Fazirulhisyam Hashim
Fazirulhisyam Hashim
Verified email at upm.edu.my
Title
Cited by
Cited by
Year
An efficient authentication and key agreement protocol for 4G (LTE) networks
KA Alezabi, F Hashim, SJ Hashim, BM Ali
2014 IEEE Region 10 Symposium, 502-507, 2014
492014
Experimental study of LTE signals as illuminators of opportunity for passive bistatic radar applications
AA Salah, RSAR Abdullah, A Ismail, F Hashim, NHA Aziz
Electronics Letters 50 (7), 545-547, 2014
462014
A new super wideband fractal monopole-dielectric resonator antenna
A Azari, A Ismail, A Sali, F Hashim
IEEE Antennas and Wireless Propagation Letters 12, 1014-1016, 2013
432013
A survey and taxonomy on medium access control strategies for cooperative communication in wireless networks: Research issues and challenges
M Sami, NK Noordin, M Khabazian, F Hashim, S Subramaniam
IEEE Communications Surveys & Tutorials 18 (4), 2493-2521, 2016
322016
Detecting sybil attacks in clustered wireless sensor networks based on energy trust system (ETS)
N Alsaedi, F Hashim, A Sali, FZ Rokhani
Computer communications 110, 75-82, 2017
262017
Analysis on target detection and classification in LTE based passive forward scattering radar
RSA Raja Abdullah, NH Abdul Aziz, NE Abdul Rashid, A Ahmad Salah, ...
Sensors 16 (10), 1607, 2016
262016
Biologically inspired anomaly detection and security control frameworks for complex heterogeneous networks
F Hashim, KS Munasinghe, A Jamalipour
IEEE Transactions on Network and Service Management 7 (4), 268-281, 2010
262010
Experimental investigation on target detection and tracking in passive radar using long-term evolution signal
RSAR Abdullah, AA Salah, A Ismail, FH Hashim, NEA Rashid, NHA Aziz
IET Radar, Sonar & Navigation 10 (3), 577-585, 2016
252016
Feasibility study of LTE signal as a new illuminators of opportunity for passive radar applications
AA Salah, RSAR Abdullah, A Ismail, F Hashim, CY Leow, MB Roslee, ...
2013 IEEE International RF and Microwave Conference (RFM), 258-262, 2013
242013
Node replication attacks in mobile wireless sensor network: a survey
HR Shaukat, F Hashim, A Sali, MF Abdul Rasid
International Journal of Distributed Sensor Networks 10 (12), 402541, 2014
222014
Totally opportunistic routing algorithm (TORA) for underwater wireless sensor network
Z Rahman, F Hashim, MFA Rasid, M Othman
Plos one 13 (6), e0197087, 2018
212018
Detection of DoS and DDoS attacks in NGMN using frequency domain analysis
F Hashim, MR Kibria, A Jamalipour
2008 14th Asia-Pacific Conference on Communications, 1-5, 2008
212008
Lightweight decentralized multicast–unicast key management method in wireless IPv6 networks
A Mehdizadeh, F Hashim, M Othman
Journal of Network and Computer Applications 42, 59-69, 2014
202014
An adaptive multi-channel assignment and coordination scheme for IEEE 802.11 P/1609.4 in vehicular Ad-Hoc networks
AA Almohammedi, NK Noordin, A Sali, F Hashim, M Balfaqih
IEEE Access 6, 2781-2802, 2017
192017
An overview of attacks against digital watermarking and their respective countermeasures
M Tanha, SDS Torshizi, MT Abdullah, F Hashim
Proceedings Title: 2012 International Conference on Cyber Security, Cyber …, 2012
192012
An effective approach for managing power consumption in cloud computing infrastructure
SK Abd, SAR Al-Haddad, F Hashim, ABHJ Abdullah, S Yussof
journal of computational science 21, 349-360, 2017
182017
Global communications newsletter
S Bregni
IEEE Communications Magazine 48 (7), 1-8, 2010
182010
Design and evaluation of distributed and dynamic mobility management approach based on PMIPv6 and MIH protocols
MK Murtadha, NK Noordin, BM Ali, F Hashim
Wireless Networks 21 (8), 2747-2763, 2015
172015
QoE-oriented cross-layer downlink scheduling for heterogeneous traffics in LTE networks
M Nasimi, M Kousha, F Hashim
2013 IEEE 11th Malaysia international conference on communications (MICC …, 2013
172013
Characterizing energy efficiency for heterogeneous cellular networks
M Nasimi, F Hashim, CK Ng
2012 IEEE Student Conference on Research and Development (SCOReD), 198-202, 2012
172012
The system can't perform the operation now. Try again later.
Articles 1–20