Your selections:
Survey : self-empowered wireless sensor networks security taxonomy, challenges, and future research directions
- Adil, Muhammad, Menon, Varun, Balasubramanian, Venki, Alotaibi, Sattam, Song, Houbing, Jin, Zhanpeng, Farouk, Ahmed
- Chen, Jingling, Kumar, Apurv, Coventry, Joe, Lipiński, Wojciech
Software-defined networks for resource allocation in cloud computing : a survey
- Mohamed, Arwa, Hamdan, Mosab, Khan, Suleman, Abdelaziz, Abdelaziz, Babiker, Sharief, Imran, Muhammad, Marsono, M.
Wearable obstacle avoidance electronic travel aids for blind and visually impaired individuals : a systematic review
- Xu, Peijie, Kennedy, Gerard, Zhao, Fei-Yi, Zhang, Wen-Jing, Van Schyndel, Ron
Blending big data analytics : review on challenges and a recent study
- Amalina, Fairuz, Targio Hashem, Ibrahim, Azizul, Zati, Fong, Ang, Imran, Muhammad
Multistep predictions for adaptive sampling in mobile robotic sensor networks using proximal ADMM
- Le, Viet-Anh, Nguyen, Linh, Nghiem, Truong
- Zhou, Jian, Chen, Chao, Khandelwal, Manoj, Tao, Ming, Li, Chuanqi
- Li, Xiaomin, Wan, Jiafu, Dai, Hong-Ning, Imran, Muhammad, Xia, Min, Celesti, Antonio
Deep learning-based approach for detecting trajectory modifications of cassini-huygens spacecraft
- Aldabbas, Ashraf, Gal, Zoltan, Ghori, Khawaja, Imran, Muhammad, Shoaib, Muhammad
Energy efficiency perspectives of femtocells in internet of things : recent advances and challenges
- Al-Turjman, Fadi, Imran, Muhammad, Bakhsh, Sheikh
The rise of ransomware and emerging security challenges in the internet of things
- Yaqoob, Ibrar, Ahmed, Ejaz, Rehman, Muhammad, Ahmed, Abdelmuttlib, Imran, Muhammad
A robust local texture descriptor in the parametric space of the weibull distribution
- Tania, Sheikh, Karmakar, Gour, Teng, Shyh, Murshed, Manzur
- Chen, Jingling, Torres, Juan, Hosseini, Sahar, Kumar, Apurv, Coventry, Joe, Lipiński, Wojciech
DC fault identification in multiterminal HVDC systems based on reactor voltage gradient
- Hassan, Mehedi, Hossain, M., Shah, Rakibuzzaman
Estimating the mean cutting force of conical picks using random forest with salp swarm algorithm
- Zhou, Jian, Dai, Yong, Tao, Ming, Khandelwal, Manoj, Zhao, Mingsheng, Li, Qiyue
- Nasser, Nasser, Fadlullah, Zubair, Fouda, Mostafa, Ali, Asmaa, Imran, Muhammad
Performance analysis of priority-based IEEE 802.15.6 protocol in saturated traffic conditions
- Ullah, Sana, Tovar, Eduardo, Kim, Ki, Kim, Kyong, Imran, Muhammad
Treating class imbalance in non-technical loss detection : an exploratory analysis of a real dataset
- Ghori, Khawaja, Awais, Muhammad, Khattak, Akmal, Imran, Muhammad, Amin, Fazal, Szathmary, Laszlo
- Peng, Yuhuai, Jolfaei, Alireza, Yu, Keping
A blockchain-based solution for enhancing security and privacy in smart factory
- Wan, Jafu, Li, Jiapeng, Imran, Muhammad, Li, Di
Are you sure you would like to clear your session, including search history and login status?