Your selections:
A framework and mathematical modeling for the vehicular delay tolerant network routing
- Nasir, Mostofa, Noor, Rafidah, Iftikhar, Mohsin, Imran, Muhammad, Abdul Wahab, Ainuddin, Jabbarpour, Mohammad, Khokhar, R.
A multi-hop angular routing protocol for wireless sensor networks
- Akbar, Mariam, Javaid, Nadeem, Imran, Muhammad, Rao, Areeba, Younis, Muhammad, Niaz, Iftikhar
- Iftikhar, Mohsin, Mathkour, Hassan, Imran, Muhammad, Bedaiwi, Abdullah, Vasilakos, Athanasios
A secure and efficient IP multimedia subsystem authentication mechanism for LTE
- Ashraf, Humaira, Sher, Muhammad, Ghafoor, Ata, Imran, Muhammad
An adaptive and efficient buffer management scheme for resource-constrained delay tolerant networks
- Moetesum, Momina, Hadi, Fazle, Imran, Muhammad, Minhas, Abid, Vasilakos, Athanasios
Automatic gender detection based on characteristics of vocal folds for mobile healthcare system
- Alhussein, Musaed, Ali, Zulfiqar, Imran, Muhammad, Abdul, Wadood
Efficient data gathering in 3D linear underwater wireless sensor networks using sink mobility
- Akbar, Mariam, Javaid, Nadeem, Khan, Ayesha, Imran, Muhammad, Shoaib, Muhammad, Vasilakos, Athanasios
- Imran, Muhammad, Zafar, Nazir, Alnuem, Mohammed, Aksoy, Mehmet, Vasilakos, Athanasios
Green industrial networking : recent advances, taxonomy, and open research challenges
- Ahmed, Ejaz, Yaqoob, Ibrar, Ahmed, Ahmed, Gani, Abdullah, Imran, Muhammad, Guizani, Sghaier
- Ahmed, Ejaz, Yaqoob, Ibrar, Gani, Abdullah, Imran, Muhammad, Guizani, Mohsen
Mobile ad hoc cloud : a survey
- Yaqoob, Ibra, Ahmed, Ejaz, Gani, Abdullah, Mokhtar, Salimah, Imran, Muhammad, Guizani, Sghaier
Mobile crowd sensing for traffic prediction in internet of vehicles
- Wan, Jiafu, Liu, Jianqi, Shao, Zehui, Vasilakos, Athanasios, Imran, Muhammad, Zhou, Keliang
Modeling induction and routing to monitor hospitalized patients in multi-hop mobility-aware body area sensor networks
- Javaid, Nadeem, Ahmad, Ashfaq, Tauqir, Anum, Imran, Muhammad, Guizani, Mohsen, Khan, Zahoor, Qasim, Umar
Secure authentication for remote patient monitoring withwireless medical sensor networks
- Hayajneh, Taier, Mohd, Bassam, Imran, Muhammad, Almashaqbeh, Ghada, Vasilakos, Athanasios
Security in software-defined networking : threats and countermeasures
- Shu, Zhaogang, Wan, Jiafu, Li, Di, Lin, Jiaxiang, Vasilakos, Athanasios, Imran, Muhammad
Sink mobility aware energy-efficient network integrated super heterogeneous protocol for WSNs
- Akbar, Mariam, Javaid, Nadeem, Imran, Muhammad, Amjad, Naeem, Khan, Majid, Guizani, Mohsen
A quantitative risk assessment model involving frequency and threat degree under line-of-business services for infrastructure of emerging sensor networks
- Jing, Xu, Hu, Hanwen, Yang, Huijun, Au, Man, Li, Shuqin, Xiong, Naixue, Imran, Muhammad, Vasilakos, Athanasios
An automatic digital audio authentication/forensics system
- Ali, Zulfiqar, Imran, Muhammad, Alsulaiman, Mansour
Blind detection of copy-move forgery in digital audio forensics
- Imran, Muhammad, Ali, Zulfiqar, Bakhsh, Sheikh, Akram, Sheeraz
Bringing Computation Closer toward the User Network: Is Edge Computing the Solution?
- Ahmed, Ejaz, Ahmed, Arif, Yaqoob, Ibrar, Shuja, Junaid, Imran, Muhammad
Are you sure you would like to clear your session, including search history and login status?