default search action
Samad S. Kolahi
Person information
- affiliation: Unitec Institute of Technology, Auckland, New Zealand
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c29]Samad Salehi Kolahi, Tahany Shaheen, Eli Aderson, Rahaf Aljadani, Asma Ceyddique:
IEEE 802.11ac WLAN Analysis in 160Mhz Channel. ICOIN 2023: 190-193 - 2021
- [c28]Samad S. Kolahi, Ahmad Khalid Sooran, Faroq Nasim, Muhammad Mazhar U. Khan:
Performance Comparison of IEEE802.11ac vs IEEE 802.11n WLAN in IPv6. AINA (3) 2021: 426-435 - [c27]Apaula Aotearoa Tuifaiga, Priyanka Ashreena Ram, Samad Salehi Kolahi:
Performance Comparison of IPv6 in 802.11ac WLAN in Windows and Linux Environment. TENCON 2021: 799-804
2010 – 2019
- 2017
- [c26]Samad S. Kolahi, Bashar Barmada, Keysha Mudaliar:
Defence mechanisms evaluation against RA flood attacks for Linux-victim node. APSIPA 2017: 1000-1005 - [c25]Samad S. Kolahi, A. A. Almatrook:
Impact of security on bandwidth and latency in IEEE 802.11ac client-to-server WLAN. ICUFN 2017: 893-897 - [c24]Samad S. Kolahi, Keysha Mudaliar, Cheng Zhang, Zhizhong Gu:
Impact of IPSec security on VoIP in different environments. ICUFN 2017: 979-982 - 2016
- [c23]Samad S. Kolahi, Yuqing Rico Cao, Hong Chen:
Impact of SSL security on bandwidth and delay in IEEE 802.11n WLAN using Windows 7. CSNDSP 2016: 1-4 - 2015
- [c22]Kiattikul Treseangrat, Samad Salehi Kolahi, Bahman Sarrafpour:
Analysis of UDP DDoS cyber flood attack and defense mechanisms on Windows Server 2012 and Linux Ubuntu 13. CITS 2015: 1-5 - [c21]Samad S. Kolahi, Kiattikul Treseangrat, Bahman Sarrafpour:
Analysis of UDP DDoS flood cyber attack and defense mechanisms on Web Server with Linux Ubuntu 13. ICCSPA 2015: 1-5 - 2014
- [c20]Samad Salehi Kolahi, Amro A. Alghalbi, Abdulmohsen F. Alotaibi, Saarim S. Ahmed, Divyesh Lad:
Performance comparison of defense mechanisms against TCP SYN flood DDoS attack. ICUMT 2014: 143-147 - 2013
- [c19]Samad Salehi Kolahi, Yuqing Rico Cao, Hong Chen:
Bandwidth-IPSec security trade-off in IPv4 and IPv6 in Windows 7 environment. FGCT 2013: 148-152 - [c18]Samad S. Kolahi, Yuqing Rico Cao, Hong Chen:
Evaluation of IPv6 with IPSec in IEEE 802.11n wireless LAN using Fedora 15 operating system. ISCC 2013: 203-206 - 2012
- [c17]Navneet Chand, Samad Salehi Kolahi:
TCP Throughput of IPv6 and IPv4 on IEEE 802.11n Wireless Client Server LAN in Windows Vista/XP - Server 2008 Environment. IMIS 2012: 300-304 - [c16]Samad Salehi Kolahi, Peng Li, Mulugeta Argawe, Mustafa Safdari:
WPA2 security-bandwith trade-off in 802.11n peer-peer WLAN for IPv4 and IPv6 using Windows XP and Windows 7 operating systems. ISCC 2012: 575-579 - 2011
- [j1]Samad S. Kolahi, Peng Li:
Evaluating IPv6 in Peer-to-Peer 802.11n Wireless LANs. IEEE Internet Comput. 15(4): 70-74 (2011) - [c15]Samad S. Kolahi, Burjiz K. Soorty:
Evaluation of Gigabit Ethernet Local Area Networks in Windows Vista-Server 2008 Environment. AINA Workshops 2011: 308-312 - [c14]Peng Li, Samad S. Kolahi, Mustafa Safdari, Mulugeta Argawe:
Effect of WPA2 Security on IEEE 802.11n Bandwith and Round Trip Time in Peer-Peer Wireless Local Area Networks. AINA Workshops 2011: 777-782 - [c13]Samad S. Kolahi, Shaneel Narayan, Du D. T. Nguyen, Yonathan Sunarto:
Performance Monitoring of Various Network Traffic Generators. UKSim 2011: 501-506 - 2010
- [c12]Samad S. Kolahi, Burjiz K. Soorty, Navneet Chand, Zhang Qu:
Performance Comparison of IPv4 and IPv6 in Peer-Peer and Client Server Local Area Networks. CIT 2010: 41-45 - [c11]Burjiz K. Soorty, Samad S. Kolahi, Navneet Chand, Zhang Qu:
Performance Comparison of Category 5e vs. Category 6 Cabling Systems for both IPv4 and IPv6 in Gigabit Ethernet. CIT 2010: 1525-1529
2000 – 2009
- 2009
- [c10]Samad S. Kolahi, Zhang Qu, Burjiz K. Soorty, Navneet Chand:
The performance of IPv4 and IPv6 using UDP on IEEE 802.11n WLANs with WPA2 security. ICIS 2009: 873-876 - [c9]Samad Salehi Kolahi, Zhang Qu, Burjiz K. Soorty, Navneet Chand:
The Impact of Security on the Performance of IPv4 and IPv6 Using 802.11n Wireless LAN. NTMS 2009: 1-4 - [c8]Samad S. Kolahi, Burjiz K. Soorty, Zhang Qu, Navneet Chand:
Performance Analysis of IPv4 and IPv6 on Windows Vista and Windows XP over Fast Ethernet in Peer-Peer LAN. NTMS 2009: 1-4 - 2008
- [c7]Shaneel Narayan, Samad S. Kolahi, Yonathan Sunarto, Du D. T. Nguyen, Paul Mani:
The Influence of Wireless 802.11g LAN Encryption Methods on Throughput and Round Trip Time for Various Windows Operating Systems. CNSR 2008: 171-175 - [c6]Samad S. Kolahi, Ranjana Shukla, Avikash Kumar, Robert Freeth:
Wireless Technology in Educational Institutes. CSSE (5) 2008: 499-502 - [c5]Samad S. Kolahi, Shaneel Narayan, Du D. T. Nguyen, Yonathan Sunarto, Paul Mani:
The impact of wireless LAN security on performance of different Windows operating systems. ISCC 2008: 260-264 - [c4]Samad S. Kolahi:
Comparison of CDMA tele-traffic models. ISCC 2008: 844-848 - 2007
- [c3]Samad S. Kolahi:
Analysis of Results in Simulation and Modeling of CDMA Systems. ISCC 2007: 679-684 - 2004
- [c2]Samad S. Kolahi, Allan G. Williamson, Kevin W. Sowerby:
Sensitivity analysis of the reverse link Erlang capacity of CDMA systems. WCNC 2004: 2220-2225 - 2002
- [c1]Samad S. Kolahi:
On Erlang Capacity of CDMA Systems. PWC 2002: 227-232
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:45 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint