default search action
Fazirulhisyam Hashim
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j66]Bilal Omar Akram, Nor Kamariah Noordin, Fazirulhisyam Hashim, Mohd Fadlee A. Rasid, Mustafa Ismael Salman, Abdulrahman M. Abdulghani:
Enhancing Reliability of Time-Triggered Traffic in Joint Scheduling and Routing Optimization Within Time-Sensitive Networks. IEEE Access 12: 78379-78396 (2024) - [j65]Mustafa Sabah Noori, Ratna Kalos Zakiah Sahbudin, Aduwati Sali, Fazirulhisyam Hashim:
Multi-Objective Multi-Exemplar Particle Swarm Optimization Algorithm With Local Awareness. IEEE Access 12: 125809-125834 (2024) - [j64]Sangin Qahtan Wali, Aduwati Sali, Darko Suka, Sam Aerts, Mohammed Alkuraysi, Lu Li, Alyani Ismail, Fazirulhisyam Hashim, Yasser A. Alsaidosh, Víctor P. Gil Jiménez, Manfred Ruttner, Anwar Faizd Osman:
An Assessment of Extrapolated Field Strengths Versus Distance, Measurement Time, and Induced Traffic From 5G Base Station in C-Band. IEEE Access 12: 130639-130653 (2024) - 2023
- [j63]Nnamdi Henry Umelo, Nor Kamariah Noordin, Mohd Fadlee A. Rasid, Kim Geok Tan, Fazirulhisyam Hashim:
Efficient Tag Grouping RFID Anti-Collision Algorithm for Internet of Things Applications Based on Improved K-Means Clustering. IEEE Access 11: 11102-11117 (2023) - [j62]Layth Muwafaq, Nor Kamariah Noordin, Mohamed Othman, Alyani Ismail, Fazirulhisyam Hashim:
Cloudlet Based Computing Optimization Using Variable-Length Whale Optimization and Differential Evolution. IEEE Access 11: 45098-45112 (2023) - [j61]Mustafa Sabah Noori, Ratna Kalos Zakiah Sahbudin, Aduwati Sali, Fazirulhisyam Hashim:
Feature Drift Aware for Intrusion Detection System Using Developed Variable Length Particle Swarm Optimization in Data Stream. IEEE Access 11: 128596-128617 (2023) - [j60]Bilal Omar Akram, Nor Kamariah Noordin, Fazirulhisyam Hashim, Mohd Fadlee A. Rasid, Mustafa Ismael Salman, Abdulrahman M. Abdulghani:
Joint Scheduling and Routing Optimization for Deterministic Hybrid Traffic in Time-Sensitive Networks Using Constraint Programming. IEEE Access 11: 142764-142779 (2023) - [j59]Isam Kareem Thajeel, Khairulmizam Samsudin, Shaiful Jahari Hashim, Fazirulhisyam Hashim:
Dynamic feature selection model for adaptive cross site scripting attack detection using developed multi-agent deep Q learning model. J. King Saud Univ. Comput. Inf. Sci. 35(6): 101490 (2023) - [j58]Isam Kareem Thajeel, Khairulmizam Samsudin, Shaiful Jahari Hashim, Fazirulhisyam Hashim:
Machine and Deep Learning-based XSS Detection Approaches: A Systematic Literature Review. J. King Saud Univ. Comput. Inf. Sci. 35(7): 101628 (2023) - [j57]Haqi Khalid, Shaiful Jahari Hashim, Fazirulhisyam Hashim, Sharifah Mumtazah Syed Ahmad, Muhammad Akmal Chaudhary, Hamza H. M. Altarturi, Muntadher Saadoon:
HOOPOE: High Performance and Efficient Anonymous Handover Authentication Protocol for Flying Out of Zone UAVs. IEEE Trans. Veh. Technol. 72(8): 10906-10920 (2023) - 2022
- [j56]Abeer A. Z. Ibrahim, Fazirulhisyam Hashim, Aduwati Sali, Nor Kamariah Noordin, Saber M. E. Fadul:
A Multi-Objective Routing Mechanism for Energy Management Optimization in SDN Multi-Control Architecture. IEEE Access 10: 20312-20327 (2022) - [j55]Khaled M. Shalghum, Nor Kamariah Noordin, Aduwati Sali, Fazirulhisyam Hashim:
Worst-Case Latency Analysis for AVB Traffic Under Overlapping-Based Time-Triggered Windows in Time-Sensitive Networks. IEEE Access 10: 43187-43208 (2022) - 2021
- [j54]Abeer A. Z. Ibrahim, Fazirulhisyam Hashim, Nor Kamariah Noordin, Aduwati Sali, Keivan Navaie, Saber M. E. Fadul:
Heuristic Resource Allocation Algorithm for Controller Placement in Multi-Control 5G Based on SDN/NFV Architecture. IEEE Access 9: 2602-2617 (2021) - [j53]Khaled M. Shalghum, Nor Kamariah Noordin, Aduwati Sali, Fazirulhisyam Hashim:
Critical Offset Optimizations for Overlapping-Based Time-Triggered Windows in Time-Sensitive Network. IEEE Access 9: 130484-130501 (2021) - [j52]Muntadher Alsabah, Marwah Abdulrazzaq Naser, Basheera M. Mahmmod, Sadiq H. Abdulhussain, Mohammad R. Eissa, Ahmed Al-Baidhani, Nor Kamariah Noordin, Sadiq M. Sait, Khaled Abdul-Aziz Al-Utaibi, Fazirulhisyam Hashim:
6G Wireless Communications Networks: A Comprehensive Survey. IEEE Access 9: 148191-148243 (2021) - [j51]Haqi Khalid, Shaiful Jahari Hashim, Sharifah Mumtazah Syed Ahmad, Fazirulhisyam Hashim, Muhammad Akmal Chaudhary:
A lightweight and secure online/offline cross-domain authentication scheme for VANET systems in Industrial IoT. PeerJ Comput. Sci. 7: e714 (2021) - [j50]Haqi Khalid, Shaiful Jahari Hashim, Sharifah Mumtazah Syed Ahmad, Fazirulhisyam Hashim, Muhammad Akmal Chaudhary:
SELAMAT: A New Secure and Lightweight Multi-Factor Authentication Scheme for Cross-Platform Industrial IoT Systems. Sensors 21(4): 1428 (2021) - [c37]Abeer A. Z. Ibrahim, Fazirulhisyam Hashim, Aduwati Sali, Nor Kamariah Noordin, Saber M. E. Fadul:
A Modified Genetic Algorithm for Controller Placement Problem in SDN Distributed Network. APCC 2021: 83-88 - [c36]I. H. Usman, N. K. Nordin, E. E. Omizegba, Aduwati Sali, Mohd Fadlee A. Rasid, Fazirulhisyam Hashim:
Performance Analyses of Adaptive Handover Decision Algorithm using Spectrum Aggregation in Long Term Evolution - Advanced Network. APCC 2021: 292-297 - [c35]Jiun Terng Liew, Aduwati Sali, Nor Kamariah Noordin, Borhanuddin Mohd Ali, Fazirulhisyam Hashim, Syamsiah Mashohor, Nur Luqman Saleh, Yacine Ouzrout, Aicha Sekhari:
Sustainable Peatland Management with IoT and Data Analytics. PRO-VE 2021: 549-557 - 2020
- [j49]Ziaur Rahman, Fazirulhisyam Hashim, Mohd Fadlee A. Rasid, Mohamed Othman, Kamal Ali Alezabi:
Normalized Advancement Based Totally Opportunistic Routing Algorithm With Void Detection and Avoiding Mechanism for Underwater Wireless Sensor Network. IEEE Access 8: 67484-67500 (2020) - [j48]Zuhura J. Ali, Nor Kamariah Noordin, Aduwati Sali, Fazirulhisyam Hashim:
Fair Energy-Efficient Resource Allocation for Downlink NOMA Heterogeneous Networks. IEEE Access 8: 200129-200145 (2020) - [j47]Kamal Ali Alezabi, Fazirulhisyam Hashim, Shaiful J. Hashim, Borhanuddin Mohd Ali, Abbas Jamalipour:
Efficient authentication and re-authentication protocols for 4G/5G heterogeneous networks. EURASIP J. Wirel. Commun. Netw. 2020(1): 105 (2020) - [j46]Abdulraqeb Alhammadi, Fazirulhisyam Hashim, Mohd Fadlee A. Rasid, Saddam Alraih:
A three-dimensional pattern recognition localization system based on a Bayesian graphical model. Int. J. Distributed Sens. Networks 16(9): 155014771988489 (2020) - [j45]Haafizah Rameeza Shaukat, Fazirulhisyam Hashim, Muhammad Arslan Shaukat, Kamal Ali Alezabi:
Hybrid Multi-Level Detection and Mitigation of Clone Attacks in Mobile Wireless Sensor Network (MWSN). Sensors 20(8): 2283 (2020)
2010 – 2019
- 2019
- [j44]Chukwuemena Cyprian Amadi, Bukhari Ujang, Aduwati Sali, Fazirulhisyam Hashim:
Collaborative Adaptive Filtering Approach for the Identification of Complex-Valued Improper Signals. Circuits Syst. Signal Process. 38(8): 3860-3879 (2019) - [j43]Mohammed Al-Medhwahi, Fazirulhisyam Hashim, Borhanuddin Mohd Ali, Aduwati Sali, Abdulsalam Alkholidi:
Resource allocation in heterogeneous cognitive radio sensor networks. Int. J. Distributed Sens. Networks 15(7) (2019) - [j42]Jiun Terng Liew, Fazirulhisyam Hashim, Aduwati Sali, Mohd Fadlee A. Rasid, Abbas Jamalipour:
Probability-based opportunity dynamic adaptation (PODA) of contention window for home M2M networks. J. Netw. Comput. Appl. 144: 1-12 (2019) - [j41]Zahraa Raad Mayoof Hajiyat, Aduwati Sali, Makhfudzah Mokhtar, Fazirulhisyam Hashim:
Channel Coding Scheme for 5G Mobile Communication System for Short Length Message Transmission. Wirel. Pers. Commun. 106(2): 377-400 (2019) - [c34]Jiun Terng Liew, Fazirulhisyam Hashim, Aduwati Sali, Mohd Fadlee A. Rasid, Kanapathippillai Cumanan:
Performance Evaluation of Backoff Misbehaviour in IEEE 802.11ah Using Evolutionary Game Theory. VTC Spring 2019: 1-7 - [c33]Abdulraqeb Alhammadi, Saddam Alraih, Fazirulhisyam Hashim, Mohd Fadlee A. Rasid:
Robust 3D Indoor Positioning System Based on Radio Map Using Bayesian Network. WF-IoT 2019: 107-110 - 2018
- [j40]Akram A. Almohammedi, Nor Kamariah Noordin, Aduwati Sali, Fazirulhisyam Hashim, Mohammed Balfaqih:
An Adaptive Multi-Channel Assignment and Coordination Scheme for IEEE 802.11P/1609.4 in Vehicular Ad-Hoc Networks. IEEE Access 6: 2781-2802 (2018) - [j39]Mas Haslinda Mohamad, Aduwati Sali, Fazirulhisyam Hashim, Rosdiadee Nordin, Osamu Takyu:
Clustering Transmission Opportunity Length (CTOL) Model over Cognitive Radio Network. Sensors 18(12): 4351 (2018) - [j38]Mohammed Al-Medhwahi, Fazirulhisyam Hashim, Borhanuddin Mohd Ali, Aduwati Sali:
Impact of Packet Size in Adaptive Cognitive Radio Sensor Network. Wirel. Commun. Mob. Comput. 2018: 3051204:1-3051204:9 (2018) - [j37]Samer A. B. Awwad, Nor Kamariah Noordin, Borhanuddin Mohd Ali, Fazirulhisyam Hashim, Nurul Halimatul Asmak Ismail:
6LoWPAN Route-Over with End-to-End Fragmentation and Reassembly Using Cross-Layer Adaptive Backoff Exponent. Wirel. Pers. Commun. 98(1): 1029-1053 (2018) - [j36]Emad Hmood Salman, Nor Kamariah Noordin, Shaiful J. Hashim, Fazirulhisyam Hashim, Ng Chee Kyun:
An Analysis of Periodogram Based on a Discrete Cosine Transform for Spectrum Sensing. Wirel. Pers. Commun. 101(3): 1261-1279 (2018) - [j35]Li Suet Mok, Nor Kamariah Noordin, Aduwati Sali, Fazirulhisyam Hashim, Chee Kyun Ng:
Low Complexity Iterative-QR (IQR) Precoder Design Based on Structure Blocks for Massive MIMO System. Wirel. Pers. Commun. 102(1): 19-30 (2018) - 2017
- [j34]Stefano Bregni, Andrzej Jajszczyk, Fazirulhisyam Hashim, Aduwati Sali, Ayman A. El-Saleh, W. Nurdiana, K. Anuar, K. Abdullah, Mohamad Yusoff Alias, Mardeni Roslee, Nordin Bin Ramli, Hafizal Mohamad, Borhanuddin Mohd Ali, Mahamod Ismail, Gonzalo Seco-Granados, Jari Nurmi, José A. Lopez-Salcedo, Elena Simona Lohan:
Global Communications Newsletter. IEEE Commun. Mag. 55(1): 13-16 (2017) - [j33]Aduwati Sali, Fazirulhisyam Hashim, Chee Yen Leow, Nur Idora Abdul Razak, Hafizal Mohamad, Sara Abou Chakra, César Vargas Rosales, Rafaela Villalpando Hernandez:
Global Communications Newsletter. IEEE Commun. Mag. 55(10): 7-9 (2017) - [j32]Noor Alsaedi, Fazirulhisyam Hashim, Aduwati Sali, Fakhrul Zaman Rokhani:
Detecting sybil attacks in clustered wireless sensor networks based on energy trust system (ETS). Comput. Commun. 110: 75-82 (2017) - [j31]Aida Al-Samawi, Aduwati Sali, Liyth Nissirat, Nor Kamariah Noordin, Mohamed Othman, Fazirulhisyam Hashim:
Wireless network power optimisation using relay stations blossoming and withering technique. Trans. Emerg. Telecommun. Technol. 28(3) (2017) - [j30]Kamal Ali Alezabi, Fazirulhisyam Hashim, Shaiful J. Hashim, Borhanuddin Mohd Ali, Abbas Jamalipour:
On the authentication and re-authentication protocols in LTE-WLAN interworking architecture. Trans. Emerg. Telecommun. Technol. 28(4) (2017) - [j29]Sura Khalil Abd, Syed Abdul Rahman Al-Haddad, Fazirulhisyam Hashim, Azizol B. H. J. Abdullah, Salman Yussof:
An effective approach for managing power consumption in cloud computing infrastructure. J. Comput. Sci. 21: 349-360 (2017) - [j28]Emad Hmood Salman, Nor Kamariah Noordin, Shaiful Jahari Hashim, Fazirulhisyam Hashim, Chee Kyun Ng:
An overview of spectrum sensing techniques for cognitive LTE and LTE-A radio systems. Telecommun. Syst. 65(2): 215-228 (2017) - [j27]Muayad Khalil Murtadha, Nor Kamariah Noordin, Borhanuddin Mohd Ali, Fazirulhisyam Hashim:
Design and simulation analysis of network-based fully distributed mobility management in flattened network architecture. Telecommun. Syst. 65(2): 253-267 (2017) - [j26]Emad Hmood Salman, Nor Kamariah Noordin, Shaiful Jahari Hashim, Fazirulhisyam Hashim, Chee Kyun Ng:
Erratum to: An overview of spectrum sensing techniques for cognitive LTE and LTE-A radio systems. Telecommun. Syst. 65(2): 339 (2017) - [j25]Aida Al-Samawi, Aduwati Sali, Nor Kamariah Noordin, Mohamed Othman, Fazirulhisyam Hashim, Mahdi Nisirat:
Feasibility of Green Network Deployment for Heterogeneous Networks. Wirel. Pers. Commun. 94(3): 1443-1476 (2017) - [j24]Meysam Nasimi, Fazirulhisyam Hashim, Aduwati Sali, Ratna Kalos Zakiah Sahbudin:
QoE-Driven Cross-Layer Downlink Scheduling for Heterogeneous Traffics Over 4G Networks. Wirel. Pers. Commun. 96(3): 4755-4780 (2017) - [c32]Abdulraqeb Alhammadi, Fazirulhisyam Hashim, Mohd Fadlee A. Rasid, Saddam Alraih:
Analysis of Impact of RSS over Different Time Durations in an Indoor Localization System. ICCSA (5) 2017: 200-211 - [c31]Sura Khalil Abd, Syed Abdul Rahman Al-Haddad, Fazirulhisyam Hashim, Azizol B. H. J. Abdullah, Salman Yussof:
Energy-Aware Fault Tolerant Task offloading of Mobile Cloud Computing. MobileCloud 2017: 161-164 - 2016
- [j23]Ali Raed Faisal, Fazirulhisyam Hashim, Nor Kamariah Noordin, Mahamod Ismail, Abbas Jamalipour:
Efficient beamforming and spectral efficiency maximization in a joint transmission system using an adaptive particle swarm optimization algorithm. Appl. Soft Comput. 49: 759-769 (2016) - [j22]Mahmoud Sami, Nor Kamariah Noordin, Mehdi Khabazian, Fazirulhisyam Hashim, Shamala Subramaniam:
A Survey and Taxonomy on Medium Access Control Strategies for Cooperative Communication in Wireless Networks: Research Issues and Challenges. IEEE Commun. Surv. Tutorials 18(4): 2493-2521 (2016) - [j21]Mohammed Aliyu Gadam, Chee Kyun Ng, Nor Kamariah Noordin, Aduwati Sali, Fazirulhisyam Hashim:
Hybrid channel gain prioritized access-aware cell association with interference mitigation in LTE-Advanced HetNets. Int. J. Commun. Syst. 29(18): 2650-2668 (2016) - [j20]Muayad Khalil Murtadha, Nor Kamariah Noordin, Borhanuddin Mohd Ali, Fazirulhisyam Hashim:
A comprehensive simulation study of a network-based distributed mobility management framework. Int. J. Wirel. Mob. Comput. 11(1): 24-32 (2016) - [j19]Mohammed Aliyu Gadam, Maryam Abdulazeez Ahmed, Chee Kyun Ng, Nor Kamariah Noordin, Aduwati Sali, Fazirulhisyam Hashim:
Review of Adaptive Cell Selection Techniques in LTE-Advanced Heterogeneous Networks. J. Comput. Networks Commun. 2016: 7394136:1-7394136:12 (2016) - [j18]Kamal Ali Alezabi, Fazirulhisyam Hashim, Shaiful Jahari Hashim, Borhanuddin Mohd Ali, Abbas Jamalipour:
Authentication process enhancements in WiMAX networks. Secur. Commun. Networks 9(17): 4703-4725 (2016) - [j17]Raja Syamsul Azmir Raja Abdullah, Noor Hafizah Abdul Aziz, Nur Emileen Abd Rashid, Asem A. Salah, Fazirulhisyam Hashim:
Analysis on Target Detection and Classification in LTE Based Passive Forward Scattering Radar. Sensors 16(10): 1607 (2016) - [c30]Mohammed Al-Medhwahi, Fazirulhisyam Hashim, Borhanuddin Mohd Ali, Aduwati Sali:
Medium access prioritizing in the heterogeneous low-rate wireless PANs. ISTT 2016: 35-40 - [c29]Havzhin Iranpanah, Borhanuddin Mohd Ali, Fazirulhisyam Hashim, Hafizal Mohamad:
Distributed power control and beamforming for cognitive two-way relay networks using a game-theoretic approach. ISTT 2016: 81-86 - [c28]Emad Hmood Salman, Nor Kamariah Noordin, Shaiful Jahari Hashim, Fazirulhisyam Hashim:
A new cooperative spectrum sensing scheme based on discrete cosine transform. ISTT 2016: 108-111 - 2015
- [j16]Maryam Tanha, Fazirulhisyam Hashim, Shamala Subramaniam:
Secure and Self-healing Control Centers of Critical Infrastructures using Intrusion Tolerance. Int. J. Netw. Secur. 17(4): 365-382 (2015) - [j15]Mahmoud Sami, Nor Kamariah Noordin, Fazirulhysiam Hashim, Shamala Subramaniam, Ayyoub Akbari-Moghanjoughi:
An Energy-Aware Cross-Layer Cooperative MAC Protocol for Wireless Ad Hoc Networks. J. Netw. Comput. Appl. 58: 227-240 (2015) - [j14]Muayad Khalil Murtadha, Nor Kamariah Noordin, Borhanuddin Mohd Ali, Fazirulhisyam Hashim:
Design and evaluation of distributed and dynamic mobility management approach based on PMIPv6 and MIH protocols. Wirel. Networks 21(8): 2747-2763 (2015) - [j13]Muntadher Qasim Abdulhasan, Mustafa Ismael Salman, Chee Kyun Ng, Nor Kamariah Noordin, Shaiful Jahari Hashim, Fazirulhisham Hashim:
An Adaptive Threshold Feedback Compression Scheme Based on Channel Quality Indicator (CQI) in Long Term Evolution (LTE) System. Wirel. Pers. Commun. 82(4): 2323-2349 (2015) - [j12]Seyed Dawood Sajjadi Torshizi, Fazirulhisyam Hashim, Kae Hsiang Kwong, David Chieng, Seh Chun Ng, Maryam Tanha:
An Adaptive Rate Allocation System to Mitigate Starvation Dilemma in Multi-Radio Multi-Hop Wireless Mesh Networks. Wirel. Pers. Commun. 84(4): 2881-2912 (2015) - [c27]Haydar Imad Mohammed, Fazirulhisyam Hashim, Bukhari Che Ujang:
Modeling of widely-linear quaternion valued systems using hypercomplex algorithms. ASCC 2015: 1-6 - 2014
- [j11]Haafizah Rameeza Shaukat, Fazirulhisyam Hashim, Aduwati Sali, Mohd Fadlee Abdul Rasid:
Node Replication Attacks in Mobile Wireless Sensor Network: A Survey. Int. J. Distributed Sens. Networks 10 (2014) - [j10]Muntadher Qasim Abdulhasan, Mustafa Ismael Salman, Chee Kyun Ng, Nor Kamariah Noordin, Shaiful J. Hashim, Fazirulhisham Hashim:
Review of Channel Quality Indicator Estimation Schemes for Multi-User MIMO in 3GPP LTE/LTE-A Systems. KSII Trans. Internet Inf. Syst. 8(6): 1848-1868 (2014) - [j9]Abbas Mehdizadeh, Fazirulhisyam Hashim, Mohamed Othman:
Lightweight decentralized multicast-unicast key management method in wireless IPv6 networks. J. Netw. Comput. Appl. 42: 59-69 (2014) - [j8]Abbas Mehdizadeh, Fazirulhisyam Hashim, Raja Syamsul Azmir Raja Abdullah, Borhanuddin Mohd Ali, Mohamed Othman, Sabira Khatun:
Multicast-Unicast Data Delivery Method in Wireless IPv6 Networks. J. Netw. Syst. Manag. 22(4): 583-608 (2014) - [j7]Osamah L. Barakat, Shaiful J. Hashim, Raja Syamsul Azmir Raja Abdullah, Abdul Rahman Ramli, Fazirulhisyam Hashim, Khairulmizam Samsudin, Mahmud Ab Rahman:
Malware analysis performance enhancement using cloud computing. J. Comput. Virol. Hacking Tech. 10(1): 1-10 (2014) - [j6]Abbas Mehdizadeh, Fazirulhisyam Hashim, Raja Syamsul Azmir Raja Abdullah, Borhanuddin Mohd Ali:
Performance Evaluation of Cost-Effective Multicast-Unicast Key Management Method. Wirel. Pers. Commun. 77(3): 2195-2212 (2014) - [c26]Abbas Mehdizadeh, Fazirulhisyam Hashim:
Multicast-unicast key management scheme in IPv6 networks. ICC Workshops 2014: 349-354 - [c25]Sura Khalil Abd, Syed Abdul Rahman Al-Haddad, Fazirulhisyam Hashim, Azizol Abdullah:
A review of cloud security based on cryptographic mechanisms. ISBAST 2014: 106-111 - [c24]Muntadher Qasim Abdulhasan, Mustafa Ismael Salman, Chee Kyun Ng, Nor Kamariah Noordin, Shaiful Jahari Hashim, Fazirulhisham Bin Hashim:
A channel quality indicator (CQI) prediction scheme using feed forward neural network (FF-NN) technique for MU-MIMO LTE system. ISTT 2014: 17-22 - [c23]Aida Al-Samawi, Aduwati Sali, Nor Kamariah Noordin, Mohamed Othman, Fazirulhisyam Hashim:
Base station blossoming and withering technique for heterogeneous wireless networks using fuzzy logic. ISTT 2014: 93-97 - [c22]Arslan Musaddiq, Fazirulhisyam Hashim:
Distributed channel assignment based on congestion information in wireless mesh network. ISTT 2014: 373-378 - [c21]Jiun Terng Liew, Fazirulhisyam Hashim:
Performance analysis of Coordinated MultiPoint (CoMP) in long term evolution-advanced. ISTT 2014: 379-384 - [c20]Zeyad Ghaleb Al-Mekhlafi, Zurina Mohd Hanapi, Mohamed Othman, Zuriati Ahmad Zukarnain, Fazirulhisyam Hashim, Ahmed M. Shamsan Saleh:
Impact of the Deafness Problem on Clock Synchronization in a Wireless Sensor Network. MEDES 2014: 127-132 - 2013
- [j5]Abbas Mehdizadeh, Raja Syamsul Azmir Raja Abdullah, Fazirulhisyam Hashim, Borhanuddin Mohd Ali, Mohamed Othman, Sabira Khatun:
Reliable Key Management and Data Delivery Method in Multicast Over Wireless IPv6 Networks. Wirel. Pers. Commun. 73(3): 967-991 (2013) - [c19]Samer A. B. Awwad, Chee Kyun Ng, Nor Kamariah Noordin, Borhanuddin Mohd Ali, Fazirulhisyam Hashim:
Second and subsequent fragments headers compression scheme for IPv6 header in 6LoWPAN network. ICST 2013: 771-776 - [c18]M. Ranjbari, Aduwati Sali, H. Abdul Karim, Fazirulhisyam Hashim:
Depth error concealment based on decision making. ICSIPA 2013: 193-196 - [c17]Aida Al-Samawi, Aduwati Sali, Nor Kamariah Noordin, Mohamed Othman, Fazirulhisyam Hashim:
Base station location optimisation in LTE using Genetic Algorithm. ICTC 2013: 336-341 - [c16]Seyed Dawood Sajjadi Torshizi, Kae Hsiang Kwong, David Chieng, Seh Chun Ng, Fazirulhisyam Hashim:
Elastic fair Rate Allocation Scheme for Multi-Radio Wireless Mesh Networks. PIMRC 2013: 2695-2700 - [c15]Seyed Dawood Sajjadi Torshizi, Sadra Mohammadalian, Fazirulhisyam Hashim, Subramaniam Shamala:
FLAME: A Flexible and Low-Power Architecture for Wireless Mesh Networks. QSHINE 2013: 171-184 - 2012
- [j4]Fazirulhisyam Hashim, Kumudu S. Munasinghe, Abbas Jamalipour:
On the negative selection and the danger theory inspired security for heterogeneous networks. IEEE Wirel. Commun. 19(3): 74-84 (2012) - [c14]Maryam Tanha, Seyed Dawood Sajjadi Torshizi, Mohd Taufik Abdullah, Fazirulhisyam Hashim:
An overview of attacks against digital watermarking and their respective countermeasures. CyberSec 2012: 265-270 - [c13]Maryam Tanha, Fazirulhisyam Hashim:
An intrusion tolerant system for improving availability in smart grid control centers. ICON 2012: 434-440 - [c12]Abbas Mehdizadeh, Fazirulhisyam Hashim:
Modeling of efficient key management method in multicast networks. ICSPCS 2012: 1-5 - [c11]Seyed Dawood Sajjadi Torshizi, Ka Kien Lo, Kae Hsiang Kwong, Alvin Ting, Mazlan Abbas, Fazirulhisyam Hashim, Heng Siong Lim:
An investigation of vegetation effect on the performance of IEEE 802.11n technology at 5.18 GHz. ICWCA 2012: 1-6 - [c10]Maryam Tanha, Fazirulhisyam Hashim:
Towards a Secure and Available Smart Grid Using Intrusion Tolerance. IDCS 2012: 188-201 - [c9]Abbas Mehdizadeh, Raja Syamsul Azmir Raja Abdullah, Fazirulhisyam Hashim:
Secure group communication scheme in wireless IPv6 networks: An experimental test-bed. ISCIT 2012: 724-729 - [i1]Maryam Tanha, Fazirulhisyam Hashim, S. Shamalab, Khairulmizam Samsudin:
Highly Available Smart Grid Control Centers through Intrusion Tolerance. CoRR abs/1209.6228 (2012) - 2011
- [j3]Fazirulhisyam Hashim, Abbas Jamalipour:
A generic sampling framework for improving anomaly detection in the next generation network. Secur. Commun. Networks 4(8): 919-936 (2011) - [c8]Farhad Mesrinejad, Fazirulhisyam Hashim, Nor Kamariah Noordin, Mohd Fadlee A. Rasid, Raja Syamsul Azmir Raja Abdullah:
The effect of fragmentation and header compression on IP-based sensor networks (6LoWPAN). APCC 2011: 845-849 - [c7]Farshad Arvin, Huda A. Majid, Shaiful Jahari Hashim, Raja Syamsul Azmir Raja Abdullah, A. M. Ali, Mohd Fadlee A. Rasid, Aduwati Sali, Alyani Ismail, Fazirulhisyam Hashim:
Effects of emission from different UWB short-range communication devices. APCC 2011: 875-879 - [c6]Abbas Mehdizadeh, Fazirulhisyam Hashim, Raja Syamsul Azmir Raja Abdullah, Borhanuddin Mohd Ali, Mohamed Othman:
Quality-improved and secure multicast delivery method in mobile IPv6 networks. ISCC 2011: 538-543 - 2010
- [j2]Fazirulhisyam Hashim, Kumudu S. Munasinghe, Abbas Jamalipour:
Biologically Inspired Anomaly Detection and Security Control Frameworks for Complex Heterogeneous Networks. IEEE Trans. Netw. Serv. Manag. 7(4): 268-281 (2010) - [c5]Fazirulhisyam Hashim, Kumudu S. Munasinghe, Abbas Jamalipour:
A Biologically Inspired Framework for Mitigating Epidemic and Pandemic Attacks in the NGMN. WCNC 2010: 1-6
2000 – 2009
- 2009
- [c4]Fazirulhisyam Hashim, Abbas Jamalipour:
Forecasting-Based Sampling Decision for Accurate and Scalable Anomaly Detection. GLOBECOM 2009: 1-6 - [c3]Fazirulhisyam Hashim, Abbas Jamalipour:
On Accurate and Scalable Anomaly Detection in Next Generation Mobile Network. ICC 2009: 1-5 - 2008
- [j1]Fazirulhisyam Hashim, M. Rubaiyat Kibria, Abbas Jamalipour:
Securing the next generation mobile network. Secur. Commun. Networks 1(1): 25-43 (2008) - [c2]Fazirulhisyam Hashim, M. Rubaiyat Kibria, Abbas Jamalipour:
A Detection and Recovery Architecture Against DoS and Worm Attacks in NGMN. ICC 2008: 1675-1679 - 2005
- [c1]R. Badlishah Ahmad, Fazirulhisyam Hashim, Borhanuddin Mohd Ali, Nor Kamariah Noordin:
Local Connectivity Scheme Analysis in Ad hoc On-demand Distance Vector (AODV) Routing Protocol. CITA 2005: 57-62
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint