A survey of low rate ddos detection techniques based on machine learning in software-defined networks AA Alashhab, MSM Zahid, MA Azim, MY Daha, B Isyaku, S Ali Symmetry 14 (8), 1563, 2022 | 37 | 2022 |
New Trends in Secure Routing Protocols for Wireless Sensor Networks AM El-Semary, MMA Azim International Journal of Distributed Sensor Networks 2013, 16, 2013 | 34 | 2013 |
Path energy weight: A global energy-aware routing protocol for wireless sensor networks AM El-Semary, MMA Azim 2010 IFIP Wireless Days, 1-6, 2010 | 22 | 2010 |
MAP: a balanced energy consumption routing protocol for wireless sensor networks MMA Azim Journal of Information Processing Systems 6 (3), 295-306, 2010 | 18 | 2010 |
The effect of RBCs concentration in blood on the wireless communication in Nano-networks in the THz band A Salem, MMA Azim Nano communication networks 18, 34-43, 2018 | 15 | 2018 |
MAP: Energy Efficient routing protocol for wireless sensor networks MMA Azim Proceedings of the 4th International Conference on Ubiquitous Information …, 2009 | 15 | 2009 |
Availability analysis of shared backup path protection under multiple-link failure scenario in WDM network MMA Azim, MN Kabir annals of telecommunications - annales des télécommunications, 2014 | 14 | 2014 |
Wireless Sensor Multimedia Networks: Architectures, Protocols, and Applications MMA Azim, X Jiang CRC Press, 2015 | 13 | 2015 |
Active light-path restoration in WDM networks M Azim, X Jiang, MM Khandker, S Horiguchi, PH Ho Journal of Optical Networking 3 (4), 247-260, 2004 | 13 | 2004 |
Cloud-based iot device authentication scheme using blockchain K Albalawi, MMA Azim 2019 IEEE Global Conference on Internet of Things (GCIoT), 1-7, 2019 | 11 | 2019 |
A connection probability model for communications networks under regional failures MN Kabir, MA Rahman, S Azad, MMA Azim, MZA Bhuiyan International Journal of Critical Infrastructure Protection 20, 16-25, 2018 | 11 | 2018 |
Models of restoration probability in WDM networks employing active restoration MMA Azim, X Jiang, PH Ho, S Horiguchi Photonic Network Communications 10, 141-153, 2005 | 11 | 2005 |
Availability study of M: N automatic protection switching scheme in WDM networks MMA Azim, MN Kabir Journal of High Speed Networks 18 (1), 1-13, 2011 | 10 | 2011 |
Counter chain: a new block cipher mode of operation AM El-Semary, MMA Azim Journal of Information Processing Systems 11 (2), 266-279, 2015 | 9 | 2015 |
Counter Chain: A New Block Cipher Mode of Operation AMESMMA Azim Journal of Information Processing Systems (JIPS) 11 (2), 266~279, 2015 | 9* | 2015 |
Vulnerability assessment for mission critical networks against region failures: A case study M Azim, A El-Semary Proceedings of the 2nd International Conference on Communications and …, 2012 | 7 | 2012 |
Radio Frequency Near Communication (RFNC) technology: an integrated RFID-NFC system for objects' localization SB Al-Saedi, MMA Azim 2017 9th IEEE-GCC conference and exhibition (GCCCE), 1-5, 2017 | 6 | 2017 |
Availability analysis under multiple link failures in WDM networks with shared-link connections MMA Azim, MN Kabir Photonic Network Communications 23, 83-91, 2012 | 5 | 2012 |
A new hybrid architecture for optical burst switching networks MMA Azim, X Jiang, PH Ho, S Horiguchi High Performance Computing and Communications: First International …, 2005 | 5 | 2005 |
A Dual-Sink Secure Routing Protocol for Wireless Sensor Networks AESMA Azim International Journal of Information Assurance and Security (JIAS) 7 (5 …, 2012 | 4* | 2012 |