


default search action
Isaac Woungang
Person information
- affiliation: Toronto Metropolitan University, Canada
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j127]Dao Thanh Hai
, Isaac Woungang
:
Next-generation optical networks to sustain connectivity of the future: All roads lead to optical-computing-enabled network? Internet Things 29: 101445 (2025) - [e12]Isaac Woungang, Sanjay Kumar Dhurandher:
The 7th International Conference on Wireless, Intelligent and Distributed Environment for Communication - WIDECOM 2024, Keene State College, Durham, NH, USA, October 16-18, 2024. Lecture Notes on Data Engineering and Communications Technologies 237, Springer 2025, ISBN 978-3-031-80816-6 [contents] - 2024
- [j126]Ali A. Alnoman
, Ahmed Shaharyar Khwaja
, Alagan Anpalagan
, Isaac Woungang
:
Emerging AI and 6G-Based User Localization Technologies for Emergencies and Disasters. IEEE Access 12: 197877-197906 (2024) - [j125]Sanjay K. Dhurandher, Nisha Kandhoul, Isaac Woungang, Han-Chieh Chao
:
Energy efficient random forest classifier-based secure routing for opportunistic internet of things. Int. J. Ad Hoc Ubiquitous Comput. 46(2): 80-89 (2024) - [j124]David W. White, Isaac Woungang
, Felix O. Akinladejo, Sanjay Kumar Dhurandher, Leonard Barolli:
A network communication speedup model using multiple fungible and non-fungible paths. Internet Things 25: 101040 (2024) - [j123]Jagdeep Singh, Sanjay Kumar Dhurandher, Vinesh Kumar, Isaac Woungang, Leonard Barolli:
Survey on securing wireless networks through a blockchain-based framework. J. High Speed Networks 30(4): 657-677 (2024) - [c131]Vinesh Kumar
, Jagdeep Singh, Sanjay Kumar Dhurandher, Isaac Woungang:
Game Theory-Based Efficient Message Forwarding Scheme for Opportunistic Networks. AINA (1) 2024: 1-10 - [c130]Dao Thanh Hai, Isaac Woungang:
On Network Design and Planning 2.0 for Optical-Computing-Enabled Networks. AINA (1) 2024: 91-102 - [c129]Dao Thanh Hai
, Minh Nguyen
, Isaac Woungang
:
Optical-computing-enabled Network: A New Dawn for Optical-layer Intelligence? APNet 2024: 215-216 - [c128]Ayush Upadhyay, Harsh Jain, Prateek Dhingra, Nisha Kandhoul, Sanjay K. Dhurandher, Isaac Woungang:
Stock Market Prediction Using Social Media Sentiments. CISIS 2024: 14-26 - [c127]Ornella Lucresse Soh, Issa Traoré, Isaac Woungang, Wei Lu, Marcelo L. Brocardo:
Identifying APT Attack Stages Using Anomaly Score Calibration. CSNet 2024: 133-137 - [c126]Braden J. Saunders, Robson E. De Grande, Glaucio H. S. Carvalho, Isaac Woungang:
Deep Graph Learning for DDoS Detection and Multi-Class Classification IDS. CSR 2024: 96-100 - [c125]Jagdeep Singh, Sanjay Kumar Dhurandher, Isaac Woungang:
Federated Learning Empowered Routing for Opportunistic Network Environments. ICC Workshops 2024: 1998-2004 - [c124]Braden J. Saunders, Patrice Kisanga, Glaucio H. S. Carvalho, Isaac Woungang:
A Graph Convolutional Networks-Based DDoS Detection Model. SysCon 2024: 1-5 - [c123]Amir Mohammadi Bagha, Isaac Woungang, Issa Traoré, Danda B. Rawat:
A Graph Clustering-Based Network Anomaly Detection System. WiMob 2024: 347-352 - [i6]Dao Thanh Hai, Isaac Woungang:
On Network Design and Planning 2.0 for Optical-computing-enabled Networks. CoRR abs/2402.11618 (2024) - [i5]Minttu Alakuijala, Reginald McLean, Isaac Woungang, Nariman Farsad, Samuel Kaski, Pekka Marttinen, Kai Yuan:
Video-Language Critic: Transferable Reward Functions for Language-Conditioned Robotics. CoRR abs/2405.19988 (2024) - [i4]Dao Thanh Hai, Minh Nguyen, Isaac Woungang:
Optical-computing-enabled Network: A New Dawn for Optical-layer Intelligence? CoRR abs/2406.00162 (2024) - [i3]Atefeh Termehchi, Ekram Hossain, Isaac Woungang:
Science-Informed Deep Learning (ScIDL) With Applications to Wireless Communications. CoRR abs/2407.07742 (2024) - [i2]Dao Thanh Hai, Isaac Woungang:
Next-generation optical networks to sustain connectivity of the future: All roads lead to optical-computing-enabled network? CoRR abs/2411.11378 (2024) - 2023
- [j122]Lilatul Ferdouse, Ahmed Shaharyar Khwaja, Alagan Anpalagan
, Brad Stimpson, Ali Arad, Isaac Woungang:
Resource allocation and user assignment schemes in cellular supported industrial IoT networks. Trans. Emerg. Telecommun. Technol. 34(6) (2023) - [j121]Noha Hassan, Xavier Fernando
, Isaac Woungang, Alagan Anpalagan:
User Association Performance Trade-Offs in Integrated RF/mmWave/THz Communications. Future Internet 15(12): 376 (2023) - [j120]Sanjay Kumar Dhurandher, Bhoopendra Kumar, Isaac Woungang, Han-Chieh Chao
:
A hybrid channel transmission method for effective spectrum access in cognitive radio networks. Int. J. Ad Hoc Ubiquitous Comput. 44(4): 221-232 (2023) - [j119]Jagdeep Singh
, Sanjay Kumar Dhurandher, Isaac Woungang, Leonard Barolli:
Double Q-learning based routing protocol for opportunistic networks. J. High Speed Networks 29(1): 1-14 (2023) - [j118]Duc-Dung Tran
, Shree Krishna Sharma
, Vu Nguyen Ha
, Symeon Chatzinotas
, Isaac Woungang
:
Multi-Agent DRL Approach for Energy-Efficient Resource Allocation in URLLC-Enabled Grant-Free NOMA Systems. IEEE Open J. Commun. Soc. 4: 1470-1486 (2023) - [j117]Glaucio H. S. Carvalho
, Isaac Woungang
, Alagan Anpalagan
, Issa Traoré
:
Admission and Placement Policies for Latency-Compliant Secure Services in 5G Edge-Cloud System. IEEE Syst. J. 17(2): 3105-3116 (2023) - [j116]Lilatul Ferdouse
, Isaac Woungang
, Alagan Anpalagan
, Koji Yamamoto
:
A Resource Allocation Policy for Downlink Communication in Distributed IRS Aided Multiple-Input Single-Output Systems. IEEE Trans. Commun. 71(4): 2410-2424 (2023) - [c122]Elie Ngomseu Mambou, Isaac Woungang:
Bandit Algorithms Applied in Online Advertisement to Evaluate Click-Through Rates. AFRICON 2023: 1-5 - [c121]Aleksander Maksimoski, Isaac Woungang, Issa Traoré, Sanjay K. Dhurandher:
Bonet Detection Mechanism Using Graph Neural Network. AINA (2) 2023: 247-257 - [c120]David W. White, Isaac Woungang, Felix O. Akinladejo, Sanjay K. Dhurandher:
A Model to Estimate the Minimum Data Transmission Time in IoT Networks Using Multiple Fungible Paths. BWCCA 2023: 199-208 - [c119]Jagdeep Singh, Sanjay Kumar Dhurandher, Isaac Woungang:
Deep Q-Network Dueling-Based Opportunistic Data Transmission in Blockchain-Enabled M2M Communication. GLOBECOM 2023: 1283-1289 - [c118]Ashwin Balaji, Sanjay Kumar Dhurandher, Karan Gupta
, Isaac Woungang:
Post-Quantum Based Oblivious Transfer for Authentication in Heterogeneous Internet of Everything. ICC Workshops 2023: 194-199 - [c117]Patrice Kisanga, Isaac Woungang, Issa Traoré, Glaucio H. S. Carvalho:
Network Anomaly Detection Using a Graph Neural Network. ICNC 2023: 61-65 - [c116]David W. White
, Isaac Woungang, Felix O. Akinladejo, Sanjay K. Dhurandher:
An Analysis of Theoretical Network Communication Speedup Using Multiple Fungible Paths. IMIS 2023: 68-77 - [c115]Noha Hassan, Xavier Fernando, Isaac Woungang, Alagan Anpalagan:
Towards Optimal Association of Coexisting RF, THz and mmWave Users in 6G Networks. PIMRC 2023: 1-6 - 2022
- [j115]Jagdeep Singh
, Isaac Woungang
