% % This file was created by the TYPO3 extension % bib % --- Timezone: CEST % Creation date: 2024-04-26 % Creation time: 14-55-08 % --- Number of references % 8 % @Article { 22011-itag-samad-cadplus, title = {CAD+: Detecting Colluding Nodes in Gray Hole Attacks}, journal = {Lecture Notes in Informatics GI-Edition}, year = {2011}, month = {3}, day = {25}, volume = {S-10}, number = {Informatiktage 2011}, pages = {279-282}, misc2 = {Druck}, publisher = {K{\"o}llen Verlag GmbH}, address = {Bonn, Germany}, series = {Gesellschaft f{\"u}r Informatik (GI) S-10}, language = {en}, ISBN = {978-3-88579- 444-8}, ISSN = {1614-3213}, author = {Karuppayah, Shankar and Samad, Fahad} } @Conference { 2010-08-lcn-samad-ASSA, title = {Adaptive Security Established on the Requirements and Resource Abilities of Network Nodes}, year = {2010}, month = {10}, day = {11}, volume = {1}, pages = {752-755}, misc2 = {Online}, publisher = {IEEE}, booktitle = {The 10th IEEE Wireless Local Networks(WLN 2010) in the 35th IEEE Local Computer Networks (LCN 2010), Denver, Colorado, U.S.A.}, event_place = {Denver, Colorado, United States}, event_name = {IEEE Local Computer Networks (IEEE LCN 2010)}, event_date = {11-14 Oct. 2010}, language = {en}, ISBN = {978-1-4244-8388-4}, author = {Samad, Fahad and Ali Makram, Sadeq} } @Conference { 2010-08-icccn-samad-PiCAT, title = {PiCAT: Palliating Channel Assignment Assaults using Adjustable Trust in Wireless Mesh Networks}, journal = {IEEE ICCCN 2010}, year = {2010}, month = {8}, day = {2}, volume = {1}, pages = {1 - 7}, misc2 = {Online}, publisher = {IEEE}, howpublished = {Medienkombination}, booktitle = {The 19th International Conference on Computer Communications and Networks (ICCCN 2010), Zurich, Switzerland}, event_place = {Zurich, Switzerland}, event_name = {19th International Conference on Computer Communications and Networks (ICCCN 2010)}, event_date = {August 2–5, 2010}, language = {en}, ISBN = {978-1-4244-7114-0}, ISSN = {1095-2055}, DOI = {10.1109/ICCCN.2010.5560076}, author = {Samad, Fahad and Ali Makram, Sadeq} } @Conference { 2009-q2swinet-samad-REALISM, title = {REALISM: Rendering Anonymity and Lightweight Security with Mobility in Wireless Ad hoc and Mesh Networks}, journal = {ACM International Symposium on QoS and Security for Wireless and Mobile Networks}, year = {2009}, month = {10}, day = {26}, pages = {97-102}, misc2 = {Online}, publisher = {ACM New York, NY, USA}, booktitle = {The 5th ACM International Symposium on QoS and Security for Wireless and Mobile Networks (Q2SWinet 2009), Tenerife, The Canary Islands, Spain}, event_place = {Tenerife, The Canary Islands, Spain}, event_name = {ACM International Symposium on QoS and Security for Wireless and Mobile Networks}, event_date = {26-30 October, 2009}, language = {en}, ISBN = {978-1-60558-619-9}, author = {Samad, Fahad and Ali Makram, Sadeq} } @Conference { 2009-ngmast-samad-pcwmn, title = {Protection based on Neighborhood-Trust in Clustered Wireless Mesh Networks}, year = {2009}, month = {9}, day = {15}, volume = {1}, pages = {487-493}, publisher = {IEEE}, howpublished = {Misc}, booktitle = {IEEE NGMAST 2009}, event_place = {Cardiff, U.K.}, event_name = {International Conference and Exhibition on Next Generation Mobil Applications, Services and Technologies}, language = {en}, ISBN = {978-0-7695-3786-3}, author = {Samad, Fahad and Ali Makram, Sadeq} } @Conference { 2009-iscc-samad-NNCQ, title = {Neighborhood Nodes Collaboration to Support QoS Routing in Wireless Mesh Networks}, year = {2009}, month = {7}, day = {5}, pages = {763-769}, misc2 = {Online}, publisher = {IEEE}, booktitle = {IEEE Symposium on Computers and Communications (ISCC 2009), Sousse, Tunisia}, event_place = {Sousse, Tunisia}, event_name = {IEEE Symposium on Computers and Communications}, language = {en}, ISBN = {978-1-4244-4671-1}, author = {Ali Makram, Sadeq and Samad, Fahad and Guenes, Mesut} } @Conference { 2009-mwns-samad-hsvc, title = {Handling Security Vulnerabilities in Clustered Wireless Mesh Networks}, year = {2009}, month = {5}, day = {15}, pages = {51-62}, misc2 = {Print}, publisher = {Shaker Verlag}, booktitle = {The 2nd International Workshop on Mobile and Wireless Networks Security in conjunction with IFIP NETWORKING 2009, Aachen, Germany.}, event_place = {Aachen, Germany}, event_name = {International Workshop on Mobile and Wireless Networks Security (MWNS 2009)}, language = {en}, ISBN = {978-3-8322-8177-9}, author = {Samad, Fahad and Makram, Sadeq Ali} } @Conference { 2008-ntms-samad-RFID, title = {Controlling Physical Objects with Privacy using Secure RFID System}, year = {2008}, month = {11}, day = {5}, pages = {1-5}, misc2 = {Online}, publisher = {IEEE}, booktitle = {2nd International Conference on New Technologies, Mobility, and Security (NTMS 2008), Tangier, Morocco}, event_place = {Tangier, Morocco}, event_name = {International Conference on New Technologies, Mobility and Security}, event_date = {5-7 Nov. 2008}, language = {en}, ISBN = {978-2-9532443-0-4}, author = {Samad, Fahad and Ali Makram, Sadeq} }