A qualitative comparison of different logical topologies for wireless sensor networks Q Mamun Sensors 12 (11), 14887-14913, 2012 | 181 | 2012 |
Lightweight cryptography in IoT networks: A survey M Rana, Q Mamun, R Islam Future Generation Computer Systems 129, 77-89, 2022 | 113 | 2022 |
COSEN: A chain oriented sensor network for efficient data collection N Tabassum, Q Ehsanul, K Mamun, Y Urano Third International Conference on Information Technology: New Generations …, 2006 | 106 | 2006 |
Detecting SQL injection attacks using SNORT IDS H Alnabulsi, MR Islam, Q Mamun Asia-Pacific World Congress on Computer Science and Engineering, 1-7, 2014 | 69 | 2014 |
Modified bully algorithm for electing coordinator in distributed systems. QEK Mamun, SM Masum, MAR Mustafa WSEAS Transactions on Computers 3 (4), 948-953, 2004 | 36 | 2004 |
A new token based protocol for group mutual exclusion in distributed systems QEK Mamun, H Nakazato 2006 Fifth International Symposium on Parallel and Distributed Computing, 34-41, 2006 | 23 | 2006 |
Current lightweight cryptography protocols in smart city IoT networks: a survey M Rana, Q Mamun, R Islam arXiv preprint arXiv:2010.00852, 2020 | 17 | 2020 |
Anomaly detection in wireless sensor networks Q Mamun, MDR Islam, M Kaosar Journal of Networks 9 (11), 2914-2924, 2014 | 17 | 2014 |
Selecting member nodes in a chain oriented WSN Q Mamun, S Ramakrishnan, B Srinivasan 2010 IEEE Wireless Communication and Networking Conference, 1-6, 2010 | 16 | 2010 |
An efficient particle swarm intelligence based strategy to generate optimum test data in t-way testing K Rabbi, Q Mamun, MDR Islam 2015 IEEE 10th Conference on Industrial Electronics and Applications (ICIEA …, 2015 | 15 | 2015 |
A chain oriented data collection protocol for energy-aware and delay-constrained wsn N Tabassum, QEK Mamun, AAKM Haque, Y Urano African Journal of Information & Communication Technology 2 (3), 2006 | 14 | 2006 |
A privacy-preserving framework for personally controlled electronic health record (PCEHR) system M Begum, Q Mamun, M Kaosar SRI Security Research Institute, Edith Cowan University, Perth, Western …, 2013 | 11 | 2013 |
Data cleansing during data collection from wireless sensor networks MZ Islam, Q Mamun, MG Rahman Proceedings of the twelfth Australasian data mining conference (AusDM 2014) 11, 2014 | 10 | 2014 |
A tessellation-based localized chain construction scheme for chain-oriented sensor networks Q Mamun IEEE Sensors Journal 13 (7), 2648-2658, 2013 | 10 | 2013 |
An Efficient Localized Chain Construction Scheme for Chain Oriented Wireless Sensor Networks Q Mamun, S Ramakrishnan, B Srinivasan IEEE 10th International Symposium on Autonomous Decentralized System (ISADS …, 2011 | 10 | 2011 |
Timestamp based optimistic concurrency control QEK Mamun, H Nakazato TENCON 2005-2005 IEEE Region 10 Conference, 1-5, 2005 | 10 | 2005 |
A coverage-based scheduling algorithm for WSNs Q Mamun International journal of wireless information networks 21, 48-57, 2014 | 9 | 2014 |
SecCOSEn–a key management scheme for securing chain oriented sensor networks QEK Mamun, S Ramakrishnan 6th Annual Communication Networks and Services Research Conference (CNSR …, 2008 | 9 | 2008 |
An S-box design using irreducible polynomial with affine transformation for lightweight cipher M Rana, Q Mamun, R Islam Quality, Reliability, Security and Robustness in Heterogeneous Systems: 17th …, 2021 | 8 | 2021 |
Multi-chain oriented logical topology for wireless sensor networks Q Mamun, S Ramakrishnan, B Srinivasan 2010 2nd International Conference on Computer Engineering and Technology 2 …, 2010 | 7 | 2010 |