, Sanjay Kumar Dhurandher
, Khuram Khalid
:
A jamming attack detection technique for opportunistic networks. Internet Things 17: 100464 (2022) - [j114]Marek R. Ogiela, Wenny Rahayu, Isaac Woungang:
Predictive intelligence in secure data processing, management, and forecasting. Inf. Process. Manag. 59(3): 102941 (2022) - [j113]Ashwin Balaji
, Sanjay Kumar Dhurandher
, Isaac Woungang
:
PINE: Post-Quantum Based Incentive Technique for Non-Cooperating Nodes in Internet of Everything. Sensors 22(18): 6928 (2022) - [j112]Glaucio H. S. Carvalho
, Isaac Woungang
, Alagan Anpalagan
:
Cloud Firewall Under Bursty and Correlated Data Traffic: A Theoretical Analysis. IEEE Trans. Cloud Comput. 10(3): 1620-1633 (2022) - [c114]Jagdeep Singh
, Sanjay Kumar Dhurandher, Isaac Woungang:
Game Theory-Based Energy Efficient Routing in Opportunistic Networks. AINA (1) 2022: 627-639 - [c113]Jagdeep Singh, Sanjay Kumar Dhurandher, Isaac Woungang:
Geocommunity Based Data Forwarding in Social Delay Tolerant Networks. Honoring Professor Mohammad S. Obaidat 2022: 421-442 - [c112]Chenyang Nie, Paulo Gustavo Quinan, Issa Traoré, Isaac Woungang:
Intrusion Detection using a Graphical Fingerprint Model. CCGRID 2022: 806-813 - [c111]Jagdeep Singh, Sanjay Kumar Dhurandher, Isaac Woungang, Periklis Chatzimisios, Joel J. P. C. Rodrigues:
Reinforcement Learning Based Congestion Control Mechanism for Opportunistic Networks. GLOBECOM (Workshops) 2022: 67-73 - [c110]Glaucio H. S. Carvalho, Isaac Woungang, Alagan Anpalagan, Issa Traoré, Periklis Chatzimisios:
Edge-Assisted Secure and Dependable Optimal Policies for the 5G Cloudified Infrastructure. ICC 2022: 847-852 - [c109]Jagdeep Singh, Sanjay Kumar Dhurandher, Isaac Woungang, Periklis Chatzimisios:
Multivariate Gaussian Mixture-based Prediction Model for Opportunistic Networks. ICC 2022: 4932-4937 - [c108]Vinesh Kumar
, Sanjay Kumar Dhurandher, Isaac Woungang, Shashank Gupta, Surajpratap Singh:
Channel Allocation in Cognitive Radio Networks: A Game-Theoretic Approach. NBiS 2022: 182-192 - 2021
- [j111]Nisha Kandhoul
, Sanjay Kumar Dhurandher, Isaac Woungang:
Random forest classifier-based safe and reliable routing for opportunistic IoT networks. Int. J. Commun. Syst. 34(1) (2021) - [j110]Hanan Alhindi, Issa Traoré, Isaac Woungang:
Preventing Data Leak through Semantic Analysis. Internet Things 14: 100073 (2021) - [j109]Isaac Woungang, Sanjay K. Dhurandher, Andrea Visconti:
Internet of Things Design, Architectures and Protocols. Internet Things 14: 100267 (2021) - [j108]Khuram Khalid
, Isaac Woungang, Sanjay K. Dhurandher, Jagdeep Singh
:
Reinforcement learning-based fuzzy geocast routing protocol for opportunistic networks. Internet Things 14: 100384 (2021) - [j107]Khuram Khalid
, Isaac Woungang, Sanjay K. Dhurandher, Jagdeep Singh
, Leonard Barolli:
A fuzzy-based check-and-spray geocast routing protocol for opportunistic networks. J. High Speed Networks 27(1): 1-12 (2021) - [j106]Hanan Alhindi, Issa Traoré, Isaac Woungang:
Preventing Data Loss by Harnessing Semantic Similarity and Relevance. J. Internet Serv. Inf. Secur. 11(2): 78-99 (2021) - [j105]Arun Kumar
, Sanjay K. Dhurandher, Isaac Woungang, Joel J. P. C. Rodrigues:
Securing Opportunistic Networks: An Encounter-based Trust-driven Barter Mechanism. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 12(2): 99-113 (2021) - [j104]Glaucio H. S. Carvalho
, Isaac Woungang
, Alagan Anpalagan
, Issa Traoré
:
Optimal Security-Aware Virtual Machine Management for Mobile Edge Computing Over 5G Networks. IEEE Syst. J. 15(3): 3403-3414 (2021) - [j103]Glaucio H. S. Carvalho
, Isaac Woungang
, Alagan Anpalagan
, Issa Traoré
:
Optimal Security Risk Management Mechanism for the 5G Cloudified Infrastructure. IEEE Trans. Netw. Serv. Manag. 18(2): 1260-1274 (2021) - [j102]Duc-Dung Tran
, Shree Krishna Sharma
, Symeon Chatzinotas
, Isaac Woungang
, Björn E. Ottersten:
Short-Packet Communications for MIMO NOMA Systems Over Nakagami-m Fading: BLER and Minimum Blocklength Analysis. IEEE Trans. Veh. Technol. 70(4): 3583-3598 (2021) - [j101]Lilatul Ferdouse
, Isaac Woungang
, Alagan Anpalagan
, Serhat Erküçük
:
Energy Efficient Downlink Resource Allocation in Cellular IoT Supported H-CRANs. IEEE Trans. Veh. Technol. 70(6): 5803-5816 (2021) - [c107]Khuram Khalid
, Isaac Woungang, Sanjay Kumar Dhurandher, Jagdeep Singh
:
Energy-Efficient Fuzzy Geocast Routing Protocol for Opportunistic Networks. AINA (1) 2021: 553-565 - [c106]Duc-Dung Tran
, Shree Krishna Sharma, Symeon Chatzinotas
, Isaac Woungang:
Learning-Based Multiplexing of Grant-Based and Grant-Free Heterogeneous Services with Short Packets. GLOBECOM 2021: 1-6 - [c105]Jagdeep Singh
, Sanjay Kumar Dhurandher, Isaac Woungang, Shivin Diwakar, Periklis Chatzimisios:
Energy Efficient Multi-Objectives Optimized Routing for Opportunistic Networks. ICC 2021: 1-6 - [c104]Paulo Gustavo Quinan, Issa Traoré, Ujwal Reddy Gondhi, Isaac Woungang:
Unsupervised Anomaly Detection Using a New Knowledge Graph Model for Network Activity and Events. MLN 2021: 117-130 - [c103]Duc-Dung Tran
, Shree Krishna Sharma, Symeon Chatzinotas
, Isaac Woungang:
Q-Learning-Based SCMA for Efficient Random Access in mMTC Networks With Short Packets. PIMRC 2021: 1334-1338 - [e11]Leonard Barolli, Isaac Woungang, Tomoya Enokido:
Advanced Information Networking and Applications - Proceedings of the 35th International Conference on Advanced Information Networking and Applications (AINA-2021), Toronto, ON, Canada, 12-14 May, 2021, Volume 1. Lecture Notes in Networks and Systems 225, Springer 2021, ISBN 978-3-030-75099-2 [contents] - [e10]Leonard Barolli, Isaac Woungang, Tomoya Enokido:
Advanced Information Networking and Applications - Proceedings of the 35th International Conference on Advanced Information Networking and Applications (AINA-2021), Toronto, ON, Canada, 12-14 May, 2021, Volume 2. Lecture Notes in Networks and Systems 226, Springer 2021, ISBN 978-3-030-75074-9 [contents] - [e9]Leonard Barolli, Isaac Woungang, Tomoya Enokido:
Advanced Information Networking and Applications - Proceedings of the 35th International Conference on Advanced Information Networking and Applications (AINA-2021), Toronto, ON, Canada, 12-14 May, 2021, Volume 3. Lecture Notes in Networks and Systems 227, Springer 2021, ISBN 978-3-030-75077-0 [contents] - 2020
- [j100]Lilatul Ferdouse
, Serhat Erküçük
, Alagan Anpalagan
, Isaac Woungang
:
Energy Efficient SCMA Supported Downlink Cloud-RANs for 5G Networks. IEEE Access 8: 1416-1430 (2020) - [j99]Shree Krishna Sharma
, Isaac Woungang, Alagan Anpalagan
, Symeon Chatzinotas
:
Toward Tactile Internet in Beyond 5G Era: Recent Advances, Current Issues, and Future Directions. IEEE Access 8: 56948-56991 (2020) - [j98]Glaucio H. S. Carvalho
, Isaac Woungang
, Alagan Anpalagan
, Issa Traoré
:
When Agile Security Meets 5G. IEEE Access 8: 166212-166225 (2020) - [j97]Olivier Flauzac, Carlos Javier Gonzalez Santamaria
, Florent Nolot
, Isaac Woungang:
An SDN approach to route massive data flows of sensor networks. Int. J. Commun. Syst. 33(7) (2020) - [j96]Sanjay K. Dhurandher, Jagdeep Singh
, Isaac Woungang
, Raghav Kumar, Geetanshu Gupta:
Message trust-based secure multipath routing protocol for opportunistic networks. Int. J. Commun. Syst. 33(8) (2020) - [j95]Mitali Bansal, Sanjay Kumar Malik
, Sanjay Kumar Dhurandher, Isaac Woungang:
Policies and mechanisms for enhancing the resource management in cloud computing: a performance perspective. Int. J. Grid Util. Comput. 11(3): 345-366 (2020) - [j94]Khuram Khalid
, Isaac Woungang, Sanjay Kumar Dhurandher, Jagdeep Singh
, Joel J. P. C. Rodrigues
:
Energy-Efficient Check-and-Spray Geocast Routing Protocol for Opportunistic Networks. Inf. 11(11): 504 (2020) - [j93]Pragya Kuchhal, Sanjay K. Dhurandher, Isaac Woungang, Vinesh Kumar
, Satbir Jain, Sahil Gupta, Leonard Barolli:
Pareto set based optimized routing in opportunistic network. J. Ambient Intell. Humaniz. Comput. 11(2): 777-797 (2020) - [j92]Asem Kitana, Issa Traoré, Isaac Woungang:
Towards an Epidemic SMS-based Cellular Botnet. J. Internet Serv. Inf. Secur. 10(4): 38-58 (2020) - [j91]Ajmery Sultana, Isaac Woungang, Alagan Anpalagan
, Lian Zhao
, Lilatul Ferdouse
:
Efficient Resource Allocation in SCMA-Enabled Device-to-Device Communication for 5G Networks. IEEE Trans. Veh. Technol. 69(5): 5343-5354 (2020) - [c102]Amir Mohammadi Bagha, Isaac Woungang, Sanjay Kumar Dhurandher, Issa Traoré:
A RSA-Biometric Based User Authentication Scheme for Smart Homes Using Smartphones. AINA 2020: 845-857 - [c101]Glaucio H. S. Carvalho, Isaac Woungang, Alagan Anpalagan, Issa Traoré:
Optimal Security Cost for Latency-Aware Service Provisioning in Mobile Edge Computing. CCCI 2020: 1-5 - [c100]Sanjay Kumar Dhurandher, Jagdeep Singh
, Mohammad S. Obaidat, Isaac Woungang, Samariddhi Srivastava, Joel J. P. C. Rodrigues:
Reinforcement Learning-Based Routing Protocol for Opportunistic Networks. ICC 2020: 1-6 - [c99]Arun Anpalagan, Isaac Woungang:
Tsunami Prediction and Impact Estimation using Classifiers on Historical Data. IDSTA 2020: 119-126 - [c98]Glaucio H. S. Carvalho, Isaac Woungang, Alagan Anpalagan
, Issa Traoré, Leonard Barolli:
Malware Detection Using Machine Learning Models. NBiS 2020: 238-246
2010 – 2019
- 2019
- [j90]Nisha Kandhoul, Sanjay K. Dhurandher, Isaac Woungang:
T_CAFE: A Trust based Security approach for Opportunistic IoT. IET Commun. 13(20): 3463-3471 (2019) - [j89]Sanjay K. Dhurandher, Isaac Woungang, Jagdeep Singh
, Satya Jyoti Borah:
Energy aware routing for efficient green communication in opportunistic networks. IET Networks 8(4): 272-279 (2019) - [j88]Richa Siddavaatam, Isaac Woungang, Alagan Anpalagan
:
Joint optimisation of radio and infrastructure resources for energy-efficient massive data storage in the mobile cloud over 5G HetNet. IET Wirel. Sens. Syst. 9(5): 323-332 (2019) - [j87]Mohammed Alshahrani, Issa Traoré, Isaac Woungang:
Anonymous mutual IoT interdevice authentication and key agreement scheme based on the ZigBee technique. Internet Things 7 (2019) - [j86]Richa Siddavaatam, Isaac Woungang
, Glaucio H. S. Carvalho, Alagan Anpalagan
:
Mobile Cloud Storage Over 5G: A Mechanism Design Approach. IEEE Syst. J. 13(4): 4060-4071 (2019) - [j85]Ajmery Sultana, Isaac Woungang
, Lian Zhao
, Alagan Anpalagan
:
Two-Tier Architecture for Spectrum Auction in SDN-Enabled Cloud Radio Access Network. IEEE Trans. Veh. Technol. 68(9): 9191-9204 (2019) - [c97]Sanjay K. Dhurandher, Jagdeep Singh
, Isaac Woungang, Mrigali Gupta, Nakul Sabharwal:
Geometric Shapes-based PSO Approach for Routing in Vehicular Networks. AFRICON 2019: 1-7 - [c96]Jagdeep Singh
, Sanjay K. Dhurandher, Isaac Woungang, Makoto Takizawa
:
Centrality Based Geocasting for Opportunistic Networks. AINA 2019: 702-712 - [c95]Richa Siddavaatam, Isaac Woungang, Sanjay Kumar Dhurandher:
An Efficient Data Transmission Technique for Big Video Files over HetNet in Emerging 5G Networks. AINA 2019: 713-724 - [c94]Sanjay K. Dhurandher, Jagdeep Singh
, Isaac Woungang, Makoto Takizawa, Geetanshu Gupta, Raghav Kumar:
Fuzzy Geocasting in Opportunistic Networks. BWCCA 2019: 279-292 - [c93]Mohammed Alshahrani, Issa Traoré, Isaac Woungang:
Anonymous IoT Mutual Inter-Device Authentication Scheme Based on Incremental Counter (AIMIA-IC). FiCloud 2019: 31-41 - [c92]Sanjay K. Dhurandher, Jagdeep Singh
, Isaac Woungang, Joel J. P. C. Rodrigues:
Priority Based Buffer Management Technique for Opportunistic Networks. GLOBECOM 2019: 1-6 - [c91]Mário W. L. Moreira
, Joel J. P. C. Rodrigues, Vasco Furtado, Constandinos X. Mavromoustakis, Neeraj Kumar
, Isaac Woungang:
Fetal Birth Weight Estimation in High-Risk Pregnancies Through Machine Learning Techniques. ICC 2019: 1-6 - [c90]Mohammed Alshahrani, Issa Traoré, Isaac Woungang:
Design and Implementation of a Lightweight Authentication Framework for the Internet of Things (IoT). IoTSMS 2019: 185-194 - [c89]Onyekachi Nwamuo, Paulo Magella de Faria Quinan, Issa Traoré, Isaac Woungang, Abdulaziz Aldribi:
Arguments Against Using the 1998 DARPA Dataset for Cloud IDS Design and Evaluation and Some Alternative. MLN 2019: 315-332 - [c88]Hanan Alhindi, Issa Traoré, Isaac Woungang:
Data Loss Prevention Using Document Semantic Signature. WIDECOM 2019: 75-99 - [e8]Isaac Woungang, Sanjay Kumar Dhurandher:
2nd International Conference on Wireless Intelligent and Distributed Environment for Communication, WIDECOM 2019, Milan, Italy, February 11-13, 2019. Lecture Notes on Data Engineering and Communications Technologies 27, Springer 2019, ISBN 978-3-030-11436-7 [contents] - [i1]Shree Krishna Sharma, Isaac Woungang, Alagan Anpalagan, Symeon Chatzinotas:
Towards Tactile Internet in Beyond 5G Era: Recent Advances, Current Issues and Future Directions. CoRR abs/1908.07337 (2019) - 2018
- [j84]Ali A. Alnoman
, Glaucio H. S. Carvalho, Alagan Anpalagan
, Isaac Woungang
:
Energy Efficiency on Fully Cloudified Mobile Networks: Survey, Challenges, and Open Issues. IEEE Commun. Surv. Tutorials 20(2): 1271-1291 (2018) - [j83]Shiyu Tang, Ali A. Alnoman
, Alagan Anpalagan
, Isaac Woungang
:
A user-centric cooperative edge caching scheme for minimizing delay in 5G content delivery networks. Trans. Emerg. Telecommun. Technol. 29(8) (2018) - [j82]Nitin Gupta
, Sanjay Kumar Dhurandher, Isaac Woungang
:
Subcarriers assignment scheme for multiple secondary users in OFDMA-based IEEE 802.22 WRAN: A game theoretic approach. Trans. Emerg. Telecommun. Technol. 29(11) (2018) - [j81]Bhoopendra Kumar, Sanjay Kumar Dhurandher, Isaac Woungang
:
A survey of overlay and underlay paradigms in cognitive radio networks. Int. J. Commun. Syst. 31(2) (2018) - [j80]Nitin Gupta, Sanjay Kumar Dhurandher, Isaac Woungang, Joel J. P. C. Rodrigues:
On the target channel sequence selection for multiple handoffs in cognitive radio-based wireless regional area networks. Int. J. Space Based Situated Comput. 8(4): 214-224 (2018) - [j79]Satya Jyoti Borah, Sanjay K. Dhurandher, Isaac Woungang, Vinesh Kumar
, Leonard Barolli:
A multi-objectives based technique for optimized routing in opportunistic networks. J. Ambient Intell. Humaniz. Comput. 9(3): 655-666 (2018) - [j78]Glaucio H. S. Carvalho, Isaac Woungang, Alagan Anpalagan
, Muhammad Jaseemuddin:
Analysis of joint parallelism in wireless and cloud domains on mobile edge computing over 5G systems. J. Commun. Networks 20(6): 565-577 (2018) - [j77]Sanjay Kumar Dhurandher, Satya Jyoti Borah, Isaac Woungang, Suryansh Tibarewala, Leonard Barolli:
DEEP: Distance and encounter based energy-efficient protocol for opportunistic networks. J. High Speed Networks 24(2): 119-131 (2018) - [j76]Sanjay K. Dhurandher, Satya Jyoti Borah, Isaac Woungang, Aman Bansal, Apoorv Gupta:
A location Prediction-based routing scheme for opportunistic networks in an IoT scenario. J. Parallel Distributed Comput. 118(Part): 369-378 (2018) - [j75]Maninder Singh Raniyal, Isaac Woungang
, Sanjay Kumar Dhurandher, Sherif Saad Ahmed:
Passphrase protected device-to-device mutual authentication schemes for smart homes. Secur. Priv. 1(3) (2018) - [j74]Isaac Woungang, Sanjay Kumar Dhurandher, Joel J. P. C. Rodrigues, Ahmed Awad:
Special Issue on security and privacy in Internet of Things and cloud computing systems. Secur. Priv. 1(3) (2018) - [j73]Deepak Kr. Sharma
, Sanjay K. Dhurandher, Isaac Woungang
, Rohit Kumar Srivastava, Anhad Mohananey, Joel J. P. C. Rodrigues
:
A Machine Learning-Based Protocol for Efficient Routing in Opportunistic Networks. IEEE Syst. J. 12(3): 2207-2213 (2018) - [j72]Anju S. Pillai, Kaumudi Singh, Vijayalakshmi Saravanan, Alagan Anpalagan
, Isaac Woungang, Leonard Barolli:
A genetic algorithm-based method for optimizing the energy consumption and performance of multiprocessor systems. Soft Comput. 22(10): 3271-3285 (2018) - [c87]Urvashi Choudhary
, Sanjay Kumar Dhurandher, Vinesh Kumar
, Isaac Woungang, Joel J. P. C. Rodrigues:
Online Signature Verification Using the Information Set Based Models. AINA 2018: 1104-1109 - [c86]Sanjay K. Dhurandher, Isaac Woungang, Nitin Gupta
, Rishabh Jain, Devesh Singhal, Joshika Agarwal, Mohammad S. Obaidat:
Optimal Secondary Users Selection for Cooperative Spectrum Sensing in Cognitive Radio Networks. GLOBECOM Workshops 2018: 1-6 - [c85]Papa Ndiaga Ba, Joel J. P. C. Rodrigues, Samuel Ouya
, Amadou Seidou Maiga
, Isaac Woungang, Sanjay Dhurander, Shahid Mumtaz:
Performance Evaluation of LTE and 5G Modeling over OFDM and GFDM Physical Layers. ICC 2018: 1-6 - [c84]Satya Jyoti Borah, Sanjay K. Dhurandher, Isaac Woungang, Nisha Kandhoul, Joel J. P. C. Rodrigues:
An Energy-Efficient Location Prediction-Based Forwarding Scheme for Opportunistic Networks. ICC 2018: 1-6 - [c83]Nitin Gupta, Sanjay Kumar Dhurandher, Isaac Woungang, Mohammad S. Obaidat:
Proactive Decision Based Handoff Scheme for Cognitive Radio Networks. ICC 2018: 1-6 - [c82]Joshika Agarwal, Rishabh Jain, Sanjay Kumar Dhurandher, Isaac Woungang, Nitin Gupta:
Fair sub-carrier allocation in OFDMA and cognitive radio based IEEE 802.22 WRAN. INFOCOM Workshops 2018: 571-576 - [c81]Maninder Singh Raniyal, Isaac Woungang, Sanjay Kumar Dhurandher:
An RSA-Based User Authentication Scheme for Smart-Homes Using Smart Card. ISDDC 2018: 16-29 - [c80]Rita De C. D. Leles, Joel J. P. C. Rodrigues, Isaac Woungang, Ricardo A. L. Rabêlo, Vasco Furtado:
Railways Networks - Challenges for IoT Underground Wireless Communications. LATINCOM 2018: 1-6 - [c79]Oumar Guèye, Isaac Woungang, Faria Khandaker, Bodrul Alam:
Design and Analysis of a Survivable ATM Network. LOPAL 2018: 60:1-60:6 - [e7]Leonard Barolli, Isaac Woungang, Omar Khadeer Hussain:
Advances in Intelligent Networking and Collaborative Systems, The 9th International Conference on Intelligent Networking and Collaborative Systems, INCoS-2017, Ryerson University, Toronto, ON, Canada, August 24-26, 2017. Lecture Notes on Data Engineering and Communications Technologies 8, Springer 2018, ISBN 978-3-319-65635-9 [contents] - [e6]Issa Traoré, Isaac Woungang, Sherif Saad Ahmed, Yasir Malik:
Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments - Second International Conference, ISDDC 2018, Vancouver, BC, Canada, November 28-30, 2018, Proceedings. Lecture Notes in Computer Science 11317, Springer 2018, ISBN 978-3-030-03711-6 [contents] - 2017
- [j71]Satya Jyoti Borah, Sanjay Kumar Dhurandher, Isaac Woungang, Vinesh Kumar
:
A game theoretic context-based routing protocol for opportunistic networks in an IoT scenario. Comput. Networks 129: 572-584 (2017) - [j70]Fatima Hussain, Lilatul Ferdouse, Alagan Anpalagan, Lutful Karim, Isaac Woungang:
Security threats in M2M networks: a survey with case study. Comput. Syst. Sci. Eng. 32(2) (2017) - [j69]Sanjay K. Dhurandher, Deepak Kumar Sharma
, Isaac Woungang, Aakanksha Saini:
An energy-efficient history-based routing scheme for opportunistic networks. Int. J. Commun. Syst. 30(7) (2017) - [j68]Arun Kumar
, Sanjay K. Dhurandher, Isaac Woungang, Mohammad S. Obaidat
, Sahil Gupta, Joel J. P. C. Rodrigues
:
An altruism-based trust-dependent message forwarding protocol for opportunistic networks. Int. J. Commun. Syst. 30(10) (2017) - [j67]Marcelo Luiz Brocardo, Issa Traoré, Isaac Woungang, Mohammad S. Obaidat
:
Authorship verification using deep belief network systems. Int. J. Commun. Syst. 30(12) (2017) - [j66]Pragya Kuchhal, Sanjay Kumar Dhurandher, Satya Jyoti Borah, Isaac Woungang, Satbir Jain, Sahil Gupta:
A* search based next hop selection for routing in opportunistic networks. Int. J. Space Based Situated Comput. 7(3): 177-186 (2017) - [j65]Glaucio H. S. Carvalho, Isaac Woungang, Alagan Anpalagan
, Muhammad Jaseemuddin, Ekram Hossain:
Intercloud and HetNet for Mobile Cloud Computing in 5G Systems: Design Issues, Challenges, and Optimization. IEEE Netw. 31(3): 80-89 (2017) - [j64]Sanjay Kumar Malik
, Mayank Dave
, Sanjay K. Dhurandher, Isaac Woungang, Leonard Barolli:
An ant-based QoS-aware routing protocol for heterogeneous wireless sensor networks. Soft Comput. 21(21): 6225-6236 (2017) - [c78]Sanjay K. Dhurandher, Arun Kumar
, Isaac Woungang, Mohammad S. Obaidat
:
Supernova and Hypernova Misbehavior Detection Scheme for Opportunistic Networks. AINA 2017: 387-391 - [c77]Abhishek Kumar
, Sanjay Kumar Dhurandher, Isaac Woungang, Vinesh Kumar
, Makoto Takizawa:
Interference Aware Metric-Based Routing Protocol in Cognitive Radio Networks. BWCCA 2017: 502-515 - [c76]Satya Jyoti Borah, Sanjay K. Dhurandher, Suryansh Tibarewala, Isaac Woungang, Mohammad S. Obaidat:
Energy-Efficient Prophet-PRoWait-EDR Protocols for Opportunistic Networks. GLOBECOM 2017: 1-6 - [c75]Nitin Gupta, Sanjay Kumar Dhurandher, Isaac Woungang, Joel J. P. C. Rodrigues:
Game Theoretic Analysis of Post Handoff Target Channel Sharing in Cognitive Radio Networks. GLOBECOM 2017: 1-6 - [c74]Mário W. L. Moreira
, Joel J. P. C. Rodrigues, Neeraj Kumar
, Jianwei Niu
, Isaac Woungang:
Performance Assessment of Decision Tree-Based Predictive Classifiers for Risk Pregnancy Care. GLOBECOM 2017: 1-5 - [c73]Glaucio H. S. Carvalho, Isaac Woungang, Alagan Anpalagan
, Elena Degtiareva, Joel J. P. C. Rodrigues:
A Semi-Markov Decision Model-based brokering mechanism for mobile cloud market. ICC 2017: 1-6 - [c72]Abdelraman Alenazi, Issa Traoré, Karim Ganame, Isaac Woungang:
Holistic Model for HTTP Botnet Detection Based on DNS Traffic Analysis. ISDDC 2017: 1-18 - [c71]Maninder Singh Raniyal, Isaac Woungang, Sanjay Kumar Dhurandher:
An Inter-device Authentication Scheme for Smart Homes Using One-Time-Password Over Infrared Channel. ISDDC 2017: 95-117 - [c70]Deepak Kumar Sharma
, Sanjay Kumar Dhurandher, Isaac Woungang, Aman Bansal, Apoorv Gupta:
GD-CAR: A Genetic Algorithm Based Dynamic Context Aware Routing Protocol for Opportunistic Networks. NBiS 2017: 611-622 - [e5]Issa Traoré, Isaac Woungang, Ahmed Awad:
Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments - First International Conference, ISDDC 2017, Vancouver, BC, Canada, October 26-28, 2017, Proceedings. Lecture Notes in Computer Science 10618, Springer 2017, ISBN 978-3-319-69154-1 [contents] - 2016
- [j63]Isaac Woungang, Sanjay Kumar Dhurandher:
Introduction to the special section on cognitive radios as next-generation wireless networks. Comput. Electr. Eng. 52: 223-225 (2016) - [j62]Nele Mentens
, Damien Sauveron, José M. Sierra
, Shiuh-Jeng Wang, Isaac Woungang:
Guest Editorial. IET Inf. Secur. 10(5): 223-224 (2016) - [j61]Ilsun You, Marek R. Ogiela, Isaac Woungang, Kangbin Yim:
Innovative security technologies against insider threats and data leakage. Int. J. Comput. Math. 93(2): 236-238 (2016) - [j60]Hwang-Cheng Wang, Isaac Woungang, Kuo-Chang Ting, Chih-Cheng Tseng, Fang-Chang Kuo, Hung Te Huang:
Co-tier downlink interference management in dense femtocell networks. Int. J. Commun. Syst. 29(17): 2534-2541 (2016) - [j59]Fatema Rashid, Ali Miri, Isaac Woungang:
Secure image deduplication through image compression. J. Inf. Secur. Appl. 27-28: 54-64 (2016) - [j58]Asem Kitana, Issa Traoré, Isaac Woungang:
Impact Study of a Mobile Botnet over LTE Networks. J. Internet Serv. Inf. Secur. 6(2): 1-22 (2016) - [j57]Asem Kitana, Issa Traoré, Isaac Woungang:
Impact Study of a Mobile Botnet over LTE Networks. J. Internet Serv. Inf. Secur. 6(3): 1-26 (2016) - [j56]Isaac Woungang, Sanjay Kumar Dhurandher, Mohammad S. Obaidat
, Rajender Dheeraj Peddi:
A DSR-based routing protocol for mitigating blackhole attacks on mobile ad hoc networks. Secur. Commun. Networks 9(5): 420-428 (2016) - [j55]Glaucio H. S. Carvalho, Isaac Woungang, Alagan Anpalagan
, Ekram Hossain:
QoS-Aware Energy-Efficient Joint Radio Resource Management in Multi-RAT Heterogeneous Networks. IEEE Trans. Veh. Technol. 65(8): 6343-6365 (2016) - [c69]Sanjay Kumar Dhurandher, Satya Jyoti Borah, Isaac Woungang, Deepak Kumar Sharma
, Kunal Arora, Divyansh Agarwal:
EDR: An Encounter and Distance Based Routing Protocol for Opportunistic Networks. AINA 2016: 297-302 - [c68]Sanjay K. Dhurandher, Satya Jyoti Borah, Isaac Woungang, Sahil Gupta, Pragya Kuchal, Makoto Takizawa, Leonard Barolli:
A Probabilistic Encounter and Distance-based Routing Protocol for Opportunistic Networks. BWCCA 2016: 491-499 - [c67]Richa Siddavaatam, Isaac Woungang, Glaucio H. S. Carvalho, Alagan Anpalagan
:
An efficient method for mobile big data transfer over HetNet in emerging 5G systems. CAMAD 2016: 59-64 - [c66]Amarpreet Bamrah, Isaac Woungang, Leonard Barolli, Sanjay Kumar Dhurandher, Glaucio H. S. Carvalho, Makoto Takizawa
:
A Centrality-Based History Prediction Routing Protocol for Opportunistic Networks. CISIS 2016: 130-136 - [c65]Tetsuya Oda, Masafumi Yamada, Ryoichiro Obukata, Leonard Barolli, Isaac Woungang, Makoto Takizawa
:
Experimental Results of a Raspberry Pi Based Wireless Mesh Network Testbed Considering TCP and LoS Scenario. CISIS 2016: 175-179 - [c64]Shinji Sakamoto
, Tetsuya Oda, Makoto Ikeda, Leonard Barolli, Fatos Xhafa, Isaac Woungang:
Investigation of Fitness Function Weight-Coefficients for Optimization in WMN-PSO Simulation System. CISIS 2016: 224-229 - [c63]Ryoichiro Obukata, Tetsuya Oda, Donald Elmazi
, Leonard Barolli, Keita Matsuo, Isaac Woungang:
Performance Evaluation of an Ambient Intelligence Testbed for Improving Quality of Life: Evaluation Using Clustering Approach. CISIS 2016: 484-487 - [c62]Vani Shrivastav, Sanjay K. Dhurandher, Isaac Woungang, Vinesh Kumar
, Joel J. P. C. Rodrigues:
Game Theory-Based Channel Allocation in Cognitive Radio Networks. GLOBECOM 2016: 1-5 - [c61]Richa Siddavaatam, Isaac Woungang, Glaucio H. S. Carvalho, Alagan Anpalagan
:
Efficient Ubiquitous Big Data Storage Strategy for Mobile Cloud Computing over HetNet. GLOBECOM 2016: 1-6 - [c60]Bhagyashri Tushir, Sanjay K. Dhurandher, Isaac Woungang, Mohammad S. Obaidat
, Vinesh Teotia:
Graph colouring technique for efficient channel allocation in cognitive radio networks. ICC 2016: 1-5 - [c59]Khuram Khalid
, Isaac Woungang, Sanjay K. Dhurandher, Leonard Barolli, Glaucio H. S. Carvalho, Makoto Takizawa
:
An Energy-Efficient Routing Protocol for Infrastructure-Less Opportunistic Networks. IMIS 2016: 237-244 - [c58]Asem Kitana, Issa Traoré, Isaac Woungang:
Impact of base transceiver station selection mechanisms on a mobile botnet over a LTE network. MALWARE 2016: 20-30 - [c57]Shinji Sakamoto
, Tetsuya Oda, Makoto Ikeda, Leonard Barolli, Fatos Xhafa, Isaac Woungang:
Node Placement in Wireless Mesh Networks: A Comparison Study of WMN-SA and WMN-PSO Simulation Systems. NBiS 2016: 1-8 - [c56]Monika Pathak, Sanjay K. Dhurandher, Isaac Woungang, Bhagyashri Tushir, Vinesh Kumar
, Makoto Takizawa
, Leonard Barolli:
Power Control Scheme for Underlay Approach in Cognitive Radio Networks. NBiS 2016: 114-118 - 2015
- [j54]Vijayalakshmi Saravanan, Kothari Dwarkadas Pralhaddas, Dwarkadas Pralhaddas Kothari, Isaac Woungang:
An optimizing pipeline stall reduction algorithm for power and performance on multi-core CPUs. Hum. centric Comput. Inf. Sci. 5: 2 (2015) - [j53]Vijayalakshmi Saravanan, Alagan Anpalagan
, Dwarkadas Pralhaddas Kothari, Isaac Woungang:
Erratum to: An optimizing pipeline stall reduction algorithm for power and performance on multi-core CPUs. Hum. centric Comput. Inf. Sci. 5: 9 (2015) - [j52]Vijayalakshmi Saravanan, Alagan Anpalagan
, Isaac Woungang:
An energy-delay product study on chip multi-processors for variable stage pipelining. Hum. centric Comput. Inf. Sci. 5: 28 (2015) - [j51]Marcelo Luiz Brocardo, Issa Traoré, Isaac Woungang:
Authorship verification of e-mail and tweet messages applied for continuous authentication. J. Comput. Syst. Sci. 81(8): 1429-1440 (2015) - [j50]Sanjay Kumar Dhurandher, Deepak Kr. Sharma, Sahil Gupta, Isaac Woungang, Mohammad S. Obaidat:
Integration of Fixed and Mobile Infrastructure for Message Passing in Opportunistic Networks. J. Networks 10(12): 642-657 (2015) - [j49]Marcelo Luiz Brocardo, Issa Traoré, Sherif Saad, Isaac Woungang:
Verifying Online User Identity using Stylometric Analysis for Short Messages. J. Networks 10(12): 675-683 (2015) - [j48]Jian-Ming Chang, Po-Chun Tsou, Isaac Woungang, Han-Chieh Chao
, Chin-Feng Lai
:
Defending Against Collaborative Attacks by Malicious Nodes in MANETs: A Cooperative Bait Detection Approach. IEEE Syst. J. 9(1): 65-75 (2015) - [j47]Sanjay Kumar Dhurandher, Isaac Woungang, Mohammad S. Obaidat
, Kirti Kumar, Mamta Joshi, Monika Verma:
A Distributed Adaptive Admission Control Scheme for Multimedia Wireless Mesh Networks. IEEE Syst. J. 9(2): 595-604 (2015) - [j46]Isaac Woungang, Fan-Hsun Tseng
, Yi-Hsuan Lin, Li-Der Chou, Han-Chieh Chao
, Mohammad S. Obaidat
:
MR-Chord: Improved Chord Lookup Performance in Structured Mobile P2P Networks. IEEE Syst. J. 9(3): 743-751 (2015) - [j45]Sanjay K. Dhurandher, Deepak Kumar Sharma
, Isaac Woungang, Aakanksha Saini:
Efficient routing based on past information to predict the future location for message passing in infrastructure-less opportunistic networks. J. Supercomput. 71(5): 1694-1711 (2015) - [j44]Afshin Behzadan, Alagan Anpalagan
, Isaac Woungang, Bobby Ma, Han-Chieh Chao
:
An energy-efficient utility-based distributed data routing scheme for heterogenous sensor networks. Wirel. Commun. Mob. Comput. 15(16): 2020-2037 (2015) - [c55]A. H. Mohammed, Ahmed Shaharyar Khwaja, Alagan Anpalagan
, Isaac Woungang:
Base Station Selection in M2M Communication Using Q-Learning Algorithm in LTE-A Networks. AINA 2015: 17-22 - [c54]Ssowjanya Harishankar, Isaac Woungang, Sanjay Kumar Dhurandher, Issa Traoré, Shakira Banu Kaleel:
E-MAnt Net: An ACO-Based Energy Efficient Routing Protocol for Mobile Ad Hoc Networks. AINA 2015: 29-36 - [c53]Parampreet Sidhu, Isaac Woungang, Glaucio H. S. Carvalho, Alagan Anpalagan
, Sanjay K. Dhurandher:
An Analysis of Machine-Type-Communication on Human-Type-Communication over Wireless Communication Networks. AINA Workshops 2015: 332-337 - [c52]Fatema Rashid, Ali Miri, Isaac Woungang:
Proof of Storage for Video Deduplication in the Cloud. BigData Congress 2015: 499-505 - [c51]Fatema Rashid, Ali Miri, Isaac Woungang:
A Secure Video Deduplication Scheme in Cloud Storage Environments Using H.264 Compression. BigDataService 2015: 138-146 - [c50]Vinesh Teotia, Sanjay K. Dhurandher, Isaac Woungang, Mohammad S. Obaidat
:
Markovian Model Based Channel Allocation in Cognitive Radio Networks. DSDIS 2015: 478-482 - [c49]Akinniyi Ojo, Ngok-Wah Ma, Isaac Woungang:
Modified Floyd-Warshall algorithm for equal cost multipath in software-defined data center. ICC Workshops 2015: 346-351 - [c48]Vinesh Teotia, Sanjay Kumar Dhurandher, Isaac Woungang, Mohammad S. Obaidat
:
Wormhole prevention using COTA mechanism in position based environment over MANETs. ICC 2015: 7036-7040 - [c47]Glaucio H. S. Carvalho, Isaac Woungang, Alagan Anpalagan
, Leonard Barolli, Makoto Takizawa
:
Optimal Cloud Broker Method for Cloud Selection in Mobile Inter-cloud Computing. IMIS 2015: 239-244 - [c46]Sanjay K. Dhurandher, Isaac Woungang, Anshu Rajendra, Piyush Ghai, Periklis Chatzimisios
:
A Centrality-Based ACK Forwarding Mechanism for Efficient Routing in Infrastructureless Opportunistic Networks. IoT 360 (1) 2015: 99-108 - 2014
- [j43]Lutful Karim, Alagan Anpalagan
, Nidal Nasser
, Jalal Almhana, Isaac Woungang:
Fault tolerant, energy efficient and secure clustering scheme for mobile machine-to-machine communications. Trans. Emerg. Telecommun. Technol. 25(10): 1028-1044 (2014) - [j42]Marcelo Luiz Brocardo, Issa Traoré, Sherif Saad, Isaac Woungang:
Verifying Online User Identity using Stylometric Analysis for Short Messages. J. Networks 9(12): 3347-3355 (2014) - [j41]Issa Traoré, Isaac Woungang, Mohammad S. Obaidat
, Youssef Nakkabi, Iris Lai:
Online risk-based authentication using behavioral biometrics. Multim. Tools Appl. 71(2): 575-605 (2014) - [j40]Mohammad S. Obaidat
, Isaac Woungang, Sanjay Kumar Dhurandher, Vincent Koo:
A cryptography-based protocol against packet dropping and message tampering attacks on mobile ad hoc networks. Secur. Commun. Networks 7(2): 376-384 (2014) - [j39]Vijayalakshmi Saravanan, Alagan Anpalagan
, Dwarkadas Pralhaddas Kothari, Isaac Woungang, Mohammad S. Obaidat
:
An analytical study of resource division and its impact on power and performance of multi-core processors. J. Supercomput. 68(3): 1265-1279 (2014) - [j38]Sanjay K. Dhurandher, Deepak Kumar Sharma
, Isaac Woungang, Rohan Gupta, Sanjay Garg:
GAER: genetic algorithm-based energy-efficient routing protocol for infrastructure-less opportunistic networks. J. Supercomput. 69(3): 1183-1214 (2014) - [j37]Vijayalakshmi Saravanan, Alagan Anpalagan
, Dwarkadas Pralhaddas Kothari, Isaac Woungang, Mohammad S. Obaidat
:
A comparative simulation study on the power-performance of multi-core architecture. J. Supercomput. 70(1): 465-487 (2014) - [j36]Glaucio H. S. Carvalho, Isaac Woungang, Alagan Anpalagan
:
Analysis of Sub-Band Allocation in Multi-Service Cognitive Radio Access Networks. IEEE Wirel. Commun. Lett. 3(6): 645-648 (2014) - [j35]Vincent Ngo, Isaac Woungang, Alagan Anpalagan
:
A schedule-based medium access control protocol for mobile wireless sensor networks. Wirel. Commun. Mob. Comput. 14(6): 629-643 (2014) - [j34]Afshin Behzadan, Alagan Anpalagan
, Isaac Woungang, Bobby Ma:
Utility-driven construction of balanced data routing trees in wireless sensor networks. Wirel. Commun. Mob. Comput. 14(8): 770-788 (2014) - [j33]Richa Siddavaatam, Alagan Anpalagan
, Isaac Woungang, Sudip Misra:
Ant Colony Optimization Based Sub-channel Allocation Algorithm for Small Cell HetNets. Wirel. Pers. Commun. 77(1): 411-432 (2014) - [c45]Marcelo Luiz Brocardo, Issa Traoré, Isaac Woungang:
Toward a Framework for Continuous Authentication Using Stylometry. AINA 2014: 106-115 - [c44]Sanjay K. Dhurandher, Isaac Woungang, Issa Traoré:
C-SCAN: An Energy-Efficient Network Layer Security Protocol for Mobile Ad Hoc Networks. AINA Workshops 2014: 530-535 - [c43]Fatema Rashid, Ali Miri, Isaac Woungang:
Proof of Retrieval and Ownership Protocols for Images through SPIHT Compression. HPCC/CSS/ICESS 2014: 835-838 - [c42]Sanjay K. Dhurandher, Mohammad S. Obaidat
, Isaac Woungang, Pragya Agarwal, Abhishek Gupta, Prateek Gupta:
A cluster-based load balancing algorithm in cloud computing. ICC 2014: 2921-2925 - [e4]James J. Park, Hojjat Adeli, Namje Park, Isaac Woungang:
Mobile, Ubiquitous, and Intelligent Computing - MUSIC 2013, FTRA 4th International Conference on Mobile, Ubiquitous, and Intelligent Computing, September 4-6, 2013, Gwangju, Korea. Lecture Notes in Electrical Engineering 274, Springer 2014, ISBN 978-3-642-40674-4 [contents] - 2013
- [j32]Taeshik Shon, Ching-Hsien Hsu, Isaac Woungang:
Introduction to Special issue on Recent Advanced Technologies and Theories for Grid and Cloud Computing. Comput. Electr. Eng. 39(1): 1-2 (2013) - [j31]Glaucio H. S. Carvalho, Isaac Woungang, Alagan Anpalagan
, Rodolfo W. L. Coutinho
, João Crisóstomo Weyl Albuquerque Costa:
A semi-Markov decision process-based joint call admission control for inter-RAT cell re-selection in next generation wireless networks. Comput. Networks 57(17): 3545-3562 (2013) - [j30]Sanjay Kumar Dhurandher, Deepak Kumar Sharma, Isaac Woungang:
Energy-based Performance Evaluation of Various Routing Protocols in Infrastructure-less Opportunistic Networks. J. Internet Serv. Inf. Secur. 3(1/2): 37-48 (2013) - [j29]Bassam Sayed, Issa Traoré, Isaac Woungang, Mohammad S. Obaidat
:
Biometric Authentication Using Mouse Gesture Dynamics. IEEE Syst. J. 7(2): 262-274 (2013) - [j28]Li-Sheng Chen, Hwang-Cheng Wang, Isaac Woungang, Fang-Chang Kuo:
EOBDBR: an Efficient Optimum Branching-Based Distributed Broadcast Routing protocol for wireless ad hoc networks. Telecommun. Syst. 52(2): 497-512 (2013) - [j27]Isaac Woungang, Sanjay Kumar Dhurandher, Lakshaya Agnani, Ankit Mahendru, Alagan Anpalagan
:
An ant-swarm inspired dynamic multiresolution data dissemination protocol for wireless sensor networks. J. Supercomput. 65(2): 524-542 (2013) - [c41]Fatema Rashid, Ali Miri, Isaac Woungang:
Secure Enterprise Data Deduplication in the Cloud. IEEE CLOUD 2013: 367-374 - [c40]Sanjay K. Dhurandher, Isaac Woungang, Raveena Mathur, Prashant Khurana:
GAODV: A Modified AODV Against Single and Collaborative Black Hole Attacks in MANETs. AINA Workshops 2013: 357-362 - [c39]Sanjay K. Dhurandher, Isaac Woungang, Sahil Sharma, Veeresh Goswami:
A Priority Based Differentiation for Contention Mechanism in Legacy DCF Method. AINA Workshops 2013: 478-482 - [c38]Sanjay K. Dhurandher, Deepak Kumar Sharma
, Isaac Woungang, Shruti Bhati
:
HBPR: History Based Prediction for Routing in Infrastructure-less Opportunistic Networks. AINA 2013: 931-936 - [c37]Fatema Rashid, Ali Miri, Isaac Woungang:
Proof of retrieval and ownership protocols for enterprise-level data deduplication. CASCON 2013: 81-90 - [c36]Marcelo Luiz Brocardo, Issa Traoré, Sherif Saad, Isaac Woungang:
Authorship verification for short messages using stylometry. CITS 2013: 1-6 - [c35]Glaucio H. S. Carvalho, Isaac Woungang, Mohammad S. Obaidat
, Alagan Anpalagan
, Md. Mizanur Rahman
:
A joint call admission control-based approach for initial RAT selection in HetNets. CITS 2013: 1-5 - [c34]Isaac Woungang, Mohammad S. Obaidat
, Sanjay Kumar Dhurandher, Issa Traoré:
A timed and secured monitoring implementation against wormhole attacks in AODV-based Mobile Ad Hoc Networks. CITS 2013: 1-5 - [c33]Lutful Karim, Alagan Anpalagan
, Nidal Nasser
, Jalal Almhana, Isaac Woungang:
An energy efficient, fault tolerant and secure clustering scheme for M2M communication networks. GLOBECOM Workshops 2013: 677-682 - [c32]Glaucio H. S. Carvalho, Isaac Woungang, Md. Mizanur Rahman, Alagan Anpalagan
:
An Optimal Radio Access Network Selection Method for Heterogeneous Wireless Networks. GPC 2013: 244-252 - [c31]Isaac Woungang, Sanjay Kumar Dhurandher, Michael Sahai:
An Energy-Aware Secured Routing Protocol for Mobile Ad Hoc Networks Using Trust-Based Multipath. GPC 2013: 517-525 - [c30]Isaac Woungang, Mohammad S. Obaidat
, Sanjay Kumar Dhurandher, Alexander Ferworn
, Waqas Shah:
An ant-swarm inspired energy-efficient ad hoc on-demand routing protocol for mobile ad hoc networks. ICC 2013: 3645-3649 - [c29]Sanjay K. Dhurandher, Deepak Kumar Sharma
, Isaac Woungang:
Mobility Models-Based Performance Evaluation of the History Based Prediction for Routing Protocol for Infrastructure-Less Opportunistic Networks. MobiQuitous 2013: 757-767 - [c28]Sahil Gupta, Sanjay Kumar Dhurandher, Isaac Woungang, Arun Kumar
, Mohammad S. Obaidat
:
Trust-based Security Protocol against blackhole attacks in opportunistic networks. WiMob 2013: 724-729 - 2012
- [j26]Jong Hyuk Park, Isaac Woungang, Jianhua Ma, Fahim Kawsar:
Ubiquitous computing for communications and broadcasting. Int. J. Commun. Syst. 25(6): 689-690 (2012) - [j25]Issa Traoré, Isaac Woungang, Ahmed Awad El Sayed Ahmed, Mohammad S. Obaidat
:
Software Performance Modeling using the UML: a Case Study. J. Networks 7(1): 4-20 (2012) - [j24]Isaac Woungang, Felix O. Akinladejo, David W. White
, Mohammad S. Obaidat
:
Coding-error based defects in enterprise resource planning software: Prevention, discovery, elimination and mitigation. J. Syst. Softw. 85(7): 1682-1698 (2012) - [j23]Hwang-Cheng Wang, Isaac Woungang, Jia-Bao Lin, Fang-Chang Kuo, Kuo-Chang Ting:
Revisiting relative neighborhood graph-based broadcasting algorithms for multimedia ad hoc wireless networks. J. Supercomput. 62(1): 24-41 (2012) - [j22]Hwang-Cheng Wang, Isaac Woungang, Cheng-Wen Yao, Alagan Anpalagan
, Mohammad S. Obaidat
:
Energy-efficient tasks scheduling algorithm for real-time multiprocessor embedded systems. J. Supercomput. 62(2): 967-988 (2012) - [j21]Issa Traoré, Isaac Woungang, Youssef Nakkabi, Mohammad S. Obaidat
, Ahmed Awad E. Ahmed, Bijan Khalilian:
Dynamic Sample Size Detection in Learning Command Line Sequence for Continuous Authentication. IEEE Trans. Syst. Man Cybern. Part B 42(5): 1343-1356 (2012) - [j20]M. Subramaniam, Alagan Anpalagan
, Isaac Woungang:
Performance of a Distributed Full Inversion Power Control and Base Station Assignment Scheme in a Cellular CDMA Network with Hot-spots. Wirel. Pers. Commun. 65(3): 713-729 (2012) - [c27]Sanjay Kumar Dhurandher, Isaac Woungang, Kirti Kumar, Mamta Joshi, Monika Verma:
A Rate Adaptive Admission Control Protocol for Multimedia Wireless Mesh Networks. AINA 2012: 38-43 - [c26]Sanjay Kumar Dhurandher, Isaac Woungang, Abhishek Gupta, Bharat K. Bhargava:
E2SIW: An Energy Efficient Scheme Immune to Wormhole Attacks in Wireless Ad Hoc Networks. AINA Workshops 2012: 472-477 - [c25]Isaac Woungang, Sanjay Kumar Dhurandher, Rajender Dheeraj Peddi, Issa Traoré:
Mitigating Collaborative Blackhole Attacks on DSR-Based Mobile Ad Hoc Networks. FPS 2012: 308-323 - [c24]Isaac Woungang, Sanjay Kumar Dhurandher, Vincent Koo, Issa Traoré:
Comparison of two security protocols for preventing packet dropping and message tampering attacks on AODV-based mobile ad Hoc networks. GLOBECOM Workshops 2012: 1037-1041 - [c23]Isaac Woungang, Sanjay Kumar Dhurandher, Mohammad S. Obaidat
, Han-Chieh Chao
, Chris Liu:
Trust-enhanced message security protocol for mobile ad hoc networks. ICC 2012: 988-992 - [c22]Jian-Ming Chang, Yi-Hsuan Lin, Isaac Woungang, Han-Chieh Chao
:
MR-Chord: A scheme for enhancing Chord lookup accuracy and performance in mobile P2P network. ICC 2012: 5408-5412 - [c21]Fatema Rashid, Ali Miri, Isaac Woungang:
A secure data deduplication framework for cloud environments. PST 2012: 81-87 - 2011
- [j19]Sanjay K. Dhurandher, Sudip Misra, Harsh Mittal, Anubhav Agarwal, Isaac Woungang:
Using ant-based agents for congestion control in ad-hoc wireless sensor networks. Clust. Comput. 14(1): 41-53 (2011) - [j18]Chung-Ming Huang, Isaac Woungang, Ming-Chiao Chen:
Open network service technologies and applications. Comput. Commun. 34(2): 119 (2011) - [j17]Mieso K. Denko, Tao Sun, Isaac Woungang:
Trust management in ubiquitous computing: A Bayesian approach. Comput. Commun. 34(3): 398-406 (2011) - [j16]Sanjay K. Dhurandher, Sudip Misra, Puneet Pruthi, Shubham Singhal, Saurabh Aggarwal, Isaac Woungang:
Using bee algorithm for peer-to-peer file searching in mobile ad hoc networks. J. Netw. Comput. Appl. 34(5): 1498-1508 (2011) - [j15]Isaac Woungang:
Special Issue On: Telecommunications Software Engineering: Emerging Methods, Models and Tools. Math. Comput. Model. 53(3-4): 403-404 (2011) - [j14]Tai-Hoon Kim, Omer F. Rana
, Juan Touriño
, Isaac Woungang:
Special issue on "Theory and practice of high-performance computing, communications, and security". J. Supercomput. 55(2): 123-125 (2011) - [c20]Sanjay K. Dhurandher, Isaac Woungang, Ishan Uppal, Hitesh Bhanushali, Deepank Gupta:
A Dot Net framework based physical testbed for ad hoc network routing protocols. CCECE 2011: 229-233 - [c19]Chi-Yuan Chen, Chia-Yin Wu, Shih-Wen Hsu, Han-Chieh Chao
, Isaac Woungang, Mohammad S. Obaidat
:
ServiceChord: A Scalable Service Capability Interaction Framework for IMS. GLOBECOM 2011: 1-5 - [c18]Jing-Wei Huang, Isaac Woungang, Han-Chieh Chao
, Mohammad S. Obaidat
, Ting-Yun Chi, Sanjay K. Dhurandher:
Multi-Path Trust-Based Secure AOMDV Routing in Ad Hoc Networks. GLOBECOM 2011: 1-5 - [c17]Che-Yu Liu, Isaac Woungang, Han-Chieh Chao
, Sanjay K. Dhurandher, Ting-Yun Chi, Mohammad S. Obaidat
:
Message Security in Multi-Path Ad Hoc Networks Using a Neural Network-Based Cipher. GLOBECOM 2011: 1-5 - [c16]Sanjay Kumar Dhurandher, Deepak Kumar Sharma, Isaac Woungang, Han-Chieh Chao
:
Performance evaluation of various routing protocols in Opportunistic Networks. GLOBECOM Workshops 2011: 1067-1071 - [c15]Sanjay K. Dhurandher, Ankit Aggarwal, Aashish Bhandari, Abhishek Verma, Mohammad S. Obaidat
, Isaac Woungang:
Time Stamp-Based Algorithm for Task Scheduling in a Distributed Computing System with Multiple Master Multiple Slave Architecture. iThings/CPSCom 2011: 67-73 - [c14]Mohammad S. Obaidat
, Harsh Bedi, Aashish Bhandari, M. S. Don Bosco, Ankur Maheshwari, Sanjay K. Dhurandher, Isaac Woungang:
Design and Implementation of a Fault Tolerant Multiple Master Cloud Computing System. iThings/CPSCom 2011: 82-88 - [c13]Vincent Ngo, Alagan Anpalagan
, Isaac Woungang:
Versatile medium access control (VMAC) protocol for mobile sensor networks. IWCMC 2011: 836-841 - 2010
- [j13]Isaac Woungang:
Wireless ad hoc, sensor and mesh networks. Comput. Electr. Eng. 36(2): 259-260 (2010) - [j12]Isaac Woungang, Guangyan Ma, Mieso K. Denko, Sudip Misra, Han-Chieh Chao
, Mohammad S. Obaidat
:
Survivable ATM mesh networks: Techniques and performance evaluation. J. Syst. Softw. 83(3): 457-466 (2010) - [j11]Tzu-Hua Lin, Han-Chieh Chao
, Isaac Woungang:
An enhanced MPR-based solution for flooding of broadcast messages in OLSR wireless ad hoc networks. Mob. Inf. Syst. 6(3): 249-257 (2010) - [j10]Isaac Woungang:
Foreword to special issue on wireless ad hoc, sensor and mesh networks. Telecommun. Syst. 44(1-2): 1-2 (2010) - [j9]Sudip Misra, Sumit Goswami, Gyan Prakash Pathak, Nirav Shah, Isaac Woungang:
Geographic server distribution model for key revocation. Telecommun. Syst. 44(3-4): 281-295 (2010)
2000 – 2009
- 2009
- [j8]Mieso K. Denko, Isaac Woungang, Han-Chieh Chao
, Pedro Cuenca
:
Special issue on ubiquitous wireless mesh networks. Int. J. Commun. Syst. 22(10): 1241-1244 (2009) - [j7]Mieso K. Denko, Tao Sun, Isaac Woungang:
Deterministic Trust Management in Pervasive Computing. J. Mobile Multimedia 5(1): 64-80 (2009) - [c12]Sanjay Kumar Dhurandher, Sudip Misra, Harsh Mittal, Anubhav Agarwal, Isaac Woungang:
Ant colony optimization-based congestion control in Ad-hoc wireless sensor networks. AICCSA 2009: 492-497 - [c11]Sanjay Kumar Dhurandher, Shubham Singhal, Saurabh Aggarwal, Puneet Pruthi, Sudip Misra, Isaac Woungang:
A Swarm Intelligence-based P2P file sharing protocol using Bee Algorithm. AICCSA 2009: 690-696 - [c10]Sudip Misra, Sumit Goswami, Gyan Prakash Pathak, Nirav Shah, Isaac Woungang:
Dividing PKI in strongest availability zones. AICCSA 2009: 963-969 - [c9]Isaac Woungang, Guangyan Ma, Mieso K. Denko, Alireza Sadeghian, Sudip Misra, Alexander Ferworn
:
Survivability in Existing ATM-Based Mesh Networks. AINA 2009: 719-724 - [c8]Mieso K. Denko, Tao Sun, Isaac Woungang, Joel J. P. C. Rodrigues, Han-Chieh Chao
:
A Trust Management Scheme for Enhancing Security in Pervasive Wireless Networks. GLOBECOM 2009: 1-6 - [c7]Anshul Saxena, Keshav Dubey, Sanjay K. Dhurandher, Isaac Woungang:
Tarantula - A Scalable and Extensible Web Spider. KMIS 2009: 167-172 - [c6]Mieso K. Denko, Isaac Woungang, Mohammad S. Obaidat
:
Trust management in opportunistic pervasive healthcare systems. ICECS 2009: 832-835 - [e3]Sudip Misra, Subhas Chandra Misra, Isaac Woungang:
Guide to Wireless Mesh Networks. Computer Communications and Networks, Springer 2009, ISBN 978-1-84800-908-0 [contents] - [e2]Sudip Misra, Isaac Woungang, Subhas Chandra Misra:
Guide to Wireless Ad Hoc Networks. Computer Communications and Networks, Springer 2009, ISBN 978-1-84800-327-9 [contents] - [e1]Subhas Chandra Misra, Isaac Woungang, Sudip Misra:
Guide to Wireless Sensor Networks. Computer Communications and Networks, Springer 2009, ISBN 978-1-84882-217-7 [contents] - 2008
- [j6]Sudip Misra, Subhas C. Misra, Isaac Woungang:
Algorithmic and theoretical aspects of wireless ad hoc and sensor networks. Comput. Commun. 31(4): 655-658 (2008) - [j5]Prayag Narula, Sanjay Kumar Dhurandher, Sudip Misra, Isaac Woungang:
Security in mobile ad-hoc networks using soft encryption and trust-based multi-path routing. Comput. Commun. 31(4): 760-769 (2008) - [j4]Farhana Zabin, Sudip Misra, Isaac Woungang, Habib F. Rashvand, Ngok-Wah Ma, Mohammad Ahsan Ali:
REEP: data-centric, energy-efficient and reliable routing protocol for wireless sensor networks. IET Commun. 2(8): 995-1008 (2008) - [j3]Mieso K. Denko, Isaac Woungang, Han-Chieh Chao, Pedro Cuenca:
Call for Papers: 'Ubiquitous Wireless Mesh Networks'. Int. J. Commun. Syst. 21(11): 1237-1238 (2008) - [c5]Guillaume Chelius, Isaac Woungang, Stuart Cunningham:
Message from the STWiMob Workshop Organizing Technical Co-chairs. WiMob 2008 - 2007
- [j2]Sudip Misra, Subhas C. Misra, Isaac Woungang:
A Paradigm for Object-Oriented Conceptual Modeling of Optical Networks. J. Comput. Inf. Technol. 15(1): 7-15 (2007) - [j1]Isaac Woungang, Sudip Misra, Mohammad S. Obaidat
:
On the problem of capacity allocation and flow assignment in self-healing ATM networks. Comput. Commun. 30(16): 3169-3178 (2007) - [c4]Alexander Ferworn, Alireza Sadeghian, Kevin Barnum, Devin Ostrom, Hossein Rahnama, Isaac Woungang:
Canine as Robot in Directed Search. SoSE 2007: 1-5 - [c3]Alexander Ferworn, Alireza Sadeghian, Kevin Barnum, Devin Ostrom, Hossein Rahnama, Isaac Woungang:
Rubble Search with Canine Augmentation Technology. SoSE 2007: 1-6 - 2006
- [c2]Maryam Arvandi, Shuwei Wu, Alireza Sadeghian, William W. Melek, Isaac Woungang:
Symmetric Cipher Design Using Recurrent Neural Networks. IJCNN 2006: 2039-2046 - 2004
- [c1]Isaac Woungang, Alireza Sadeghian, William W. Melek:
Bounds on the minimum distances of a class of q-ary images of qm-ary irreducible cyclic codes. ISIT 2004: 185
Coauthor Index
aka: Sanjay Kumar Dhurandher

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-20 00:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint