PUBLICATION
2025
Binary classification of Low-Rate DoS attacks using Long Short-Term Memory Feed-Forward (LSTM-FF) Intrusion Detection System (IDS)
2024
Reliability-aware swarm based multi-objective optimization for controller placement in distributed SDN architecture
2023
Authentication-Chains: Blockchain-Inspired Lightweight Authentication Protocol for IoT Networks
2022
Optimal Resource Allocation for NOMA Wireless Networks
2022
A Multi-Objective Routing Mechanism for Energy Management Optimization in SDN Multi-Control Architecture
2022
Hierarchical blockchain structure for node authentication in IoT networks
2021
Heuristic Resource Allocation Algorithm for Controller Placement in Multi-Control 5G based on SDN/NFV Architecture
2021
A Highly Efficient Algorithm for Phased-Array mmWave Massive MIMO Beamforming
2021
Scalable and secure SDN based ethernet architecture by suppressing broadcast traffic
2020
Pseudorandom Sequence Contention Algorithm for IEEE 802.11ah based Internet of Things Network
2020
Efficient Authentication and Re-authentication Protocols for 4G/5G Heterogeneous Networks
2020
NORMALIZED ADVANCEMENT BASED TOTALLY OPPORTUNISTIC ROUTING ALGORITHM WITH VOID DETECTION AND AVOIDING MECHANISM FOR UNDERWATER WIRELESS SENSOR NETWORK
2020
Hybrid Multi-level Detection and Mitigation of Clone Attacks in Mobile Wireless Sensor Network (MWSN)
2019
A 3D Pattern Recognition Localization System Based on Bayesian Graphical Model
2019
Resource allocation in heterogeneous cognitive radio sensor networks
2019
Probability-based opportunity dynamic adaptation (PODA) of contention window for home M2M networks
2019
Resource Allocation in Heterogeneous Cognitive Radio Sensor Networks
2019
An architecture of 5G based on SDN NV wireless network
2018
Impact of Packet Size in Adaptive Cognitive Radio Sensor Network
2018
Totally Opportunistic Routing Algorithm (TORA) for Underwater Wireless Sensor Network
2017
QoE-Driven Cross-Layer Downlink Scheduling for Heterogeneous Traffics Over 4G Networks
2017
Detecting sybil attacks in clustered wireless sensor networks based on energy trust system (ETS)
2017
On the authentication and re-authentication protocols in LTE-WLAN interworking architecture
2016
Efficient beamforming and spectral efficiency maximization in a jointtransmission system using an adaptive particle swarm optimization algorithm
2016
Pliable Cognitive MAC for Heterogeneous Adaptive Cognitive Radio Sensor Networks
2016
On the authentication and re-authentication protocols in LTE-WLAN interworking architecture
2016
AN ADAPTIVE LOCALIZATION SYSTEM USING PARTICLE SWARM OPTIMIZATION IN A CIRCULAR DISTRIBUTION FORM
2016
Authentication process enhancements in WiMAX networks
2014
Lightweight decentralized multicast-unicast key management method in wireless IPv6 networks
2014
Node Replication Attacks in Mobile Wireless Sensor Network: A Survey
2012
Highly Available Smart Grid Control Centers through Intrusion Tolerance
2012
On the negative selection and the danger theory inspired security for heterogeneous networks
2012
Lightweight Decentralized Key Management Method in Multicast IPv6 Networks
2011
A Generic Sampling Framework for Improving Anomaly Detection in the Next Generation Network
2011
On the Negative Selection and the Danger Theory Inspired Security for Heterogeneous Networks