关注
Asmaa Ahmad
Asmaa Ahmad
在 deakin.edu.au 的电子邮件经过验证
标题
引用次数
引用次数
年份
Routing protocols in opportunistic networks–a survey
M Alajeely, R Doss, A Ahmad
IETE Technical Review 35 (4), 369-387, 2018
552018
Security and trust in opportunistic networks–a survey
M Alajeely, R Doss, A Ahmad
IETE Technical Review 33 (3), 256-268, 2016
282016
Defense against packet collusion attacks in opportunistic networks
M Alajeely, R Doss, A Ahmad, V Mak-Hau
Computers & Security 65, 269-282, 2017
202017
Packet faking attack: a novel attack and detection mechanism in OppNets
M Alajeely, A Ahmad, R Doss, V Mak-Hau
2014 Tenth International Conference on Computational Intelligence and …, 2014
182014
Defense against packet dropping attacks in opportunistic networks
A Ahmad, M Alajeely, R Doss
2014 International Conference on Advances in Computing, Communications and …, 2014
15*2014
Packet integrity defense mechanism in OppNets
A Ahmad, R Doss, M Alajeely, SF Al Rubeaai, D Ahmad
Computers & Security 74, 71-93, 2018
13*2018
Malicious node traceback in opportunistic networks using merkle trees
M Alajeely, A Ahmad, R Doss
2015 IEEE International Conference on Data Science and Data Intensive …, 2015
122015
Catabolism attack and anabolism defense: A novel attack and traceback mechanism in opportunistic networks
M Alajeely, R Doss, A Ahmad, V Mak-Hau
Computer Communications 71, 111-118, 2015
122015
Reputation based malicious node detection in OppNets
A Ahmad, M Alajeely, R Doss
2016 13th International Joint Conference on Computer Science and Software …, 2016
11*2016
Establishing trust relationships in OppNets using Merkle trees
A Ahmad, M Alajeely, R Doss
2016 8th International Conference on Communication Systems and Networks …, 2016
11*2016
Malicious node detection in OppNets using hash chain technique
M Alajeely, A Ahmad, R Doss
2015 4th International Conference on Computer Science and Network Technology …, 2015
112015
Comparative study of routing protocols for opportunistic networks
M Alajeely, A Ahmad, R Doss
2013 Seventh International Conference on Sensing Technology (ICST), 209-214, 2013
102013
Securing OppNets from packet integrity attacks using trust and reputation
A Ahmad, R Doss, M Alajeely, K Ahmad
2017 31st International Conference on Advanced Information Networking and …, 2017
32017
Trust strategy implementation in OppNets
A Ahmad, R Doss, M Alajeely, SF Al Rubeaai
Computing 100 (2), 151-181, 2018
22018
An Efficient Detection Mechanism Against Packet Faking Attack in Opportunistic Networks
M Alajeely, A Ahmad, R Doss, V Mak-Hau
International Conference on Future Network Systems and Security, 84-100, 2015
22015
Establishing trust relationships and secure channels in opportunistic networks
A Ahmad
Deakin University, 2017
2017
系统目前无法执行此操作,请稍后再试。
文章 1–16