Fazirulhisyam Hashim
Fazirulhisyam Hashim
Verified email at upm.edu.my
Cited by
Cited by
An efficient authentication and key agreement protocol for 4G (LTE) networks
KA Alezabi, F Hashim, SJ Hashim, BM Ali
2014 IEEE Region 10 Symposium, 502-507, 2014
Experimental study of LTE signals as illuminators of opportunity for passive bistatic radar applications
AA Salah, RSAR Abdullah, A Ismail, F Hashim, NHA Aziz
Electronics Letters 50 (7), 545-547, 2014
A new super wideband fractal monopole-dielectric resonator antenna
A Azari, A Ismail, A Sali, F Hashim
IEEE Antennas and Wireless Propagation Letters 12, 1014-1016, 2013
A survey and taxonomy on medium access control strategies for cooperative communication in wireless networks: Research issues and challenges
M Sami, NK Noordin, M Khabazian, F Hashim, S Subramaniam
IEEE Communications Surveys & Tutorials 18 (4), 2493-2521, 2016
Experimental investigation on target detection and tracking in passive radar using long-term evolution signal
RSAR Abdullah, AA Salah, A Ismail, FH Hashim, NEA Rashid, NHA Aziz
IET Radar, Sonar & Navigation 10 (3), 577-585, 2016
Detecting sybil attacks in clustered wireless sensor networks based on energy trust system (ETS)
N Alsaedi, F Hashim, A Sali, FZ Rokhani
Computer communications 110, 75-82, 2017
Analysis on target detection and classification in LTE based passive forward scattering radar
RSA Raja Abdullah, NH Abdul Aziz, NE Abdul Rashid, A Ahmad Salah, ...
Sensors 16 (10), 1607, 2016
Feasibility study of LTE signal as a new illuminators of opportunity for passive radar applications
AA Salah, RSAR Abdullah, A Ismail, F Hashim, CY Leow, MB Roslee, ...
2013 IEEE International RF and Microwave Conference (RFM), 258-262, 2013
Totally opportunistic routing algorithm (TORA) for underwater wireless sensor network
Z Rahman, F Hashim, MFA Rasid, M Othman
Plos one 13 (6), e0197087, 2018
An adaptive multi-channel assignment and coordination scheme for IEEE 802.11 P/1609.4 in vehicular Ad-Hoc networks
AA Almohammedi, NK Noordin, A Sali, F Hashim, M Balfaqih
IEEE Access 6, 2781-2802, 2017
Lightweight decentralized multicast–unicast key management method in wireless IPv6 networks
A Mehdizadeh, F Hashim, M Othman
Journal of Network and Computer Applications 42, 59-69, 2014
Biologically inspired anomaly detection and security control frameworks for complex heterogeneous networks
F Hashim, KS Munasinghe, A Jamalipour
IEEE Transactions on Network and Service Management 7 (4), 268-281, 2010
An overview of attacks against digital watermarking and their respective countermeasures
M Tanha, SDS Torshizi, MT Abdullah, F Hashim
Proceedings Title: 2012 International Conference on Cyber Security, Cyber …, 2012
Node replication attacks in mobile wireless sensor network: a survey
HR Shaukat, F Hashim, A Sali, MF Abdul Rasid
International Journal of Distributed Sensor Networks 10 (12), 402541, 2014
Energy-aware fault tolerant task offloading of mobile cloud computing
SK Abd, SAR Al-Haddad, F Hashim, ABHJ Abdullah, S Yussof
2017 5th IEEE International Conference on Mobile Cloud Computing, Services …, 2017
Detection of DoS and DDoS attacks in NGMN using frequency domain analysis
F Hashim, MR Kibria, A Jamalipour
2008 14th Asia-Pacific Conference on Communications, 1-5, 2008
Design and evaluation of distributed and dynamic mobility management approach based on PMIPv6 and MIH protocols
MK Murtadha, NK Noordin, BM Ali, F Hashim
Wireless Networks 21 (8), 2747-2763, 2015
An effective approach for managing power consumption in cloud computing infrastructure
SK Abd, SAR Al-Haddad, F Hashim, ABHJ Abdullah, S Yussof
journal of computational science 21, 349-360, 2017
Qoe-oriented cross-layer downlink scheduling for heterogeneous traffics in lte networks
M Nasimi, M Kousha, F Hashim
2013 IEEE 11th Malaysia international conference on communications (MICC …, 2013
Protection of smart substation based on WLAN complies with IEC 61850 using traveling wave analysis
NH Ali, BM Ali, O Basir, ML Othman, F Hashim, KM Abdel-Latif
Electric Power Systems Research 140, 20-26, 2016
The system can't perform the operation now. Try again later.
Articles 1–20