关注
Nahid Majd
Nahid Majd
在 csusm.edu 的电子邮件经过验证
标题
引用次数
引用次数
年份
Secure content delivery in information-centric networks: Design, implementation, and analyses
S Misra, R Tourani, NE Majd
Proceedings of the 3rd ACM SIGCOMM workshop on Information-centric …, 2013
2932013
AccConF: An access control framework for leveraging in-network cached data in the ICN-enabled wireless edge
S Misra, R Tourani, F Natividad, T Mick, NE Majd, H Huang
IEEE transactions on dependable and secure computing 16 (1), 5-17, 2017
812017
Approximation algorithms for constrained relay node placement in energy harvesting wireless sensor networks
S Misra, NE Majd, H Huang
IEEE Transactions on Computers 63 (12), 2933-2947, 2013
702013
Constrained relay node placement in energy harvesting wireless sensor networks
S Misra, NE Majd, H Huang
2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor …, 2011
472011
Split-Cache: A holistic caching framework for improved network performance in wireless ad hoc networks
NE Majd, S Misra, R Tourani
2014 IEEE Global Communications Conference, 137-142, 2014
252014
Evaluation of parameters affecting the performance of routing protocols in mobile ad hoc networks (MANETs) with a focus on energy efficiency
N Ebrahimi Majd, N Ho, T Nguyen, J Stolmeier
Advances in Information and Communication: Proceedings of the 2019 Future of …, 2020
222020
AccConF: An access control framework for leveraging in-network cached data in ICNs
S Misra, R Tourani, F Natividad, T Mick, N Majd, H Huang
arXiv preprint arXiv:1603.03501, 2016
92016
A fuzzy algorithm for QoS-based routing in MPLS network
NE Majd, MH Yaghmaee
2006 Asia-Pacific Conference on Communications, 1-5, 2006
52006
Energy aware LEACH protocol for WSNs
N Ebrahimi Majd, P Chhabria, A Tomar
Advances in Information and Communication: Proceedings of the 2019 Future of …, 2020
42020
Toward Optimal Constrained Relay Node Placement Problem in Energy Cooperative Energy Harvesting Wireless Sensor Networks
NE Majd
International Journal of Computer Science and Information Security (IJCSIS …, 2017
32017
Ransomware Classification Using Machine Learning
NE Majd, T Mazumdar
2023 IEEE 32nd International Conference on Computer Communications and …, 2023
22023
Spam SMS Classification Using Machine Learning
NE Majd, MS Hanchate
2023 IEEE 32nd International Conference on Computer Communications and …, 2023
2*2023
CoinCrowder: An accountable Blockchain Decentralized Application (DApp) with tamper-proof evidence of purchase and analyses
Z Dianovics, NE Majd
2021 Computer Science Conference for CSU Undergraduates, 2021
22021
IoT Botnet Classification using CNN-based Deep Learning
NE Majd, DSKR Gudipelly
2023 IEEE 42nd International Performance, Computing, and Communications …, 2023
12023
Anomaly Detection and Attack Classification in IoT Networks Using Machine Learning
K Lee, NE Majd
2023 IEEE 42nd International Performance, Computing, and Communications …, 2023
12023
Intrusion Detection in IoT leveraged by Multi-Access Edge Computing using Machine Learning
D Li, NE Majd
2023 IEEE 42nd International Performance, Computing, and Communications …, 2023
12023
Secure and Cost Effective IoT Authentication and Data Storage Framework using Blockchain NFT
NE Majd, M Sharko
2023 IEEE 32nd International Conference on Computer Communications and …, 2023
12023
ESAC: An Energetic Sustainable Adaptive Clustering Protocol for Heterogenous Wireless Ad Hoc Networks (HANETs)
NE Maid, M McDermott
2020 IEEE 17th Annual Consumer Communications & Networking Conference (CCNC …, 2020
12020
Phishing URL Detection Using Machine Learning and Deep Learning
R Ferdaws, NE Majd
2024 IEEE World AI IoT Congress (AIIoT), 0485-0490, 2024
2024
Edge Computing Ransomware Detection in IoT Using Machine Learning
T Radhakrishna, NE Majd
2024 IEEE International Conference on Computing, Networking and …, 2024
2024
系统目前无法执行此操作,请稍后再试。
文章 1–20