Segueix
Isaac Woungang
Isaac Woungang
Toronto Metropolitan University (TMU)
No hi ha cap correu electrònic verificat - Pàgina d'inici
Títol
Citada per
Citada per
Any
Guide to wireless mesh networks
S Misra, SC Misra, I Woungang
Springer 9 (9), 2009
2652009
Defending against collaborative attacks by malicious nodes in MANETs: A cooperative bait detection approach
JM Chang, PC Tsou, I Woungang, HC Chao, CF Lai
IEEE systems journal 9 (1), 65-75, 2014
2112014
Guide to wireless ad hoc networks
S Misra, I Woungang, SC Misra
Springer Science & Business Media, 2009
2022009
Authorship verification for short messages using stylometry
ML Brocardo, I Traore, S Saad, I Woungang
2013 International Conference on Computer, Information and Telecommunication …, 2013
1402013
Trust management in ubiquitous computing: A Bayesian approach
MK Denko, T Sun, I Woungang
Computer Communications 34 (3), 398-406, 2011
1272011
REEP: data-centric, energy-efficient and reliable routing protocol for wireless sensor networks
F Zabin, S Misra, I Woungang, HF Rashvand, NW Ma, MA Ali
IET communications 2 (8), 995-1008, 2008
1062008
A machine learning-based protocol for efficient routing in opportunistic networks
DK Sharma, SK Dhurandher, I Woungang, RK Srivastava, A Mohananey, ...
IEEE Systems Journal 12 (3), 2207-2213, 2016
1052016
HBPR: history based prediction for routing in infrastructure-less opportunistic networks
SK Dhurandher, DK Sharma, I Woungang, S Bhati
2013 IEEE 27th international Conference on advanced information networking …, 2013
982013
Security in mobile ad-hoc networks using soft encryption and trust-based multi-path routing
P Narula, SK Dhurandher, S Misra, I Woungang
Computer Communications 31 (4), 760-769, 2008
972008
Toward tactile internet in beyond 5G era: recent advances, current issues, and future directions
SK Sharma, I Woungang, A Anpalagan, S Chatzinotas
Ieee Access 8, 56948-56991, 2020
942020
Biometric authentication using mouse gesture dynamics
B Sayed, I Traoré, I Woungang, MS Obaidat
IEEE systems journal 7 (2), 262-274, 2013
902013
Combining mouse and keystroke dynamics biometrics for risk-based authentication in web environments
I Traore, I Woungang, MS Obaidat, Y Nakkabi, I Lai
2012 fourth international conference on digital home, 138-145, 2012
902012
Routing in opportunistic networks
I Woungang, SK Dhurandher, A Anpalagan, AV Vasilakos
Springer, 2013
722013
Authorship verification of e-mail and tweet messages applied for continuous authentication
ML Brocardo, I Traore, I Woungang
Journal of Computer and System Sciences 81 (8), 1429-1440, 2015
712015
Biometric-based physical and cybersecurity systems
MS Obaidat, I Traore, I Woungang
Springer International Publishing, 2019
682019
Authorship verification using deep belief network systems
ML Brocardo, I Traore, I Woungang, MS Obaidat
International Journal of Communication Systems 30 (12), e3259, 2017
682017
GAER: genetic algorithm-based energy-efficient routing protocol for infrastructure-less opportunistic networks
SK Dhurandher, DK Sharma, I Woungang, R Gupta, S Garg
The Journal of Supercomputing 69 (3), 1183-1214, 2014
602014
Handbook of green information and communication systems
M Obaidat, A Anpalagan, I Woungang
Academic press, 2012
582012
Detecting blackhole attacks on DSR-based mobile ad hoc networks
I Woungang, SK Dhurandher, RD Peddi, MS Obaidat
2012 International Conference on Computer, Information and Telecommunication …, 2012
532012
Using bee algorithm for peer-to-peer file searching in mobile ad hoc networks
SK Dhurandher, S Misra, P Pruthi, S Singhal, S Aggarwal, I Woungang
Journal of Network and Computer Applications 34 (5), 1498-1508, 2011
522011
En aquests moments el sistema no pot dur a terme l'operació. Torneu-ho a provar més tard.
Articles 1–20