensor Networks (2017) (243)
- 5G for Vehicular Communications (2018) (234)
- Security attacks and solutions for vehicular ad hoc networks (2010) (233)
- Cross-Layer Support for Energy Efficient Routing in Wireless Sensor Networks (2009) (224)
- Offloading in fog computing for IoT: Review, enabling technologies, and research opportunities (2018) (221)
- Certificateless Public Auditing Scheme for Cloud-Assisted Wireless Body Area Networks (2018) (220)
- Authentication protocol for an ambient assisted living system (2015) (216)
- Critical infrastructure protection: Requirements and challenges for the 21st century (2015) (213)
- Smart cities (2016) (211)
- Trust management of services in cloud environments: Obstacles and solutions (2013) (210)
- Virtualization: Issues, security threats, and solutions (2013) (194)
- Fog computing job scheduling optimization based on bees swarm (2018) (189)
- Survey of media access control protocols for vehicular ad hoc networks (2011) (181)
- Internet of Things (IoT): Research, Simulators, and Testbeds (2018) (173)
- Enabling Next-Generation RFID Applications: Solutions and Challenges (2008) (171)
- Integration of Cognitive Radio Technology with unmanned aerial vehicles: Issues, opportunities, and future research challenges (2015) (165)
- Stream Control Transmission Protocol (SCTP) (2008) (152)
- Container-as-a-Service at the Edge: Trade-off between Energy Efficiency and Service Availability at Fog Nano Data Centers (2017) (149)
- Fog Computing Architecture, Evaluation, and Future Research Directions (2018) (148)
- Efficient and Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography for Multi-Server Architectures (2016) (148)
- Blockchain for Internet of Energy management: Review, solutions, and challenges (2020) (147)
- IoT technologies for smart cities (2018) (147)
- Mobility management across hybrid wireless networks: Trends and challenges (2006) (145)
- Bio-Inspired Routing Algorithms Survey for Vehicular Ad Hoc Networks (2015) (140)
- Efficient and Privacy-Preserving Data Aggregation Scheme for Smart Grid Against Internal Adversaries (2017) (135)
- Vehicular delay-tolerant networks for smart grid data management using mobile edge computing (2016) (125)
- Online deception in social media (2014) (124)
- Taxonomy and analysis of security protocols for Internet of Things (2018) (123)
- Energy-efficient networking: past, present, and future (2012) (120)
- Handling big data: research challenges and future directions (2016) (112)
- Certificateless Public Key Authenticated Encryption With Keyword Search for Industrial Internet of Things (2018) (111)
- Network layer inter-operation of Device-to-Device communication technologies in Internet of Things (IoT) (2017) (111)
- Cybersecurity and Privacy Solutions in Smart Cities (2017) (110)
- Comparative study of trust and reputation systems for wireless sensor networks (2013) (106)
- Multiple Account Identity Deception Detection in Social Media Using Nonverbal Behavior (2014) (104)
- Balancing energy consumption with mobile agents in wireless sensor networks (2012) (102)
- A survey on computation offloading modeling for edge computing (2020) (100)
- A Novel Distributed Sensor Positioning System Using the Dual of Target Tracking (2008) (99)
- BPAS: Blockchain-Assisted Privacy-Preserving Authentication System for Vehicular Ad Hoc Networks (2020) (98)
- HyBR: A Hybrid Bio-inspired Bee swarm Routing protocol for safety applications in Vehicular Ad hoc NETworks (VANETs) (2013) (94)
- Fog Computing for 5G Tactile Industrial Internet of Things: QoE-Aware Resource Allocation Model (2019) (94)
- Securing Internet of Things with Software Defined Networking (2018) (93)
- Lightweight Blockchain for Healthcare (2019) (92)
- Network Service Chaining in Fog and Cloud Computing for the 5G Environment: Data Management and Security Challenges (2017) (92)
- Machine learning and data analytics for the IoT (2020) (91)
- Design architectures for energy harvesting in the Internet of Things (2020) (91)
- Secure authentication and privacy-preserving techniques in Vehicular Ad-hoc NETworks (VANETs) (2020) (88)
- A Novel Vehicular Information Network Architecture Based on Named Data Networking (NDN) (2014) (88)
- Using Cloud Computing to Implement a Security Overlay Network (2013) (88)
- Industrial Control Systems: Cyberattack trends and countermeasures (2020) (87)
- An adaptive cross-layer mapping algorithm for MPEG-4 video transmission over IEEE 802.11e WLAN (2009) (87)
- Toward efficient smartification of the Internet of Things (IoT) services (2017) (86)
- A seven-layered model architecture for Internet of Vehicles (2017) (86)
- Millimeter-Wave Communication for Internet of Vehicles: Status, Challenges, and Perspectives (2020) (84)
- Data collection using unmanned aerial vehicles for Internet of Things platforms (2019) (83)
- Machine-to-Machine (M2M) Communications in Vehicular Networks (2012) (82)
- Mobile cloud computing: Challenges and future research directions (2018) (81)
- Vehicular Communications for ITS: Standardization and Challenges (2020) (78)
- Trust in VANET: A Survey of Current Solutions and Future Research Opportunities (2021) (76)
- Internet Protocol Television (IPTV): Architecture, Trends, and Challenges (2011) (76)
- Integration of VANET and 5G Security: A review of design and implementation issues (2019) (74)
- Towards Privacy Protection in Smart Grid (2013) (72)
- Mobile social networking applications (2013) (72)
- Sustainable Transportation Management System for a Fleet of Electric Vehicles (2015) (70)
- A survey on physical unclonable function (PUF)-based security solutions for Internet of Things (2020) (70)
- MASM: A Multiple-Algorithm Service Model for Energy-Delay Optimization in Edge Artificial Intelligence (2019) (69)
- Ransomware behavioural analysis on windows platforms (2018) (69)
- Evaluating IPv6 on Windows and Solaris (2003) (67)
- Anonymous biometrics-based authentication scheme with key distribution for mobile multi-server environment (2017) (66)
- RFID enabled traceability networks: a survey (2011) (65)
- Harnessing Artificial Intelligence Capabilities to Improve Cybersecurity (2020) (65)
- Design and Performance Analysis of a Virtual Ring Architecture for Smart Grid Privacy (2014) (64)
- A survey on Green communications using Adaptive Link Rate (2013) (64)
- A secure vehicle-to-roadside communication payment protocol in vehicular ad hoc networks (2008) (63)
- Cryptographic technologies and protocol standards for Internet of Things (2019) (62)
- Unique Radio Innovation for the 21st Century: Building Scalable and Global RFID Networks (2010) (61)
- Data analytics for Cooperative Intelligent Transport Systems (2019) (60)
- Physical Layer Security for the Smart Grid: Vulnerabilities, Threats, and Countermeasures (2019) (60)
- Certificateless Provable Data Possession Scheme for Cloud-Based Smart Grid Data Management Systems (2018) (59)
- Ubiquitous RFID: Where are we? (2010) (58)
- HARMONICA: enhanced QoS support with admission control for IEEE 802.11 contention-based access (2004) (57)
- A Taxonomy of Domain-Generation Algorithms (2016) (57)
- A Classification and Characterization of Security Threats in Cloud Computing (2016) (56)
- Mobile CoMMerCe (2014) (56)
- Cognitive radio spectrum sensing framework based on multi-agent arc hitecture for 5G networks (2015) (55)
- Vehicular Ad-hoc Networks (VANETs): Architecture, Protocols and Applications (2013) (55)
- Performance analysis of data intensive cloud systems based on data management and replication: a survey (2016) (54)
- Critical Control System Protection in the 21st Century (2013) (54)
- Enabling Cyber Physical Systems with Wireless Sensor Networking Technologies (2012) (54)
- QoS-Aware Hierarchical Web Caching Scheme for Online Video Streaming Applications in Internet-Based Vehicular Ad Hoc Networks (2015) (54)
- Healthcare Data Breaches: Implications for Digital Forensic Readiness (2018) (53)
- Performance analysis of Bayesian coalition game-based energy-aware virtual machine migration in vehicular mobile cloud (2015) (53)
- A Lightweight ECC-Based Authentication Scheme for Internet of Things (IoT) (2020) (51)
- Network Forensics: An Analysis of Techniques, Tools, and Trends (2012) (51)
- Energy-Efficient Fog Computing for 6G-Enabled Massive IoT: Recent Trends and Future Opportunities (2022) (49)
- Green Networking for Major Components of Information Communication Technology Systems (2009) (49)
- Cybersecurity in industrial control systems: Issues, technologies, and challenges (2019) (48)
- Privacy Issues and Solutions for Consumer Wearables (2018) (47)
- Harnessing the power of Internet of Things based connectivity to improve healthcare (2019) (47)
- Wireless multimedia delivery over 802.11e with cross-layer optimization techniques (2010) (47)
- Solving vehicular ad hoc network challenges with Big Data solutions (2016) (45)
- Lattice-Based Public Key Cryptosystem for Internet of Things Environment: Challenges and Solutions (2019) (45)
- A lightweight secure mobile Payment protocol for vehicular ad-hoc networks (VANETs) (2012) (45)
- Performance comparison of media access control protocols for vehicular ad hoc networks (2012) (44)
- RFID Infrastructure Design: A Case Study of Two Australian RFID Projects (2009) (44)
- An Empirical Analysis of Handoff Performance for SIP, Mobile IP, and SCTP Protocols (2007) (43)
- A tutorial survey on vehicle-to-vehicle communications (2020) (43)
- QoE-Based Server Selection for Content Distribution Networks (2014) (43)
- Teaching Cybersecurity Using the Cloud (2015) (42)
- Ideal Lattice-Based Anonymous Authentication Protocol for Mobile Devices (2019) (42)
- Lightweight and efficient privacy-preserving data aggregation approach for the Smart Grid (2017) (41)
- Securing Internet of Things (IoT) with machine learning (2019) (41)
- Comparison of end-system IPv6 protocol stacks (2004) (41)
- Secure Mobile Payment Systems (2014) (40)
- Smart Grid Privacy: Issues and Solutions (2012) (40)
- Smart healthcare (2019) (40)
- An Anonymous Secure Payment Protocol in a Payment Gateway Centric Model (2012) (39)
- Gigabit Wireless Networking with IEEE 802.11ac: Technical Overview and Challenges (2015) (37)
- Energy Harvesting Techniques for Internet of Things (IoT) (2021) (37)
- Internet of Things Forensics: The Need, Process Models, and Open Issues (2018) (37)
- Lightweight Data Aggregation Scheme against Internal Attackers in Smart Grid Using Elliptic Curve Cryptography (2017) (36)
- RFID: Opportunities and Challenges (2013) (36)
- Next-Generation Wireless Technologies: 4G and Beyond (2013) (36)
- Security Attacks and Solutions in Electronic Health (E-health) Systems (2016) (36)
- Concurrent multipath transmission combining forward error correction and path interleaving for video streaming (2011) (35)
- Mobile Banking: Evolution and Threats: Malware Threats and Security Solutions (2019) (35)
- Hop-based approach for holes and boundary detection in wireless sensor networks (2012) (34)
- Lifespan and propagation of information in On-line Social Networks: A case study based on Reddit (2014) (33)
- Quality of service models for heterogeneous networks: overview and challenges (2008) (33)
- Efficient Revocable ID-Based Signature With Cloud Revocation Server (2017) (33)
- Detecting Insider Threats: Solutions and Trends (2012) (33)
- Wireless energy harvesting: Empirical results and practical considerations for Internet of Things (2018) (33)
- RFID technology, systems, and applications (2011) (32)
- Managing Trust in the Cloud: State of the Art and Research Challenges (2016) (32)
- Energy-aware sensor node relocation in mobile sensor networks (2014) (31)
- Modeling Object Flows from Distributed and Federated RFID Data Streams for Efficient Tracking and Tracing (2013) (30)
- Multimedia applications over metropolitan area networks (MANs) (2011) (30)
- Communication Issues in the Internet of Things (IoT) (2013) (30)
- Lightweight authentication protocols for wearable devices (2017) (30)
- Blockchain: Trends and future opportunities (2019) (30)
- Mobile cloud networking for efficient energy management in smart grid cyber-physical systems (2016) (29)
- A real-time video quality estimator for emerging wireless multimedia systems (2014) (28)
- Internet of Things (IoT) Technologies for Smart Cities (2017) (28)
- Real-time QoE prediction for multimedia applications in Wireless Mesh Networks (2012) (28)
- Analysis of Security Protocols for Mobile Healthcare (2016) (28)
- 25 Years of Bluetooth Technology (2019) (28)
- Design and implementation of a SIP-based VoIP architecture (2004) (28)
- Implementation and performance evaluation of a payment protocol for vehicular ad hoc networks (2010) (27)
- Artificial Intelligence-Based Sensors for Next Generation IoT Applications: A Review (2021) (27)
- Drive-By Download Attacks: A Comparative Study (2016) (27)
- Techniques, Taxonomy, and Challenges of Privacy Protection in the Smart Grid (2015) (27)
- Cyber-Physical Cloud Manufacturing Systems With Digital Twins (2021) (27)
- An efficient and secure searchable public key encryption scheme with privacy protection for cloud storage (2018) (27)
- Toward self-authenticable wearable devices (2015) (27)
- Security issues in implantable medical devices: Fact or fiction? (2020) (26)
- Recent advances in multimedia networking (2011) (26)
- Analysis of handover authentication protocols for mobile wireless networks using identity-based public key cryptography (2017) (26)
- TMS-RFID: Temporal management of large-scale RFID applications (2011) (26)
- Mobile Forensics: Advances, Challenges, and Research Opportunities (2017) (26)
- Energy‐efficient beaconless geographic routing in energy harvested wireless sensor networks (2013) (25)
- Bio-inspired cybersecurity for wireless sensor networks (2016) (25)
- Privacy aware IOTA ledger: Decentralized mixing and unlinkable IOTA transactions (2019) (24)
- An Empirical Study of HTTP-based Financial Botnets (2016) (24)
- Interference-Aided Vehicular Networks: Future Research Opportunities and Challenges (2018) (24)
- Ancillary Impacts of Multipath TCP on Current and Future Network Security (2015) (24)
- Efficient Task Scheduling With Stochastic Delay Cost in Mobile Edge Computing (2019) (24)
- Health Fog for Smart Healthcare (2020) (24)
- Cloud-Assisted Context-Aware Vehicular Cyber-Physical System for PHEVs in Smart Grid (2017) (23)
- Anonymous and Efficient Message Authentication Scheme for Smart Grid (2019) (23)
- Enabling gigabit network access to end users (2004) (23)
- Privacy and Civilian Drone Use: The Need for Further Regulation (2018) (23)
- BitFund: A blockchain-based crowd funding platform for future smart and connected nation (2020) (23)
- A review and an empirical analysis of privacy policy and notices for consumer Internet of things (2018) (23)
- A Cloud-Integrated, Multilayered, Agent-Based Cyber-Physical System Architecture (2017) (23)
- Voice over IP in intranet and Internet environments (2004) (23)
- Survey on Artificial Intelligence (AI) techniques for Vehicular Ad-hoc Networks (VANETs) (2021) (23)
- Data Quality Challenges in Cyber-Physical Systems (2015) (23)
- Secure and lightweight communication in heterogeneous IoT environments (2019) (22)
- A novel architecture for roaming between 3G and wireless LANs (2005) (22)
- Detecting and Preventing Online Identity Deception in Social Networking Services (2015) (22)
- Next-Generation Wireless Technologies (2013) (22)
- SecBCS: a secure and privacy-preserving blockchain-based crowdsourcing system (2020) (22)
- Efficient Mining Cluster Selection for Blockchain-Based Cellular V2X Communications (2020) (21)
- Multiple Attributes Decision Fusion for Wireless Sensor Networks Based on Intuitionistic Fuzzy Set (2017) (21)
- SCTP multihoming support for handoffs across heterogeneous networks (2006) (21)
- AI-Empowered Content Caching in Vehicular Edge Computing: Opportunities and Challenges (2021) (21)
- An Intelligent Terminal Based Privacy-Preserving Multi-Modal Implicit Authentication Protocol for Internet of Connected Vehicles (2021) (21)
- Achieving Quality of Service (QoS) Using Resource Allocation and Adaptive Scheduling in Cloud Computing with Grid Support (2014) (21)
- A Novel Pause Count Backoff Algorithm for Channel Access in IEEE 802.11 Based Wireless LANs (2008) (21)
- Approaches for Preventing Honeypot Detection and Compromise (2018) (20)
- Media Networks: Architectures, Applications, and Standards (2012) (20)
- Service level agreements (SLAs) parameter negotiation between heterogeneous 4G wireless network operators (2011) (20)
- An Analysis of Process and Memory Models to Support High-Speed Networking in a UNIX Environment (1996) (20)
- Distributed mobility management in named data networking (2016) (19)
- Emerging Wireless Technologies for Internet of Things Applications: Opportunities and Challenges (2019) (19)
- A secure multipath reactive protocol for routing in IoT and HANETs (2020) (19)
- Trust-based security adaptation mechanism for Vehicular Sensor Networks (2018) (19)
- Energy-efficient Workload Allocation and Computation Resource Configuration in Distributed Cloud/Edge Computing Systems With Stochastic Workloads (2020) (19)
- Privacy Policy Analysis of Popular Web Platforms (2016) (19)
- Survey on Congestion Detection and Control in Connected Vehicles (2020) (19)
- Enabling Wireless Technologies for Green Pervasive Computing (2009) (19)
- Privacy-preserving Data Aggregation against Malicious Data Mining Attack for IoT-enabled Smart Grid (2021) (19)
- Mobile Payment Systems (2017) (19)
- Optimal solution for data collision avoidance in radio frequency identification networks (2018) (19)
- Security and Privacy in Ubiquitous Sensor Networks (2018) (18)
- A Public-Private Partnership Model for National Cybersecurity (2011) (18)
- SIP and mobile IP integration to support seamless mobility (2004) (18)
- A blockchain-based certificate revocation management and status verification system (2021) (18)
- Curbing Address Reuse in the IOTA Distributed Ledger: A Cuckoo-Filter-Based Approach (2020) (18)
- Task offloading in edge computing for machine learning-based smart healthcare (2021) (18)
- Fast Handover over Micro-MPLS-Based Wireless Networks (2006) (18)
- Recent Advances in Wireless Communications and Networking (2011) (18)
- Design and performance analysis of an inductive QoS routing algorithm (2009) (17)
- Recent Advances in Wearable Sensing Technologies (2021) (17)
- Blockchain-Based Cyber-Physical Security for Electrical Vehicle Aided Smart Grid Ecosystem (2021) (17)
- Intelligent and Secure Clustering in Wireless Sensor Network (WSN)-Based Intelligent Transportation Systems (2022) (17)
- Cyberwar: The What, When, Why, and How [Commentary] (2014) (16)
- Internet access to heterogeneous home area network devices with an OSGi-based residential gateway (2007) (16)
- Compact Hardware Implementation of a SHA-3 Core for Wireless Body Sensor Networks (2018) (16)
- Energy Efficiency in Cellular Networks (2013) (16)
- Mobile Crowd-sensing Applications: Data Redundancies, Challenges, and Solutions (2021) (16)
- A Traffic-Aware Approach for Enabling Unmanned Aerial Vehicles (UAVs) in Smart City Scenarios (2019) (16)
- Mobile Multimedia Applications: Delivery Technologies (2012) (16)
- Performance Evaluation of Energy-Autonomous Sensors Using Power-Harvesting Beacons for Environmental Monitoring in Internet of Things (IoT) (2018) (16)
- Design, implementation, and performance analysis of a secure payment protocol in a payment gateway centric model (2014) (15)
- ElectroBlocks: A blockchain‐based energy trading scheme for smart grid systems (2020) (15)
- Lightweight and provable secure cross-domain access control scheme for internet of things (IoT) based wireless body area networks (WBAN) (2021) (15)
- Next Generation Networks (NGNs) (2010) (15)
- Evaluating IPv 4 to IPv 6 Transition Mechanisms (2002) (15)
- Analyzing the security of Windows 7 and Linux for cloud computing (2013) (15)
- Cybersecurity and US Legislative Efforts to address Cybercrime (2013) (14)
- A dynamic network discovery and selection method for heterogeneous wireless networks (2009) (14)
- Automated Biometric Authentication with Cloud Computing (2018) (14)
- A Survey on Long-Range Wide-Area Network Technology Optimizations (2021) (14)
- US Policy on Active Cyber Defense (2014) (13)
- Future Multimedia Networking, Second International Workshop, FMN 2009, Coimbra, Portugal, June 22-23, 2009. Proceedings (2009) (13)
- Impact of denial of service solutions on network quality of service (2011) (13)
- RepGuide: Reputation-Based Route Guidance Using Internet of Vehicles (2018) (13)
- GSTR: Secure Multi-hop Message Dissemination in Connected Vehicles using Social Trust Model (2019) (13)
- Deep learning support for intelligent transportation systems (2020) (13)
- Experimental Evaluation and Characterization of Long-Distance 802.11g Links (2008) (13)
- Investigating Security for Ubiquitous Sensor Networks (2017) (13)
- Attribution in cyberspace: techniques and legal implications (2016) (13)
- Dynamic pricing for load‐balancing in user‐centric joint call admission control of next‐generation wireless networks (2010) (13)
- Cyber-security risk assessment framework for critical infrastructures (2018) (13)
- Key management solutions in the smart grid environment (2013) (13)
- Data Security in the Smart Grid Environment (2019) (12)
- Privacy in a Digital, Networked World: Technologies, Implications and Solutions (2015) (12)
- Privacy-preserving auditing scheme for shared data in public clouds (2018) (12)
- FacePET: Enhancing Bystanders’ Facial Privacy with Smart Wearables/Internet of Things (2018) (12)
- QoS path selection exploiting minimum link delays in MPLS-based networks (2005) (12)
- On Linux starvation of CPU-bound processes in the presence of network I/O (2011) (12)
- A Survey on Hardware-based Security Mechanisms for Internet of Things (2019) (12)
- Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA'99) (1999) (12)
- Zero Configuration Networking: Implementation, performance, and security (2012) (12)
- Internet of Things. IoT Infrastructures (2014) (12)
- Dual-Server Public-Key Authenticated Encryption with Keyword Search (2019) (12)
- A ReRAM Physically Unclonable Function (ReRAM PUF)-Based Approach to Enhance Authentication Security in Software Defined Wireless Networks (2017) (11)
- Cybercrime at a Scale: A Practical Study of Deployments of HTTP-Based Botnet Command and Control Panels (2017) (11)
- An analysis of tools for online anonymity (2015) (11)
- GaRuDa: A Blockchain-Based Delivery Scheme Using Drones for Healthcare 5.0 Applications (2021) (11)
- Secure and privacy-preserving crowdsensing using smart contracts: Issues and solutions (2022) (11)
- Crowd social media computing: Applying crowd computing techniques to social media (2017) (11)
- Flexible architecture for cluster evolution in cloud computing (2015) (11)
- Is DNS Ready for Ubiquitous Internet of Things? (2019) (11)
- On-Demand Sensing and Wireless Power Transfer for Self-Sustainable Industrial Internet of Things Networks (2021) (10)
- Comparison of end-system IPv6 protocol stacks : Internet protocols, technology and applications (VoIP) (2004) (10)
- Editorial: Cloud computing service and architecture models (2014) (10)
- Landscape: a high performance distributed positioning scheme for outdoor sensor networks (2005) (10)
- An Improved Privacy Solution for the Smart Grid (2016) (10)
- A Novel Distributed Authentication Framework for Single Sign-On Services (2008) (10)
- Adaptive priority-aware LoRaWAN resource allocation for Internet of Things applications (2021) (10)
- PEAR: A Privacy-Enabled Architecture for Crowdsensing (2017) (10)
- Bystanders' Privacy (2017) (10)
- Distributed All-IP Mobility Management Architecture Supported by the NDN Overlay (2017) (10)
- Privacy in a Digital, Networked World (2015) (10)
- Medical Sensors and Their Integration in Wireless Body Area Networks for Pervasive Healthcare Delivery: A Review (2022) (10)
- Protocol support for audio streaming between Bluetooth devices (2004) (10)
- A Cross-Layer Design for H.264 Video Stream Over Wireless Local Area Networks (2008) (9)
- Efficient and Provably Secure Distributed Signing Protocol for Mobile Devices in Wireless Networks (2018) (9)
- A Concurrent Multi-path Transmission Control Scheme to reduce packet reordering latency at the receiver (2008) (9)
- Autonomous Cars: Social and Economic Implications (2018) (9)
- Survey on smart homes: Vulnerabilities, risks, and countermeasures (2022) (9)
- Design and evaluation of a novel hierarchical trust assessment approach for vehicular networks (2020) (9)
- Assessing and Improving Authentication Confidence Management (2010) (9)
- Healthcare Insurance Frauds: Taxonomy and Blockchain-Based Detection Framework (Block-HI) (2021) (9)
- Improving Trust and Privacy Models in Social Networks (2012) (9)
- Multi-agent architecture for reliable Cyber-Physical Systems (CPS) (2017) (9)
- Interventions in Cyberspace: Status and Trends (2016) (9)
- Zero Trust: The What, How, Why, and When (2021) (9)
- Securing Cyberspace in the 21st Century (2013) (9)
- Design, implementation, and evaluation of a Programmable Bandwidth Aggregation System for home networks (2009) (9)
- A secure enhanced privacy-preserving key agreement protocol for wireless mobile networks (2018) (8)
- Special issue on recent developments in Cognitive Radio Sensor Networks (2015) (8)
- An efficient wireless network discovery scheme for heterogeneous access environments (2008) (8)
- Framework for determining the suitability of blockchain: Criteria and issues to consider (2021) (8)
- Wearable Computing for Health Care (2016) (8)
- Defending against Distributed Denial of Service (DDoS) Attacks with Queue Traffic Differentiation over Micro-MPLS-based Wireless Networks (2006) (8)
- Design, implementation, and evaluation of the audio/video distribution transport protocol (AVDTP) for high quality audio support over Bluetooth (2005) (7)
- Security in vehicular ad hoc networks (2013) (7)
- Securing Cyberspace of Future Smart Cities with 5G Technologies (2020) (7)
- Network application programming interfaces (APIs) performance on commodity operating systems (2004) (7)
- Internet of underwater things communication: Architecture, technologies, research challenges and future opportunities (2022) (7)
- Enabling End-to-End QoS over Hybrid Wired-Wireless Networks (2006) (7)
- FASPM: Fuzzy logic‐based adaptive security protocol for multihop data dissemination in intelligent transport systems (2017) (7)
- An Analysis of Energy Consumption and Carbon Footprints of Cryptocurrencies and Possible Solutions (2022) (7)
- Blockchain-Based Data Dissemination Scheme for 5G-Enabled Softwarized UAV Networks (2021) (7)
- Attribute-based authorization for structured Peer-to-Peer (P2P) networks (2015) (7)
- Modeling Influence with Semantics in Social Networks (2018) (7)
- An empirical investigation of botnet as a service for cyberattacks (2018) (7)
- Dynamic pricing for load-balancing in user-centric joint call admission control of next-generation wireless networks (2010) (7)
- A Communication Architecture for Crowd Management in Emergency and Disruptive Scenarios (2019) (7)
- Self-Adaptation Techniques in Cyber-Physical Systems (CPSs) (2019) (7)
- Design Architectures for 3G and IEEE 802.11 WLAN Integration (2005) (7)
- A User Study of a Wearable System to Enhance Bystanders’ Facial Privacy (2020) (7)
- Provably secure identity-based two-party authenticated key agreement protocol based on CBi-ISIS and Bi-ISIS problems on lattices (2020) (6)
- Reliability, failure detection and prevention in cyber‐physical systems (CPSs) with agents (2019) (6)
- Isogeny-Based Cryptography: A Promising Post-Quantum Technique (2019) (6)
- Temperature-aware routing protocol for Intrabody Nanonetworks (2021) (6)
- Mobility protocols for ITS/VANET (2008) (6)
- Biometric Authentication for Wearables (2018) (6)
- QoS Support over IEEE 802.11e in Multirate Networks (2009) (6)
- ABAMA: An Agent-based Architecture for Mapping Natural Ecosystems onto Wireless Sensor Networks (2014) (6)
- Integrated Blockchain and Cloud Computing Systems: A Systematic Survey, Solutions, and Challenges (2021) (6)
- A programmable network address translator: Design, implementation, and performance (2010) (6)
- Cyber Physical Systems Using Sensor Technologies (2012) (6)
- Improving Bluetooth performance in 802.11 interference environments (2004) (6)
- Using Wireless Sensor Networks to Narrow the Gap Between Low-Level Information and Context-Awareness (2004) (6)
- Impact of neighbor awareness at the MAC layer in a Vehicular Ad-Hoc Network (VANET) (2013) (6)
- Priority-based congestion control in MPLS-based networks (2005) (6)
- Exploiting Trust: Stealthy Attacks Through Socioware and Insider Threats (2017) (6)
- Ubiquitous Wireless Connectivity across Cellular and Wireless Local Area Networks (2008) (6)
- Artificial Intelligence Best Practices in Smart Agriculture (2022) (6)
- Introduction to the special issue on "Wireless systems: New technologies, resource optimization and security" (2014) (6)
- A Hierarchical Spectrum Access Scheme for TV White Space Coexistence in Heterogeneous Networks (2018) (5)
- Autonomous Cars: Challenges and Opportunities (2019) (5)
- Energy Efficiency in Wireless Networks: Jumira/Energy Efficiency in Wireless Networks (2012) (5)
- Evaluation of an Adaptive Resource Allocation for LoRaWAN (2021) (5)
- Guest editorial: Advances in RFID technology (2010) (5)
- Optimizing Channel Access in Wireless Local Area Network Environments with a New Backoff Approach (2009) (5)
- Energy Harvesting in Wireless Sensor Networks (2013) (5)
- A Cloud-Integrated Appliance Recognition Approach over Internet of Things (2015) (5)
- Implementation and performance of a low-cost video conferencing system over ATM (1998) (5)
- Edge Computing-Enabled Internet of Vehicles: Towards Federated Learning Empowered Scheduling (2022) (5)
- Vehicle-Life Interaction in Fog-Enabled Smart Connected and Autonomous Vehicles (2021) (5)
- Multi-utility framework: blockchain exchange platform for sustainable development (2020) (5)
- Mobility management techniques for heterogeneous wireless networks (2007) (5)
- Recent Trends in Internet-of-Things-Enabled Sensor Technologies for Smart Agriculture (2022) (5)
- Vulnerabilities to Online Social Network Identity Deception Detection Research and Recommendations for Mitigation (2020) (5)
- Performance modeling of MPEG-4 video streaming over IEEE 802.11 using distribution coordination function (2011) (5)
- An IoT-Based Prediction Technique for Efficient Energy Consumption in Buildings (2021) (4)
- Edge-centric trust management in vehicular networks (2021) (4)
- A closed-loop control architecture of UAV and WSN for traffic surveillance on highways (2022) (4)
- A framework for efficient resource management in IEEE 802.11 WLANs (2004) (4)
- A brief overview of intelligent mobility management for future wireless mobile networks (2017) (4)
- Secure Transmission in Cellular V2X Communications Using Deep Q-Learning (2022) (4)
- Broadband Wireless Technologies (2013) (4)
- A Survey of Media Access Control ( MAC ) Protocols for Vehicular Ad-hoc NETworks ( VANETs ) (2012) (4)
- Blockchain-Based Solution for Detecting and Preventing Fake Check Scams (2021) (4)
- A survey of network performance tools for computer networking classes (2003) (4)
- Blockchain-based public ecosystem for auditing security of software applications (2021) (4)
- Is it Really Easy to Detect Sybil Attacks in C-ITS Environments: A Position Paper (2022) (4)
- An efficient and forward-secure lattice-based searchable encryption scheme for the Big-data era (2021) (4)
- Lightweight Access Control System for Wearable Devices (2019) (4)
- Proactive Defense for Fog-to-Things Critical Infrastructure (2022) (4)
- Intelligent and Secure Radio Environments for 6G Vehicular Aided HetNets: Key Opportunities and Challenges (2022) (4)
- A Chain-Based Relocation Approach to Maintain Connectivity with a Center of Interest (2012) (4)
- Special Issue on 5G Wireless Networks for IoT and Body Sensors (2017) (4)
- A Bio-Inspired Quality of Service (QoS) Routing Algorithm (2011) (4)
- A comprehensive review on collision-resistant hash functions on lattices (2021) (4)
- Approaches for Fake Content Detection: Strengths and Weaknesses to Adversarial Attacks (2020) (4)
- Architectures and Models for Mobile Payment Systems (2017) (4)
- Mobility Protocols for Handoff Management in Heterogeneous Networks (2006) (3)
- A realistic relay selection scheme for cooperative MIMO networks (2021) (3)
- Enabling "Quality of Service" in IEEE802.16 networks for distributed mesh topologies (2010) (3)
- A state-dependent time evolving multi-constraint routing algorithm (2013) (3)
- Analysis of Students' Learning Emotions Using EEG (2019) (3)
- TCP-UDP/IP performance over ATM on Windows NT (1997) (3)
- Introduction to the Special Section on Network Science for Internet of Things (IoT) (2020) (3)
- Multi-Utility Market: Framework for a Blockchain Exchange Platform for Sustainable Development (2020) (3)
- End-to-End Security Across Wired-Wireless Networks for Mobile Users (2007) (3)
- An efficient multi-hop FEC scheme for wireless mesh networks (2008) (3)
- Experiences with multimedia applications over native ATM (1998) (3)
- SPECIAL ISSUE PAPER Energy-efficient beaconless geographic routing in energy harvested wireless sensor networks (2012) (3)
- Security Attacks and Solutions for Digital Twins (2022) (3)
- Privacy in Social Networks (2015) (3)
- Design and implementation of a wireless prescription system (2004) (3)
- An agent-based architecture for fast context transfers during handoffs (2008) (3)
- Energy Efficient Routing in Wireless Sensor Networks (2013) (3)
- A novel centralised clustering algorithm for energy efficient wireless sensor networks (2008) (3)
- Structural analysis and classification of search interfaces for the deep web (2018) (3)
- Design and Implementation of a QoS-aware Networking Application Programming Interface (1999) (3)
- The Challenge of Improving Credibility of User-Generated Content in Online Social Networks (2016) (3)
- An assessment of U.S. legislation on cybersecurity (2012) (3)
- Design and evaluation of a privacy architecture for crowdsensing applications (2018) (3)
- Guest editorial special issue on “Future multimedia networking” (2011) (2)
- Introduction to the topical issue on semantic social networks and media applications (2017) (2)
- An enhanced uplink scheduling scheme for IEEE 802.16 metropolitan area networks (2008) (2)
- RETRACTED: Communication issues in the Internet of Things (IoT) (2012) (2)
- A novel sensor node relocation approach to maintain connectivity with a center of interest (2012) (2)
- Proceedings of the 3rd International Workshop on RFID Technology - Concepts, Applications, Challenges IWRT 2009 (2009) (2)
- Security in Mobile Payment Systems (2017) (2)
- Enabling user prioritization of multimedia applications (2003) (2)
- A Proposed Authentication Protocol for Mobile Users of WiMAX Networks (2010) (2)
- A framework for efficient resource management in IEEE 802.11 WLANs: Research Articles (2004) (2)
- The CHARISMA ATM Horst Interface (1994) (2)
- Machine learning and data analytics for the IoT (2020) (2)
- Adaptive queue management on micro-MPLS-based wireless networks for multimedia traffic (2006) (2)
- Proceedings of 2012 5th International Conference on New Technologies, Mobility and Security (NTMS) (2012) (2)
- Editorial for special issue of Telecommunication Systems on “Mobility management and wireless access” (2009) (2)
- Energy Efficiency in Wireless Ad Hoc Networks (2013) (2)
- Blockchain-based Data Sharing System for Sensing-as-A-Service in Smart Cities (2020) (2)
- Blockchain based optimized data storage with secure communication for Internet of Vehicles considering active, passive, and double spending attacks (2022) (2)
- J2EE support for wireless services (2005) (2)
- On the Adequacy of 5G Security for Vehicular Ad Hoc Networks (2021) (2)
- A dynamic QoE routing system for user‐centric applications (2013) (2)
- Neural network-based blockchain decision scheme (2021) (2)
- An evaluation of the real-time performances of SVR4.0 and SVR4.2 (1997) (1)
- Outsourcing IOTA proof‐of‐work to volunteer public devices (2019) (1)
- Metaverse for 6G and Beyond: The Next Revolution and Deployment Challenges (2023) (1)
- Future Challenges and Opportunities (2017) (1)
- Power and Performance Efficient SDN-Enabled Fog Architecture (2021) (1)
- SPECIAL SECTION ON ARTIFICIAL INTELLIGENCE IN CYBERSECURITY (2020) (1)
- Joint Service Quality Control and Resource Allocation for Service Reliability Maximization in Edge Computing (2023) (1)
- On the coexistence of Bluetooth and IEEE 802.11 technologies in real networking environments (2003) (1)
- Detection and Prevention of Online Identity Deception in Social Networking Services ( SNSs ) (2015) (1)
- Green networks (2011) (1)
- A Performance Comparison of Media Access Control Protocols for Vehicular Ad-hoc Networks ( VANETs ) (2012) (1)
- Detecting DDoS attacks using adversarial neural network (2023) (1)
- Security threats, countermeasures, and challenges of digital supply chains (2023) (1)
- Seamless Bluetooth Connectivity to IPv6 Networks (2004) (1)
- Future Multimedia Networking, Third International Workshop, FMN 2010, Krakow, Poland, June 17-18, 2010. Proceedings (2010) (1)
- Special Issue on Cybersecurity, Cybercrime, Cyberwar (2014) (1)
- Quality of Service Support for MPLS‐based Wired‐Wireless Domains (2010) (1)
- ISBORD: Internet Searching based on Resource Description (2017) (1)
- Deep Learning Enhanced UAV Imagery for Critical Infrastructure Protection (2022) (1)
- Design and implementation of a user-level prioritization service (2003) (1)
- Implementation and Performance of QoS-aware Java Applications over ATM Networks (2000) (1)
- Mitigating starvation of Linux CPU-bound processes in the presence of network I/O (2012) (1)
- A Novel High Performance Distributed Sensor Positioning System (1)
- A review of IoT systems to enable independence for the elderly and disabled individuals (2023) (1)
- Design and implementation of a Jini-J2EE bridge to enable access to enterprise services (2004) (1)
- Impact of ATM switch architectures on CBR video performance (2000) (1)
- Internet of Things. IoT Infrastructures (2015) (1)
- Security Protocols for Wireless Local Area Networks (WLANs) and Cellular Networks (2007) (1)
- Foreword: Routing and QoS over heterogeneous networks (2008) (1)
- Throughput optimization for multimedia applications over high speed networks (1997) (1)
- End-to-end support over Heterogeneous Wired-Wireless Networks (2008) (1)
- Towards native ATM services: Where are we? (1999) (1)
- Handling big data: research challenges and future directions (2016) (1)
- Privacy-preserving auditing scheme for shared data in public clouds (2018) (1)
- Performance evaluation of a Java-based networking Application Programming Interface (API) (2000) (1)
- Detecting Online Content Deception (2020) (1)
- Best-effort delivery of live video across a local area ATM network (1998) (1)
- A secure two-factor authentication scheme for single sign-on services (2009) (1)
- Viral content propagation in Online Social Networks (2017) (1)
- RFID Meets the Internet (2009) (1)
- Proceedings of the 20th ACM International Symposium on Mobility Management and Wireless Access (2006) (1)
- Mobile Device Security (2017) (1)
- End‐to‐End QoE/QoS Engineering in Next Generation Heterogeneous Networks (2008) (1)
- A UNIX-based ATM multimedia architecture (1997) (0)
- A Fine-Grained Video Traffic Control Mechanism in Software-Defined Networks (2022) (0)
- Green networks (2011) (0)
- A Directional Geocast Warning Dissemination Protocol for Vehicular Ad Hoc NETworks (VANETs) (2014) (0)
- Session details: Mobility and Handover Management (2008) (0)
- Ensemble Learning Method for Human Identification in Wearable Devices (2022) (0)
- Audio Streaming to IP-Enabled Bluetooth Devices (2009) (0)
- Energy-efficient networking: past, present, and future (2011) (0)
- Performance of Mobility Protocols (2008) (0)
- CloudNA 2015 (2015) (0)
- Guest editorial special issue on quality of experience for multimedia applications (2012) (0)
- A lightweight secure mobile Payment protocol for vehicular ad-hoc networks (VANETs) (2011) (0)
- Internetworking of Heterogeneous Wireless Networks (2011) (0)
- On Energy Equilibrium in Wireless Sensor Networks (2010) (0)
- Guest Editorial Special Issue on Artificial Intelligence-Based Sensors for Next Generation IoT Applications (2021) (0)
- Design, implementation, and performance analysis of a secure payment protocol in a payment gateway centric model (2013) (0)
- Efficient and Secure Three-Factor User Authentication and Key Agreement Using Chaotic Maps (2019) (0)
- Special Issue: Foundations and Practice of Security in Emerging ICT Applications (2017) (0)
- Voice over IP in Intranet and Internet environments : Internet protocols, technology and applications (VoIP) (2004) (0)
- User-Centricity and Immersive Technologies (2012) (0)
- Correction to: Efficient and Secure Three-Factor User Authentication and Key Agreement Using Chaotic Maps (2019) (0)
- IEEE Access Special Section Editorial: Data Mining for Internet of Things (2021) (0)
- Media Content Delivery and Quality of Experience (2012) (0)
- Editorial [special issue introduction] (2014) (0)
- Securingin the 21st Century (2013) (0)
- SecBCS: a secure and privacy-preserving blockchain-based crowdsourcing system (2020) (0)
- Self-powered Sensors: Applications, Challenges, and Solutions (2023) (0)
- Proceedings of the Fifth ACM International Workshop on Mobility Management & Wireless Access, MOBIWAC 2007, Chania, Crete Island, Greece, October 22, 2007 (2007) (0)
- A Novel Secure Handoff Approach for Wireless LANs (2003) (0)
- A ReRAM Physically Unclonable Function (ReRAM PUF)-Based Approach to Enhance Authentication Security in Software Defined Wireless Networks (2018) (0)
- Personal Area Networking with Bluetooth (2005) (0)
- Sanctus: An Architecture for Trusted Products (2019) (0)
- Fog Computing: Data Analytics for Time-Sensitive Applications (2020) (0)
- Distributed Computing Over High-Speed Local Area Networks (1998) (0)
- A secure enhanced privacy-preserving key agreement protocol for wireless mobile networks (2018) (0)
- Vehicular ad hoc networks (VANETS): status, results, and challenges (2010) (0)
- Performance Optimization through Multi-Agent Sensing Framework based on Interference for Cognitive Radio (2019) (0)
- Recent advances of wireless communication technologies for ubiquitous computing (2008) (0)
- Energy-efficient routing protocols in ad hoc networks (2013) (0)
- Evaluation of an Adaptive Resource Allocation for LoRaWAN (2021) (0)
- Towards Privacy Protection in Smart Grid (2012) (0)
- Proceedings of the Sixth ACM International Workshop on Mobility Management & Wireless Access, MOBIWAC 2008, Vancouver, British Columbia, Canada, October 30-31, 2008 (2008) (0)
- Voice Over Internet Protocol (2011) (0)
- SH 2010: Welcome message from workshop organizers: FutureTech 2010 (2010) (0)
- Mobile Agent Systems (2012) (0)
- Contributors (2019) (0)
- Proceedings of the Third international conference on Future Multimedia Networking (2010) (0)
