Showing 1 - 5 results of 5 for search 'Muhammad K Shahzad' Skip to content
VuFind
    • English
    • Deutsch
    • Español
    • Français
    • Italiano
    • 日本語
    • Nederlands
    • Português
    • Português (Brasil)
    • 中文(简体)
    • 中文(繁體)
    • Türkçe
    • עברית
    • Gaeilge
    • Cymraeg
    • Ελληνικά
    • Català
    • Euskara
    • Русский
    • Čeština
    • Suomi
    • Svenska
    • polski
    • Dansk
    • slovenščina
    • اللغة العربية
    • বাংলা
    • Galego
    • Tiếng Việt
    • Hrvatski
    • हिंदी
    • Հայերէն
    • Українська
    • Sámegiella
    • Монгол
Advanced
  • Author
  • Muhammad K Shahzad
Showing 1 - 5 results of 5 for search 'Muhammad K Shahzad', query time: 0.03s Refine Results
  1. 1
    LNDIR: A lightweight non-increasing delivery-latency interval-based routing for duty-cycled sensor networks

    LNDIR: A lightweight non-increasing delivery-latency interval-based routing for duty-cycled sensor networks by Muhammad K Shahzad, Dang Tu Nguyen, Vyacheslav Zalyubovskiy, Hyunseung Choo

    Published 2018-04-01
    Get full text
    Article
  2. 2
    Secure and Blockchain-Based Emergency Driven Message Protocol for 5G Enabled Vehicular Edge Computing

    Secure and Blockchain-Based Emergency Driven Message Protocol for 5G Enabled Vehicular Edge Computing by Lewis Nkenyereye, Bayu Adhi Tama, Muhammad K. Shahzad, Yoon-Ho Choi

    Published 2019-12-01
    Get full text
    Article
  3. 3
    AEF: Adaptive En-Route Filtering to Extend Network Lifetime in Wireless Sensor Networks

    AEF: Adaptive En-Route Filtering to Extend Network Lifetime in Wireless Sensor Networks by Muhammad K. Shahzad, S. M. Riazul Islam, Kyung-Sup Kwak, Lewis Nkenyereye

    Published 2019-09-01
    Get full text
    Article
  4. 4
    GAFOR: Genetic Algorithm Based Fuzzy Optimized Re-Clustering in Wireless Sensor Networks

    GAFOR: Genetic Algorithm Based Fuzzy Optimized Re-Clustering in Wireless Sensor Networks by Muhammad K. Shahzad, S. M. Riazul Islam, Mahmud Hossain, Mohammad Abdullah-Al-Wadud, Atif Alamri, Mehdi Hussain

    Published 2020-12-01
    Get full text
    Article
  5. 5
    Protocol-Based Deep Intrusion Detection for DoS and DDoS Attacks Using UNSW-NB15 and Bot-IoT Data-Sets

    Protocol-Based Deep Intrusion Detection for DoS and DDoS Attacks Using UNSW-NB15 and Bot-IoT Data-Sets by Muhammad Zeeshan, Qaiser Riaz, Muhammad Ahmad Bilal, Muhammad K. Shahzad, Hajira Jabeen, Syed Ali Haider, Azizur Rahim

    Published 2022-01-01
    Get full text
    Article

Search Tools:

  • RSS Feed
  • Email Search

Search Options

  • Search History
  • Advanced Search

Find More

  • Browse the Catalog
  • Browse Alphabetically
  • Explore Channels
  • Course Reserves
  • New Items

Need Help?

  • Search Tips
  • Ask a Librarian
  • FAQs