EAACK?? A Secure Intrusion Detection System for MANETs E Shakshuki, N Kang, T Sheltami IEEE Transactions on Industrial Electronics 60 (3), 1089-1098,, 2013 | 545 | 2013 |
Detecting misbehaving nodes in MANETs N Kang, EM Shakshuki, TR Sheltami Proceedings of the 12th international conference on information integration …, 2010 | 153 | 2010 |
Video transmission enhancement in presence of misbehaving nodes in MANETs T Sheltami, A Al-Roubaiey, E Shakshuki, A Mahmoud Multimedia systems 15, 273-282, 2009 | 137 | 2009 |
Blockchain for 5G: Opportunities and challenges A Chaer, K Salah, C Lima, PP Ray, T Sheltami 2019 IEEE Globecom Workshops (GC Wkshps), 1-6, 2019 | 135 | 2019 |
RTSP: An Accurate and Energy-Efficient Protocol for Clock Synchronization in WSNs M Akhlaq, TR Sheltami IEEE Transactions on Instrumentation and Measurement 62 (3), 578-589, 2013 | 123 | 2013 |
Mobility prediction in mobile ad hoc networks using extreme learning machines L Ghouti, TR Sheltami, KS Alutaibi Procedia Computer Science 19, 305-312, 2013 | 118 | 2013 |
A review of techniques and technologies for sand and dust storm detection M Akhlaq, TR Sheltami, HT Mouftah Reviews in Environmental Science and Biotechnology 11 (3), 305-322, 2012 | 113 | 2012 |
Detecting forged acknowledgements in MANETs N Kang, EM Shakshuki, TR Sheltami 2011 IEEE International Conference on Advanced Information Networking and …, 2011 | 107 | 2011 |
DV-maxHop: A fast and accurate range-free localization algorithm for anisotropic wireless networks F Shahzad, TR Sheltami, EM Shakshuki IEEE Transactions on Mobile Computing 16 (9), 2494-2505, 2016 | 104 | 2016 |
Support vector machines framework for predicting the PVT properties of crude-oil systems E El-Sebakhy, T Sheltami, S Al-Bokhitan, Y Shaaban, I Raharja, ... SPE Middle East oil and gas show and conference, SPE-105698-MS, 2007 | 103 | 2007 |
Data compression techniques in Wireless Sensor Networks T Sheltami, M Musaddiq, E Shakshuki Future Generation Computer Systems 64, 151-162, 2016 | 100 | 2016 |
A detection and prevention technique for man in the middle attack in fog computing F Aliyu, T Sheltami, EM Shakshuki Procedia computer science 141, 24-31, 2018 | 92 | 2018 |
Wireless sensor networks for leak detection in pipelines: a survey TR Sheltami, A Bala, EM Shakshuki Journal of Ambient Intelligence and Humanized Computing 7 (3), 347-356, 2016 | 81 | 2016 |
RF-Based UAV Detection and Identification Using Hierarchical Learning Approach I Nemer, T Sheltami, A Irfan, A Yasar, M Abdeen Sensors 21 (6), 1947, 2021 | 69 | 2021 |
AACK: Adaptive acknowledgment intrusion detection for MANET with node detection enhancement A Al-Roubaiey, T Sheltami, A Mahmoud, E Shakshuki, H Mouftah 2010 24th IEEE International Conference on Advanced Information Networking …, 2010 | 67 | 2010 |
UAV-enabled intelligent traffic policing and emergency response handling system for the smart city A Beg, AR Qureshi, T Sheltami, A Yasar Personal and Ubiquitous Computing 25 (1), 33-50, 2021 | 59 | 2021 |
Multi-Objective Optimization for a Reliable Localization Scheme in Wireless Sensor Networks F Shahzad, TR Sheltami, EM Shakshuki IEEE Journal of Communications and Networks 18 (5), 796 - 805, 2016 | 56 | 2016 |
Internet of things for healthcare monitoring applications based on RFID clustering scheme A Abuelkhail, U Baroudi, M Raad, T Sheltami Wireless Networks 27, 747–763, 2021 | 55 | 2021 |
A survey on autonomic provisioning and management of QoS in SDN networks A Binsahaq, TR Sheltami, K Salah IEEE Access 7, 73384-73435, 2019 | 55 | 2019 |
Comparative study on range free localization algorithms E Shakshuki, AA Elkhail, I Nemer, M Adam, T Sheltami Procedia Computer Science 151, 501-510, 2019 | 54 | 2019 |