default search action
Dawood Al-Abri
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j10]Manar Aldaoud, Dawood Al-Abri, Medhat Awadalla, Firdous Kausar:
Data Structure and Management Protocol to Enhance Name Resolving in Named Data Networking. Future Internet 16(4): 118 (2024) - [j9]Manar Aldaoud, Dawood Al-Abri, Firdous Kausar, Medhat Awadalla:
NDNOTA: NDN One-Time Authentication. Inf. 15(5): 289 (2024) - 2023
- [j8]Manar Aldaoud, Dawood Al-Abri, Ahmed Al-Maashri, Firdous Kausar:
Detecting and mitigating DHCP attacks in OpenFlow-based SDN networks: a comprehensive approach. J. Comput. Virol. Hacking Tech. 19(4): 597-614 (2023) - 2022
- [j7]Manar Aldaoud, Dawood Al-Abri, Medhat Awadalla, Firdous Kausar:
N-BGP: An efficient BGP routing protocol adaptation for named data networking. Int. J. Commun. Syst. 35(14) (2022) - 2021
- [j6]Manar Aldaoud, Dawood Al-Abri, Ahmed Al-Maashri, Firdous Kausar:
DHCP attacking tools: an analysis. J. Comput. Virol. Hacking Tech. 17(2): 119-129 (2021) - [c4]Muneera Alotaibi, Mohamed I. Ibrahem, Waleed Alasmary, Dawood Al-Abri, Mohamed Mahmoud:
UBLS: User-Based Location Selection Scheme for Preserving Location Privacy. ICC Workshops 2021: 1-6 - 2020
- [j5]Dawood Al-Abri, Shahrokh Valaee:
Diversified viral marketing: The power of sharing over multiple online social networks. Knowl. Based Syst. 193: 105430 (2020)
2010 – 2019
- 2019
- [j4]Iman Al-Kindi, Dawood Al-Abri, Ahmed Al-Maashri, Fahad Bait Shiginah:
Analysis of malware propagation behavior in Social Internet of Things. Int. J. Commun. Syst. 32(15) (2019) - [c3]Tariq Al Balushi, Ayoub Al Hosni, Hashim Al Theeb Ba Omar, Dawood Al-Abri:
A LoRaWAN-based Camel Crossing Alert and Tracking System. INDIN 2019: 1035-1040 - 2016
- [j3]Ali Al Shidhani, Khalil Al Maawali, Dawood Al-Abri, Hadj Bourdoucen:
A Comparative Analysis of Open Source Network Monitoring Tools. Int. J. Open Source Softw. Process. 7(2): 1-19 (2016) - 2015
- [c2]Dawood Al-Abri:
Detection of MITM attack in LAN environment using payload matching. ICIT 2015: 1857-1862
2000 – 2009
- 2008
- [j2]Eylem Ekici, Serdar Vural, Janise McNair, Dawood Al-Abri:
Secure probabilistic location verification in randomly deployed wireless sensor networks. Ad Hoc Networks 6(2): 195-209 (2008) - [j1]Dawood Al-Abri, Janise McNair:
On the interaction between localization and location verification for wireless sensor networks. Comput. Networks 52(14): 2713-2727 (2008) - 2006
- [c1]Eylem Ekici, Janise McNair, Dawood Al-Abri:
A Probabilistic Approach to Location Verification in Wireless Sensor Networks. ICC 2006: 3485-3490
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-19 21:03 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint