TYPE |
PUBLICATION |
TARIKH PENERBITAN |
TYPE OF CONTRIBUTION |
REFEREED PUBLICATION |
CONFERENCE PAPER |
A Geofencing-based Recent Trends Identification from Twitter Data |
05/12/2019 |
40% |
CONFERENCE PAPER |
A Hybrid Screen Size Independent Authentication Scheme for Smart Devices |
04/12/2019 |
40% |
JOURNAL |
A Cyber-Enabled Mission-Critical System for Post-Flood Response: Exploiting TV White Space as Network Backhaul Links |
25/10/2019 |
40% |
JOURNAL |
A Secure Hybrid Authentication Scheme using PassPoints and Press Touch Code |
30/10/2019 |
60 |
JOURNAL |
Traveling distance estimation to mitigate unnecessary handoff in mobile wireless networks |
28/10/2019 |
30% |
BOOK CHAPTER |
IPTV Network Security: Threats and Counterparts |
02/05/2018 |
60% |
BOOKS |
IPTV Delivery Networks: Next Generation Architectures for Live and Video-on-Demand Services |
04/06/2018 |
30% |
CONFERENCE PAPER |
A Flexible Keyphrase Extraction Technique for Academic Literature |
01/10/2018 |
50% |
JOURNAL |
A Highly Accurate PDF-To-Text Conversion System for Academic Papers Using Natural Language Processing Approach |
09/07/2018 |
50% |
JOURNAL |
A connection probability model for communications networks under regional failures |
03/07/2018 |
30% |
JOURNAL |
A performance investigation on IoT enabled intra-vehicular wireless sensor networks |
04/09/2018 |
30% |
JOURNAL |
An Analysis on Vulnerabilities of Password Retrying |
15/10/2018 |
50% |
JOURNAL |
An Expanding Neighbourhood Search Technique for Avalanche Search-and-Rescue Operations using Air Ground Collaborative Wireless Networks |
15/10/2018 |
70% |
JOURNAL |
Collab-SAR: A collaborative avalanche search-and-rescue missions exploiting hostile alpine networks |
06/08/2018 |
50% |
JOURNAL |
Finding a suitable hop-to-hop busty traffic transmission approach for underwater acoustic networks: handshake-based vs. handshake-free MAC protocols |
08/06/2018 |
60% |
JOURNAL |
Hybrid Communication Network Architecture for Palm Oil Supply Chain Traceability (POSCT) System |
06/12/2018 |
30% |
JOURNAL |
Security mechanisms and data access protocols in innovative wireless networks |
15/11/2018 |
30% |
JOURNAL |
Underwater Delay-Tolerant Routing via Probabilistic Spraying |
12/10/2018 |
50% |
BOOKS |
Comparison of Non-Probing-Based Routing Metrics for Static Multihop Underwater Acoustic Networks |
08/12/2017 |
60% |
JOURNAL |
Finding a suitable hop-to-hop busty traffic transmission approach for Underwater Acoustic Networks: handshake-based vs handshake-free MAC protocols |
14/02/2017 |
It's my student paper from another university. I am the corresponding author. |
JOURNAL |
Crowd Associated Network: Exploiting over Smart Garbage Management System |
01/06/2017 |
First author and corresponding author. |
JOURNAL |
Crowd associated network: Exploiting over a smart garbage management system |
06/09/2017 |
50% |
JOURNAL |
Press touch code: A finger press based screen size independent authentication scheme for smart devices |
03/10/2017 |
50% |
JOURNAL |
VAP code: A secure graphical password for smart devices |
07/08/2017 |
50% |
CONFERENCE PAPER |
Comparative investigation on CSMA/CA-based MAC protocols for scalable networks |
09/05/2016 |
20% |
CONFERENCE PAPER |
Exploiting privacy-policy and-management features on social networks: A user's perspective |
11/07/2016 |
20% |
CONFERENCE PAPER |
aising Fairness Issue of Vehicular Routing Problem |
23/12/2016 |
60% |
JOURNAL |
VAP Code: A Secure Graphical Password for Smart Devices |
13/12/2016 |
First author and corresponding author. |
CONFERENCE PAPER |
A store-and-delivery based MAC protocol for air-ground collaborative wireless networks for precision agriculture |
03/02/2015 |
50% |
CONFERENCE PAPER |
Blockchain Security Hole: Issues and Solutions |
08/06/2015 |
20% |
CONFERENCE PAPER |
On mitigating hop-to-hop congestion problem in IoT enabled Intra-Vehicular communication |
04/05/2015 |
30% |
JOURNAL |
A High-throughput Routing Metric for Multihop Underwater Acoustic Networks |
08/09/2015 |
50% |
BOOK CHAPTER |
Advanced Encryption Standard |
07/10/2014 |
40% |
BOOK CHAPTER |
Asymmetric Key Algorithms |
07/10/2014 |
60% |
BOOK CHAPTER |
Block Cipher |
16/07/2014 |
30% |
BOOK CHAPTER |
Data Encryption Standard |
07/10/2014 |
50% |
BOOK CHAPTER |
Elliptic Curve Cryptography |
07/10/2014 |
60% |
BOOK CHAPTER |
Rotor Machine |
21/10/2014 |
40% |
BOOK CHAPTER |
Secure Hash Algorithm |
07/10/2014 |
60% |
BOOK CHAPTER |
The RSA Algorithm |
07/10/2014 |
50% |
BOOKS |
Classical Cryptographic Algorithms |
06/05/2014 |
40% |
BOOKS |
Practical Cryptography: Algorithms and Implementations using C++ |
08/07/2014 |
80% |
CONFERENCE PAPER |
A secure communication suite for cluster-based Underwater Surveillance Networks |
20/01/2014 |
40% |
CONFERENCE PAPER |
MACA-APT: A MACA-based Adaptive Packet Train transmission protocol for Underwater Acoustic Networks |
03/12/2014 |
60% |
JOURNAL |
Multipath Routing with LimitedCross-Path Interference in Underwater Networks |
09/07/2014 |
60% |
JOURNAL |
Open Source Suites for Underwater Networking: WOSS and DESERT Underwater |
06/10/2014 |
20% |
JOURNAL |
The Underwater Selective Repeat Error Control Protocol for Multiuser Acoustic Networks: Design |
02/10/2013 |
60% |
CONFERENCE PAPER |
Coastal patrol and surveillance networks using AUVs and delay-tolerant networking |
16/04/2012 |
60% |
CONFERENCE PAPER |
DESERT Underwater: an NS-Miracle-based framework to DEsign, Simulate, Emulate and Realize Test-beds for Underwater network protocols |
28/03/2012 |
20% |
CONFERENCE PAPER |
Packet error recovery via multipath routing and reed-solomon codes in underwater networks |
03/04/2012 |
40% |
JOURNAL |
Enhancing Performance of MAODV Routing Protocol for Wireless Mesh Network Using Integrated Multiple Metrics Technique (IMMT) |
26/07/2012 |
30% |
CONFERENCE PAPER |
Improved link repair technique for multicast routing in Wireless Mesh Network |
05/04/2011 |
50% |
CONFERENCE PAPER |
Jamming-resistant multi-path routing for reliable intruder detection in underwater networks |
08/03/2011 |
50% |
CONFERENCE PAPER |
On ARQ strategies over random access protocols in underwater acoustic networks |
25/10/2011 |
60% |
CONFERENCE PAPER |
On the impact of the environment on MAC and routing in shallow water scenarios |
07/03/2011 |
60% |
CONFERENCE PAPER |
On the performance of unsynchronized distributed MAC protocols in deep water acoustic networks |
03/10/2011 |
40% |
CONFERENCE PAPER |
MySQL performance analysis on a limited resource server: Fedora vs. Ubuntu Linux |
02/02/2010 |
30% |
CONFERENCE PAPER |
A simulation based performance analysis of reactive routing protocols in wireless mesh networks |
16/03/2009 |
40% |
CONFERENCE PAPER |
Intergrating multiple metrics to improve the performance of a routing protocol over wireless mesh networks |
08/06/2009 |
40% |
JOURNAL |
Integrated Metric-Ad Hoc On-Demand Distance Vector: A Routing Protocol over Wireless Mesh Networks |
01/07/2009 |
50% |
JOURNAL |
Multibiometric Systems based Verification Technique |
06/07/2009 |
50% |
JOURNAL |
Performance Analysis of On-Demand Routing Protocols in Wireless Mesh Networks |
04/05/2009 |
40% |
JOURNAL |
Performance Comparison of Proactive and Reactive Multicast Routing Protocols over Wireless Mesh Networks |
04/05/2009 |
50% |
JOURNAL |
Performance of Ad Hoc Routing Protocols in Mobile WiMAX Environment |
07/12/2009 |
50% |
CONFERENCE PAPER |
A simple and effective technique for human verification with Hand Geometry |
21/02/2008 |
40% |
CONFERENCE PAPER |
Design of smart card for automated toll collection at Jamuna Multipurpose Bridge in Bangladesh |
02/04/2008 |
40% |
CONFERENCE PAPER |
Performance Evaluation of Wireless Routing Protocols in Mobile WiMAX Environment |
10/06/2008 |
60% |
CONFERENCE PAPER |
Rain fade analysis on earth-space microwave link in a subtropical region |
24/03/2008 |
30% |
JOURNAL |
Performance Analysis of Ad Hoc Routing Protocols in Mobile WiMAX Environment |
06/05/2008 |
50% |
JOURNAL |
A Performance Comparison of Proactive and Reactive Routing Protocols of Mobile Ad-Hoc Network (MANET) |
03/04/2007 |
60% |
JOURNAL |
An Efficient Technique for Human Verification Using Finger Stripes Geometry |
16/10/2007 |
50% |