default search action
Mansoor Alam
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. The links to all actual bibliographies of persons of the same or a similar name can be found below. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Other persons with the same name
- Muhammad Mansoor Alam (aka: Muhammad Alam 0001, Mansoor Alam 0001) — Riphah International University, Department of Computer Science, Islamabad, Pakistan (and 2 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c59]P. Rajesh, Mansoor Alam, Mansour Tahernezhadi, Monika A, Gm Chanakya:
Analysis Of Cyber Threat Detection And Emulation Using MITRE Attack Framework. IDSTA 2022: 4-12 - 2021
- [c58]P Rajesh, Mohammed Ismail. B, Mansoor Alam, Mansour Tahernezhadi, Monika A:
Network Forensics Investigation in Virtual Data Centers Using ELK. ISEEIE 2021: 175-179 - 2020
- [c57]P Rajesh, Bharadwaj, Mansoor Alam, Mansour Tahernezhadi:
A Data Science Approach to Football Team Player Selection. EIT 2020: 175-183 - [c56]Mohammed Ismail. B, Mansoor Alam, Mansour Tahernezhadi, Hari Kiran Vege, P. Rajesh:
A Machine Learning Classification Technique for Predicting Prostate Cancer. EIT 2020: 228-232 - [c55]Rajesh P, Babitha D, Mansoor Alam, Mansour Tahernezhadi, Monika A:
Machine Learning and Statistical Analysis Techniques on Terrorism. FSDM 2020: 210-222 - [c54]P Rajesh, Mansoor Alam, Mansour Tahernezhadi, C. Vikram, P. N. Phaneendra:
Real Time Data Science Decision Tree Approach to Approve Bank Loan from Lawyer's Perspective. ICMLA 2020: 921-929 - [c53]P Rajesh, Mansoor Alam, Mansour Tahernezhadi, K. Vamshikrishna Reddy, K. Chandrakala:
A Real Time Stock tendency prognostication using Quantopian. ICMLA 2020: 1260-1267
2010 – 2019
- 2019
- [j25]Farha Jahan, Weiqing Sun, Quamar Niyaz, Mansoor Alam:
Security Modeling of Autonomous Systems: A Survey. ACM Comput. Surv. 52(5): 91:1-91:34 (2019) - 2018
- [j24]Brett Snyder, Robert C. Green II, Vijay K. Devabhaktuni, Mansoor Alam:
ReliaCloud-NS: A scalable web-based simulation platform for evaluating the reliability of cloud computing systems. Softw. Pract. Exp. 48(3): 665-680 (2018) - [j23]Muslim Mustapa, Mohammed Y. Niamat, Atul Prasad Deb Nath, Mansoor Alam:
Hardware-Oriented Authentication for Advanced Metering Infrastructure. IEEE Trans. Smart Grid 9(2): 1261-1270 (2018) - [c52]Khalid R. Alasmari, Robert C. Green II, Mansoor Alam:
Mobile Edge Offloading Using Markov Decision Processes. EDGE 2018: 80-90 - 2017
- [j22]Mona Nasseri, Junghwan Kim, Robert Green, Mansoor Alam:
Identification of the Optimum Relocalization Time in the Mobile Wireless Sensor Network Using Time-Bounded Relocalization Methodology. IEEE Trans. Veh. Technol. 66(1): 344-357 (2017) - [c51]Rishabh Chauhan, Hong Wang, Ahmad Y. Javaid, Mansoor Alam:
Modified RSSI Fingerprinting Algorithm with Reliability Factor for Wi-Fi based Indoor Navigation System. SENSORNETS 2017: 118-125 - 2016
- [j21]Ahmad Y. Javaid, Quamar Niyaz, Weiqing Sun, Mansoor Alam:
A Deep Learning Approach for Network Intrusion Detection System. EAI Endorsed Trans. Security Safety 3(9): e2 (2016) - [i1]Hussein S. Al-Olimat, Robert C. Green II, Mansoor Alam, Vijay K. Devabhaktuni, Wei Cheng:
Particle Swarm Optimized Power Consumption of Trilateration. CoRR abs/1602.02473 (2016) - 2015
- [j20]Brett Snyder, Jordan Ringenberg, Robert Green, Vijay K. Devabhaktuni, Mansoor Alam:
Evaluation and design of highly reliable and highly utilized cloud computing systems. J. Cloud Comput. 4: 11 (2015) - [j19]Farha Jahan, Ahmad Y. Javaid, Weiqing Sun, Mansoor Alam:
GNSSim: An Open Source GNSS/GPS Framework for Unmanned Aerial Vehicular Network Simulation. EAI Endorsed Trans. Mob. Commun. Appl. 2(6): e2 (2015) - [j18]Ahmad Y. Javaid, Weiqing Sun, Mansoor Alam:
Single and Multiple UAV Cyber-Attack Simulation and Performance Evaluation. EAI Endorsed Trans. Scalable Inf. Syst. 2(4): e4 (2015) - [j17]Thabet M. Mismar, Junghwan Kim, Mansoor Alam:
Indoor antispoofing cooperative localization in cellular networks. IEEE Trans. Aerosp. Electron. Syst. 51(4): 2823-2833 (2015) - [c50]Ahmad Y. Javaid, Quamar Niyaz, Weiqing Sun, Mansoor Alam:
A Deep Learning Approach for Network Intrusion Detection System. BICT 2015: 21-26 - [c49]Mingzhe Xu, Weiqing Sun, Mansoor Alam:
Security enhancement of secure USB debugging in Android system. CCNC 2015: 134-139 - [c48]Quamar Niyaz, Weiqing Sun, Rao Xu, Mansoor Alam:
Light VN: A Light-Weight Testbed for Network and Security Experiments. ITNG 2015: 459-464 - [c47]Quamar Niyaz, Weiqing Sun, Mansoor Alam:
Impact on SDN Powered Network Services Under Adversarial Attacks. SCSE 2015: 228-235 - [c46]Mona Nasseri, Hussein Al-Olimat, Mansoor Alam, Junghwan Kim, Robert Green, Wei Cheng:
Contiki Cooja simulation for time bounded localization in wireless sensor network. SpringSim (CNS) 2015: 1-7 - 2014
- [c45]Congyingzi Zhang, Robert Green, Mansoor Alam:
Reliability and Utilization Evaluation of a Cloud Computing System Allowing Partial Failures. IEEE CLOUD 2014: 936-937 - [c44]Brett Snyder, Robert Green, Vijay K. Devabhaktuni, Mansoor Alam:
Evaluation of Highly Reliable Cloud Computing Systems Using Non-sequential Monte Carlo Simulation. IEEE CLOUD 2014: 940-941 - [c43]Jacob Phillips, Robert Green, Mansoor Alam:
Time-of-Flight Distance Measurements Using Smart Phones. IEEE MS 2014: 153-154 - [c42]Thabet M. Mismar, Junghwan Kim, Mansoor Alam:
Anti-spoofing cooperative localization in cellular networks. SpringSim (CNS) 2014: 4 - [c41]Mona Nasseri, Junghwan Kim, Mansoor Alam:
Unified metric calculation of sampling-based turbo-coded noncoherent MFSK for mobile channel. SpringSim (CNS) 2014: 7 - [c40]Ahmad Y. Javaid, Weiqing Sun, Mansoor Alam:
UAVNet Simulation in UAVSim: A Performance Evaluation and Enhancement. TRIDENTCOM 2014: 107-115 - 2013
- [j16]Robert C. Green II, Lingfeng Wang, Mansoor Alam, Chanan Singh:
Intelligent state space pruning for Monte Carlo simulation with applications in composite power system reliability. Eng. Appl. Artif. Intell. 26(7): 1707-1724 (2013) - [j15]Robert C. Green II, Lingfeng Wang, Mansoor Alam:
Applications and Trends of High Performance Computing for Electric Power Systems: Focusing on Smart Grid. IEEE Trans. Smart Grid 4(2): 922-931 (2013) - [c39]Mona Nasseri, Mansoor Alam, Robert C. Green II:
MDP based optimal policy for collaborative processing using mobile cloud computing. CloudNet 2013: 123-129 - [c38]Ahmad Y. Javaid, Weiqing Sun, Mansoor Alam:
UAVSim: A simulation testbed for unmanned aerial vehicle network cyber security analysis. GLOBECOM Workshops 2013: 1432-1436 - [c37]Muslim Mustapa, Mohammed Y. Niamat, Mansoor Alam, Taylor W. Killian:
Frequency uniqueness in ring oscillator Physical Unclonable Functions on FPGAs. MWSCAS 2013: 465-468 - [c36]Junghwan Kim, Pooja Raorane, Mona Nasseri, Mansoor Alam:
Performance analysis of sampling-based turbo coded NCQFSK for image data transmission. SpringSim (ANSS) 2013: 12 - [c35]Tao Zou, Mansoor Alam, Min Song:
A Network Forensics System for Information Leak Events. WASA 2013: 54-63 - 2012
- [j14]Robert C. Green II, Lingfeng Wang, Mansoor Alam:
Training neural networks using Central Force Optimization and Particle Swarm Optimization: Insights and comparisons. Expert Syst. Appl. 39(1): 555-563 (2012) - [j13]Robert C. Green II, Lingfeng Wang, Mansoor Alam, Richard A. Formato:
Central force optimization on a GPU: a case study in high performance metaheuristics. J. Supercomput. 62(1): 378-398 (2012) - [c34]Nagajyothi Gunti, Weiqing Sun, Mingzhe Xu, Zidong Liu, Mohammed Y. Niamat, Mansoor Alam:
A Healthcare Information System with Augmented Access Controls. APWeb 2012: 792-795 - [c33]Changlong Chen, Min Song, Chunsheng Xin, Mansoor Alam:
A robust malicious user detection scheme in cooperative spectrum sensing. GLOBECOM 2012: 4856-4861 - [c32]Robert C. Green II, Lingfeng Wang, Mansoor Alam:
Intelligent State Space Pruning with local search for power system reliability evaluation. ISGT Europe 2012: 1-8 - [c31]Kang Yao, Weiqing Sun, Mansoor Alam, Mingzhe Xu, Vijay K. Devabhaktuni:
A Real-Time Testbed for Routing Network. TRIDENTCOM 2012: 256-270 - 2011
- [j12]Yichi Zhang, Lingfeng Wang, Weiqing Sun, Robert C. Green II, Mansoor Alam:
Distributed Intrusion Detection System in a Multi-Layer Network Architecture of Smart Grids. IEEE Trans. Smart Grid 2(4): 796-808 (2011) - [c30]Robert C. Green II, Lingfeng Wang, Mansoor Alam, Richard A. Formato:
Central Force Optimization on a GPU: A case study in high performance metaheuristics using multiple topologies. IEEE Congress on Evolutionary Computation 2011: 550-557 - [c29]Robert C. Green II, Lingfeng Wang, Mansoor Alam:
Composite power system reliability evaluation using support vector machines on a multicore platform. IJCNN 2011: 2586-2592 - 2010
- [c28]Jue Wang, Mansoor Alam, Badlishah bin Ahmad:
Optimal Admission Control Strategies for Next-gen Wireless Heterogeneous Networks. CATA 2010: 124-129 - [c27]Barath Vasudevan, Mohammed Y. Niamat, Mansoor Alam, Srinivasa Vemuru:
Analysis and test of electromigration failures in FPGAs. ISCAS 2010: 3905-3908
2000 – 2009
- 2009
- [j11]Wenlong Ni, Wei Wayne Li, Mansoor Alam:
Determination of optimal call admission control policy in wireless networks. IEEE Trans. Wirel. Commun. 8(2): 1038-1044 (2009) - 2008
- [c26]Wenlong Ni, Wei Wayne Li, Mansoor Alam:
Optimal CAC Policy in Multimedia Wireless Networks with Reservation Channel Schemes. GLOBECOM 2008: 1443-1447 - [c25]Wenlong Ni, Wei Wayne Li, Mansoor Alam:
Optimal Call Admission Control Policy for the RCS Schemes in Wireless Networks. ICC 2008: 2845-2848 - [c24]Tao Li, Min Song, Mansoor Alam:
Compromised Sensor Nodes Detection: A Quantitative Approach. ICDCS Workshops 2008: 352-357 - [c23]Wenlong Ni, Wei Wayne Li, Mansoor Alam:
Optimal Call Admission Control Policy In Wireless Networks. WCNC 2008: 2975-2979 - 2007
- [c22]Walter W. Schilling Jr., Mansoor Alam:
Evaluating the Effectiveness of Java Static Analysis Tools. ESA 2007: 91-97 - [c21]Ash Mohammad Abbas, Mansoor Alam, Bijendra Nath Jain:
Alleviating path correlation using directional antenna in node-disjoint multipath routing for mobile ad hoc networks. IWCMC 2007: 405-410 - 2006
- [c20]Walter W. Schilling Jr., Mansoor Alam:
Estimating Software Reliability with Static Analysis Techniques. SEDE 2006: 63-68 - 2005
- [j10]Min Song, Weiying Zhu, Andrea Francini, Mansoor Alam:
Performance analysis of large multicast switches with multicast virtual output queues. Comput. Commun. 28(2): 189-198 (2005) - [j9]Mansoor Alam, Shravan K. Vallala, Min Song:
Comparison of Various TCP Implementations in a Congested Network. Int. J. Comput. Their Appl. 12(3): 125-132 (2005) - [j8]Mansoor Alam, Carl Weisfelder, Min Song:
A Study of Parallel Monitoring Algorithm in ATM Network. Int. J. Comput. Their Appl. 12(4): 195-201 (2005) - [c19]Mansoor Alam, Praveen Bethoju, Min Song:
Simulation and Analysis of Traffic Engineering Capabilities of MPLS Networks Using Linux Test-Bed. CATA 2005: 127-132 - [c18]Mohammed Y. Niamat, Surya S. Hejeebu, Mansoor Alam:
A BIST Approach for Testing FPGAs Using JBITS. FCCM 2005: 267-268 - [c17]Mansoor Alam, Praveen Bethoju, Min Song:
Study of Traffic Engineering Capabilities of MPLS Networks. ITCC (2) 2005: 14-15 - 2004
- [j7]Min Song, Mansoor Alam:
Quality of Service Control and Performance Analysis of a Gigabit Network. Int. J. Comput. Their Appl. 11(3): 162-170 (2004) - [j6]Mahir Sabra, Mansoor Alam:
A Fuzzy Logic Feedback Controller for ABR Traffic Management in ATM Networks. Int. J. Comput. Their Appl. 11(3): 186-199 (2004) - [c16]Min Song, Sachin Shetty, Mansoor Alam, HouJun Yang:
A New Multicast Queuing Mechanism for High-Speed Packet Switches. PDCS 2004: 327-332 - 2003
- [c15]Mansoor Alam, Min Song, Amit Deshmukh:
A Scalable MPLS Multicast Solution for Dense Mode Multicast Networks. CAINE 2003: 234-237 - [c14]Mansoor Alam, Balachandar Swami:
Simulation of Error Control Schemes for Wireless and Satellite ATM. CATA 2003: 44-49 - 2002
- [c13]Min Song, Mansoor Alam, Sachin Shetty, Uday Jarajapu:
Evolutionary Scheduling in a Multi-Service Routing Switch. IS 2002: 38-43 - [c12]Min Song, Mansoor Alam, Mohammad Azam Khan:
Simulation and Performance Analysis of MPLS Networks. CAINE 2002: 229-234 - [c11]Mansoor Alam, Qing Tan, Min Song, Xingxue Hao:
QoS Control and Performance Analysis of a Gigabit Network. CATA 2002: 223-227 - [c10]Min Song, Mansoor Alam, Uday Jarajapu:
High Performance ATM Network Simulators. CATA 2002: 412-416 - 2001
- [j5]Mansoor Alam, Vinod Jeyachandran:
A Fuzzy Algorithm for ABR Flow Control in ATM Networks. Int. J. Comput. Their Appl. 8(4) (2001) - [c9]Mansoor Alam, Carl Weisfelder, Min Song:
A Study of Parallel Monitoring Algorithm in ATM Network Admission Control. PDCS 2001: 295-301 - [c8]Mansoor Alam, Shravan K. Vallala, Min Song:
Comparison of Various TCP Implementations in a Congested Network. PDCS 2001: 308-314 - [c7]Min Song, Mansoor Alam:
Two scheduling algorithms for input-queued switches guaranteeing voice QoS. GLOBECOM 2001: 92-96 - 2000
- [c6]Walter W. Schilling Jr., Mansoor Alam:
Performance simulation of the combination of prefetching and victim caching. CATA 2000: 284-287 - [c5]Mansoor Alam, Vinod Jeyachandran:
A fuzzy algorithm for ABR flow control in ATM networks. CATA 2000: 396-399
1990 – 1999
- 1996
- [j4]Steven G. Popovich, Mansoor Alam, Subir Bandyopadhyay:
Simulation of a DQDB MAC Protocol Using NETWORK 11.5. Int. J. Comput. Simul. 6(1): 113- (1996) - [c4]Elsa Salcedo Valeroso, Mansoor Alam:
Adaptive Resource Scheduling Strategies and Performance Analysis of Broadband Networks. LCN 1996: 305-314 - 1994
- [c3]Steven G. Popovich, Mansoor Alam:
A Simulation Study of the Migration from a CSMA/CD Network to FDDI. LCN 1994: 73-80 - 1993
- [j3]Salih O. Duffuaa, Abdelrahman N. Shuaib, Mansoor Alam:
Evaluation of optimization methods for machining economics models. Comput. Oper. Res. 20(2): 227-237 (1993) - [c2]Steven G. Popovich, Mansoor Alam, Subir Bandyopadhyay:
Simulation Of Optimized Distributed Query Schedules On A Hypercube Network. Annual Simulation Symposium 1993: 178-187 - 1992
- [c1]Steven G. Popovich, Mansoor Alam, Subir Bandyopadhyay:
Simulation of a DQDB MAC protocol with movable boundary and bandwidth balancing mechanisms. Annual Simulation Symposium 1992: 118-128
1970 – 1979
- 1975
- [j2]V. V. S. Sarma, Mansoor Alam:
Optimal Maintenance Policies for Machines Subject to Deterioration and Intermittent Breakdowns. IEEE Trans. Syst. Man Cybern. 5(3): 396-398 (1975) - 1974
- [j1]Mansoor Alam, V. V. S. Sarma:
Optimum Maintenance Policy for an Equipment Subject to Deterioration and Random Failure. IEEE Trans. Syst. Man Cybern. 4(2): 172-175 (1974)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-23 20:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint