Guide to wireless mesh networks S Misra, SC Misra, I Woungang Springer 9 (9), 2009 | 293 | 2009 |
Defending against collaborative attacks by malicious nodes in MANETs: A cooperative bait detection approach JM Chang, PC Tsou, I Woungang, HC Chao, CF Lai IEEE systems journal 9 (1), 65-75, 2014 | 244 | 2014 |
Guide to wireless ad hoc networks S Misra, I Woungang, SC Misra Springer Science & Business Media, 2009 | 228 | 2009 |
Toward tactile internet in beyond 5G era: Recent advances, current issues, and future directions SK Sharma, I Woungang, A Anpalagan, S Chatzinotas Ieee Access 8, 56948-56991, 2020 | 200 | 2020 |
Authorship verification for short messages using stylometry ML Brocardo, I Traore, S Saad, I Woungang 2013 International Conference on Computer, Information and Telecommunication …, 2013 | 180 | 2013 |
A machine learning-based protocol for efficient routing in opportunistic networks DK Sharma, SK Dhurandher, I Woungang, RK Srivastava, A Mohananey, ... IEEE Systems Journal 12 (3), 2207-2213, 2016 | 151 | 2016 |
Trust management in ubiquitous computing: A Bayesian approach MK Denko, T Sun, I Woungang Computer Communications 34 (3), 398-406, 2011 | 134 | 2011 |
Combining mouse and keystroke dynamics biometrics for risk-based authentication in web environments I Traore, I Woungang, MS Obaidat, Y Nakkabi, I Lai 2012 fourth international conference on digital home, 138-145, 2012 | 125 | 2012 |
Biometric-based physical and cybersecurity systems MS Obaidat, I Traore, I Woungang Springer International Publishing, 2019 | 124 | 2019 |
Biometric authentication using mouse gesture dynamics B Sayed, I Traoré, I Woungang, MS Obaidat IEEE systems journal 7 (2), 262-274, 2013 | 118 | 2013 |
REEP: data-centric, energy-efficient and reliable routing protocol for wireless sensor networks F Zabin, S Misra, I Woungang, HF Rashvand, NW Ma, MA Ali IET communications 2 (8), 995-1008, 2008 | 116 | 2008 |
HBPR: history based prediction for routing in infrastructure-less opportunistic networks SK Dhurandher, DK Sharma, I Woungang, S Bhati 2013 IEEE 27th international Conference on advanced information networking …, 2013 | 110 | 2013 |
Security in mobile ad-hoc networks using soft encryption and trust-based multi-path routing P Narula, SK Dhurandher, S Misra, I Woungang Computer Communications 31 (4), 760-769, 2008 | 108 | 2008 |
Authorship verification using deep belief network systems ML Brocardo, I Traore, I Woungang, MS Obaidat International Journal of Communication Systems 30 (12), e3259, 2017 | 92 | 2017 |
Authorship verification of e-mail and tweet messages applied for continuous authentication ML Brocardo, I Traore, I Woungang Journal of Computer and System Sciences 81 (8), 1429-1440, 2015 | 88 | 2015 |
Routing in opportunistic networks I Woungang, SK Dhurandher, A Anpalagan, AV Vasilakos Springer, 2013 | 83 | 2013 |
Handbook of green information and communication systems A Anpalagan, I Woungang, MS Obaidat Academic press, 2012 | 76 | 2012 |
GAER: genetic algorithm-based energy-efficient routing protocol for infrastructure-less opportunistic networks SK Dhurandher, DK Sharma, I Woungang, R Gupta, S Garg The Journal of Supercomputing 69, 1183-1214, 2014 | 69 | 2014 |
Short-Packet Communications for MIMO NOMA Systems Over Nakagami-m Fading: BLER and Minimum Blocklength Analysis DD Tran, SK Sharma, S Chatzinotas, I Woungang, B Ottersten IEEE Transactions on Vehicular Technology 70 (4), 3583-3598, 2021 | 62 | 2021 |
Using bee algorithm for peer-to-peer file searching in mobile ad hoc networks SK Dhurandher, S Misra, P Pruthi, S Singhal, S Aggarwal, I Woungang Journal of Network and Computer Applications 34 (5), 1498-1508, 2011 | 56 | 2011 |