- DeepMA: End-to-end Deep Multiple Access for Wireless Image Transmission in Semantic Communication (2023) (0)
- RFID Technology - Concepts, Applications, Challenges, Proceedings of the 1st International Workshop on RFID Technology - Concepts, Applications, Challenges, IWRT 2007, In conjunction with ICEIS 2007, Funchal, Madeira, Portugal, June 2007 (2007) (0)
- Interaction Modelling using Trust and Recommendation in Cloud Computing Environment (2016) (0)
- Editorial (2014) (0)
- Internet of Things. IoT Infrastructures: Second International Summit, IoT 360 2015, Rome, Italy, October 27-29, 2015, Revised Selected Papers, Part II (2016) (0)
- Multichannel Audio Over Internet2 Using ATM (1999) (0)
- Design, implementation, and evaluation of TAILOR (Intelligent Handoff Decision Model for Heterogeneous Networks) (2008) (0)
- Improving End System Performance for Multimedia Applications over High Bandwidth Networks (1997) (0)
- Internet of Things. IoT Infrastructures: Second International Summit, IoT 360° 2015, Rome, Italy, October 27–29, 2015, Revised Selected Papers, Part I (2016) (0)
- A performance comparison of communication APIs on Solaris and Windows operating systems (2003) (0)
- Privacy in Biometric Systems (2015) (0)
- A real-time video quality estimator for emerging wireless multimedia systems (2014) (0)
- QoS Support in Wireless LANs Using Dynamic Adaptation of Channel Access Parameters (2003) (0)
- Introduction to the topical issue on semantic social networks and media applications (2017) (0)
- Guest Editors' Introduction to the Special Issue on "Modern trends in applied security: Architectures, implementations and applications" (2011) (0)
- Distributed Energy Aware Routing Protocol for Wireless Sensor Network (2018) (0)
- Throughout optimization for multimedia applications over high speed networks (1997) (0)
- Foreword - Special issue on vehicular communications, networks and applications (2012) (0)
- 4-16-2018 Sensor Technologies for Intelligent Transportation Systems (2018) (0)
- SGNI 2010 Organizing and Program Committee (2010) (0)
- Space-Aerial-Ground-Sea Integrated Networks: Resource Optimization Security in 6G Networks (2022) (0)
- RFID Technology - Concepts, Applications, Challenges, Proceedings of the 2nd International Workshop on RFID Technology - Concepts, Applications, Challenges, IWRT 2008, In conjunction with ICEIS 2008, Barcelona, Spain, June 2008 (2008) (0)
- GUEST EDITORIAL: Internet of Medical Things in the Context of COVID-19 (2021) (0)
- Internet of Things: IoT Infrastructures: Second international summit, IoT 360° (2016) (0)
- RFID Technology-Concepts, Applications, Challenges, Proceedings of the 3rd International Workshop, IWRT 2009, In conjunction with ICEIS 2009, Milan, Italy, May 2009 (2009) (0)
- Workshop and Program Chairs (2009) (0)
- Message from general co-chairs and technical program co-chairs (2012) (0)
- A secure cross-layer architecture for reactive routing in vehicle to vehicle (V2V) communications (2022) (0)
- Time Update Key secure channel public channel Verifier Signature Identity : Message : Time Period : Signing key : Identity : Message : Time Period : MTK (2017) (0)
- An efficient and secure searchable public key encryption scheme with privacy protection for cloud storage (2018) (0)
- Toward Performance and Energy-Efficient Edge-of-Things (2023) (0)
- Underwater and Submerged Wireless Sensor Systems: Security Issues and Solutions (2017) (0)
- End-to-end Quality of Service (QoS) negotiation between heterogeneous 4G wireless network operators (2010) (0)
- STAR-Scheduler: A Batch Job Scheduler for Distributed I/O Intensive Applications (2004) (0)
- Performance comparison of IP implementations on ATM networks (1997) (0)
- Guest editorial special issue on quality of experience for multimedia applications (2012) (0)
- Non-Fungible Tokens: A Review (2023) (0)
- Call for Papers: on ‘Next Generation Networks (NGNs)’ (2009) (0)
- Pear (2022) (0)
- Application-to-application priority with STREAMS (2001) (0)
- Delivery of high quality uncompressed video over ATM to windows NT desktop (1997) (0)
- Performance analysis of a cross-layered incremental redundancy hybrid automatic repeat request (CL IR-HARQ) mechanism (2014) (0)
- An ATM multimedia architecture: Design, implementation, and performance (1997) (0)
- Routing in wireless sensor networks for cyber-physical systems (2016) (0)
- Energy Efficiency in Wireless Local Area Networks (2013) (0)
- Remote monitoring system using Light Fidelity and InfraRed technologies (2022) (0)
- Quality of service methods over large-scale networks with mpls (2006) (0)
- Mobile sensors in wireless sensor network cyber-physical systems (2016) (0)
- Quality of Service (QoS) in WiMAX (2012) (0)
- List of Acronyms (2013) (0)
- Introduction to the special section on Smart Green Applications: QoS and Security-aware solutions in collaborative wireless networks (VSI-cwn) (2022) (0)
- Artificial Intelligence for Cybersecurity: Offensive Tactics, Mitigation Techniques and Future Directions (2022) (0)
- Proceedings of the 2nd International Workshop on Future Multimedia Networking (2009) (0)
- Priority-aware traffic routing and resource allocation mechanism for space-division multiplexing elastic optical networks (2022) (0)
- A Cybersecurity Architecture to Mitigate Shamoon Attacks (2022) (0)
- A survey on Green communications using Adaptive Link Rate (2012) (0)
- Message from the Workshop Co-Organizers (2009) (0)
- Cloud-Native Application Security: Risks, Opportunities, and Challenges in Securing the Evolving Attack Surface (2021) (0)
- Communication Technologies, Information Security and Sustainable Development: Third International Multi-topic Conference, IMTIC 2013, Jamshoro, Pakistan (2014) (0)
- Space-aerial-ground-sea integrated networks: Resource optimization and challenges in 6G (2023) (0)
- A brief overview of intelligent mobility management for future wireless mobile networks (2017) (0)
- 17. Home Networking (2011) (0)
- Analysis of Vulnerabilities of Internet of Things (IoT) Devices Online (2018) (0)
- Information security (2019) (0)
This paper list is powered by the following services:
What Schools Are Affiliated With Sherali Zeadally?
Sherali Zeadally is affiliated with the following schools: