Mobile Ad Hoc Networks: Current Status and Future Trends J Loo, JL Mauri, JH Ortiz Taylor & Francis Group, 0 | 406* | |
Joint computation and communication design for UAV-assisted mobile edge computing in IoT T Zhang, Y Xu, J Loo, D Yang, L Xiao IEEE Transactions on Industrial Informatics 16 (8), 5505-5516, 2019 | 380 | 2019 |
Customer churn prediction in telecommunication industry using data certainty A Amin, F Al-Obeidat, B Shah, A Adnan, J Loo, S Anwar Journal of Business Research 94, 290-301, 2019 | 293 | 2019 |
Recent advances in information-centric networking-based Internet of Things (ICN-IoT) S Arshad, MA Azam, MH Rehmani, J Loo IEEE Internet of Things Journal 6 (2), 2128-2158, 2018 | 240 | 2018 |
A specification-based IDS for detecting attacks on RPL-based network topology A Le, J Loo, KK Chai, M Aiash Information 7 (2), 25, 2016 | 233 | 2016 |
Recent advances in radio resource management for heterogeneous LTE/LTE-A networks YL Lee, TC Chuah, J Loo, A Vinel IEEE Communications Surveys & Tutorials 16 (4), 2142-2180, 2014 | 232 | 2014 |
The impact of rank attack on network topology of routing protocol for low-power and lossy networks A Le, J Loo, A Lasebae, A Vinel, Y Chen, M Chai IEEE Sensors Journal 13 (10), 3685-3692, 2013 | 229 | 2013 |
Real-time detection of denial-of-service attacks in IEEE 802.11 p vehicular networks N Lyamin, A Vinel, M Jonsson, J Loo IEEE Communications letters 18 (1), 110-113, 2013 | 190 | 2013 |
6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach A Le, J Loo, A Lasebae, M Aiash, Y Luo International Journal of Communication Systems 25 (9), 1189-1212, 2012 | 181 | 2012 |
Dynamic network slicing for multitenant heterogeneous cloud radio access networks YL Lee, J Loo, TC Chuah, LC Wang IEEE Transactions on Wireless Communications 17 (4), 2146-2161, 2018 | 177 | 2018 |
Specification-based IDS for securing RPL from topology attacks A Le, J Loo, Y Luo, A Lasebae 2011 IFIP Wireless Days (WD), 1-3, 2011 | 164 | 2011 |
Authentication of smartphone users based on activity recognition and mobile sensing M Ehatisham-ul-Haq, MA Azam, J Loo, K Shuang, S Islam, U Naeem, ... Sensors 17 (9), 2043, 2017 | 143 | 2017 |
Continuous authentication of smartphone users based on activity pattern recognition using passive mobile sensing M Ehatisham-ul-Haq, MA Azam, U Naeem, Y Amin, J Loo Journal of Network and Computer Applications 109, 24-35, 2018 | 136 | 2018 |
The impacts of internal threats towards routing protocol for low power and lossy network performance A Le, J Loo, Y Luo, A Lasebae 2013 IEEE symposium on computers and communications (ISCC), 000789-000794, 2013 | 99 | 2013 |
An integrated antenna system for 4G and millimeter-wave 5G future handheld devices SI Naqvi, AH Naqvi, F Arshad, MA Riaz, MA Azam, MS Khan, Y Amin, ... IEEE Access 7, 116555-116566, 2019 | 91 | 2019 |
On the investigation of cloud-based mobile media environments with service-populating and QoS-aware mechanisms F Sardis, G Mapp, J Loo, M Aiash, A Vinel IEEE transactions on multimedia 15 (4), 769-777, 2013 | 85 | 2013 |
Secure routing protocol using cross-layer design and energy harvesting in wireless sensor networks NA Alrajeh, S Khan, J Lloret, J Loo International Journal of Distributed Sensor Networks 9 (1), 374796, 2013 | 80 | 2013 |
User preference aware caching deployment for device-to-device caching networks T Zhang, H Fan, J Loo, D Liu IEEE Systems Journal 13 (1), 226-237, 2017 | 76 | 2017 |
Hierarchical and flat-based hybrid naming scheme in content-centric networks of things S Arshad, B Shahzaad, MA Azam, J Loo, SH Ahmed, S Aslam IEEE Internet of Things Journal 5 (2), 1070-1080, 2018 | 73 | 2018 |
Case study of a black hole attack on LoWPAN-RPL K Chugh, L Aboubaker, J Loo Proc. of the Sixth International Conference on Emerging Security Information …, 2012 | 72 | 2012 |