default search action
Abdul Halim Zaim
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j25]Bulut Karadag, Abdul Halim Zaim, Akhan Akbulut:
Blockchain-Based KYC Model for Credit Allocation in Banking. IEEE Access 12: 80176-80182 (2024) - [j24]Begum Ay Ture, Akhan Akbulut, Abdul Halim Zaim, Cagatay Catal:
Stacking-based ensemble learning for remaining useful life estimation. Soft Comput. 28(2): 1337-1349 (2024) - 2023
- [j23]Ibrahim Gulatas, H. Hakan Kilinc, Abdul Halim Zaim, M. Ali Aydin:
Malware Threat on Edge/Fog Computing Environments From Internet of Things Devices Perspective. IEEE Access 11: 33584-33606 (2023) - [j22]Bulut Karadag, Akhan Akbulut, Abdul Halim Zaim:
Cyberbullying detection through deep learning: A case study of Turkish celebrities on Twitter. Web Intell. 21(1): 61-70 (2023) - 2022
- [j21]Akhan Akbulut, Feray Gungor, Ela Tarakci, Muhammed Ali Aydin, Abdul Halim Zaim, Cagatay Catal:
Identification of phantom movements with an ensemble learning approach. Comput. Biol. Medicine 150: 106132 (2022) - 2021
- [j20]Muhammed Ali Aydin, Baybars Karabekir, Abdül Halim Zaim:
Energy Efficient Clustering-Based Mobile Routing Algorithm on WSNs. IEEE Access 9: 89593-89601 (2021) - [j19]Wisam Elmasry, Akhan Akbulut, Abdul Halim Zaim:
A Design of an Integrated Cloud-based Intrusion Detection System with Third Party Cloud Service. Open Comput. Sci. 11(1): 365-379 (2021) - [j18]Murat Koca, Muhammed Ali Aydin, Ahmet Sertbas, Abdül Halim Zaim:
A new distributed anomaly detection approach for log IDS management based on deep learning. Turkish J. Electr. Eng. Comput. Sci. 29(5): 2486-2501 (2021) - 2020
- [j17]Wisam Elmasry, Akhan Akbulut, Abdul Halim Zaim:
Evolving deep learning architectures for network intrusion detection using a double PSO metaheuristic. Comput. Networks 168 (2020) - [j16]Wisam Elmasry, Akhan Akbulut, Abdul Halim Zaim:
Comparative evaluation of different classification techniques for masquerade attack detection. Int. J. Inf. Comput. Secur. 13(2): 187-209 (2020)
2010 – 2019
- 2019
- [j15]Wisam Elmasry, Akhan Akbulut, Abdul Halim Zaim:
Empirical study on multiclass classification-based network intrusion detection. Comput. Intell. 35(4): 919-954 (2019) - 2018
- [j14]Safak Durukan-Odabasi, Abdül Halim Zaim:
A dynamic channel assignment method for multichannel multiradio wireless mesh networks. Turkish J. Electr. Eng. Comput. Sci. 26(5): 2448-2464 (2018) - [j13]Can Eyupoglu, Muhammed Ali Aydin, Abdül Halim Zaim, Ahmet Sertbas:
An Efficient Big Data Anonymization Algorithm Based on Chaos and Perturbation Techniques. Entropy 20(5): 373 (2018) - [j12]Wisam Elmasry, Akhan Akbulut, Abdul Halim Zaim:
Deep Learning Approaches for Predictive Masquerade Detection. Secur. Commun. Networks 2018: 9327215:1-9327215:24 (2018) - 2017
- [j11]Asim Sinan Yüksel, Mehmet Erkan Yüksel, Ahmet Sertbas, Abdül Halim Zaim:
Implementation of a web-based service for mobile application risk assessment. Turkish J. Electr. Eng. Comput. Sci. 25: 976-994 (2017) - 2015
- [j10]Ali Boyaci, Abdul Halim Zaim, Coskun Sönmez:
A cross-layer adaptive channel selection mechanism for IEEE 802.11P suite. EURASIP J. Wirel. Commun. Netw. 2015: 214 (2015) - [j9]Özgür Can Turna, Muhammed Ali Aydin, Abdül Halim Zaim, Tülin Atmaca:
A new dynamic bandwidth allocation algorithm based on online-offline mode for EPON. Opt. Switch. Netw. 15: 29-43 (2015) - [c20]Pinar Kirci, Abdul Halim Zaim:
A Novel Multicasting Innovation with Optical Burst Switching. FiCloud 2015: 131-134 - 2013
- [j8]Taner Çevik, Abdül Halim Zaim:
A Multichannel Cross-Layer Architecture for Multimedia Sensor Networks. Int. J. Distributed Sens. Networks 9 (2013) - [c19]Pinar Kirci, Abdul Halim Zaim:
Optical Wdm Networks and Multicasting. BCI (Local) 2013: 47 - [c18]Ali Boyaci, Serhan Yarkan, Abdul Halim Zaim:
Identification of shadowed fast fading interference in celullar mobile radio systems. SIU 2013: 1-4 - 2012
- [c17]Özgür Can Turna, M. Ali Aydin, Abdül Halim Zaim, Tülin Atmaca:
Half cycling dynamic bandwidth allocation with prediction on EPON. ISCC 2012: 898-902 - 2011
- [j7]Ali Norouzi, Faezeh Sadat Babamir, Abdul Halim Zaim:
A Novel Energy Efficient Routing Protocol in Wireless Sensor Networks. Wirel. Sens. Netw. 3(10): 350-359 (2011) - [c16]Ali Norouzi, Abdul Halim Zaim:
A novel social network platform by using e-marketing and evaluating models. CASoN 2011: 37-41 - [c15]Taner Çevik, Abdul Halim Zaim:
Localized energy efficient routing for wireless sensor networks. DCOSS 2011: 1-7 - [c14]Gulsum Zeynep Gurkas Aydin, Abdul Halim Zaim, Hakima Chaouchi, Tülin Atmaca:
A Prediction Based Mobility Extension for eHIP Protocol. ISCIS 2011: 209-213 - [c13]Özgür Can Turna, M. Ali Aydin, Tülin Atmaca, Abdül Halim Zaim, Tuan-Dung Nguyen:
Traffic characterization study on EPON upstream channel. IWCMC 2011: 1601-1606 - [c12]Taner Çevik, Derya Yiltas, Abdul Halim Zaim:
Delay efficient STEM by pipelining. WCIT 2011: 96-103 - 2010
- [j6]M. Ali Aydin, Tülin Atmaca, Özgür Can Turna, Abdül Halim Zaim, Thaere Eido:
A performance comparison of OPS with variable-size packets and OBS. Opt. Switch. Netw. 7(2): 85-94 (2010) - [c11]Recep Selami Ozbey, Abdul Halim Zaim:
Matching Reservation Method: A New Resource Reservation Scheme For LEO Satellite Systems And A Simulation-Based Performance Analysis. ICWN 2010: 64-69 - [c10]Mehmet Ali Ertürk, Abdul Halim Zaim, Selim Akyokus:
Semantic Information Retrieval on Peer-to-Peer Networks. NDT (2) 2010: 715-725 - [c9]Gulsum Zeynep Gurkas Aydin, Tara Ali-Yahiya, Hakima Chaouchi, Abdul Halim Zaim:
QoS mobility-aware algorithm using early update for Host Identity Protocol. PIMRC 2010: 2014-2018
2000 – 2009
- 2009
- [j5]M. Ali Aydin, Abdül Halim Zaim, K. Gökhan Ceylan:
A hybrid intrusion detection system design for computer network security. Comput. Electr. Eng. 35(3): 517-526 (2009) - [j4]Derya Yiltas, Abdul Halim Zaim:
Evaluation of call blocking probabilities in LEO satellite networks. Int. J. Satell. Commun. Netw. 27(2): 103-115 (2009) - [c8]M. Ali Aydin, Tülin Atmaca, Özgür Can Turna, Abdül Halim Zaim, Thaere Eido:
Regulative Wavelength Grouping Approach for QoS in OBS Networks. AICT 2009: 254-260 - [c7]M. Ali Aydin, Tülin Atmaca, Özgür Can Turna, Abdül Halim Zaim:
Performance Study of New OBS Channel Scheduling Algorithms in a Multiservice Network. ICNS 2009: 242-248 - [c6]Derya Yiltas, Abdul Halim Zaim:
A traffic performance evaluation for low-earth orbit satellite communication systems. IWCMC 2009: 984-988 - [c5]Gulsum Zeynep Gurkas Aydin, Hakima Chaouchi, Abdul Halim Zaim:
eHIP: early update for Host Identity Protocol. Mobility Conference 2009 - 2008
- [c4]M. Ali Aydin, Tülin Atmaca, Abdül Halim Zaim, Özgür Can Turna, Viet Hung Nguyen:
Performance Study of OBS Reservation Protocols. AICT 2008: 428-433 - 2006
- [c3]Gulsum Zeynep Gurkas Aydin, Abdül Halim Zaim, M. Ali Aydin:
Security Mechanisms And Their Performance Impacts On Wireless Local Area Networks. ISCN 2006: 123-127 - [c2]Pinar Kirci, Abdul Halim Zaim:
Comparison of OBS protocols. ISCN 2006: 158-161 - 2003
- [j3]Abdul Halim Zaim:
A Markov Model to Calculate New and Hand-off Call Blocking Probabilities in LEO Satellite Networks. J. Res. Pract. Inf. Technol. 35(4): 271-283 (2003) - [j2]Abdul Halim Zaim, Harry G. Perros, George N. Rouskas:
Computing call-blocking probabilities in LEO satellite constellations. IEEE Trans. Veh. Technol. 52(3): 622-636 (2003) - 2002
- [j1]Abdul Halim Zaim, George N. Rouskas, Harry G. Perros:
Computing call-blocking probabilities in LEO satellite networks: the single-orbit case. IEEE Trans. Veh. Technol. 51(2): 332-347 (2002) - [c1]Abdul Halim Zaim, Harry G. Perros, George N. Rouskas:
Performance Analysis of LEO Satellite Networks. NETWORKING 2002: 790-801
Coauthor Index
aka: Muhammed Ali Aydin
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint