Follow
Intesab Hussain
Intesab Hussain
Verified email at parisdescartes.fr
Title
Cited by
Cited by
Year
A comprehensive study of flooding attack consequences and countermeasures in session initiation protocol (sip)
I Hussain, S Djahel, Z Zhang, F Naīt‐Abdesselam
Security and Communication Networks 8 (18), 4436-4451, 2015
302015
Strategy based proxy to secure user agent from flooding attack in SIP
I Hussain, F Naīt-Abdesselam
2011 7th International Wireless Communications and Mobile Computing …, 2011
202011
Enhancing IEEE 802.15. 4 for low-latency, bandwidth, and energy critical WSN applications
P Kumar, M Gunes, I Hussain
2008 4th International Conference on Emerging Technologies, 146-151, 2008
192008
A novel energy-efficient clustering algorithm for more sustainable wireless sensor networks enabled smart cities applications
Z Yousif, I Hussain, S Djahel, Y Hadjadj-Aoul
Journal of sensor and actuator networks 10 (3), 50, 2021
182021
A survey on registration hijacking attack consequences and protection for Session Initiation Protocol (SIP)
MM Naeem, I Hussain, MMS Missen
Computer Networks 175, 107250, 2020
182020
A lightweight countermeasure to cope with flooding attacks against session initiation protocol
I Hussain, S Djahel, D Geneiatakis, F Naīt-Abdesselam
6th Joint IFIP Wireless and Mobile Networking Conference (WMNC), 1-5, 2013
92013
Performance Evaluation of Video Streaming Over Wired Networks Using NS-2 Simulator
S Memon, SR Hassan, IH Sadhayo, UA Khan, NA Memon
First International Conference on Modern Communication & Computing …, 2014
42014
Analysis and detection of DDoS attacks targetting virtualized servers
N Ahmed, I Hussain, Z Yousaf
International Journal of Computer Science and Network Security 19 (1), 128-133, 2019
12019
Resolution of Left Atrial Appendage Thrombi with Anticoagulant Therapy in Candidates for Percutaneous Mitral Commissurotomy
S SHEIKH, M Nazir, S Hameed, I Hussain, N Ahmed, A TARIQ
Annals of King Edward Medical University 8 (3), 2002
12002
Laboratory Evaluation of Dibenz (b, t)-1, 4-0xazepine for the Protection of Nylon Tapes against Rodents Attack
MJ Mendki, S Prakash, PK Gutch, RC Malhotra, KM Rao, J Singh, ...
Defence Science Journal 50 (1), 59, 2000
12000
A Technique for Safeguarding Legitimate Users from Media Access Control (MAC) Spoofing Attacks
MM Naeem, I Hussain, MMS Missen
Journal of Computing & Biomedical Informatics 6 (02), 160-171, 2024
2024
Evaluating Reactive Routing Protocols of VANETs using 2K Factorial Analysis
Z Yousif, I Hussain, S Parveen, F Umer, N Naeem
Indian Journal of Science and Technology 12, 20, 2019
2019
Empirical Evaluation of Social and Traditional Search Tools for Adhoc Information Retrieval
S Hussain, MMS Missen, N Akhtar, M Husnain, I Hussain, MA Nizamani
International Journal of Advanced Computer Science and Applications 8 (2), 2017
2017
COMPUTING ANGULAR CORRELATION FUNCTION USING MESSAGE PASSING INTERFACE
FA Jokhio, UA Khan, IH Sadhayo
ENGINEERING, SCIENCE & TECHNOLOGY, 38, 2015
2015
PREVENTING SPIT WITH NAIVE BAYES IN VOIP COMMUNICATION
IH Sadhayo, FA Jokhio, UA Khan, P Kumar, NA Memon
Feedback 13 (1), 2014
2014
Solving flooding and SPIT based denial of service problems in voice over IP communications
I Hussain
Paris 5, 2013
2013
Study of Secure Auto-Stabilizing Algorithms in Mobile Ad Hoc Networks
I Hussain
2007
COMPLETE LOCAL BINARY PATTERN AND SPATIAL STRUCTURE OF LIVE FACES
S Parveen, S Mumtazah, N Naeem, I Hussain, P Kumar
ANALYSIS OF POWER OPTIMIZATION TECHNIQUES IN VISION BASED ENVIRONMENT MONITORING SYSTEMS
UA Khan, FH Mangi, IH Sadhayo
ENGINEERING, SCIENCE & TECHNOLOGY, 34, 0
The system can't perform the operation now. Try again later.
Articles 1–19