default search action
Abdul Razaque
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j40]Ikram Bazarbekov, Abdul Razaque, Madina T. Ipalakova, Joon Yoo, Zhanna Assipova, Ali Almisreb:
A review of artificial intelligence methods for Alzheimer's disease diagnosis: Insights from neuroimaging to sensor data analysis. Biomed. Signal Process. Control. 92: 106023 (2024) - [j39]Nader Al-lqubaydhi, Abdulrahman Alenezi, Turki Alanazi, Abdulrahman Senyor, Naif Alanezi, Bandar Alotaibi, Munif Alotaibi, Abdul Razaque, Salim Hariri:
Deep learning for unmanned aerial vehicles detection: A review. Comput. Sci. Rev. 51: 100614 (2024) - [j38]Hari Mohan Rai, Joon Yoo, Abdul Razaque:
Comparative analysis of machine learning and deep learning models for improved cancer detection: A comprehensive review of recent advancements in diagnostic techniques. Expert Syst. Appl. 255: 124838 (2024) - [j37]Abdul Razaque, Meenhoon Khan, Joon Yoo, Aziz Alotaibi, Majid Alshammari, Muder Almiani:
Blockchain-enabled heterogeneous 6G supported secure vehicular management system over cloud edge computing. Internet Things 25: 101115 (2024) - 2023
- [j36]Abrar M. Alajlan, Abdul Razaque:
ESOA-HGRU: egret swarm optimization algorithm-based hybrid gated recurrent unit for classification of diabetic retinopathy. Artif. Intell. Rev. 56(S2): 1617-1646 (2023) - [j35]Brian Hildebrand, Mohamed Baza, Tara Salman, Simra Tabassum, Bharath Konatham, Fathi H. Amsaad, Abdul Razaque:
A comprehensive review on blockchains for Internet of Vehicles: Challenges and directions. Comput. Sci. Rev. 48: 100547 (2023) - [j34]Melaouene Noussaiba, Abdul Razaque, Rahal Romadi:
Heterogeneous Algorithm for Efficient-Path Detection and Congestion Avoidance for a Vehicular-Management System. Sensors 23(12): 5471 (2023) - [j33]Abdul Razaque, Gulnara Bektemyssova, Joon Yoo, Aziz Alotaibi, Mohsin Ali, Fathi Amsaad, Amanzholova Saule Toksanovna, Majid Alshammari:
Malicious Vehicle Detection Using Layer-Based Paradigm and the Internet of Things. Sensors 23(14): 6554 (2023) - [j32]Abdul Razaque, Joon Yoo, Gulnara Bektemyssova, Majid Alshammari, Tolganay T. Chinibayeva, Saule Amanzholova, Aziz Alotaibi, Dauren Umutkulov:
Efficient Internet-of-Things Cyberattack Depletion Using Blockchain-Enabled Software-Defined Networking and 6G Network Technology. Sensors 23(24): 9690 (2023) - [c43]Fathi Amsaad, P. L. Prasanna, T. Pravallika, G. Mamatha, B. Raviteja, M. Lakshmi, Nasser Alsaadi, Abdul Razaque, Yahya M. Tashtoush:
Toward Secure and Efficient CNN Recognition with Different Activation and Optimization Functions. ACR 2023: 550-568 - [c42]Vishnu Vardhan Baligodugula, Fathi Amsaad, Varshitha Vunnam Tadepalli, Vojjala Radhika, Yetukuri Sanjana, Sai Shiva, Supriya Meduri, Majdi Maabreh, Naser Alsaadi, Omar A. Darwish, Abdul Razaque, Yahya M. Tashtoush:
A Comparative Study of Secure and Efficient Data Duplication Mechanisms for Cloud-Based IoT Applications. ACR 2023: 569-586 - [c41]Mohsin Ali, Abdul Razaque, Damelya M. Yeskendirova, Talgat A. Nurlybayev, Nessibeli Y. Askarbekova, Zarina A. Kashaganova:
Enhancing Cloud Computing Security through AI-Based Intelligent Intrusion Detection Leveraging Neural Networks and Artificial Bee Colony Optimization. DTESI (workshops, short papers) 2023 - [c40]Meer J. Khan, Mohsin A. Farhad, Nurgul Nalgozhina, Abdul Razaque:
Enhanced Algorithm Blend and Turing for Improving Quality-of-Service of Multiple Datasets. DTESI (workshops, short papers) 2023 - [c39]Syed Atif Moqurrab, Abdul Razaque, Yersain Chinibayev, Tolganay Chinibayeva:
Binary Rainfall Classification using SMOTE: An Effective Machine Learning Strategy. DTESI (workshops, short papers) 2023 - [c38]Abdul Razaque, Saule Amanzholova, Azhar Sagymbekova, Aizhan Zaurbek:
Performance Comparison of Convolutional Neural Networks for Handwritten Digit Recognition Using Activation Functions and Optimization Methods. DTESI (workshops, short papers) 2023 - [c37]Abdul Razaque, Hari Mohan Rai, Yersain Chinibayev, Tolganay Chinibayeva:
Analysis of Major Factors Preventing Cybercrime Reduction in Kazakhstan. DTESI (workshops, short papers) 2023 - [c36]Kaustubh Kumar Shukla, Hari Mohan Rai, Abdul Razaque, Saule Amanzholova, Bagdat Kozhakhmetova:
Enhancing Gain and Bandwidth of Microstrip Antennas Through Optimized 3D Printing: A Study on Design and Implementation. DTESI (workshops, short papers) 2023 - 2022
- [j31]Abdul Razaque, Bandar Alotaibi, Munif Alotaibi, Fathi H. Amsaad, Ansagan Manasov, Salim Hariri, Banu B. Yergaliyeva, Aziz Alotaibi:
Blockchain-Enabled Deep Recurrent Neural Network Model for Clickbait Detection. IEEE Access 10: 3144-3163 (2022) - [j30]Vipin Kumar, Navneet Malik, Jimmy Singla, N. Z. Jhanjhi, Fathi Amsaad, Abdul Razaque:
Light Weight Authentication Scheme for Smart Home IoT Devices. Cryptogr. 6(3): 37 (2022) - [j29]Abdul Razaque, Yaser Jararweh, Bandar Alotaibi, Munif Alotaibi, Salim Hariri, Muder Almiani:
Energy-efficient and secure mobile fog-based cloud for the Internet of Things. Future Gener. Comput. Syst. 127: 1-13 (2022) - [j28]Abdul Razaque, Fathi H. Amsaad, Musbah Abdulgader, Bandar Alotaibi, Fawaz Alsolami, Duisen Gulsezim, Saraju P. Mohanty, Salim Hariri:
A Mobility-Aware Human-Centric Cyber-Physical System for Efficient and Secure Smart Healthcare. IEEE Internet Things J. 9(22): 22434-22452 (2022) - [j27]Abdul Razaque, Syed Rizvi, Meer Jaro Khan, Muder Almiani, Amer Al-Rahayfeh:
State-of-art review of information diffusion models and their impact on social network vulnerabilities. J. King Saud Univ. Comput. Inf. Sci. 34(1): 1275-1294 (2022) - [j26]Muder Almiani, Alia Abu Ghazleh, Yaser Jararweh, Abdul Razaque:
Resilient Back Propagation Neural Network Security Model For Containerized Cloud Computing. Simul. Model. Pract. Theory 118: 102544 (2022) - [j25]Abdul Razaque, Yaser Jararweh, Aziz Alotaibi, Fathi H. Amsaad, Bandar Alotaibi, Munif Alotaibi:
A blockchain-enabled framework for securing connected consumer electronics against wireless attacks. Simul. Model. Pract. Theory 121: 102652 (2022) - [j24]Abdul Razaque, Yaser Jararweh, Bandar Alotaibi, Munif Alotaibi, Muder Almiani:
Hybrid energy-efficient algorithm for efficient Internet of Things deployment. Sustain. Comput. Informatics Syst. 35: 100715 (2022) - [c35]Abdul Razaque, Saule Amanzholova, Amir Akimbayev, Emil Kovalenko, Dilnaz Ashimzhanova:
Development System of Application Security Testing. DTESI 2022 - [c34]Abdul Razaque, Saule Amanzholova, Azhar Sagymbekova, Shakirt Makilenov:
Control Frame Protection from Denial-of-Service Attacks during Handover Process. DTESI 2022 - [c33]Muder Almiani, Alia Abu Ghazleh, Yaser Jararweh, Abdul Razaque:
Intelligent Ensemble based System for Rare Attacks Dectection in IoT Networks. GLOBECOM 2022: 1990-1995 - [i14]Brian Hildebrand, Mohamed Baza, Tara Salman, Fathi Amsaad, Abdul Razaque, Abdullah Alourani:
A Comprehensive Review on Blockchains for Internet of Vehicles: Challenges and Directions. CoRR abs/2203.10708 (2022) - 2021
- [j23]Fathi H. Amsaad, Ahmed Oun, Mohammed Y. Niamat, Abdul Razaque, Selçuk Köse, Mohamed Mahmoud, Waleed Alasmary, Fawaz Alsolami:
Enhancing the Performance of Lightweight Configurable PUF for Robust IoT Hardware-Assisted Security. IEEE Access 9: 136792-136810 (2021) - [j22]Abdul Razaque, Moayad Aloqaily, Muder Almiani, Yaser Jararweh, Gautam Srivastava:
Efficient and reliable forensics using intelligent edge computing. Future Gener. Comput. Syst. 118: 230-239 (2021) - [j21]Muder Almiani, Alia Abu Ghazleh, Yaser Jararweh, Abdul Razaque:
DDoS detection in 5G-enabled IoT networks using deep Kalman backpropagation neural network. Int. J. Mach. Learn. Cybern. 12(11): 3337-3349 (2021) - [j20]Abdul Razaque, Mohamed Ben Haj Frej, Muder Almiani, Munif Alotaibi, Bandar Alotaibi:
Improved Support Vector Machine Enabled Radial Basis Function and Linear Variants for Remote Sensing Image Classification. Sensors 21(13): 4431 (2021) - [c32]Fathi H. Amsaad, Abdul Razaque, Mohamed Baza, Selçuk Köse, Sajal Bhatia, Gautam Srivastava:
An Efficient and Reliable Lightweight PUF for IoT-based Applications. ICC Workshops 2021: 1-6 - [c31]Abdul Razaque, Fathi H. Amsaad, Dipal Halder, Mohamed Baza, Abobakr Aboshgifa, Sajal Bhatia:
Analysis of Sentimental Behaviour over Social Data Using Machine Learning Algorithms. IEA/AIE (1) 2021: 396-412 - [c30]Abdul Razaque, Muder Almiani, Bandar Alotaibi, Munif Alotaibi, Mohammed Alweshah:
Novel File-Checksum Method for Data Duplication Removal of Patients. SDS 2021: 1-5 - [c29]Abdul Razaque, Vladislav Alexandrov, Muder Almiani, Bandar Alotaibi, Munif Alotaibi, Ayman Al-Dmour:
Comparative Analysis of Digital Signature and Elliptic Curve Digital Signature Algorithms for the Validation of QR Code Vulnerabilities. SDS 2021: 1-7 - 2020
- [j19]Abdul Razaque, Fathi H. Amsaad, Salim Hariri, Marwah Almasri, Syed S. Rizvi, Mohamed Ben Haj Frej:
Enhanced Grey Risk Assessment Model for Support of Cloud Service Provider. IEEE Access 8: 80812-80826 (2020) - [j18]Muder Almiani, Alia Abu Ghazleh, Amer Al-Rahayfeh, Abdul Razaque:
Cascaded hybrid intrusion detection model based on SOM and RBF neural networks. Concurr. Comput. Pract. Exp. 32(21) (2020) - [j17]Syed Rizvi, John E. Mitchell, Abdul Razaque, Mohammad Rizvi, Iyonna Williams:
A fuzzy inference system (FIS) to evaluate the security readiness of cloud service providers. J. Cloud Comput. 9: 42 (2020) - [j16]Muder Almiani, Alia Abu Ghazleh, Amer Al-Rahayfeh, Saleh Atiewi, Abdul Razaque:
Deep recurrent neural network for IoT intrusion detection system. Simul. Model. Pract. Theory 101: 102031 (2020) - [c28]Muder Almiani, Abdul Razaque, Shen Ziqi, Ge Yaqin, Saleh Atiewi, Mohammed Alweshah, Ayman Al-Dmour, Basel Magableh:
Android CompCache based on Graphics Processing Unit. SDS 2020: 89-94 - [c27]Abdul Razaque, Kalkamanova Kamila Myrzabekovna, Spanova Yerkezhan Magbatkyzy, Muder Almiani, Baktygulova Aray Doszhanovna, Awny Alnusair:
Secure Password-Driven Fingerprint Biometrics Authentication. SDS 2020: 95-99 - [c26]Abdul Razaque, Fathi H. Amsaad, Muder Almiani, Wan Xiaoya, Li Shiyu, Raouf M. Ganda, Majdi Rawashdeh, Amer Al-Rahayfeh:
Efficient Context-aware File System Approach. SDS 2020: 226-230 - [c25]Abdul Razaque, Fathi H. Amsaad, Muder Almiani, Duisen Gulsezim, Mohammad Adnan Almahamed, Ayman Al-Dmour, Meer Jaro Khan, Raouf M. Ganda:
Successes and Failures in Exploring Biometric Algorithms in NIST Open Source Software and Data. SDS 2020: 231-234
2010 – 2019
- 2019
- [j15]Abdul Razaque, Fathi H. Amsaad, Meer Jaro Khan, Salim Hariri, Shujing Chen, Chen Siting, Xingchen Ji:
Survey: Cybersecurity Vulnerabilities, Attacks and Solutions in the Medical Domain. IEEE Access 7: 168774-168797 (2019) - [c24]Muder Almiani, Abdul Razaque, Liu Yimu, Meer Jaro Khan, Tang Minjie, Mohammed Alweshah, Saleh Atiewi:
Bluetooth Application-Layer Packet-Filtering For Blueborne Attack Defending. FMEC 2019: 142-148 - [c23]Nurbek Tastan, Abdul Razaque, Mohamed Ben Haj Frej, Amanzholova Saule Toksanovna, Raouf M. Ganda, Fathi H. Amsaad:
Burglary Detection Framework for House Crime Control. ICCSA (7) 2019: 152-157 - [c22]Duisen Gulsezim, Seiitkaliyeva Zhansaya, Abdul Razaque, Yestayeva Ramina, Fathi H. Amsaad, Muder Almiani, Raouf M. Ganda, Ahmed Oun:
Two Factor Authentication using Twofish Encryption and Visual Cryptography Algorithms for Secure Data Communication. IoTSMS 2019: 405-411 - [c21]Abdul Razaque, Muder Almiani, Meer Jaro Khan, Basel Magableh, Ayman Al-Dmour, Amer Al-Rahayfeh:
Fuzzy-GRA Trust Model for Cloud Risk Management. SDS 2019: 179-185 - [c20]Alia Abu Ghazleh, Muder Almiani, Basel Magableh, Abdul Razaque:
Intelligent Intrusion Detection Using Radial Basis Function Neural Network. SDS 2019: 200-208 - [c19]Abdul Razaque, A. Kanapina, M. Sailaubek, Dana Tsoy, Z. Turganov, Muder Almiani, Fathi H. Amsaad, Mohammad Adnan Almahamed:
Pair Data Division Algorithm For Handling Data Classification. SNAMS 2019: 316-320 - 2018
- [j14]Muhammad Fahim Uddin, Syed Rizvi, Abdul Razaque:
Proposing Logical Table Constructs for Enhanced Machine Learning Process. IEEE Access 6: 47751-47769 (2018) - [j13]Sudha Narendrakumar, Abdul Razaque, Varil Patel, Muder Almiani, Syed Rizvi, Akshat Hans:
Token security for internet of things. Int. J. Embed. Syst. 10(4): 334-343 (2018) - [j12]Muder Almiani, Abdul Razaque, Toufik Aidja, Ayman Al-Dmour:
Context-aware latency reduction protocol for secure encryption and decryption. Int. J. High Perform. Comput. Netw. 12(3): 251-260 (2018) - [j11]Amer Al-Rahayfeh, Abdul Razaque, Yaser Jararweh, Muder Almiani:
Location-Based Lattice Mobility Model for Wireless Sensor Networks. Sensors 18(12): 4096 (2018) - [c18]Abdul Razaque, Yuxin Li, Qianqian Liu, Meer Jaro Khan, Ahmad Doulat, Muder Almiani, Ahmad Alflahat:
Enhanced Risk Minimization Framework for Cloud Computing Environment. AICCSA 2018: 1-7 - [c17]Abdul Razaque, Xihao Zhou, Liangjie Wei, Muder Almiani, Yaser Jararweh, Meer Jaro Khan:
Naïve Bayesian and Fuzzy C-Means Algorithm for Mobile Malware Detection Precision. IoTSMS 2018: 239-243 - [c16]Muder Almiani, Alia Abu Ghazleh, Amer Al-Rahayfeh, Abdul Razaque:
Intelligent intrusion detection system using clustered self organized map. SDS 2018: 138-144 - [c15]Liang Guo, Pu Du, Abdul Razaque, Muder Almiani, Amer Al-Rahayfeh:
Energy saving and maximize utilization cloud resources allocation via online multi-dimensional vector bin packing. SDS 2018: 160-165 - [c14]Abdul Razaque, Liu Yimu, Tang Minjie, Muder Almiani, Amer Al-Rahayfeh:
Distributed allocating algorithm based on cloud CPU scheme. SDS 2018: 166-175 - [c13]Syed Rizvi, Joseph Gualdoni, Abdul Razaque:
Securing Wireless Networks from Sinkhole and Sybil Attacks Using Secure Data Aggregation Protocol. TrustCom/BigDataSE 2018: 721-726 - 2017
- [j10]Abdul Razaque, Syed S. Rizvi, Meer J. Khan, Qassim B. Hani, Julius P. Dichter, Reza M. Parizi:
Secure and quality-of-service-supported service-oriented architecture for mobile cloud handoff process. Comput. Secur. 66: 169-184 (2017) - [j9]Abdul Razaque, Syed S. Rizvi:
Secure data aggregation using access control and authentication for wireless sensor networks. Comput. Secur. 70: 532-545 (2017) - [j8]Abdul Razaque, Syed S. Rizvi:
Privacy preserving model: a new scheme for auditing cloud stakeholders. J. Cloud Comput. 6: 7 (2017) - 2016
- [j7]Abdul Razaque, Syed S. Rizvi:
Triangular data privacy-preserving model for authenticating all key stakeholders in a cloud environment. Comput. Secur. 62: 328-347 (2016) - [j6]Muder Almiani, Abdul Razaque, Ayman Al-Dmour:
Privacy Preserving Framework to Support Mobile Government Services. Int. J. Inf. Technol. Web Eng. 11(3): 65-78 (2016) - [c12]Abdul Razaque, Fathi H. Amsaad, Musbah Abdulgader, Vijay Chand Mannava, Ibrahim Elwarfalli, Pavan Teja Kilari:
Automatic Tampering Detection Paradigm to Support Personal Health Record. CHASE 2016: 388-393 - [c11]Niraj, Ankit Trivedi, Abdul Razaque, Fathi H. Amsaad, Musbah Abdulgader:
Efficient allocation of slot using Medium Access Control protocol. EIT 2016: 105-110 - [c10]Abdul Razaque, Savitesh Jain, M. N. K. Sai Santosh Irrinki, Fathi H. Amsaad, Musbah Abdulgader, Niraj:
Simultaneous Priority and Detection based Carrier Sense Multiple Access protocol. EIT 2016: 111-116 - [c9]Abdul Razaque, Peter Oddo, Fathi H. Amsaad, Mohit Sangavikar, Sushil Manchikatla, Niraj:
Power reduction for Smart Homes in an Internet of Things framework. EIT 2016: 117-121 - [c8]Abdul Razaque, Prudhvi Sagar Sreeramoju, Fathi H. Amsaad, Chaitanya Kumar Nerella, Musbah Abdulgader, Harsha Saranu:
Multi-biometric system using Fuzzy Vault. EIT 2016: 122-126 - 2015
- [j5]Syed Rizvi, Kelsey Karpinski, Abdul Razaque:
Novel Architecture of Self-organized Mobile Wireless Sensor Networks. J. Comput. Sci. Eng. 9(4) (2015) - [j4]Abdul Razaque, Khaled M. Elleithy:
Modular Energy-Efficient and Robust Paradigms for a Disaster-Recovery Process over Wireless Sensor Networks. Sensors 15(7): 16162-16195 (2015) - [j3]Abdul Razaque, Khaled M. Elleithy:
Low Duty Cycle, Energy-Efficient and Mobility-Based Boarder Node - MAC Hybrid Protocol for Wireless Sensor Networks. J. Signal Process. Syst. 81(2): 265-284 (2015) - [c7]Syed Rizvi, Abdul Razaque, Katie Cover:
Third-Party Auditor (TPA): A Potential Solution for Securing a Cloud Environment. CSCloud 2015: 31-36 - [c6]Syed Rizvi, Abdul Razaque, Katie Cover:
Cloud Data Integrity Using a Designated Public Verifier. HPCC/CSS/ICESS 2015: 1361-1366 - 2014
- [j2]Abdul Razaque, Khaled M. Elleithy:
Energy-Efficient Boarder Node Medium Access Control Protocol for Wireless Sensor Networks. Sensors 14(3): 5074-5117 (2014) - [i13]Wafa Elmannai, Abdul Razaque, Khaled M. Elleithy:
Simulation based Study of TCP Variants in Hybrid Network. CoRR abs/1410.5127 (2014) - [i12]Abeer Alabass, Khaled M. Elleithy, Abdul Razaque:
Dynamic Cluster Head Node Election (DCHNE) Model over Wireless Sensor Networks (WSNs). CoRR abs/1410.5128 (2014) - [i11]Khaled M. Elleithy, Abdul Razaque:
Fostering of innovative usability testing to develop mobile application for mobile collaborative learning (MCL). CoRR abs/1410.5129 (2014) - 2013
- [c5]Abdul Razaque, Khaled M. Elleithy:
Least Distance Smart Neighboring Search (LDSNS) over Wireless Sensor Networks (WSNs). EMS 2013: 549-554 - [i10]Abdul Razaque, Khaled M. Elleithy:
Restoring the privacy and confidentiality of users over Mobile collaborative learning (MCL) environment. CoRR abs/1309.4499 (2013) - [i9]Abdul Razaque, Khaled M. Elleithy:
Automatic energy saving (AES) modelto boost ubiquitous wireless sensor networks (WSNs). CoRR abs/1309.4504 (2013) - [i8]Abdul Razaque, Khaled M. Elleithy:
Efficient Search (RES) for One-Hop Destination over Wireless Sensor Network. CoRR abs/1310.1129 (2013) - [i7]Fatma Almajadub, Eman Abdelfattah, Abdul Razaque:
Deployment of Stream Control Transmission Protocol (SCTP) to Maintain the Applications of Data Centers. CoRR abs/1311.2630 (2013) - [i6]Fatma Almajadub, Abdul Razaque, Eman Abdelfattah:
Stream Control Transmission Protocol (SCTP): Robust and Efficient for Data Centre Applications. CoRR abs/1312.0629 (2013) - 2012
- [j1]Abdul Razaque, Khaled M. Elleithy:
Interactive Prototypes to Foster Pedagogical Activities for Mobile Collaborative Learning Environment (MCLE). Int. J. Interact. Mob. Technol. 6(1): 16-24 (2012) - [c4]Abdul Razaque, Khaled M. Elleithy:
Detection of Attacks for Restoring Privacy of Users to Improve Mobile Collaborative Learning (MCL) over Heterogeneous Network. NDT (2) 2012: 201-216 - [c3]Abdul Razaque, Khaled M. Elleithy:
Automated Energy Saving (AES) Paradigm to Support Pedagogical Activities over Wireless Sensor Networks. UCAmI 2012: 512-519 - [i5]Abdul Razaque, Khaled M. Elleithy:
Discovery of Malicious Attacks to Improve Mobile Collaborative Learning (MCL). CoRR abs/1208.2073 (2012) - [i4]Marwah Almasri, Khaled M. Elleithy, Abdul Razaque:
Analytical Study of Pre-congestion notification (PCN) techniques. CoRR abs/1208.2314 (2012) - [i3]Abdul Razaque, Khaled M. Elleithy, Nyembo Salama:
Novel Framework for Mobile Collaborative learning (MCL)to substantiate pedagogical activities. CoRR abs/1210.2023 (2012) - [i2]Wafa Elmannai, Abdul Razaque, Khaled M. Elleithy:
TCP-UB: A New congestion aware transmission control protocolvariant. CoRR abs/1210.2025 (2012) - [i1]Abdul Razaque, Khaled M. Elleithy:
Multi-frame Signature-cum Anomaly-based Intrusion Detection Systems (MSAIDS) to Protect Privacy of Users over Mobile Collaborative Learning (MCL). CoRR abs/1210.2030 (2012) - 2011
- [c2]Kwang Lee, Abdul Razaque:
Suggested Collaborative Learning Conceptual Architecture and Applications for Mobile Devices. HCI (9) 2011: 611-620
2000 – 2009
- 2008
- [c1]Abdul Razaque, Khurram Shahzad, Muhammad Abdul Qadir:
Performance Evaluation of TCP Variants under Mobility Based Anchor Point Node (APN) Hybrid Network. CNSR 2008: 270-277
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-16 20:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint