Energy harvesting for wearable devices: A review YW Chong, W Ismail, K Ko, CY Lee IEEE Sensors Journal 19 (20), 9047-9062, 2019 | 63 | 2019 |
A review on the role of blockchain technology in the healthcare domain HD Zubaydi, YW Chong, K Ko, SM Hanshi, S Karuppayah Electronics 8 (6), 679, 2019 | 51 | 2019 |
Comparative performance analysis of classification algorithms for intrusion detection system M Anbar, R Abdullah, IH Hasbullah, YW Chong, OE Elejla 2016 14th Annual Conference on Privacy, Security and Trust (PST), 282-288, 2016 | 28 | 2016 |
Detection techniques of distributed denial of service attacks on software-defined networking controller–a review MA Aladaileh, M Anbar, IH Hasbullah, YW Chong, YK Sanjalawe IEEE Access 8, 143985-143995, 2020 | 23 | 2020 |
Security mechanism for IPv6 stateless address autoconfiguration S Praptodiyono, RK Murugesan, IH Hasbullah, CY Wey, MM Kadhum, ... 2015 International Conference on Automation, Cognitive Science, Optics …, 2015 | 23 | 2015 |
Optimized access point selection with mobility prediction using hidden Markov model for wireless network KL Yap, YW Chong 2017 ninth international conference on ubiquitous and future networks (ICUFN …, 2017 | 17 | 2017 |
Securing duplicate address detection on IPv6 using distributed trust mechanism S Praptodiyono, IH Hasbullah, MM Kadhum, CY Wey, RK Murugesan, ... Int J Simulation—Systems, Sci Technol 17 (26), 2016 | 16 | 2016 |
Proposed statistical-based approach for detecting distribute denial of service against the controller of software defined network (SADDCS) MA Al-Adaileh, M Anbar, YW Chong, A Al-Ani MATEC Web of Conferences 218, 02012, 2018 | 13 | 2018 |
An optimized flow management mechanism in OpenFlow network ETB Hong, CY Wey 2017 International Conference on Information Networking (ICOIN), 143-147, 2017 | 12 | 2017 |
Network security situation assessment: a review and discussion YB Leau, S Manickam, YW Chong Information Science and Applications, 407-414, 2015 | 12 | 2015 |
Enhanced handover mechanism using mobility prediction in wireless networks KL Yap, YW Chong, W Liu PloS one 15 (1), e0227982, 2020 | 11 | 2020 |
Hybrid monitoring technique for detecting abnormal behaviour in rpl-based network. M Alzubaidi, M Anbar, YW Chong, S Al-Sarawi J. Commun. 13 (5), 198-208, 2018 | 11 | 2018 |
Adaptive path finding algorithm in dynamic environment for warehouse robot MK Ng, YW Chong, K Ko, YH Park, YB Leau Neural Computing and Applications 32 (17), 13155-13171, 2020 | 10 | 2020 |
Software-defined networking techniques to improve mobile network connectivity: technical review KL Yap, YW Chong IETE Technical review 35 (3), 292-304, 2018 | 9 | 2018 |
Comparative Performance Analysis of classification algorithm for Internal Intrusion Detection M Anbar, R Abdulah, IH Hasbullah, YW Chong, OE Elejla 2016 14th Annual Conference on Privacy Security and Trust (PCT), 2016 | 9 | 2016 |
Improving security of duplicate address detection on IPv6 local network in public area S Praptodiyono, IH Hasbullah, MM Kadhum, RK Murugesan, CY Wey, ... 2015 9th Asia Modelling Symposium (AMS), 123-128, 2015 | 8 | 2015 |
Comparative study on hybrid header compression over satellite-wireless networks YW Chong, TC Wan IETE Technical Review 30 (6), 461-472, 2013 | 8 | 2013 |
Entropy-based approach to detect DDoS attacks on software defined networking controller M Aladaileh, M Anbar, IH Hasbullah, YK Sanjalawe, YW Chong CMC-COMPUTERS MATERIALS & CONTINUA 69 (1), 373-391, 2021 | 5 | 2021 |
Efficient acoustic echo cancellation joint with noise reduction framework SM Hanshi, YW Chong, S Ramadass, AN Naeem, KC Ooi 2014 International Conference on Computer, Communications, and Control …, 2014 | 5 | 2014 |
Concepts and types of peer-to-peer network topology for live video streaming AW AlTuhafi, S Ramadass, YW Chong 2013 IEEE International Conference on RFID-Technologies and Applications …, 2013 | 5 | 2013 |