Mobile Ad Hoc Networks: Current Status and Future Trends J Loo, JL Mauri, JH Ortiz Taylor & Francis Group, 0 | 287* | |
Recent advances in radio resource management for heterogeneous LTE/LTE-A networks YL Lee, TC Chuah, J Loo, A Vinel IEEE Communications Surveys & Tutorials 16 (4), 2142-2180, 2014 | 174 | 2014 |
6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach A Le, J Loo, A Lasebae, M Aiash, Y Luo International Journal of Communication Systems 25 (9), 1189-1212, 2012 | 143 | 2012 |
Real-time detection of denial-of-service attacks in IEEE 802.11 p vehicular networks N Lyamin, A Vinel, M Jonsson, J Loo IEEE Communications letters 18 (1), 110-113, 2013 | 140 | 2013 |
The impact of rank attack on network topology of routing protocol for low-power and lossy networks A Le, J Loo, A Lasebae, A Vinel, Y Chen, M Chai IEEE Sensors Journal 13 (10), 3685-3692, 2013 | 124 | 2013 |
A specification-based IDS for detecting attacks on RPL-based network topology A Le, J Loo, KK Chai, M Aiash Information 7 (2), 25, 2016 | 100 | 2016 |
Specification-based IDS for securing RPL from topology attacks A Le, J Loo, Y Luo, A Lasebae 2011 IFIP Wireless Days (WD), 1-3, 2011 | 92 | 2011 |
Dynamic network slicing for multitenant heterogeneous cloud radio access networks YL Lee, J Loo, TC Chuah, LC Wang IEEE Transactions on Wireless Communications 17 (4), 2146-2161, 2018 | 78 | 2018 |
On the investigation of cloud-based mobile media environments with service-populating and QoS-aware mechanisms F Sardis, G Mapp, J Loo, M Aiash, A Vinel IEEE transactions on multimedia 15 (4), 769-777, 2013 | 76 | 2013 |
Recent advances in information-centric networking-based Internet of Things (ICN-IoT) S Arshad, MA Azam, MH Rehmani, J Loo IEEE Internet of Things Journal 6 (2), 2128-2158, 2018 | 65 | 2018 |
Authentication of smartphone users based on activity recognition and mobile sensing M Ehatisham-ul-Haq, MA Azam, J Loo, K Shuang, S Islam, U Naeem, ... Sensors 17 (9), 2043, 2017 | 64 | 2017 |
The impacts of internal threats towards routing protocol for low power and lossy network performance A Le, J Loo, Y Luo, A Lasebae 2013 IEEE Symposium on computers and communications (ISCC), 000789-000794, 2013 | 56 | 2013 |
Secure routing protocol using cross-layer design and energy harvesting in wireless sensor networks NA Alrajeh, S Khan, J Lloret, J Loo International Journal of Distributed Sensor Networks 9 (1), 374796, 2013 | 52 | 2013 |
Customer churn prediction in telecommunication industry using data certainty A Amin, F Al-Obeidat, B Shah, A Adnan, J Loo, S Anwar Journal of Business Research 94, 290-301, 2019 | 51 | 2019 |
Generalized pairwise Z-complementary codes L Feng, P Fan, X Tang, K Loo IEEE Signal Processing Letters 15, 377-380, 2008 | 51 | 2008 |
Enabling seamless V2I communications: toward developing cooperative automotive applications in VANET systems A Ghosh, VV Paranthaman, G Mapp, O Gemikonakli, J Loo IEEE Communications Magazine 53 (12), 80-86, 2015 | 46 | 2015 |
Secure route selection in wireless mesh networks S Khan, NA Alrajeh, KK Loo Computer Networks 56 (2), 491-503, 2012 | 46 | 2012 |
Framework for intrusion detection in IEEE 802.11 wireless mesh networks. S Khan, KK Loo, ZU Din Int. Arab J. Inf. Technol. 7 (4), 435-440, 2010 | 45 | 2010 |
Case study of a black hole attack on LoWPAN-RPL K Chugh, L Aboubaker, J Loo Proc. of the Sixth International Conference on Emerging Security Information …, 2012 | 43 | 2012 |
Cross layer design for routing and security in multi-hop wireless networks S Khan, KK Loo, ZU Din Journal of information assurance and security 4 (2), 170-173, 2009 | 43 | 2009 |