default search action
Sherali Zeadally
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j385]Adnan Akhunzada, Ahmad Sami Al-Shamayleh, Sherali Zeadally, Ahmad Almogren, Ahmad Adel Abu Shareha:
Design and performance of an AI-enabled threat intelligence framework for IoT-enabled autonomous vehicles. Comput. Electr. Eng. 119: 109609 (2024) - [j384]Michail Tsikerdekis, Sherali Zeadally, Iyad A. Katib:
Defenses Against Artificial Intelligence Attacks. Computer 57(11): 49-59 (2024) - [j383]Nimish Mishra, SK Hafizul Islam, Sherali Zeadally:
A survey on security and cryptographic perspective of Industrial-Internet-of-Things. Internet Things 25: 101037 (2024) - [j382]Vinay Chamola, Gaurang Bansal, Tridib Kumar Das, Vikas Hassija, Siva Sai, Jiacheng Wang, Sherali Zeadally, Amir Hussain, Fei Richard Yu, Mohsen Guizani, Dusit Niyato:
Beyond Reality: The Pivotal Role of Generative AI in the Metaverse. IEEE Internet Things Mag. 7(4): 126-135 (2024) - [j381]Muna Al-Hawawreh, Zubair A. Baig, Sherali Zeadally:
AI for Critical Infrastructure Security: Concepts, Challenges, and Future Directions. IEEE Internet Things Mag. 7(4): 136-142 (2024) - [j380]Merwa Mehmood, Zubair A. Baig, Naeem Syed, Sherali Zeadally:
The Role of Rule Mining in Generating Synthetic Cyber-Physical System Attack Samples. IEEE Internet Things Mag. 7(6): 14-19 (2024) - [j379]Jacques Bou Abdo, Sherali Zeadally:
Disposable identities: Solving web tracking. J. Inf. Secur. Appl. 84: 103821 (2024) - [j378]Rejab Hajlaoui, Tarek Moulahi, Salah Zidi, Salim El Khediri, Bechir Alaya, Sherali Zeadally:
Towards smarter cyberthreats detection model for industrial internet of things (IIoT) 4.0. J. Ind. Inf. Integr. 39: 100595 (2024) - [j377]Ikram Ud Din, Wajahat Ali, Ahmad Almogren, Iehab Al Rassan, Sherali Zeadally:
Using smart grid infrastructure for authentication and data management in Internet of Medical Things. Secur. Priv. 7(3) (2024) - [j376]Kaige Zhu, Zhenjiang Zhang, Sherali Zeadally, Feng Sun:
Learning to Optimize Workflow Scheduling for an Edge-Cloud Computing Environment. IEEE Trans. Cloud Comput. 12(3): 897-912 (2024) - [j375]Wenyu Zhang, Kaiyuan Bai, Sherali Zeadally, Haijun Zhang, Hua Shao, Hui Ma, Victor C. M. Leung:
DeepMA: End-to-End Deep Multiple Access for Wireless Image Transmission in Semantic Communication. IEEE Trans. Cogn. Commun. Netw. 10(2): 387-402 (2024) - [j374]Ali Ranjha, Muhammad Awais Javed, Md. Jalil Piran, Muhammad Asif, Mostafa Hussien, Sherali Zeadally, Jaroslav Frnda:
Toward Facilitating Power Efficient URLLC Systems in UAV Networks Under Jittering. IEEE Trans. Consumer Electron. 70(1): 3031-3041 (2024) - [j373]Amitkumar Vidyakant Jha, Bhargav Appasani, Mohammad S. Khan, Sherali Zeadally, Iyad A. Katib:
6G for intelligent transportation systems: standards, technologies, and challenges. Telecommun. Syst. 86(2): 241-268 (2024) - [j372]Mritunjay Shall Peelam, Naren, Mehul Gera, Vinay Chamola, Sherali Zeadally:
A Review on Emergency Vehicle Management for Intelligent Transportation Systems. IEEE Trans. Intell. Transp. Syst. 25(11): 15229-15246 (2024) - [c57]Ayoub Wehby, Sherali Zeadally, Rida Khatoun, Mohammed Lamine Bouchouia, Ahmad Fadlallah:
How Does Distributed Denial of Service Affect the Connected Cars Environment? CoDIT 2024: 164-170 - [i16]Sana Sharif, Sherali Zeadally, Waleed Ejaz:
Resource Optimization in UAV-assisted IoT Networks: The Role of Generative AI. CoRR abs/2405.03863 (2024) - 2023
- [j371]Sri Harsha Mekala, Zubair A. Baig, Adnan Anwar, Sherali Zeadally:
Cybersecurity for Industrial IoT (IIoT): Threats, countermeasures, challenges and future directions. Comput. Commun. 208: 294-320 (2023) - [j370]Ali Mustapha, Rida Khatoun, Sherali Zeadally, Fadlallah Chbib, Ahmad Fadlallah, Walid Fahs, Ali El Attar:
Detecting DDoS attacks using adversarial neural network. Comput. Secur. 127: 103117 (2023) - [j369]Badis Hammi, Sherali Zeadally:
Software Supply-Chain Security: Issues and Countermeasures. Computer 56(7): 54-66 (2023) - [j368]Wali Ullah Khan, Muhammad Awais Javed, Sherali Zeadally, Eva Lagunas, Symeon Chatzinotas:
Intelligent and Secure Radio Environments for 6G Vehicular Aided HetNets: Key Opportunities and Challenges. IEEE Commun. Stand. Mag. 7(3): 32-39 (2023) - [j367]Badis Hammi, Sherali Zeadally, Jamel Nebhen:
Security Threats, Countermeasures, and Challenges of Digital Supply Chains. ACM Comput. Surv. 55(14s): 316:1-316:40 (2023) - [j366]Varun Kohli, Sombuddha Chakravarty, Vinay Chamola, Kuldip Singh Sangwan, Sherali Zeadally:
An analysis of energy consumption and carbon footprints of cryptocurrencies and possible solutions. Digit. Commun. Networks 9(1): 79-89 (2023) - [j365]Alfredo J. Perez, Farhan Siddiqui, Sherali Zeadally, Derek Lane:
A review of IoT systems to enable independence for the elderly and disabled individuals. Internet Things 21: 100653 (2023) - [j364]Anjum Mohd Aslam, Rajat Chaudhary, Aditya Bhardwaj, Ishan Budhiraja, Neeraj Kumar, Sherali Zeadally:
Metaverse for 6G and Beyond: The Next Revolution and Deployment Challenges. IEEE Internet Things Mag. 6(1): 32-39 (2023) - [j363]Badis Hammi, Sherali Zeadally, Alfredo J. Perez:
Non-Fungible Tokens: A Review. IEEE Internet Things Mag. 6(1): 46-50 (2023) - [j362]Adnan Akhunzada, Sherali Zeadally, Saif ul Islam:
Toward Performance and Energy-Efficient Edge-of-Things. IT Prof. 25(1): 17-23 (2023) - [j361]Zubair A. Baig, Sri Harsha Mekala, Sherali Zeadally:
Ransomware Attacks of the COVID-19 Pandemic: Novel Strains, Victims, and Threat Actors. IT Prof. 25(5): 37-44 (2023) - [j360]Michail Tsikerdekis, Sherali Zeadally:
Misinformation Detection Using Deep Learning. IT Prof. 25(5): 57-63 (2023) - [j359]Sana Sharif, Sherali Zeadally, Waleed Ejaz:
Space-aerial-ground-sea integrated networks: Resource optimization and challenges in 6G. J. Netw. Comput. Appl. 215: 103647 (2023) - [j358]Alfredo J. Perez, Sherali Zeadally, David Kingsley Tan:
Detecting Mobile Malware Associated With Global Pandemics. IEEE Pervasive Comput. 22(4): 45-54 (2023) - [j357]Nouman Bashir, Saadi Boudjit, Gabriel Dauphin, Sherali Zeadally:
An obstacle avoidance approach for UAV path planning. Simul. Model. Pract. Theory 129: 102815 (2023) - [j356]Wenyu Zhang, Sherali Zeadally, Wei Li, Haijun Zhang, Jingyi Hou, Victor C. M. Leung:
Edge AI as a Service: Configurable Model Deployment and Delay-Energy Optimization With Result Quality Constraints. IEEE Trans. Cloud Comput. 11(2): 1954-1969 (2023) - [j355]Wenyu Zhang, Sherali Zeadally, Huan Zhou, Haijun Zhang, Ning Wang, Victor C. M. Leung:
Joint Service Quality Control and Resource Allocation for Service Reliability Maximization in Edge Computing. IEEE Trans. Commun. 71(2): 935-948 (2023) - [j354]Zaiba Shah, Umer Javed, Muhammad Naeem, Sherali Zeadally, Waleed Ejaz:
Mobile Edge Computing (MEC)-Enabled UAV Placement and Computation Efficiency Maximization in Disaster Scenario. IEEE Trans. Veh. Technol. 72(10): 13406-13416 (2023) - [c56]Rafael Veiga, Rodrigo Flexa, Lucas Bastos, Iago Medeiros, Denis Rosário, Eduardo Cerqueira, Sherali Zeadally, Leandro Villas:
A Federated Learning Approach for Continuous User Identification. WF-IoT 2023: 1-6 - [i15]Vinay Chamola, Gaurang Bansal, Tridib Kumar Das, Vikas Hassija, Naga Siva Sai Reddy, Jiacheng Wang, Sherali Zeadally, Amir Hussain, F. Richard Yu, Mohsen Guizani, Dusit Niyato:
Beyond Reality: The Pivotal Role of Generative AI in the Metaverse. CoRR abs/2308.06272 (2023) - [i14]Xiaolong Xu, Xuanhong Zhou, Muhammad Bilal, Sherali Zeadally, Jon Crowcroft, Lianyong Qi, Shengjun Xue:
Socially Beneficial Metaverse: Framework, Technologies, Applications, and Challenges. CoRR abs/2310.17260 (2023) - [i13]Daksh Dave, Vinay Chamola, Sandeep Joshi, Sherali Zeadally:
DroneOptiNet: A Framework for Optimal Drone-based Load Redistribution Mechanism for 5G and Beyond Solar Small Cell Networks. CoRR abs/2311.12944 (2023) - 2022
- [j353]Ouadoudi Zytoune, Hacène Fouchal, Sherali Zeadally:
A realistic relay selection scheme for cooperative MIMO networks. Ad Hoc Networks 124: 102706 (2022) - [j352]Oladayo Bello, Sherali Zeadally:
Internet of underwater things communication: Architecture, technologies, research challenges and future opportunities. Ad Hoc Networks 135: 102933 (2022) - [j351]Mario Collotta, Ilsun You, Sherali Zeadally, Fei Song:
Introduction to the special section on Smart Green Applications: QoS and Security-aware solutions in collaborative wireless networks (VSI-cwn). Comput. Electr. Eng. 97: 107656 (2022) - [j350]Adel Thaljaoui, Salim El Khediri, Sherali Zeadally, Abdullah Alourani:
Remote monitoring system using Light Fidelity and InfraRed technologies. Comput. Electr. Eng. 101: 108073 (2022) - [j349]Muhammad Taimoor Khan, Adnan Akhunzada, Sherali Zeadally:
Proactive Defense for Fog-to-Things Critical Infrastructure. IEEE Commun. Mag. 60(12): 44-49 (2022) - [j348]Rafael S. Lopes, Denis Rosário, Eduardo Cerqueira, Helder M. N. S. Oliveira, Sherali Zeadally:
Priority-aware traffic routing and resource allocation mechanism for space-division multiplexing elastic optical networks. Comput. Networks 218: 109389 (2022) - [j347]Nouman Bashir, Saadi Boudjit, Sherali Zeadally:
A closed-loop control architecture of UAV and WSN for traffic surveillance on highways. Comput. Commun. 190: 78-86 (2022) - [j346]Badis Hammi, Sherali Zeadally, Rida Khatoun, Jamel Nebhen:
Survey on smart homes: Vulnerabilities, risks, and countermeasures. Comput. Secur. 117: 102677 (2022) - [j345]Alfredo J. Perez, Sherali Zeadally:
Secure and privacy-preserving crowdsensing using smart contracts: Issues and solutions. Comput. Sci. Rev. 43: 100450 (2022) - [j344]Jinglin Zou, Debiao He, Sherali Zeadally, Neeraj Kumar, Huaqun Wang, Kim-Kwang Raymond Choo:
Integrated Blockchain and Cloud Computing Systems: A Systematic Survey, Solutions, and Challenges. ACM Comput. Surv. 54(8): 160:1-160:36 (2022) - [j343]Jacques Bou Abdo, Sherali Zeadally:
Multi-utility framework: blockchain exchange platform for sustainable development. Int. J. Pervasive Comput. Commun. 18(4): 388-406 (2022) - [j342]Tu N. Nguyen, Sherali Zeadally, Abhijith B. Vuduthala:
Cyber-Physical Cloud Manufacturing Systems With Digital Twins. IEEE Internet Comput. 26(3): 15-21 (2022) - [j341]Usman Mahmood Malik, Muhammad Awais Javed, Sherali Zeadally, Saif ul Islam:
Energy-Efficient Fog Computing for 6G-Enabled Massive IoT: Recent Trends and Future Opportunities. IEEE Internet Things J. 9(16): 14572-14594 (2022) - [j340]Faisal Karim Shaikh, Sarang Karim, Sherali Zeadally, Jamel Nebhen:
Recent Trends in Internet-of-Things-Enabled Sensor Technologies for Smart Agriculture. IEEE Internet Things J. 9(23): 23583-23598 (2022) - [j339]Dwij Mehta, Aditya Mehta, Pratik Narang, Vinay Chamola, Sherali Zeadally:
Deep Learning Enhanced UAV Imagery for Critical Infrastructure Protection. IEEE Internet Things Mag. 5(2): 30-34 (2022) - [j338]Faisal Karim Shaikh, Mohsin Ali Memon, Naeem Ahmed Mahoto, Sherali Zeadally, Jamel Nebhen:
Artificial Intelligence Best Practices in Smart Agriculture. IEEE Micro 42(1): 17-24 (2022) - [j337]Biwen Chen, Libing Wu, Sherali Zeadally, Debiao He:
Dual-Server Public-Key Authenticated Encryption with Keyword Search. IEEE Trans. Cloud Comput. 10(1): 322-333 (2022) - [j336]Badis Hammi, Sherali Zeadally, Yves-Christian Adja Elloh, Manlio Del Giudice, Jamel Nebhen:
Blockchain-Based Solution for Detecting and Preventing Fake Check Scams. IEEE Trans. Engineering Management 69(6): 3710-3725 (2022) - [j335]Sandeep Verma, Sherali Zeadally, Satnam Kaur, Ajay Kumar Sharma:
Intelligent and Secure Clustering in Wireless Sensor Network (WSN)-Based Intelligent Transportation Systems. IEEE Trans. Intell. Transp. Syst. 23(8): 13473-13481 (2022) - [j334]Furqan Jameel, Muhammad Awais Javed, Sherali Zeadally, Riku Jäntti:
Secure Transmission in Cellular V2X Communications Using Deep Q-Learning. IEEE Trans. Intell. Transp. Syst. 23(10): 17167-17176 (2022) - [j333]Badis Hammi, Yacine Mohamed Idir, Sherali Zeadally, Rida Khatoun, Jamel Nebhen:
Is it Really Easy to Detect Sybil Attacks in C-ITS Environments: A Position Paper. IEEE Trans. Intell. Transp. Syst. 23(10): 18273-18287 (2022) - [j332]Jun Huang, Qiang Duan, Cong-Cong Xing, Bo Gu, Guodong Wang, Sherali Zeadally, Erich J. Baker:
A Fine-Grained Video Traffic Control Mechanism in Software-Defined Networks. IEEE Trans. Netw. Serv. Manag. 19(3): 3501-3515 (2022) - [j331]Tu N. Nguyen, Sherali Zeadally:
Mobile Crowd-sensing Applications: Data Redundancies, Challenges, and Solutions. ACM Trans. Internet Techn. 22(2): 48:1-48:15 (2022) - [j330]Feng Sun, Zhenjiang Zhang, Sherali Zeadally, Guangjie Han, Shiyuan Tong:
Edge Computing-Enabled Internet of Vehicles: Towards Federated Learning Empowered Scheduling. IEEE Trans. Veh. Technol. 71(9): 10088-10103 (2022) - [j329]Abir Mchergui, Tarek Moulahi, Sherali Zeadally:
Survey on Artificial Intelligence (AI) techniques for Vehicular Ad-hoc Networks (VANETs). Veh. Commun. 34: 100403 (2022) - [j328]Adamu Sani Yahaya, Nadeem Javaid, Sherali Zeadally, Hassan Farooq:
Blockchain based optimized data storage with secure communication for Internet of Vehicles considering active, passive, and double spending attacks. Veh. Commun. 37: 100502 (2022) - [j327]Fadlallah Chbib, Sherali Zeadally, Rida Khatoun, Lyes Khoukhi, Walid Fahs, Jamal Haydar:
A secure cross-layer architecture for reactive routing in vehicle to vehicle (V2V) communications. Veh. Commun. 38: 100541 (2022) - [j326]Jean Moraes, Helder M. N. S. Oliveira, Eduardo Cerqueira, Cristiano Both, Sherali Zeadally, Denis Rosário:
Evaluation of an Adaptive Resource Allocation for LoRaWAN. J. Signal Process. Syst. 94(1): 65-79 (2022) - [c55]Lucas Bastos, Bruno S. Martins, Iago Medeiros, Augusto Neto, Sherali Zeadally, Denis Rosário, Eduardo Cerqueira:
Ensemble Learning Method for Human Identification in Wearable Devices. IWCMC 2022: 1052-1057 - [c54]Sana Sharif, Sherali Zeadally, Waleed Ejaz:
Space-Aerial-Ground-Sea Integrated Networks: Resource Optimization Security in 6G Networks. MILCOM 2022: 7-12 - [i12]Sabah Suhail, Sherali Zeadally, Raja Jurdak, Rasheed Hussain, Raimundas Matulevicius, Davor Svetinovic:
Security Attacks and Solutions for Digital Twins. CoRR abs/2202.12501 (2022) - [i11]Varun Kohli, Sombuddha Chakravarty, Vinay Chamola, Kuldip Singh Sangwan, Sherali Zeadally:
An Analysis of Energy Consumption and Carbon Footprints of Cryptocurrencies and Possible Solutions. CoRR abs/2203.03717 (2022) - 2021
- [j325]Bushra Feroz, Amjad Mehmood, Hafsa Maryam, Sherali Zeadally, Carsten Maple, Munam Ali Shah:
Vehicle-Life Interaction in Fog-Enabled Smart Connected and Autonomous Vehicles. IEEE Access 9: 7402-7420 (2021) - [j324]Teodora Sanislav, George Dan Mois, Sherali Zeadally, Silviu C. Folea:
Energy Harvesting Techniques for Internet of Things (IoT). IEEE Access 9: 39530-39549 (2021) - [j323]Chun-Wei Tsai, Mu-Yen Chen, Francesco Piccialli, Tie Qiu, Jason J. Jung, Patrick C. K. Hung, Sherali Zeadally:
IEEE Access Special Section Editorial: Data Mining for Internet of Things. IEEE Access 9: 90418-90427 (2021) - [j322]Felipe Sampaio Dantas da Silva, Emidio P. Neto, Helder M. N. S. Oliveira, Denis do Rosário, Eduardo Cerqueira, Cristiano Both, Sherali Zeadally, Augusto José Venâncio Neto:
A Survey on Long-Range Wide-Area Network Technology Optimizations. IEEE Access 9: 106079-106106 (2021) - [j321]Eduardo Lima, Jean Moraes, Helder M. N. S. Oliveira, Eduardo Cerqueira, Sherali Zeadally, Denis do Rosário:
Adaptive priority-aware LoRaWAN resource allocation for Internet of Things applications. Ad Hoc Networks 122: 102598 (2021) - [j320]Mohammad Aazam, Sherali Zeadally, Eduardo Feo Flushing:
Task offloading in edge computing for machine learning-based smart healthcare. Comput. Networks 191: 108019 (2021) - [j319]Yves-Christian Adja Elloh, Badis Hammi, Ahmed Serhrouchni, Sherali Zeadally:
A blockchain-based certificate revocation management and status verification system. Comput. Secur. 104: 102209 (2021) - [j318]Malcolm Shore, Sherali Zeadally, Astha Keshariya:
Zero Trust: The What, How, Why, and When. Computer 54(11): 26-35 (2021) - [j317]Maxim Chernyshev, Zubair Ahmed Baig, Sherali Zeadally:
Cloud-Native Application Security: Risks, Opportunities, and Challenges in Securing the Evolving Attack Surface. Computer 54(11): 47-57 (2021) - [j316]Qinwen Hu, Muhammad Rizwan Asghar, Sherali Zeadally:
Blockchain-based public ecosystem for auditing security of software applications. Computing 103(11): 2643-2665 (2021) - [j315]Rasheed Hussain, Fatima Hussain, Sherali Zeadally, JooYoung Lee:
On the Adequacy of 5G Security for Vehicular Ad Hoc Networks. IEEE Commun. Stand. Mag. 5(1): 32-39 (2021) - [j314]Gerasimos Razis, Ioannis Anagnostopoulos, Sherali Zeadally:
Modeling Influence with Semantics in Social Networks: A Survey. ACM Comput. Surv. 53(1): 7:1-7:38 (2021) - [j313]Juan Antonio Guerrero Ibáñez, Juan Contreras-Castillo, Sherali Zeadally:
Deep learning support for intelligent transportation systems. Trans. Emerg. Telecommun. Technol. 32(3) (2021) - [j312]Vikas Hassija, Sherali Zeadally, Ishan Jain, Aman Tahiliani, Vinay Chamola, Shashank Gupta:
Framework for determining the suitability of blockchain: Criteria and issues to consider. Trans. Emerg. Telecommun. Technol. 32(10) (2021) - [j311]Matthew Carter, Michail Tsikerdekis, Sherali Zeadally:
Approaches for Fake Content Detection: Strengths and Weaknesses to Adversarial Attacks. IEEE Internet Comput. 25(2): 73-83 (2021) - [j310]Sherali Zeadally, Oladayo Bello:
Harnessing the power of Internet of Things based connectivity to improve healthcare. Internet Things 14: 100074 (2021) - [j309]Sherali Zeadally, Ashok Kumar Das, Nicolas Sklavos:
Cryptographic technologies and protocol standards for Internet of Things. Internet Things 14: 100075 (2021) - [j308]Farhan Siddiqui, Jake Beley, Sherali Zeadally, Grant Braught:
Secure and lightweight communication in heterogeneous IoT environments. Internet Things 14: 100093 (2021) - [j307]Joel J. P. C. Rodrigues, Korhan Cengiz, Muhammad Awais Javed, Sudeep Tanwar, Zhaolong Ning, Sherali Zeadally:
GUEST EDITORIAL: Internet of Medical Things in the Context of COVID-19. IEEE Internet Things Mag. 4(2): 2-3 (2021) - [j306]Rajesh Gupta, Pronaya Bhattacharya, Sudeep Tanwar, Neeraj Kumar, Sherali Zeadally:
GaRuDa: A Blockchain-Based Delivery Scheme Using Drones for Healthcare 5.0 Applications. IEEE Internet Things Mag. 4(4): 60-66 (2021) - [j305]Jacques Bou Abdo, Sherali Zeadally:
Neural network-based blockchain decision scheme. Inf. Secur. J. A Glob. Perspect. 30(3): 173-187 (2021) - [j304]Nimish Mishra, SK Hafizul Islam, Sherali Zeadally:
A comprehensive review on collision-resistant hash functions on lattices. J. Inf. Secur. Appl. 58: 102782 (2021) - [j303]Leila Ismail, Sherali Zeadally:
Healthcare Insurance Frauds: Taxonomy and Blockchain-Based Detection Framework (Block-HI). IT Prof. 23(4): 36-43 (2021) - [j302]Adnan Akhunzada, Sherali Zeadally, Saif ul Islam:
Power and Performance Efficient SDN-Enabled Fog Architecture. IT Prof. 23(6): 24-30 (2021) - [j301]Shumaila Javaid, Zhenqiang Wu, Zara Hamid, Sherali Zeadally, Hamza Fahim:
Temperature-aware routing protocol for Intrabody Nanonetworks. J. Netw. Comput. Appl. 183-184: 103057 (2021) - [j300]Insaf Ullah, Sherali Zeadally, Noor Ul Amin, Muhammad Asghar Khan, Hizbullah Khattak:
Lightweight and provable secure cross-domain access control scheme for internet of things (IoT) based wireless body area networks (WBAN). Microprocess. Microsystems 81: 103477 (2021) - [j299]Hesham El-Sayed, Sherali Zeadally, Manzoor Ahmed Khan, Henry Alexander Ignatious:
Edge-centric trust management in vehicular networks. Microprocess. Microsystems 84: 104271 (2021) - [j298]Muhammad Awais Javed, Sherali Zeadally:
AI-Empowered Content Caching in Vehicular Edge Computing: Opportunities and Challenges. IEEE Netw. 35(3): 109-115 (2021) - [j297]Alfredo J. Perez, Sherali Zeadally:
Recent Advances in Wearable Sensing Technologies. Sensors 21(20): 6828 (2021) - [j296]Rajesh Gupta, Mohil Maheshkumar Patel, Sudeep Tanwar, Neeraj Kumar, Sherali Zeadally:
Blockchain-Based Data Dissemination Scheme for 5G-Enabled Softwarized UAV Networks. IEEE Trans. Green Commun. Netw. 5(4): 1712-1721 (2021) - [j295]Shidrokh Goudarzi, Mohammad Hossein Anisi, Seyed Ahmad Soleymani, Masri Ayob, Sherali Zeadally:
An IoT-Based Prediction Technique for Efficient Energy Consumption in Buildings. IEEE Trans. Green Commun. Netw. 5(4): 2076-2088 (2021) - [j294]Waleed Ejaz, Muhammad Naeem, Sherali Zeadally:
On-Demand Sensing and Wireless Power Transfer for Self-Sustainable Industrial Internet of Things Networks. IEEE Trans. Ind. Informatics 17(10): 7075-7084 (2021) - [j293]Rasheed Hussain, JooYoung Lee, Sherali Zeadally:
Trust in VANET: A Survey of Current Solutions and Future Research Opportunities. IEEE Trans. Intell. Transp. Syst. 22(5): 2553-2571 (2021) - [j292]Fushan Wei, Sherali Zeadally, Pandi Vijayakumar, Neeraj Kumar, Debiao He:
An Intelligent Terminal Based Privacy-Preserving Multi-Modal Implicit Authentication Protocol for Internet of Connected Vehicles. IEEE Trans. Intell. Transp. Syst. 22(7): 3939-3951 (2021) - [j291]Furqan Jameel, Muhammad Awais Javed, Sherali Zeadally, Riku Jäntti:
Efficient Mining Cluster Selection for Blockchain-Based Cellular V2X Communications. IEEE Trans. Intell. Transp. Syst. 22(7): 4064-4072 (2021) - [j290]Kuljeet Kaur, Georges Kaddoum, Sherali Zeadally:
Blockchain-Based Cyber-Physical Security for Electrical Vehicle Aided Smart Grid Ecosystem. IEEE Trans. Intell. Transp. Syst. 22(8): 5178-5189 (2021) - [j289]Chao Lin, Debiao He, Sherali Zeadally, Xinyi Huang, Zhe Liu:
Blockchain-based Data Sharing System for Sensing-as-a-Service in Smart Cities. ACM Trans. Internet Techn. 21(2): 40:1-40:21 (2021) - [j288]Jing Wang, Libing Wu, Sherali Zeadally, Muhammad Khurram Khan, Debiao He:
Privacy-preserving Data Aggregation against Malicious Data Mining Attack for IoT-enabled Smart Grid. ACM Trans. Sens. Networks 17(3): 25:1-25:25 (2021) - [i10]Adnan Akhunzada, Sherali Zeadally, Saif ul Islam:
Power and Performance Efficient SDN-Enabled Fog Architecture. CoRR abs/2105.14607 (2021) - 2020
- [j287]Sherali Zeadally, Erwin Adi, Zubair A. Baig, Imran A. Khan:
Harnessing Artificial Intelligence Capabilities to Improve Cybersecurity. IEEE Access 8: 23817-23837 (2020) - [j286]Badis Hammi, Sherali Zeadally, Houda Labiod, Rida Khatoun, Youcef Begriche, Lyes Khoukhi:
A secure multipath reactive protocol for routing in IoT and HANETs. Ad Hoc Networks 103: 102118 (2020) - [j285]Anirudh Paranjothi, Mohammad S. Khan, Sherali Zeadally:
A survey on congestion detection and control in connected vehicles. Ad Hoc Networks 108: 102277 (2020) - [j284]Mohammad Aazam, Sherali Zeadally, Khaled A. Harras:
Health Fog for Smart Healthcare. IEEE Consumer Electron. Mag. 9(2): 96-102 (2020) - [j283]Chao Lin, Debiao He, Sherali Zeadally, Neeraj Kumar, Kim-Kwang Raymond Choo:
SecBCS: a secure and privacy-preserving blockchain-based crowdsourcing system. Sci. China Inf. Sci. 63(3) (2020) - [j282]Alireza Shamsoshoara, Ashwija Korenda, Fatemeh Afghah, Sherali Zeadally:
A survey on physical unclonable function (PUF)-based security solutions for Internet of Things. Comput. Networks 183: 107593 (2020) - [j281]Arzoo Miglani, Neeraj Kumar, Vinay Chamola, Sherali Zeadally:
Blockchain for Internet of Energy management: Review, solutions, and challenges. Comput. Commun. 151: 395-418 (2020) - [j280]Tejasvi Alladi, Vinay Chamola, Sherali Zeadally:
Industrial Control Systems: Cyberattack trends and countermeasures. Comput. Commun. 155: 1-8 (2020) - [j279]Sherali Zeadally, Muhammad Awais Javed, Elyes Ben Hamida:
Vehicular Communications for ITS: Standardization and Challenges. IEEE Commun. Stand. Mag. 4(1): 11-17 (2020) - [j278]Max Ismailov, Michail Tsikerdekis, Sherali Zeadally:
Vulnerabilities to Online Social Network Identity Deception Detection Research and Recommendations for Mitigation. Future Internet 12(9): 148 (2020) - [j277]Sherali Zeadally, Michail Tsikerdekis:
Securing Internet of Things (IoT) with machine learning. Int. J. Commun. Syst. 33(1) (2020) - [j276]Sudeep Tanwar, Shriya Kaneriya, Neeraj Kumar, Sherali Zeadally:
ElectroBlocks: A blockchain-based energy trading scheme for smart grid systems. Int. J. Commun. Syst. 33(15) (2020) - [j275]Kayhan Zrar Ghafoor, Linghe Kong, Sherali Zeadally, Ali Safaa Sadiq, Gregory Epiphaniou, Mohammad Hammoudeh, Ali Kashif Bashir, Shahid Mumtaz:
Millimeter-Wave Communication for Internet of Vehicles: Status, Challenges, and Perspectives. IEEE Internet Things J. 7(9): 8525-8546 (2020) - [j274]SK Hafizul Islam, Sherali Zeadally:
Provably secure identity-based two-party authenticated key agreement protocol based on CBi-ISIS and Bi-ISIS problems on lattices. J. Inf. Secur. Appl. 54: 102540 (2020) - [j273]Michail Tsikerdekis, Sherali Zeadally:
Detecting Online Content Deception. IT Prof. 22(2): 35-44 (2020) - [j272]Hai Lin, Sherali Zeadally, Zhihong Chen, Houda Labiod, Lusheng Wang:
A survey on computation offloading modeling for edge computing. J. Netw. Comput. Appl. 169: 102781 (2020) - [j271]Wenyu Zhang, Zhenjiang Zhang, Sherali Zeadally, Han-Chieh Chao, Victor C. M. Leung:
Energy-efficient Workload Allocation and Computation Resource Configuration in Distributed Cloud/Edge Computing Systems With Stochastic Workloads. IEEE J. Sel. Areas Commun. 38(6): 1118-1132 (2020) - [j270]Erwin Adi, Adnan Anwar, Zubair A. Baig, Sherali Zeadally:
Machine learning and data analytics for the IoT. Neural Comput. Appl. 32(20): 16205-16233 (2020) - [j269]Adnan Akhunzada, Saif ul Islam, Sherali Zeadally:
Securing Cyberspace of Future Smart Cities with 5G Technologies. IEEE Netw. 34(4): 336-342 (2020) - [j268]Umair Sarfraz, Sherali Zeadally, Masoom Alam:
Outsourcing IOTA proof-of-work to volunteer public devices. Secur. Priv. 3(2) (2020) - [j267]Badis Hammi, Achraf Fayad, Rida Khatoun, Sherali Zeadally, Youcef Begriche:
A Lightweight ECC-Based Authentication Scheme for Internet of Things (IoT). IEEE Syst. J. 14(3): 3440-3450 (2020) - [j266]Sherali Zeadally, Juan Antonio Guerrero Ibáñez, Juan Contreras-Castillo:
A tutorial survey on vehicle-to-vehicle communications. Telecommun. Syst. 73(3): 469-489 (2020) - [j265]Sehrish Shafeeq, Sherali Zeadally, Masoom Alam, Abid Khan:
Curbing Address Reuse in the IOTA Distributed Ledger: A Cuckoo-Filter-Based Approach. IEEE Trans. Engineering Management 67(4): 1244-1255 (2020) - [j264]Qi Feng, Debiao He, Sherali Zeadally, Kaitai Liang:
BPAS: Blockchain-Assisted Privacy-Preserving Authentication System for Vehicular Ad Hoc Networks. IEEE Trans. Ind. Informatics 16(6): 4146-4155 (2020) - [j263]Honggang Wang, Shui Yu, Sherali Zeadally, Danda B. Rawat, Yue Gao:
Introduction to the Special Section on Network Science for Internet of Things (IoT). IEEE Trans. Netw. Sci. Eng. 7(1): 237-238 (2020) - [j262]Hesham El-Sayed, Sherali Zeadally, Deepak Puthal:
Design and evaluation of a novel hierarchical trust assessment approach for vehicular networks. Veh. Commun. 24: 100227 (2020) - [j261]D. Manivannan, Shafika Showkat Moni, Sherali Zeadally:
Secure authentication and privacy-preserving techniques in Vehicular Ad-hoc NETworks (VANETs). Veh. Commun. 25: 100247 (2020) - [p1]Jawwad A. Shamsi, Muhammad Hanif, Sherali Zeadally:
Fog Computing: Data Analytics for Time-Sensitive Applications. Convergence of Artificial Intelligence and the Internet of Things 2020: 1-13 - [i9]Furqan Jameel, Muhammad Awais Javed, Sherali Zeadally, Riku Jäntti:
Efficient Mining Cluster Selection for Blockchain-based Cellular V2X Communications. CoRR abs/2007.01052 (2020) - [i8]Erwin Adi, Adnan Anwar, Zubair A. Baig, Sherali Zeadally:
Machine learning and data analytics for the IoT. CoRR abs/2007.04093 (2020) - [i7]Jacques Bou Abdo, Sherali Zeadally:
Multi-Utility Market: Framework for a Blockchain Exchange Platform for Sustainable Development. CoRR abs/2007.07096 (2020) - [i6]Anirudh Paranjothi, Mohammad S. Khan, Sherali Zeadally:
Survey on Congestion Detection and Control in Connected Vehicles. CoRR abs/2007.14896 (2020)
2010 – 2019
- 2019
- [j260]Zhiwei Yan, Hongtao Li, Sherali Zeadally, Yu Zeng, Guanggang Geng:
Is DNS Ready for Ubiquitous Internet of Things? IEEE Access 7: 28835-28846 (2019) - [j259]Hesham El-Sayed, Moumena Chaqfeh, Sherali Zeadally, Deepak Puthal:
A Traffic-Aware Approach for Enabling Unmanned Aerial Vehicles (UAVs) in Smart City Scenarios. IEEE Access 7: 86297-86305 (2019) - [j258]Leila Ismail, Huned Materwala, Sherali Zeadally:
Lightweight Blockchain for Healthcare. IEEE Access 7: 149935-149951 (2019) - [j257]Sherali Zeadally, Teodora Sanislav, George Dan Mois:
Self-Adaptation Techniques in Cyber-Physical Systems (CPSs). IEEE Access 7: 171126-171139 (2019) - [j256]Shidrokh Goudarzi, Nazri Kama, Mohammad Hossein Anisi, Sherali Zeadally, Shahid Mumtaz:
Data collection using unmanned aerial vehicles for Internet of Things platforms. Comput. Electr. Eng. 75: 1-15 (2019) - [j255]Mohammad Wazid, Sherali Zeadally, Ashok Kumar Das:
Mobile Banking: Evolution and Threats: Malware Threats and Security Solutions. IEEE Consumer Electron. Mag. 8(2): 56-60 (2019) - [j254]Alfredo J. Perez, Sherali Zeadally:
A Communication Architecture for Crowd Management in Emergency and Disruptive Scenarios. IEEE Commun. Mag. 57(4): 54-60 (2019) - [j253]Umair Sarfraz, Masoom Alam, Sherali Zeadally, Abid Khan:
Privacy aware IOTA ledger: Decentralized mixing and unlinkable IOTA transactions. Comput. Networks 148: 361-372 (2019) - [j252]Muhammad Rizwan Asghar, Qinwen Hu, Sherali Zeadally:
Cybersecurity in industrial control systems: Issues, technologies, and challenges. Comput. Networks 165 (2019) - [j251]Rasheed Hussain, Sherali Zeadally:
Autonomous Cars: Research Results, Issues, and Future Challenges. IEEE Commun. Surv. Tutorials 21(2): 1275-1313 (2019) - [j250]Teodora Sanislav, Sherali Zeadally, George Dan Mois, Hacène Fouchal:
Reliability, failure detection and prevention in cyber-physical systems (CPSs) with agents. Concurr. Comput. Pract. Exp. 31(24) (2019) - [j249]Badis Hammi, Sherali Zeadally, Rida Khatoun:
An empirical investigation of botnet as a service for cyberattacks. Trans. Emerg. Telecommun. Technol. 30(3) (2019) - [j248]Oladayo Bello, Sherali Zeadally:
Toward efficient smartification of the Internet of Things (IoT) services. Future Gener. Comput. Syst. 92: 663-673 (2019) - [j247]Rasheed Hussain, Fatima Hussain, Sherali Zeadally:
Integration of VANET and 5G Security: A review of design and implementation issues. Future Gener. Comput. Syst. 101: 843-864 (2019) - [j246]Sherali Zeadally, Farhan Siddiqui, Zubair A. Baig:
25 Years of Bluetooth Technology. Future Internet 11(9): 194 (2019) - [j245]Wenyu Zhang, Zhenjiang Zhang, Sherali Zeadally, Han-Chieh Chao:
Efficient Task Scheduling With Stochastic Delay Cost in Mobile Edge Computing. IEEE Commun. Lett. 23(1): 4-7 (2019) - [j244]Anirudh Paranjothi, Mohammad S. Khan, Sherali Zeadally, Ajinkya Pawar, David Hicks:
GSTR: Secure multi-hop message dissemination in connected vehicles using social trust model. Internet Things 7 (2019) - [j243]Rajat Chaudhary, Gagangeet Singh Aujla, Neeraj Kumar, Sherali Zeadally:
Lattice-Based Public Key Cryptosystem for Internet of Things Environment: Challenges and Solutions. IEEE Internet Things J. 6(3): 4897-4909 (2019) - [j242]Sherali Zeadally, Jacques Bou Abdo:
Blockchain: Trends and future opportunities. Internet Technol. Lett. 2(6) (2019) - [j241]Fidel Paniagua Diez, Diego Suarez Touceda, José María Sierra Camara, Sherali Zeadally:
Lightweight Access Control System for Wearable Devices. IT Prof. 21(1): 50-58 (2019) - [j240]Juan Contreras-Castillo, Sherali Zeadally, Juan Antonio Guerrero Ibáñez:
Autonomous Cars: Challenges and Opportunities. IT Prof. 21(6): 6-13 (2019) - [j239]Cong Peng, Jianhua Chen, Sherali Zeadally, Debiao He:
Isogeny-Based Cryptography: A Promising Post-Quantum Technique. IT Prof. 21(6): 27-32 (2019) - [j238]Maxim Chernyshev, Sherali Zeadally, Zubair Ahmed Baig:
Healthcare Data Breaches: Implications for Digital Forensic Readiness. J. Medical Syst. 43(1): 7:1-7:12 (2019) - [j237]Qi Feng, Debiao He, Sherali Zeadally, Muhammad Khurram Khan, Neeraj Kumar:
A survey on privacy protection in blockchain system. J. Netw. Comput. Appl. 126: 45-58 (2019) - [j236]Libing Wu, Jing Wang, Sherali Zeadally, Debiao He:
Anonymous and Efficient Message Authentication Scheme for Smart Grid. Secur. Commun. Networks 2019: 4836016:1-4836016:12 (2019) - [j235]Qi Feng, Debiao He, Sherali Zeadally, Neeraj Kumar, Kaitai Liang:
Ideal Lattice-Based Anonymous Authentication Protocol for Mobile Devices. IEEE Syst. J. 13(3): 2775-2785 (2019) - [j234]Mohammad Aazam, Khaled A. Harras, Sherali Zeadally:
Fog Computing for 5G Tactile Industrial Internet of Things: QoE-Aware Resource Allocation Model. IEEE Trans. Ind. Informatics 15(5): 3085-3092 (2019) - [j233]Wenyu Zhang, Zhenjiang Zhang, Sherali Zeadally, Han-Chieh Chao, Victor C. M. Leung:
MASM: A Multiple-Algorithm Service Model for Energy-Delay Optimization in Edge Artificial Intelligence. IEEE Trans. Ind. Informatics 15(7): 4216-4224 (2019) - [j232]Shama Naz Islam, Zubair A. Baig, Sherali Zeadally:
Physical Layer Security for the Smart Grid: Vulnerabilities, Threats, and Countermeasures. IEEE Trans. Ind. Informatics 15(12): 6522-6530 (2019) - [j231]Muhammad Awais Javed, Sherali Zeadally, Elyes Ben Hamida:
Data analytics for Cooperative Intelligent Transport Systems. Veh. Commun. 15: 63-72 (2019) - [c53]Jiaxi Hu, Zhiqiang Xu, Debiao He, Sherali Zeadally, Kim-Kwang Raymond Choo:
Efficient and Secure Three-Factor User Authentication and Key Agreement Using Chaotic Maps. CSS (1) 2019: 186-202 - [c52]Ting-Mei Li, Wei-Xiang Shen, Han-Chieh Chao, Sherali Zeadally:
Analysis of Students' Learning Emotions Using EEG. ICITL 2019: 498-504 - [i5]Anirudh Paranjothi, Mohammad S. Khan, Sherali Zeadally, Ajinkya Pawar, David Hicks:
GSTR: Secure Multi-hop Message Dissemination in Connected Vehicles using Social Trust Model. CoRR abs/1906.04219 (2019) - [i4]Alireza Shamsoshoara, Ashwija Korenda, Fatemeh Afghah, Sherali Zeadally:
A Survey on Hardware-based Security Mechanisms for Internet of Things. CoRR abs/1907.12525 (2019) - 2018
- [j230]Yi Yang, Debiao He, Neeraj Kumar, Sherali Zeadally:
Compact Hardware Implementation of a SHA-3 Core for Wireless Body Sensor Networks. IEEE Access 6: 40128-40136 (2018) - [j229]Mohammad Zaeri-Amirani, Fatemeh Afghah, Sherali Zeadally:
A Hierarchical Spectrum Access Scheme for TV White Space Coexistence in Heterogeneous Networks. IEEE Access 6: 78992-79004 (2018) - [j228]Nafaâ Jabeur, Ahmed Nait-Sidi-Moh, Sherali Zeadally:
Crowd social media computing: Applying crowd computing techniques to social media. Appl. Soft Comput. 66: 495-505 (2018) - [j227]Vasilis Kolias, Ioannis Anagnostopoulos, Sherali Zeadally:
Structural analysis and classification of search interfaces for the deep web. Comput. J. 61(3): 386-398 (2018) - [j226]Syed Adeel Ali Shah, Ejaz Ahmed, Muhammad Imran, Sherali Zeadally:
5G for Vehicular Communications. IEEE Commun. Mag. 56(1): 111-117 (2018) - [j225]Mohammad Aazam, Sherali Zeadally, Khaled A. Harras:
Fog Computing Architecture, Evaluation, and Future Research Directions. IEEE Commun. Mag. 56(5): 46-52 (2018) - [j224]Kübra Kalkan, Sherali Zeadally:
Securing Internet of Things with Software Defined Networking. IEEE Commun. Mag. 56(9): 186-192 (2018) - [j223]Furqan Jameel, Shurjeel Wyne, Muhammad Awais Javed, Sherali Zeadally:
Interference-Aided Vehicular Networks: Future Research Opportunities and Challenges. IEEE Commun. Mag. 56(10): 36-42 (2018) - [j222]Muhammad Awais Javed, Sherali Zeadally, Zara Hamid:
Trust-based security adaptation mechanism for Vehicular Sensor Networks. Comput. Networks 137: 27-36 (2018) - [j221]Furqan Jameel, Zara Hamid, Farhana Jabeen, Sherali Zeadally, Muhammad Awais Javed:
A Survey of Device-to-Device Communications: Research Issues and Challenges. IEEE Commun. Surv. Tutorials 20(3): 2133-2168 (2018) - [j220]Muhammad Awais Javed, Sherali Zeadally:
RepGuide: Reputation-Based Route Guidance Using Internet of Vehicles. IEEE Commun. Stand. Mag. 2(4): 81-87 (2018) - [j219]Salim Bitam, Sherali Zeadally, Abdelhamid Mellouk:
Fog computing job scheduling optimization based on bees swarm. Enterp. Inf. Syst. 12(4): 373-397 (2018) - [j218]Qi Feng, Debiao He, Sherali Zeadally, Huaqun Wang:
Anonymous biometrics-based authentication scheme with key distribution for mobile multi-server environment. Future Gener. Comput. Syst. 84: 239-251 (2018) - [j217]Mohammad Aazam, Sherali Zeadally, Khaled A. Harras:
Offloading in fog computing for IoT: Review, enabling technologies, and research opportunities. Future Gener. Comput. Syst. 87: 278-289 (2018) - [j216]Ashok Kumar Das, Sherali Zeadally, Debiao He:
Taxonomy and analysis of security protocols for Internet of Things. Future Gener. Comput. Syst. 89: 110-125 (2018) - [j215]Stephanie Winkler, Sherali Zeadally, Katrine Evans:
Privacy and Civilian Drone Use: The Need for Further Regulation. IEEE Secur. Priv. 16(5): 72-80 (2018) - [j214]Badis Hammi, Rida Khatoun, Sherali Zeadally, Achraf Fayad, Lyes Khoukhi:
IoT technologies for smart cities. IET Networks 7(1): 1-13 (2018) - [j213]Fatemeh Afghah, Bertrand Cambou, Masih Abedini, Sherali Zeadally:
A ReRAM Physically Unclonable Function (ReRAM PUF)-Based Approach to Enhance Authentication Security in Software Defined Wireless Networks. Int. J. Wirel. Inf. Networks 25(2): 117-129 (2018) - [j212]Maxim Chernyshev, Zubair A. Baig, Oladayo Bello, Sherali Zeadally:
Internet of Things (IoT): Research, Simulators, and Testbeds. IEEE Internet Things J. 5(3): 1637-1647 (2018) - [j211]Juan Contreras-Castillo, Sherali Zeadally, Juan Antonio Guerrero Ibáñez:
Internet of Vehicles: Architecture, Protocols, and Security. IEEE Internet Things J. 5(5): 3701-3709 (2018) - [j210]Yudi Zhang, Debiao He, Sherali Zeadally, Ding Wang, Kim-Kwang Raymond Choo:
Efficient and Provably Secure Distributed Signing Protocol for Mobile Devices in Wireless Networks. IEEE Internet Things J. 5(6): 5271-5280 (2018) - [j209]Nikolai Hampton, Zubair A. Baig, Sherali Zeadally:
Ransomware behavioural analysis on windows platforms. J. Inf. Secur. Appl. 40: 44-51 (2018) - [j208]Ngoc-Tu Nguyen, Ming C. Leu, Sherali Zeadally, Bing-Hong Liu, Shao-I Chu:
Optimal solution for data collision avoidance in radio frequency identification networks. Internet Technol. Lett. 1(3) (2018) - [j207]Maxim Chernyshev, Sherali Zeadally, Zubair A. Baig, Andrew Woodward:
Internet of Things Forensics: The Need, Process Models, and Open Issues. IT Prof. 20(3): 40-49 (2018) - [j206]Alfredo J. Perez, Sherali Zeadally:
Privacy Issues and Solutions for Consumer Wearables. IT Prof. 20(4): 46-56 (2018) - [j205]Rasheed Hussain, JooYoung Lee, Sherali Zeadally:
Autonomous Cars: Social and Economic Implications. IT Prof. 20(6): 70-77 (2018) - [j204]Alfredo J. Perez, Sherali Zeadally, Nafaâ Jabeur:
Security and Privacy in Ubiquitous Sensor Networks. J. Inf. Process. Syst. 14(2): 286-308 (2018) - [j203]Talal H. Noor, Sherali Zeadally, Abdullah Alfazi, Quan Z. Sheng:
Mobile cloud computing: Challenges and future research directions. J. Netw. Comput. Appl. 115: 70-85 (2018) - [j202]Teodora Sanislav, Sherali Zeadally, George Dan Mois, Silviu C. Folea:
Wireless energy harvesting: Empirical results and practical considerations for Internet of Things. J. Netw. Comput. Appl. 121: 149-158 (2018) - [j201]Alfredo J. Perez, Sherali Zeadally, Jonathan Cochran:
A review and an empirical analysis of privacy policy and notices for consumer Internet of things. Secur. Priv. 1(3) (2018) - [j200]Juan Antonio Guerrero Ibáñez, Sherali Zeadally, Juan Contreras-Castillo:
Sensor Technologies for Intelligent Transportation Systems. Sensors 18(4): 1212 (2018) - [j199]George Dan Mois, Teodora Sanislav, Silviu C. Folea, Sherali Zeadally:
Performance Evaluation of Energy-Autonomous Sensors Using Power-Harvesting Beacons for Environmental Monitoring in Internet of Things (IoT). Sensors 18(6): 1709 (2018) - [j198]Debiao He, Sherali Zeadally, Libing Wu:
Certificateless Public Auditing Scheme for Cloud-Assisted Wireless Body Area Networks. IEEE Syst. J. 12(1): 64-73 (2018) - [j197]Libing Wu, Biwen Chen, Sherali Zeadally, Debiao He:
An efficient and secure searchable public key encryption scheme with privacy protection for cloud storage. Soft Comput. 22(23): 7685-7696 (2018) - [j196]Vanga Odelu, Sherali Zeadally, Ashok Kumar Das, Mohammad Wazid, Debiao He:
A secure enhanced privacy-preserving key agreement protocol for wireless mobile networks. Telecommun. Syst. 69(4): 431-445 (2018) - [j195]Debiao He, Neeraj Kumar, Sherali Zeadally, Huaqun Wang:
Certificateless Provable Data Possession Scheme for Cloud-Based Smart Grid Data Management Systems. IEEE Trans. Ind. Informatics 14(3): 1232-1241 (2018) - [j194]Debiao He, Mimi Ma, Sherali Zeadally, Neeraj Kumar, Kaitai Liang:
Certificateless Public Key Authenticated Encryption With Keyword Search for Industrial Internet of Things. IEEE Trans. Ind. Informatics 14(8): 3618-3627 (2018) - [j193]Mohammad Aazam, Sherali Zeadally, Khaled A. Harras:
Deploying Fog Computing in Industrial Internet of Things and Industry 4.0. IEEE Trans. Ind. Informatics 14(10): 4674-4682 (2018) - [j192]Libing Wu, Jing Wang, Sherali Zeadally, Debiao He:
Privacy-preserving auditing scheme for shared data in public clouds. J. Supercomput. 74(11): 6156-6183 (2018) - [c51]Michail Tsikerdekis, Sherali Zeadally, Amy Schlesener, Nicolas Sklavos:
Approaches for Preventing Honeypot Detection and Compromise. GIIS 2018: 1-6 - 2017
- [b1]Jesús Téllez Isaac, Sherali Zeadally:
Mobile Payment Systems - Secure Network Architectures and Protocols. Computer Communications and Networks, Springer 2017, ISBN 978-3-319-23032-0, pp. 1-117 - [j191]Zhiwei Yan, Guanggang Geng, Sherali Zeadally, Yong-Jin Park:
Distributed All-IP Mobility Management Architecture Supported by the NDN Overlay. IEEE Access 5: 243-251 (2017) - [j190]Xiaoying Jia, Debiao He, Sherali Zeadally, Li Li:
Efficient Revocable ID-Based Signature With Cloud Revocation Server. IEEE Access 5: 2945-2954 (2017) - [j189]Qi Jiang, Sherali Zeadally, Jianfeng Ma, Debiao He:
Lightweight Three-Factor Authentication and Key Agreement Protocol for Internet-Integrated Wireless Sensor Networks. IEEE Access 5: 3376-3392 (2017) - [j188]Zhenjiang Zhang, Ziqi Hao, Sherali Zeadally, Jing Zhang, Bowen Han, Han-Chieh Chao:
Multiple Attributes Decision Fusion for Wireless Sensor Networks Based on Intuitionistic Fuzzy Set. IEEE Access 5: 12798-12809 (2017) - [j187]Oladayo Bello, Sherali Zeadally, Mohamad Badra:
Network layer inter-operation of Device-to-Device communication technologies in Internet of Things (IoT). Ad Hoc Networks 57: 52-62 (2017) - [j186]Mohamad Badra, Sherali Zeadally:
Lightweight and efficient privacy-preserving data aggregation approach for the Smart Grid. Ad Hoc Networks 64: 32-40 (2017) - [j185]Ashok Kumar Das, Sherali Zeadally, Mohammad Wazid:
Lightweight authentication protocols for wearable devices. Comput. Electr. Eng. 63: 196-208 (2017) - [j184]Rida Khatoun, Sherali Zeadally:
Cybersecurity and Privacy Solutions in Smart Cities. IEEE Commun. Mag. 55(3): 51-59 (2017) - [j183]Aditya K. Sood, Sherali Zeadally, Rohit Bansal:
Cybercrime at a Scale: A Practical Study of Deployments of HTTP-Based Botnet Command and Control Panels. IEEE Commun. Mag. 55(7): 22-28 (2017) - [j182]Rajat Chaudhary, Neeraj Kumar, Sherali Zeadally:
Network Service Chaining in Fog and Cloud Computing for the 5G Environment: Data Management and Security Challenges. IEEE Commun. Mag. 55(11): 114-122 (2017) - [j181]Debiao He, Sherali Zeadally, Libing Wu, Huaqun Wang:
Analysis of handover authentication protocols for mobile wireless networks using identity-based public key cryptography. Comput. Networks 128: 154-163 (2017) - [j180]Joel J. P. C. Rodrigues, Sherali Zeadally, Neeraj Kumar, Guangjie Han:
Special Issue on 5G Wireless Networks for IoT and Body Sensors. Comput. Networks 129: 335-339 (2017) - [j179]Teodora Sanislav, Sherali Zeadally, George Dan Mois:
A Cloud-Integrated, Multilayered, Agent-Based Cyber-Physical System Architecture. Computer 50(4): 27-37 (2017) - [j178]Ilsun You, Sherali Zeadally, A Min Tjoa:
Special Issue: Foundations and Practice of Security in Emerging ICT Applications. Comput. Syst. Sci. Eng. 32(2) (2017) - [j177]Ilsun You, Yuh-Shyan Chen, Sherali Zeadally, Fei Song:
A brief overview of intelligent mobility management for future wireless mobile networks. EURASIP J. Wirel. Commun. Netw. 2017: 188 (2017) - [j176]Muhammad Awais Javed, Sherali Zeadally, Muhammad Usman, Guftaar Ahmad Sardar Sidhu:
FASPM: Fuzzy logic-based adaptive security protocol for multihop data dissemination in intelligent transport systems. Trans. Emerg. Telecommun. Technol. 28(11) (2017) - [j175]Zhiwei Yan, Sherali Zeadally, Guanggang Geng:
ISBORD: Internet Searching based on Resource Description. ICT Express 3(1): 48-51 (2017) - [j174]Maxim Chernyshev, Sherali Zeadally, Zubair A. Baig, Andrew Woodward:
Mobile Forensics: Advances, Challenges, and Research Opportunities. IEEE Secur. Priv. 15(6): 42-51 (2017) - [j173]Alfredo J. Perez, Sherali Zeadally, Scott Griffith:
Bystanders' Privacy. IT Prof. 19(3): 61-65 (2017) - [j172]Juan Contreras-Castillo, Sherali Zeadally, Juan Antonio Guerrero Ibáñez:
A seven-layered model architecture for Internet of Vehicles. J. Inf. Telecommun. 1(1): 4-22 (2017) - [j171]Neeraj Kumar, Mukesh Singh, Sherali Zeadally, Joel J. P. C. Rodrigues, Seungmin Rho:
Cloud-Assisted Context-Aware Vehicular Cyber-Physical System for PHEVs in Smart Grid. IEEE Syst. J. 11(1): 140-151 (2017) - [j170]Aditya K. Sood, Sherali Zeadally, Rohit Bansal:
Exploiting Trust: Stealthy Attacks Through Socioware and Insider Threats. IEEE Syst. J. 11(2): 415-426 (2017) - [j169]Faisal Karim Shaikh, Sherali Zeadally, Ernesto Exposito:
Enabling Technologies for Green Internet of Things. IEEE Syst. J. 11(2): 983-994 (2017) - [j168]Debiao He, Sherali Zeadally, Neeraj Kumar, Jong-Hyouk Lee:
Anonymous Authentication for Wireless Body Area Networks With Provable Security. IEEE Syst. J. 11(4): 2590-2601 (2017) - [j167]Ioannis Anagnostopoulos, Manolis Wallace, Sherali Zeadally:
Introduction to the topical issue on semantic social networks and media applications. Soc. Netw. Anal. Min. 7(1): 53:1-53:2 (2017) - [j166]Debiao He, Neeraj Kumar, Sherali Zeadally, Alexey V. Vinel, Laurence T. Yang:
Efficient and Privacy-Preserving Data Aggregation Scheme for Smart Grid Against Internal Adversaries. IEEE Trans. Smart Grid 8(5): 2411-2419 (2017) - [j165]Kuljeet Kaur, Tanya Dhand, Neeraj Kumar, Sherali Zeadally:
Container-as-a-Service at the Edge: Trade-off between Energy Efficiency and Service Availability at Fog Nano Data Centers. IEEE Wirel. Commun. 24(3): 48-56 (2017) - [j164]Debiao He, Sherali Zeadally, Huaqun Wang, Qin Liu:
Lightweight Data Aggregation Scheme against Internal Attackers in Smart Grid Using Elliptic Curve Cryptography. Wirel. Commun. Mob. Comput. 2017 (2017) - [c50]Alfredo J. Perez, Sherali Zeadally, Nafaâ Jabeur:
Investigating Security for Ubiquitous Sensor Networks. ANT/SEIT 2017: 737-744 - [c49]Teodora Sanislav, Sherali Zeadally, George Dan Mois, Hacène Fouchal:
Multi-agent architecture for reliable Cyber-Physical Systems (CPS). ISCC 2017: 170-175 - [c48]Alfredo J. Perez, Sherali Zeadally:
PEAR: A Privacy-Enabled Architecture for Crowdsensing. RACS 2017: 166-171 - [i3]Giannis Haralabopoulos, Ioannis Anagnostopoulos, Sherali Zeadally:
Viral content propagation in Online Social Networks. CoRR abs/1712.02245 (2017) - [i2]Fatemeh Afghah, Bertrand Cambou, Masih Abedini, Sherali Zeadally:
A ReRAM Physically Unclonable Function (ReRAM PUF)-based Approach to Enhance Authentication Security in Software Defined Wireless Networks. CoRR abs/1712.09916 (2017) - 2016
- [j163]Rida Khatoun, Sherali Zeadally:
Smart cities: concepts, architectures, research opportunities. Commun. ACM 59(8): 46-57 (2016) - [j162]Salim Bitam, Sherali Zeadally, Abdelhamid Mellouk:
Bio-inspired cybersecurity for wireless sensor networks. IEEE Commun. Mag. 54(6): 68-74 (2016) - [j161]Neeraj Kumar, Sherali Zeadally, Joel J. P. C. Rodrigues:
Vehicular delay-tolerant networks for smart grid data management using mobile edge computing. IEEE Commun. Mag. 54(10): 60-66 (2016) - [j160]Talal H. Noor, Quan Z. Sheng, Zakaria Maamar, Sherali Zeadally:
Managing Trust in the Cloud: State of the Art and Research Challenges. Computer 49(2): 34-45 (2016) - [j159]Abdul Hameed, Alireza Khoshkbarforoushha, Rajiv Ranjan, Prem Prakash Jayaraman, Joanna Kolodziej, Pavan Balaji, Sherali Zeadally, Qutaibah Marwan Malluhi, Nikos Tziritas, Abhinav Vishnu, Samee U. Khan, Albert Y. Zomaya:
A survey and taxonomy on energy efficient resource allocation techniques for cloud computing systems. Computing 98(7): 751-774 (2016) - [j158]Saif Ur Rehman Malik, Samee U. Khan, Sam J. Ewen, Nikos Tziritas, Joanna Kolodziej, Albert Y. Zomaya, Sajjad Ahmad Madani, Nasro Min-Allah, Lizhe Wang, Cheng-Zhong Xu, Qutaibah M. Malluhi, Johnatan E. Pecero, Pavan Balaji, Abhinav Vishnu, Rajiv Ranjan, Sherali Zeadally, Hongxiang Li:
Performance analysis of data intensive cloud systems based on data management and replication: a survey. Distributed Parallel Databases 34(2): 179-215 (2016) - [j157]Aditya K. Sood, Sherali Zeadally:
A Taxonomy of Domain-Generation Algorithms. IEEE Secur. Priv. 14(4): 46-53 (2016) - [j156]Juan Contreras-Castillo, Sherali Zeadally, Juan Antonio Guerrero Ibáñez:
Solving vehicular ad hoc network challenges with Big Data solutions. IET Networks 5(4): 81-84 (2016) - [j155]Pavel Tariqul Islam, D. Manivannan, Sherali Zeadally:
A Classification and Characterization of Security Threats in Cloud Computing. Int. J. Next Gener. Comput. 7(1) (2016) - [j154]Mohamad Badra, Sherali Zeadally:
An Improved Privacy Solution for the Smart Grid. Int. J. Netw. Secur. 18(3): 529-537 (2016) - [j153]Jawwad A. Shamsi, Sherali Zeadally, Zafar Nasir:
Interventions in Cyberspace: Status and Trends. IT Prof. 18(1): 18-25 (2016) - [j152]Aditya K. Sood, Sherali Zeadally:
Drive-By Download Attacks: A Comparative Study. IT Prof. 18(5): 18-25 (2016) - [j151]Giannis Haralabopoulos, Ioannis Anagnostopoulos, Sherali Zeadally:
The Challenge of Improving Credibility of User-Generated Content in Online Social Networks. ACM J. Data Inf. Qual. 7(3): 13:1-13:4 (2016) - [j150]Han-Chieh Chao, Sherali Zeadally, Bin Hu:
Wearable Computing for Health Care. J. Medical Syst. 40(4): 87:1-87:3 (2016) - [j149]Mohammad Wazid, Sherali Zeadally, Ashok Kumar Das, Vanga Odelu:
Analysis of Security Protocols for Mobile Healthcare. J. Medical Syst. 40(11): 229:1-229:10 (2016) - [j148]Sherali Zeadally, Jesús Téllez Isaac, Zubair A. Baig:
Security Attacks and Solutions in Electronic Health (E-health) Systems. J. Medical Syst. 40(12): 263:1-263:12 (2016) - [j147]Jawwad A. Shamsi, Sherali Zeadally, Fareha Sheikh, Angelyn Flowers:
Attribution in cyberspace: techniques and legal implications. Secur. Commun. Networks 9(15): 2886-2900 (2016) - [j146]Oladayo Bello, Sherali Zeadally:
Intelligent Device-to-Device Communication in the Internet of Things. IEEE Syst. J. 10(3): 1172-1182 (2016) - [j145]Stephanie Winkler, Sherali Zeadally:
Privacy Policy Analysis of Popular Web Platforms. IEEE Technol. Soc. Mag. 35(2): 75-85 (2016) - [j144]Aditya K. Sood, Sherali Zeadally, Richard J. Enbody:
An Empirical Study of HTTP-based Financial Botnets. IEEE Trans. Dependable Secur. Comput. 13(2): 236-251 (2016) - [j143]Debiao He, Sherali Zeadally, Neeraj Kumar, Wei Wu:
Efficient and Anonymous Mobile User Authentication Protocol Using Self-Certified Public Key Cryptography for Multi-Server Architectures. IEEE Trans. Inf. Forensics Secur. 11(9): 2052-2064 (2016) - [j142]Ioannis Anagnostopoulos, Sherali Zeadally, Ernesto Exposito:
Handling big data: research challenges and future directions. J. Supercomput. 72(4): 1494-1516 (2016) - [j141]Neeraj Kumar, Sherali Zeadally, Subhas C. Misra:
Mobile cloud networking for efficient energy management in smart grid cyber-physical systems. IEEE Wirel. Commun. 23(5): 100-108 (2016) - [j140]Zhiwei Yan, Sherali Zeadally, Siran Zhang, Ruowei Guo, Yong-Jin Park:
Distributed mobility management in named data networking. Wirel. Commun. Mob. Comput. 16(13): 1773-1783 (2016) - [e11]Benny Mandler, Johann Márquez-Barja, Miguel Elias Mitre Campista, Dagmar Cagánová, Hakima Chaouchi, Sherali Zeadally, Mohamad Badra, Stefano Giordano, Maria Fazio, Andrey Somov, Radu-Laurentiu Vieriu:
Internet of Things. IoT Infrastructures - Second International Summit, IoT 360° 2015, Rome, Italy, October 27-29, 2015, Revised Selected Papers, Part I. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 169, 2016, ISBN 978-3-319-47062-7 [contents] - [e10]Benny Mandler, Johann Márquez-Barja, Miguel Elias Mitre Campista, Dagmar Cagánová, Hakima Chaouchi, Sherali Zeadally, Mohamad Badra, Stefano Giordano, Maria Fazio, Andrey Somov, Radu-Laurentiu Vieriu:
Internet of Things. IoT Infrastructures - Second International Summit, IoT 360° 2015, Rome, Italy, October 27-29, 2015, Revised Selected Papers, Part II. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 170, 2016, ISBN 978-3-319-47074-0 [contents] - 2015
- [j139]Tzu-Chi Huang, Sherali Zeadally:
Flexible architecture for cluster evolution in cloud computing. Comput. Electr. Eng. 42: 90-106 (2015) - [j138]Debiao He, Sherali Zeadally:
Authentication protocol for an ambient assisted living system. IEEE Commun. Mag. 53(1): 71-77 (2015) - [j137]Salim Bitam, Abdelhamid Mellouk, Sherali Zeadally:
Bio-Inspired Routing Algorithms Survey for Vehicular Ad Hoc Networks. IEEE Commun. Surv. Tutorials 17(2): 843-867 (2015) - [j136]Diego Suarez Touceda, José María Sierra Camara, Sherali Zeadally, Miguel Soriano:
Attribute-based authorization for structured Peer-to-Peer (P2P) networks. Comput. Stand. Interfaces 42: 71-83 (2015) - [j135]Cristina Alcaraz, Sherali Zeadally:
Critical infrastructure protection: Requirements and challenges for the 21st century. Int. J. Crit. Infrastructure Prot. 8: 53-66 (2015) - [j134]Stephanie Winkler, Sherali Zeadally:
An analysis of tools for online anonymity. Int. J. Pervasive Comput. Commun. 11(4): 436-453 (2015) - [j133]Michail Tsikerdekis, Sherali Zeadally:
Detecting and Preventing Online Identity Deception in Social Networking Services. IEEE Internet Comput. 19(3): 41-49 (2015) - [j132]Catherine Pearce, Sherali Zeadally:
Ancillary Impacts of Multipath TCP on Current and Future Network Security. IEEE Internet Comput. 19(5): 58-65 (2015) - [j131]Debiao He, Sherali Zeadally:
An Analysis of RFID Authentication Schemes for Internet of Things in Healthcare Environment Using Elliptic Curve Cryptography. IEEE Internet Things J. 2(1): 72-83 (2015) - [j130]Kewei Sha, Sherali Zeadally:
Data Quality Challenges in Cyber-Physical Systems. ACM J. Data Inf. Qual. 6(2-3): 8:1-8:4 (2015) - [j129]Yasir Saleem, Mubashir Husain Rehmani, Sherali Zeadally:
Integration of Cognitive Radio Technology with unmanned aerial vehicles: Issues, opportunities, and future research challenges. J. Netw. Comput. Appl. 50: 15-31 (2015) - [j128]Giannis Haralabopoulos, Ioannis Anagnostopoulos, Sherali Zeadally:
Lifespan and propagation of information in On-line Social Networks: A case study based on Reddit. J. Netw. Comput. Appl. 56: 88-100 (2015) - [j127]Farhan Siddiqui, Sherali Zeadally, Khaled Salah:
Gigabit Wireless Networking with IEEE 802.11ac: Technical Overview and Challenges. J. Networks 10(3): 164-171 (2015) - [j126]Nafaâ Jabeur, Nabil Sahli, Sherali Zeadally:
Enabling Cyber Physical Systems with Wireless Sensor Networking Technologies, Multiagent System Paradigm, and Natural Ecosystems. Mob. Inf. Syst. 2015: 908315:1-908315:15 (2015) - [j125]Neeraj Kumar, Sherali Zeadally, Naveen K. Chilamkurti, Alexey V. Vinel:
Performance analysis of Bayesian coalition game-based energy-aware virtual machine migration in vehicular mobile cloud. IEEE Netw. 29(2): 62-69 (2015) - [j124]Mubashir Husain Rehmani, Mehdi Shadaram, Sherali Zeadally, Paolo Bellavista:
Special issue on recent developments in Cognitive Radio Sensor Networks. Pervasive Mob. Comput. 22: 1-2 (2015) - [j123]Neeraj Kumar, Sherali Zeadally, Joel J. P. C. Rodrigues:
QoS-Aware Hierarchical Web Caching Scheme for Online Video Streaming Applications in Internet-Based Vehicular Ad Hoc Networks. IEEE Trans. Ind. Electron. 62(12): 7892-7900 (2015) - [j122]Debiao He, Sherali Zeadally, Baowen Xu, Xinyi Huang:
An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks. IEEE Trans. Inf. Forensics Secur. 10(12): 2681-2691 (2015) - [j121]Sara Mehar, Sherali Zeadally, Guillaume Remy, Sidi Mohammed Senouci:
Sustainable Transportation Management System for a Fleet of Electric Vehicles. IEEE Trans. Intell. Transp. Syst. 16(3): 1401-1414 (2015) - [j120]Khaled Salah, Mohammad Hammoud, Sherali Zeadally:
Teaching Cybersecurity Using the Cloud. IEEE Trans. Learn. Technol. 8(4): 383-392 (2015) - [j119]Fidel Paniagua Diez, Diego Suarez Touceda, José Sierra Camara, Sherali Zeadally:
Toward self-authenticable wearable devices. IEEE Wirel. Commun. 22(1): 36-43 (2015) - [j118]Salim Bitam, Abdelhamid Mellouk, Sherali Zeadally:
VANET-cloud: a generic cloud computing model for vehicular Ad Hoc networks. IEEE Wirel. Commun. 22(1): 96-102 (2015) - [j117]Zhen-Jiang Zhang, Wenyu Zhang, Sherali Zeadally, Yanan Wang, Yun Liu:
Cognitive radio spectrum sensing framework based on multi-agent arc hitecture for 5G networks. IEEE Wirel. Commun. 22(6): 34-39 (2015) - [j116]Juan Antonio Guerrero Ibáñez, Sherali Zeadally, Juan Contreras-Castillo:
Integration challenges of intelligent transportation systems with connected vehicle, cloud computing, and internet of things technologies. IEEE Wirel. Commun. 22(6): 122-128 (2015) - [c47]Khaled Salah, Sherali Zeadally:
CloudNA 2015. LCN Workshops 2015: 1-2 - [c46]Farhan Siddiqui, Sherali Zeadally, Scott Fowler:
A Novel Architecture for Roaming between 3G and Wireless LANs. MSAN 2015: 101-105 - 2014
- [j115]Inès El Korbi, Sherali Zeadally:
Energy-aware sensor node relocation in mobile sensor networks. Ad Hoc Networks 16: 247-265 (2014) - [j114]Houda Labiod, Sherali Zeadally, Elias Tebchrany:
Performance analysis of a cross-layered incremental redundancy hybrid automatic repeat request (CL IR-HARQ) mechanism. Ad Hoc Networks 23: 109-120 (2014) - [j113]Michail Tsikerdekis, Sherali Zeadally:
Online deception in social media. Commun. ACM 57(9): 72-80 (2014) - [j112]Mehdi Shadaram, S. Smys, Sherali Zeadally:
Introduction to the special issue on "Wireless systems: New technologies, resource optimization and security". Comput. Electr. Eng. 40(2): 289-290 (2014) - [j111]Neeraj Kumar, Naveen K. Chilamkurti, Sherali Zeadally, Young-Sik Jeong:
Achieving Quality of Service (QoS) Using Resource Allocation and Adaptive Scheduling in Cloud Computing with Grid Support. Comput. J. 57(2): 281-290 (2014) - [j110]Jesús Téllez Isaac, Sherali Zeadally:
Design, implementation, and performance analysis of a secure payment protocol in a payment gateway centric model. Computing 96(7): 587-611 (2014) - [j109]Zhiwei Yan, Sherali Zeadally, Yong-Jin Park:
A Novel Vehicular Information Network Architecture Based on Named Data Networking (NDN). IEEE Internet Things J. 1(6): 525-532 (2014) - [j108]Gregorio Martínez Pérez, Sherali Zeadally, Han-Chieh Chao:
Editorial: Cloud computing service and architecture models. Inf. Sci. 258: 353-354 (2014) - [j107]Jesús Téllez Isaac, Sherali Zeadally:
Secure Mobile Payment Systems. IT Prof. 16(3): 36-43 (2014) - [j106]Han-Chieh Chao, Victor C. M. Leung, Sherali Zeadally, Jong-Hyouk Lee:
Editorial. IEEE Syst. J. 8(1): 171-173 (2014) - [j105]Sherali Zeadally, Angelyn Flowers:
Cyberwar: The What, When, Why, and How [Commentary]. IEEE Technol. Soc. Mag. 33(3): 14-21 (2014) - [j104]Hai Anh Tran, Said Hoceini, Abdelhamid Mellouk, Julien Perez, Sherali Zeadally:
QoE-Based Server Selection for Content Distribution Networks. IEEE Trans. Computers 63(11): 2803-2815 (2014) - [j103]Mohamad Badra, Sherali Zeadally:
Design and Performance Analysis of a Virtual Ring Architecture for Smart Grid Privacy. IEEE Trans. Inf. Forensics Secur. 9(2): 321-329 (2014) - [j102]Michail Tsikerdekis, Sherali Zeadally:
Multiple Account Identity Deception Detection in Social Media Using Nonverbal Behavior. IEEE Trans. Inf. Forensics Secur. 9(8): 1311-1321 (2014) - [j101]Elisangela Aguiar, André Riker, Eduardo Cerqueira, Antônio Jorge Gomes Abelém, Mu Mu, Torsten Braun, Marília Curado, Sherali Zeadally:
A real-time video quality estimator for emerging wireless multimedia systems. Wirel. Networks 20(7): 1759-1776 (2014) - [c45]Nafaâ Jabeur, Nabil Sahli, Sherali Zeadally:
ABAMA: An Agent-based Architecture for Mapping Natural Ecosystems onto Wireless Sensor Networks. FNC/MobiSPC 2014: 257-265 - [c44]Zouina Doukha, Sherali Zeadally, Samira Moussaoui:
A Directional Geocast Warning Dissemination Protocol for Vehicular Ad Hoc NETworks (VANETs). WWIC 2014: 55-67 - 2013
- [j100]Nafaâ Jabeur, Sherali Zeadally, Biju Theruvil Sayed:
Mobile social networking applications. Commun. ACM 56(3): 71-79 (2013) - [j99]Kashif Bilal, Samee Ullah Khan, Sajjad Ahmad Madani, Khizar Hayat, Majid Iqbal Khan, Nasro Min-Allah, Joanna Kolodziej, Lizhe Wang, Sherali Zeadally, Dan Chen:
A survey on Green communications using Adaptive Link Rate. Clust. Comput. 16(3): 575-589 (2013) - [j98]Khaled Salah, José M. Alcaraz Calero, Jorge Bernal Bernabé, Juan Manuel Marín Pérez, Sherali Zeadally:
Analyzing the security of Windows 7 and Linux for cloud computing. Comput. Secur. 34: 113-122 (2013) - [j97]Sherali Zeadally, Gregorio Martínez Pérez, Han-Chieh Chao:
Securing Cyberspace in the 21st Century. Computer 46(4): 22-23 (2013) - [j96]Cristina Alcaraz, Sherali Zeadally:
Critical Control System Protection in the 21st Century. Computer 46(10): 74-83 (2013) - [j95]Elias Z. Tragos, Sherali Zeadally, Alexandros G. Fragkiadakis, Vasilios A. Siris:
Spectrum Assignment in Cognitive Radio Networks: A Comprehensive Survey. IEEE Commun. Surv. Tutorials 15(3): 1108-1135 (2013) - [j94]Oswald Jumira, Riaan Wolhuter, Sherali Zeadally:
Energy-efficient beaconless geographic routing in energy harvested wireless sensor networks. Concurr. Comput. Pract. Exp. 25(1): 58-84 (2013) - [j93]Michael Pearce, Sherali Zeadally, Ray Hunt:
Virtualization: Issues, security threats, and solutions. ACM Comput. Surv. 45(2): 17:1-17:39 (2013) - [j92]Talal H. Noor, Quan Z. Sheng, Sherali Zeadally, Jian Yu:
Trust management of services in cloud environments: Obstacles and solutions. ACM Comput. Surv. 46(1): 12:1-12:30 (2013) - [j91]Hai Anh Tran, Abdelhamid Mellouk, Said Hoceini, Brice Augustin, Sherali Zeadally:
A dynamic QoE routing system for user-centric applications. Trans. Emerg. Telecommun. Technol. 24(3): 266-279 (2013) - [j90]Khaled Salah, José M. Alcaraz Calero, Sherali Zeadally, Sameera Al-Mulla, Mohammed Alzaabi:
Using Cloud Computing to Implement a Security Overlay Network. IEEE Secur. Priv. 11(1): 44-53 (2013) - [j89]Salim Bitam, Abdelhamid Mellouk, Sherali Zeadally:
HyBR: A Hybrid Bio-inspired Bee swarm Routing protocol for safety applications in Vehicular Ad hoc NETworks (VANETs). J. Syst. Archit. 59(10-B): 953-967 (2013) - [j88]Osman Khalid, Samee Ullah Khan, Sajjad Ahmad Madani, Khizar Hayat, Majid Iqbal Khan, Nasro Min-Allah, Joanna Kolodziej, Lizhe Wang, Sherali Zeadally, Dan Chen:
Comparative study of trust and reputation systems for wireless sensor networks. Secur. Commun. Networks 6(6): 669-688 (2013) - [j87]Abdelhamid Mellouk, Said Hoceini, Sherali Zeadally:
A state-dependent time evolving multi-constraint routing algorithm. ACM Trans. Auton. Adapt. Syst. 8(1): 6:1-6:21 (2013) - [j86]Yanbo Wu, Quan Z. Sheng, Hong Shen, Sherali Zeadally:
Modeling Object Flows from Distributed and Federated RFID Data Streams for Efficient Tracking and Tracing. IEEE Trans. Parallel Distributed Syst. 24(10): 2036-2045 (2013) - [j85]Sherali Zeadally, Al-Sakib Khan Pathan, Cristina Alcaraz, Mohamad Badra:
Towards Privacy Protection in Smart Grid. Wirel. Pers. Commun. 73(1): 23-50 (2013) - [c43]Mohamad Badra, Sherali Zeadally:
Key management solutions in the smart grid environment. WMNC 2013: 1-7 - [c42]Marthinus J. Booysen, Sherali Zeadally, Gert-Jan van Rooyen:
Impact of neighbor awareness at the MAC layer in a Vehicular Ad-Hoc Network (VANET). WiVeC 2013: 1-5 - 2012
- [j84]Farhan Siddiqui, Sherali Zeadally, Thabet Kacem, Scott Fowler:
Zero Configuration Networking: Implementation, performance, and security. Comput. Electr. Eng. 38(5): 1129-1145 (2012) - [j83]Ray Hunt, Sherali Zeadally:
Network Forensics: An Analysis of Techniques, Tools, and Trends. Computer 45(12): 36-43 (2012) - [j82]Jesús Téllez Isaac, Sherali Zeadally, José Sierra Camara:
A lightweight secure mobile Payment protocol for vehicular ad-hoc networks (VANETs). Electron. Commer. Res. 12(1): 97-123 (2012) - [j81]Kai Lin, Min Chen, Sherali Zeadally, Joel J. P. C. Rodrigues:
Balancing energy consumption with mobile agents in wireless sensor networks. Future Gener. Comput. Syst. 28(2): 446-456 (2012) - [j80]Marthinus J. Booysen, Sherali Zeadally, Gert-Jan van Rooyen:
Performance comparison of media access control protocols for vehicular ad hoc networks. IET Networks 1(1): 10-19 (2012) - [j79]Ijaz Muhammad Khan, Nafaâ Jabeur, Sherali Zeadally:
Hop-based approach for holes and boundary detection in wireless sensor networks. IET Wirel. Sens. Syst. 2(4): 328-337 (2012) - [j78]Chih-Yung Chang, Sherali Zeadally, Tzung-Shi Chen:
Cyber Physical Systems Using Sensor Technologies. Int. J. Distributed Sens. Networks 8 (2012) - [j77]Chih-Yu Lin, Sherali Zeadally, Tzung-Shi Chen, Chih-Yung Chang:
Enabling Cyber Physical Systems with Wireless Sensor Networking Technologies. Int. J. Distributed Sens. Networks 8 (2012) - [j76]Sherali Zeadally, Byunggu Yu, Dong Hyun Jeong, Lily Rui Liang:
Detecting Insider Threats: Solutions and Trends. Inf. Secur. J. A Glob. Perspect. 21(4): 183-192 (2012) - [j75]Marthinus J. Booysen, John S. Gilmore, Sherali Zeadally, Gert-Jan van Rooyen:
Machine-to-Machine (M2M) Communications in Vehicular Networks. KSII Trans. Internet Inf. Syst. 6(2): 529-546 (2012) - [j74]Hassnaa Moustafa, Nicolas Maréchal, Sherali Zeadally:
Mobile Multimedia Applications: Delivery Technologies. IT Prof. 14(5): 12-21 (2012) - [j73]Khaled Salah, A. Manea, Sherali Zeadally, José M. Alcaraz Calero:
Mitigating starvation of Linux CPU-bound processes in the presence of network I/O. J. Syst. Softw. 85(8): 1899-1914 (2012) - [j72]Mikolaj Igor Leszczuk, Eduardo Cerqueira, Marília Curado, Andreas Mauthe, Sherali Zeadally:
Guest editorial special issue on quality of experience for multimedia applications. Multim. Tools Appl. 61(3): 697-701 (2012) - [j71]Chih-Yung Chang, Yuh-Shyan Chen, Tzung-Shi Chen, Sherali Zeadally:
Foreword - Special issue on vehicular communications, networks and applications. Telecommun. Syst. 50(4): 215-216 (2012) - [j70]Sherali Zeadally, Ray Hunt, Yuh-Shyan Chen, Angela Irwin, Aamir Hassan:
Vehicular ad hoc networks (VANETS): status, results, and challenges. Telecommun. Syst. 50(4): 217-241 (2012) - [j69]Samee Ullah Khan, Sherali Zeadally, Pascal Bouvry, Naveen K. Chilamkurti:
Green networks. J. Supercomput. 62(3): 1091-1092 (2012) - [j68]Sherali Zeadally, Samee Ullah Khan, Naveen K. Chilamkurti:
Energy-efficient networking: past, present, and future. J. Supercomput. 62(3): 1093-1118 (2012) - [c41]Elisangela Aguiar, Andre Riker, Mu Mu, Sherali Zeadally, Eduardo Cerqueira, Antônio Jorge Gomes Abelém:
Real-time QoE prediction for multimedia applications in Wireless Mesh Networks. CCNC 2012: 592-596 - [c40]Inès El Korbi, Sherali Zeadally, Oswald Jumira:
A Chain-Based Relocation Approach to Maintain Connectivity with a Center of Interest. CSE 2012: 235-242 - [c39]Acklyn Murray, Sherali Zeadally, Angelyn Flowers:
An assessment of U.S. legislation on cybersecurity. CyberSec 2012: 289-294 - [c38]Farhan Siddiqui, Sherali Zeadally, Cristina Alcaraz, Samara Galvao:
Smart Grid Privacy: Issues and Solutions. ICCCN 2012: 1-5 - [c37]Inès El Korbi, Chayma Zidi, Sherali Zeadally, Leïla Azouz Saïdane:
A novel sensor node relocation approach to maintain connectivity with a center of interest. MSWiM 2012: 135-142 - [c36]Nafaâ Jabeur, Sherali Zeadally, Sergey Maydebura:
Improving Trust and Privacy Models in Social Networks. NTMS 2012: 1-5 - [c35]Jesús Téllez Isaac, Sherali Zeadally:
An Anonymous Secure Payment Protocol in a Payment Gateway Centric Model. ANT/MobiWIS 2012: 758-765 - [e9]Albert Levi, Mohamad Badra, Matteo Cesana, Mona Ghassemian, Özgür Gürbüz, Nafaâ Jabeur, Marek Klonowski, Antonio Maña, Susana Sargento, Sherali Zeadally:
5th International Conference on New Technologies, Mobility and Security, Istanbul, Turkey, NTMS 2012, May 7-10, 2012. IEEE 2012, ISBN 978-1-4673-0229-6 [contents] - 2011
- [j67]Nicolas Sklavos, Sherali Zeadally, Cristina Alcaraz:
Guest Editors' Introduction to the Special Issue on "Modern trends in applied security: Architectures, implementations and applications". Comput. Electr. Eng. 37(2): 127-128 (2011) - [j66]Khaled Salah, A. Manea, Sherali Zeadally, José M. Alcaraz Calero:
On Linux starvation of CPU-bound processes in the presence of network I/O. Comput. Electr. Eng. 37(6): 1090-1105 (2011) - [j65]Ming-Fong Tsai, Naveen K. Chilamkurti, Sherali Zeadally, Alexey V. Vinel:
Concurrent multipath transmission combining forward error correction and path interleaving for video streaming. Comput. Commun. 34(9): 1125-1136 (2011) - [j64]Yanbo Wu, Damith Chinthana Ranasinghe, Quan Z. Sheng, Sherali Zeadally, Jian Yu:
RFID enabled traceability networks: a survey. Distributed Parallel Databases 29(5-6): 397-443 (2011) - [j63]Abdelhamid Mellouk, Said Hoceini, Sherali Zeadally:
A Bio-Inspired Quality of Service (QoS) Routing Algorithm. IEEE Commun. Lett. 15(9): 1016-1018 (2011) - [j62]Marthinus J. Booysen, Sherali Zeadally, Gert-Jan van Rooyen:
Survey of media access control protocols for vehicular ad hoc networks. IET Commun. 5(11): 1619-1631 (2011) - [j61]Xue Li, Jing Liu, Quan Z. Sheng, Sherali Zeadally, Weicai Zhong:
TMS-RFID: Temporal management of large-scale RFID applications. Inf. Syst. Frontiers 13(4): 481-500 (2011) - [j60]Quan Z. Sheng, Sherali Zeadally, Aikaterini Mitrokotsa, Zakaria Maamar:
RFID technology, systems, and applications. J. Netw. Comput. Appl. 34(3): 797-798 (2011) - [j59]Rashid Mehmood, Raad Alturki, Sherali Zeadally:
Multimedia applications over metropolitan area networks (MANs). J. Netw. Comput. Appl. 34(5): 1518-1529 (2011) - [j58]Eduardo Cerqueira, Mikolaj Igor Leszczuk, Sherali Zeadally, Marília Curado, Andreas Mauthe:
Guest editorial special issue on "Future multimedia networking". Multim. Tools Appl. 54(3): 545-549 (2011) - [j57]Eduardo Cerqueira, Sherali Zeadally, Mikolaj Leszczuk, Marília Curado, Andreas Mauthe:
Recent advances in multimedia networking. Multim. Tools Appl. 54(3): 635-647 (2011) - [j56]Mohsin Iftikhar, Björn Landfeldt, Sherali Zeadally, Albert Y. Zomaya:
Service level agreements (SLAs) parameter negotiation between heterogeneous 4G wireless network operators. Pervasive Mob. Comput. 7(5): 525-544 (2011) - [j55]Scott Fowler, Sherali Zeadally, Naveen K. Chilamkurti:
Impact of denial of service solutions on network quality of service. Secur. Commun. Networks 4(10): 1089-1103 (2011) - [j54]Sherali Zeadally, Hassnaa Moustafa, Farhan Siddiqui:
Internet Protocol Television (IPTV): Architecture, Trends, and Challenges. IEEE Syst. J. 5(4): 518-527 (2011) - [j53]Cheng-Han Lin, Naveen K. Chilamkurti, Sherali Zeadally, Ce-Kuen Shieh:
Performance modeling of MPEG-4 video streaming over IEEE 802.11 using distribution coordination function. Wirel. Commun. Mob. Comput. 11(9): 1312-1322 (2011) - 2010
- [j52]Jesús Téllez Isaac, Sherali Zeadally, José Sierra Camara:
Implementation and performance evaluation of a payment protocol for vehicular ad hoc networks. Electron. Commer. Res. 10(2): 209-233 (2010) - [j51]Jesús Téllez Isaac, Sherali Zeadally, José Sierra Camara:
Security attacks and solutions for vehicular ad hoc networks. IET Commun. 4(7): 894-903 (2010) - [j50]Olabisi Emmanuel Falowo, Sherali Zeadally, H. Anthony Chan:
Dynamic pricing for load-balancing in user-centric joint call admission control of next-generation wireless networks. Int. J. Commun. Syst. 23(3): 335-368 (2010) - [j49]Han-Chieh Chao, Sherali Zeadally, Yuh-Shyan Chen, Gregorio Martínez Pérez, Reen-Cheng Wang:
Next Generation Networks (NGNs). Int. J. Commun. Syst. 23(6-7): 691-693 (2010) - [j48]Michael Pearce, Sherali Zeadally, Ray Hunt:
Assessing and Improving Authentication Confidence Management. Inf. Manag. Comput. Secur. 18(2): 124-139 (2010) - [j47]Quan Z. Sheng, Sherali Zeadally, Zongwei Luo, Jen-Yao Chung, Zakaria Maamar:
Guest editorial: Advances in RFID technology. Inf. Syst. Frontiers 12(5): 481-483 (2010) - [j46]Quan Z. Sheng, Sherali Zeadally, Zongwei Luo, Jen-Yao Chung, Zakaria Maamar:
Ubiquitous RFID: Where are we? Inf. Syst. Frontiers 12(5): 485-490 (2010) - [j45]Naveen K. Chilamkurti, Sherali Zeadally, Robin Soni, Giovanni Giambene:
Wireless multimedia delivery over 802.11e with cross-layer optimization techniques. Multim. Tools Appl. 47(1): 189-205 (2010) - [j44]Tzu-Chi Huang, Sherali Zeadally, Naveen K. Chilamkurti, Ce-Kuen Shieh:
A programmable network address translator: Design, implementation, and performance. ACM Trans. Internet Techn. 10(1): 3:1-3:37 (2010) - [j43]Yan Zhang, Hassnaa Moustafa, Sherali Zeadally:
Recent advances in wireless communications and networks. Wirel. Commun. Mob. Comput. 10(1): 1-3 (2010) - [e8]Sherali Zeadally, Eduardo Cerqueira, Marília Curado, Mikolaj Leszczuk:
Future Multimedia Networking, Third International Workshop, FMN 2010, Krakow, Poland, June 17-18, 2010. Proceedings. Lecture Notes in Computer Science 6157, Springer 2010, ISBN 978-3-642-13788-4 [contents] - [e7]Quan Z. Sheng, Aikaterini Mitrokotsa, Sherali Zeadally, Zakaria Maamar:
RFID Technology-Concepts, Applications, Challenges, Proceedings of the 4th International Workshop, IWRT 2010, In conjunction with ICEIS 2010, Funchal, Madeira, Portugal, June 2010. SciTePress 2010, ISBN 978-989-8425-11-9 [contents]
2000 – 2009
- 2009
- [j42]Abdelhamid Mellouk, Said Hoceini, Sherali Zeadally:
Design and performance analysis of an inductive QoS routing algorithm. Comput. Commun. 32(12): 1371-1376 (2009) - [j41]Naveen K. Chilamkurti, Sherali Zeadally, Abbas Jamalipour, Sajal Kumar Das:
Enabling Wireless Technologies for Green Pervasive Computing. EURASIP J. Wirel. Commun. Netw. 2009 (2009) - [j40]Naveen K. Chilamkurti, Sherali Zeadally, Frank Mentiplay:
Green Networking for Major Components of Information Communication Technology Systems. EURASIP J. Wirel. Commun. Netw. 2009 (2009) - [j39]Han-Chieh Chao, Sherali Zeadally, Yuh-Shyan Chen, Gregorio Martínez Pérez:
Call for Papers: on 'Next Generation Networks (NGNs)'. Int. J. Commun. Syst. 22(3): 373-374 (2009) - [j38]Farhan Siddiqui, Sherali Zeadally, Hesham El-Sayed, Naveen K. Chilamkurti:
A dynamic network discovery and selection method for heterogeneous wireless networks. Int. J. Internet Protoc. Technol. 4(2): 99-114 (2009) - [j37]John P. T. Mo, Quan Z. Sheng, Xue Li, Sherali Zeadally:
RFID Infrastructure Design: A Case Study of Two Australian RFID Projects. IEEE Internet Comput. 13(1): 14-21 (2009) - [j36]Tzu-Chi Huang, Sherali Zeadally, Naveen K. Chilamkurti, Ce-Kuen Shieh:
Design, implementation, and evaluation of a Programmable Bandwidth Aggregation System for home networks. J. Netw. Comput. Appl. 32(3): 741-759 (2009) - [j35]Naveen K. Chilamkurti, Sherali Zeadally, Athanasios V. Vasilakos, V. Sharma:
Cross-Layer Support for Energy Efficient Routing in Wireless Sensor Networks. J. Sensors 2009: 134165:1-134165:9 (2009) - [j34]Kaleb Brasee, S. Kami Makki, Sherali Zeadally:
A secure two-factor authentication scheme for single sign-on services. Secur. Commun. Networks 2(4): 315-323 (2009) - [j33]Han-Chieh Chao, Sherali Zeadally, Yueh-Min Huang:
Guest editorial. Telecommun. Syst. 42(1-2): 1-3 (2009) - [j32]Sherali Zeadally, Albert Y. Zomaya, Han-Chieh Chao:
Editorial for special issue of Telecommunication Systems on "Mobility management and wireless access". Telecommun. Syst. 42(3-4): 163-164 (2009) - [j31]Cheng-Han Lin, Ce-Kuen Shieh, Chih-Heng Ke, Naveen K. Chilamkurti, Sherali Zeadally:
An adaptive cross-layer mapping algorithm for MPEG-4 video transmission over IEEE 802.11e WLAN. Telecommun. Syst. 42(3-4): 223-234 (2009) - [c34]Jong Hyuk Park, Robert C. Hsu, Sherali Zeadally, Han-Chieh Chao, Mieso K. Denko, Sheikh Iqbal Ahamed:
Message from the Workshop Co-Organizers. PerCom Workshops 2009: 1-2 - [e6]Andreas Mauthe, Sherali Zeadally, Eduardo Cerqueira, Marília Curado:
Future Multimedia Networking, Second International Workshop, FMN 2009, Coimbra, Portugal, June 22-23, 2009. Proceedings. Lecture Notes in Computer Science 5630, Springer 2009, ISBN 978-3-642-02471-9 [contents] - [e5]Quan Z. Sheng, Aikaterini Mitrokotsa, Sherali Zeadally, Zakaria Maamar:
RFID Technology-Concepts, Applications, Challenges, Proceedings of the 3rd International Workshop, IWRT 2009, In conjunction with ICEIS 2009, Milan, Italy, May 2009. INSTICC PRESS 2009, ISBN 978-989-8111-94-4 [contents] - 2008
- [j30]Abdelhamid Mellouk, Sherali Zeadally, Peter Mueller:
Foreword: Routing and QoS over heterogeneous networks. Ann. des Télécommunications 63(11-12): 543-544 (2008) - [j29]Hesham El-Sayed, Abdelhamid Mellouk, Laurent George, Sherali Zeadally:
Quality of service models for heterogeneous networks: overview and challenges. Ann. des Télécommunications 63(11-12): 639-668 (2008) - [j28]Jesús Téllez Isaac, José Sierra Camara, Sherali Zeadally, Joaquín Torres Márquez:
A secure vehicle-to-roadside communication payment protocol in vehicular ad hoc networks. Comput. Commun. 31(10): 2478-2484 (2008) - [j27]Sherali Zeadally, Bin Wei, Björn Landfeldt:
End-to-end support over Heterogeneous Wired-Wireless Networks. Comput. Commun. 31(11): 2643-2645 (2008) - [j26]Han-Chieh Chao, Sherali Zeadally:
Mobility protocols for ITS/VANET. Comput. Commun. 31(12): 2765-2766 (2008) - [j25]Quan Z. Sheng, Xue Li, Sherali Zeadally:
Enabling Next-Generation RFID Applications: Solutions and Challenges. Computer 41(9): 21-28 (2008) - [j24]Stefano Colombo, Naveen K. Chilamkurti, Sherali Zeadally:
A novel centralised clustering algorithm for energy efficient wireless sensor networks. Int. J. Auton. Adapt. Commun. Syst. 1(2): 242-261 (2008) - [j23]Sherali Zeadally, Priya Kubher:
Internet access to heterogeneous home area network devices with an OSGi-based residential gateway. Int. J. Ad Hoc Ubiquitous Comput. 3(1): 48-56 (2008) - [j22]Farhan Siddiqui, Sherali Zeadally:
An agent-based architecture for fast context transfers during handoffs. Int. J. Ad Hoc Ubiquitous Comput. 3(4): 236-244 (2008) - [j21]Farhan Siddiqui, Sherali Zeadally:
An efficient wireless network discovery scheme for heterogeneous access environments. Int. J. Pervasive Comput. Commun. 4(1): 50-60 (2008) - [j20]Farhan Siddiqui, Sherali Zeadally:
Ubiquitous Wireless Connectivity across Cellular and Wireless Local Area Networks. J. Inf. Sci. Eng. 24(2): 327-342 (2008) - [j19]Liqiang Zhang, Qiang Cheng, Yingge Wang, Sherali Zeadally:
A Novel Distributed Sensor Positioning System Using the Dual of Target Tracking. IEEE Trans. Computers 57(2): 246-260 (2008) - [c33]Hesham El-Sayed, Sherali Zeadally, Mohammed Boulmalf:
Experimental Evaluation and Characterization of Long-Distance 802.11g Links. ICN 2008: 511-516 - [c32]Ming-Fong Tsai, Naveen K. Chilamkurti, Sherali Zeadally, Ce-Kuen Shieh, Hesham El-Sayed:
An efficient multi-hop FEC scheme for wireless mesh networks. ISWCS 2008: 663-666 - [c31]Chia-Yu Yu, Sherali Zeadally, Naveen K. Chilamkurti, Ce-Kuen Shieh:
An enhanced uplink scheduling scheme for IEEE 802.16 metropolitan area networks. Mobility Conference 2008: 98 - [c30]Kaleb Brasee, S. Kami Makki, Sherali Zeadally:
A Novel Distributed Authentication Framework for Single Sign-On Services. SUTC 2008: 52-58 - [e4]Quan Z. Sheng, Zakaria Maamar, Sherali Zeadally, Mark Cameron:
RFID Technology - Concepts, Applications, Challenges, Proceedings of the 2nd International Workshop on RFID Technology - Concepts, Applications, Challenges, IWRT 2008, In conjunction with ICEIS 2008, Barcelona, Spain, June 2008. INSTICC PRESS 2008, ISBN 978-989-8111-46-3 [contents] - [e3]Sherali Zeadally, Björn Landfeldt:
Proceedings of the Sixth ACM International Workshop on Mobility Management & Wireless Access, MOBIWAC 2008, Vancouver, British Columbia, Canada, October 30-31, 2008. ACM 2008, ISBN 978-1-60558-055-5 [contents] - 2007
- [j18]Sherali Zeadally, Nicolas Sklavos, Moganakrishnan Rathakrishnan, Scott Fowler:
End-to-End Security Across Wired-Wireless Networks for Mobile Users. Inf. Secur. J. A Glob. Perspect. 16(5): 264-277 (2007) - [j17]Sherali Zeadally, Farhan Siddiqui:
An Empirical Analysis of Handoff Performance for SIP, Mobile IP, and SCTP Protocols. Wirel. Pers. Commun. 43(2): 589-603 (2007) - [e2]Quan Z. Sheng, Zakaria Maamar, Sherali Zeadally, Mark Cameron:
RFID Technology - Concepts, Applications, Challenges, Proceedings of the 1st International Workshop on RFID Technology - Concepts, Applications, Challenges, IWRT 2007, In conjunction with ICEIS 2007, Funchal, Madeira, Portugal, June 2007. INSTICC PRESS 2007, ISBN 978-989-8111-01-2 [contents] - [e1]Albert Y. Zomaya, Sherali Zeadally:
Proceedings of the Fifth ACM International Workshop on Mobility Management & Wireless Access, MOBIWAC 2007, Chania, Crete Island, Greece, October 22, 2007. ACM 2007, ISBN 978-1-59593-809-1 [contents] - 2006
- [j16]Farhan Siddiqui, Sherali Zeadally:
Mobility management across hybrid wireless networks: Trends and challenges. Comput. Commun. 29(9): 1363-1385 (2006) - [j15]Liqiang Zhang, Sherali Zeadally:
Enabling End-to-End QoS over Hybrid Wired-Wireless Networks. Wirel. Pers. Commun. 38(2): 167-185 (2006) - [c29]Scott Fowler, Sherali Zeadally:
Adaptive Queue Management on Micro-MPLS-Based Wireless Networks for Multimedia Traffic. CNSR 2006: 162-169 - [c28]Farhan Siddiqui, Sherali Zeadally:
SCTP Multihoming Support for Handoffs across Heterogeneous Networks. CNSR 2006: 243-250 - [c27]Scott Fowler, Sherali Zeadally:
Defending against Distributed Denial of Service (DDoS) Attacks with Queue Traffic Differentiation over Micro-MPLS-based Wireless Networks. ICSNC 2006: 8 - [c26]Farhan Siddiqui, Sherali Zeadally:
Mobility Protocols for Handoff Management in Heterogeneous Networks. PWC 2006: 1-12 - [c25]Scott Fowler, Sherali Zeadally:
Fast Handover over Micro-MPLS-Based Wireless Networks. ISCC 2006: 181-186 - 2005
- [j14]Sherali Zeadally, Aarti Kumar:
Design, implementation, and evaluation of the audio/video distribution transport protocol (AVDTP) for high quality audio support over Bluetooth. Comput. Commun. 28(2): 215-223 (2005) - [j13]Sherali Zeadally, Junhua Pan:
J2EE support for wireless services. J. Syst. Softw. 75(1-2): 215-226 (2005) - [c24]Scott Fowler, Sherali Zeadally:
Priority-Based Congestion Control in MPLS-Based Networks. AICT/SAPIR/ELETE 2005: 332-337 - [c23]Farhan Siddiqui, Sherali Zeadally, Ece Yaprak:
Design Architectures for 3G and IEEE 802.11 WLAN Integration. ICN (2) 2005: 1047-1054 - [c22]Scott Fowler, Sherali Zeadally, Farhan Siddiqui:
QoS Path Selection Exploiting Minimum Link Delays in MPLS-Based Networks. Systems Communications 2005: 27-32 - [c21]Liqiang Zhang, Qiang Cheng, Yingge Wang, Sherali Zeadally:
Landscape: a high performance distributed positioning scheme for outdoor sensor networks. WiMob (3) 2005: 430-437 - 2004
- [j12]Sherali Zeadally, Aruna Banda, Aarti Kumar:
Improving Bluetooth performance in 802.11 interference environments. Comput. Commun. 27(7): 616-621 (2004) - [j11]Sherali Zeadally, Liqiang Zhang, Z. Zhu, Jia Lu:
Network application programming interfaces (APIs) performance on commodity operating systems. Inf. Softw. Technol. 46(6): 397-402 (2004) - [j10]Sherali Zeadally, Liqiang Zhang:
Enabling gigabit network access to end users. Proc. IEEE 92(2): 340-353 (2004) - [j9]Liqiang Zhang, Sherali Zeadally:
A framework for efficient resource management in IEEE 802.11 WLANs. Wirel. Commun. Mob. Comput. 4(8): 835-848 (2004) - [c20]Sherali Zeadally, Farhan Siddiqui:
Design and Implementation of a SIP-based VoIP Architecture. AINA (2) 2004: 187-190 - [c19]Sherali Zeadally, Jia Lu, Sastry Nanduri:
Design and implementation of a Jini-J2EE bridge to enable access to enterprise services. CCNC 2004: 370-375 - [c18]Sherali Zeadally, Aarti Kumar, Aruna Banda:
Seamless Bluetooth Connectivity to IPv6 Networks. EUC 2004: 612-621 - [c17]Sherali Zeadally, Junhua Pan:
Design and Implementation of a Wireless Prescription System. HICSS 2004 - [c16]Sherali Zeadally, Farhaii Siddiqui, Niveditha DeepakMavatoor, Pavneet Randhavva:
SIP and mobile IP integration to support seamless mobility. PIMRC 2004: 1927-1931 - [c15]Liqiang Zhang, Sherali Zeadally:
HARMONICA: Enhanced QoS Support with Admission Control for IEEE 802.11 Contention-based Access. IEEE Real-Time and Embedded Technology and Applications Symposium 2004: 64-73 - [i1]Ioan Raicu, Owen Richter, Loren Schwiebert, Sherali Zeadally:
Using Wireless Sensor Networks to Narrow the Gap between Low-Level Information and Context-Awareness. CoRR cs.NI/0411039 (2004) - 2003
- [j8]Sherali Zeadally, Ioan Raicu:
Evaluating IPv6 on Windows and Solaris. IEEE Internet Comput. 7(3): 51-57 (2003) - [c14]S. Ghias, Sherali Zeadally:
Design and Implementation of a User-level Prioritization Service. ISCC 2003: 30-35 - [c13]Sherali Zeadally, Jia Lu:
A Performance Comparison of Communication APIs on Solaris and Windows Operating Systems. ITCC 2003: 336- - [c12]S. Ghias, Sherali Zeadally:
Enabling User Prioritization of Multimedia Applications. ITCC 2003: 650- - [c11]Sastry Nanduri, Sherali Zeadally:
A Novel Secure Handoff Approach for Wireless LANs. MWCN 2003 - [c10]Liqiang Zhang, Sherali Zeadally:
QoS Support in Wireless LANs Using Dynamic Adaptation of Channel Access Parameters. MWCN 2003 - 2002
- [c9]Ioan Raicu, Owen Richter, Loren Schwiebert, Sherali Zeadally:
Using Wireless Sensor Networks to Narrow the Gap Between Low-Level Information and Context-Awareness. CATA 2002: 209-214 - 2001
- [c8]Davis Ford, Sherali Zeadally:
Application-to-Application Priority with STREAMS. LCN 2001: 334-343 - 2000
- [j7]Sherali Zeadally:
Implementation and Performance of QoS-aware Java Applications over ATM Networks. Comput. J. 43(4): 266-273 (2000) - [j6]Sherali Zeadally:
Impact of ATM switch architectures on CBR video performance. Comput. Commun. 23(1): 1-12 (2000) - [j5]Sherali Zeadally:
Performance evaluation of a Java-based networking Application Programming Interface (API). Inf. Process. Lett. 75(5): 199-209 (2000)
1990 – 1999
- 1999
- [c7]Sherali Zeadally:
Towards native ATM services: Where are we? CATA 1999: 120-125 - [c6]Sherali Zeadally, X. Chen, Weiyou Cui:
Design and Implementation of a QoS-aware Networking Application Programming Interface. PDPTA 1999: 475-481 - 1998
- [j4]Sherali Zeadally, Weiyou Cui:
Experiences with multimedia applications over native ATM. J. Netw. Comput. Appl. 21(2): 107-123 (1998) - [c5]Sherali Zeadally:
Best-effort delivery of live video across a local area ATM network. CATA 1998: 262-265 - 1997
- [j3]Sherali Zeadally:
An ATM multimedia architecture: Design, implementation, and performance. J. High Speed Networks 6(2): 93-109 (1997) - [j2]Sherali Zeadally, Grig Gheorghiu, Anthony F. J. Levi:
Improving End System Performance for Multimedia Applications over High Bandwidth Networks. Multim. Tools Appl. 5(3): 307-322 (1997) - [j1]Sherali Zeadally:
An Evaluation of the Real-Time Performance of SVR4.0 and SVR4.2. ACM SIGOPS Oper. Syst. Rev. 31(1): 78-87 (1997) - [c4]Sherali Zeadally, Grig Gheorghiu, Anthony F. J. Levi:
Throughout optimization for multimedia applications over high speed networks. HPN 1997: 101-114 - [c3]Sherali Zeadally:
A UNIX-based ATM multimedia architecture. ISCC 1997: 131-138 - 1996
- [c2]B. J. Murphy, Sherali Zeadally, C. J. Adams:
An Analysis of Process and Memory Models to Support High-Speed Networking in a UNIX Environment. USENIX ATC 1996: 239-252 - 1994
- [c1]B. J. Murphy, C. J. Adams, Sherali Zeadally:
The CHARISMA ATM Horst Interface. Broadband Islands 1994: 81-100
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-19 21:48 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint