Fahad Samad
Title
Cited by
Cited by
Year
Securing wireless mesh networks: a three dimensional perspective
F Samad
Hochschulbibliothek der Rheinisch-Westfälischen Technischen Hochschule Aachen, 2011
112011
Jam: mitigating jellyfish attacks in wireless ad hoc networks
F Samad, QA Ahmed, A Shaikh, A Aziz
International Multi Topic Conference, 432-444, 2012
102012
Cpu-gpu processing
ZA Memon, F Samad, ZR Awan, A Aziz, SS Siddiqi
Int. J. Comput. Sci. Netw. Secur 17 (9), 188-193, 2017
72017
The future of internet: IPv6 fulfilling the routing needs in internet of things
F Samad, A Abbasi, ZA Memon, A Aziz, A Rahman
International Journal of Future Generation Communication and Networking 11 …, 2018
62018
Neighborhood nodes collaboration to support qos routing in wireless mesh networks
SA Makram, F Samad, M Gunes
2009 IEEE Symposium on Computers and Communications, 763-769, 2009
62009
Protection based on neighborhood-trust in clustered wireless mesh networks
F Samad, SA Makram
2009 Third International Conference on Next Generation Mobile Applications …, 2009
42009
Adaptive security established on the requirements and resource abilities of network nodes
F Samad, SA Makram
IEEE Local Computer Network Conference, 752-755, 2010
32010
Improved security in IEEE 802.11 wireless LANs
F Samad, W Mahmood, A Ali, U Kalim
WSEAS Transactions on Communications 5 (12), 2155-2160, 2006
32006
A new design of in-memory file system based on file virtual address framework
F Samad, ZA Memon
International Journal of Advanced Computer Science and Applications 8 (9 …, 2017
22017
PICAT: Palliating channel assignment assaults using adjustable trust in wireless mesh networks
SA Makram, F Samad
2010 Proceedings of 19th International Conference on Computer Communications …, 2010
22010
Realism: Rendering anonymity and lightweight security with mobility in wireless ad hoc and mesh networks
SA Makram, F Samad
Proceedings of the 5th ACM Symposium on QoS and Security for Wireless and …, 2009
22009
Building Wireless Sensor Networks Application Using Sun SPOTs
A Shaikh, N Anjum, F Samad, A Shah
International Multi Topic Conference, 466-477, 2012
2012
Controlling Physical Objects with Privacy using Secure RFID System
F Samad, SA Makram
2008 New Technologies, Mobility and Security, 1-4, 2008
2008
Handling Security Vulnerabilities in Clustered Wireless Mesh Networks
SA Makram, F Samad
MOBILE AND WIRELESS NETWORK SECURITY, 51, 0
The system can't perform the operation now. Try again later.
Articles 1–14