The exchanged hypercube PKK Loh, WJ Hsu, Y Pan IEEE Transactions on Parallel and Distributed Systems 16 (9), 866-874, 2005 | 183 | 2005 |
How network topology affects dynamic loading balancing PKK Loh, WJ Hsu, C Wentong, N Sriskanthan IEEE Parallel & Distributed Technology: Systems & Applications 4 (3), 25-35, 1996 | 82 | 1996 |
Mechanisms of polymorphic and metamorphic viruses X Li, PKK Loh, F Tan 2011 European intelligence and security informatics conference, 149-154, 2011 | 68 | 2011 |
Performance evaluation of efficient and reliable routing protocols for fixed-power sensor networks PKK Loh, HW Jing, Y Pan IEEE transactions on wireless communications 8 (5), 2328-2335, 2009 | 60 | 2009 |
A novel neuro-cognitive approach to modeling traffic control and flow based on fuzzy neural techniques Y Chong, C Quek, P Loh Expert Systems with Applications 36 (3), 4788-4803, 2009 | 40 | 2009 |
An efficient and reliable routing protocol for wireless sensor networks PKK Loh, SH Long, Y Pan Sixth IEEE International Symposium on a World of Wireless Mobile and …, 2005 | 37 | 2005 |
Taxonomy on malware evasion countermeasures techniques CS Veerappan, PLK Keong, Z Tang, F Tan 2018 IEEE 4th World Forum on Internet of Things (WF-IoT), 558-563, 2018 | 29 | 2018 |
Fuzzy classification metrics for scanner assessment and vulnerability reporting PKK Loh, D Subramanian IEEE Transactions on Information Forensics and security 5 (4), 613-624, 2010 | 26 | 2010 |
Performance simulations of moving target search algorithms PKK Loh, EC Prakash International Journal of Computer Games Technology 2009, 745219, 2009 | 22 | 2009 |
Unified approach to vulnerability analysis of web applications HT Le, PKK Loh AIP Conference Proceedings 1060 (1), 155-159, 2008 | 19 | 2008 |
A cost-effective space sensing prototype for an intelligent refrigerator PKK Loh, DYH Let ICARCV 2004 8th Control, Automation, Robotics and Vision Conference, 2004. 2 …, 2004 | 17 | 2004 |
Medical informatics system with wireless sensor network-enabled for hospitals PKK Loh, L Allan 2005 International Conference on Intelligent Sensors, Sensor Networks and …, 2005 | 16 | 2005 |
Reliable and efficient communications in sensor networks PKK Loh, WJ Hsu, Y Pan Journal of Parallel and Distributed Computing 67 (8), 922-934, 2007 | 14 | 2007 |
Smart Drone Controller Framework—Toward an Internet of Drones CS Veerappan, PKK Loh, RJ Chennattu AI and IoT for Smart City Applications, 1-14, 2022 | 12 | 2022 |
Fuzzy heuristic design for diagnosis of web-based vulnerabilities D Subramanian, HT Le, PKK Loh 2009 Fourth International Conference on Internet Monitoring and Protection …, 2009 | 12 | 2009 |
Evaluating AVDL descriptions for web application vulnerability analysis HT Le, PKK Loh 2008 IEEE International Conference on Intelligence and Security Informatics …, 2008 | 12 | 2008 |
The Josephus cube: A novel interconnection network PKK Loh, WJ Hsu Parallel Computing 26 (4), 427-453, 2000 | 12 | 2000 |
DRAT: A drone attack tool for vulnerability assessment MS bin Mohammad Fadilah, V Balachandran, P Loh, M Chua Proceedings of the tenth ACM conference on data and application security and …, 2020 | 11 | 2020 |
An energy-aware clustering approach for wireless sensor networks PKK Loh, Y Pan International Journal of Communications, Network and System Sciences 2 (2), 131, 2009 | 11 | 2009 |
Design of a viable fault-tolerant routing strategy for optical-based grids PKK Loh, WJ Hsu Parallel and Distributed Processing and Applications: International …, 2003 | 11 | 2003 |