Calculated based on number of publications stored in Pure and citations from Scopus
20032023

Research activity per year

Filter
Conference contribution

Search results

  • 2005

    Adapting support vector machines to predict translation initiation sites in the human genome

    Akbani, R. & Kwek, S., 2005, 2005 IEEE Computational Systems Bioinformatics Conference, Workshops and Poster Abstracts. p. 143-145 3 p. 1540576. (2005 IEEE Computational Systems Bioinformatics Conference, Workshops and Poster Abstracts).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • 2007

    A packet authentication scheme for wireless sensor networks

    Akbani, R., Korkmaz, T. & Raju, G. V. S., 2007, 22nd International Conference on Computers and Their Applications 2007, CATA 2007. p. 401-407 7 p. (22nd International Conference on Computers and Their Applications 2007, CATA 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Authentication in wireless networks

    Raju, G. V. S. & Akbani, R., 2007, Proceedings of the 40th Annual Hawaii International Conference on System Sciences 2007, HICSS'07. 4076928. (Proceedings of the Annual Hawaii International Conference on System Sciences).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Scopus citations
  • HEAP: Hop-by-hop efficient authentication protocol for mobile Ad-hoc networks

    Akbani, R., Korkmaz, T. & Raju, G. V. S., 2007, 10th Communications and Networking Simulation Symposium, CNS 2007, Part of the 2007 Spring Simulation Multiconference, SpringSim 2007. p. 157-165 9 p. (Simulation Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Scopus citations
  • 2008

    A machine learning based reputation system for defending against malicious node behavior

    Akbani, R., Korkmaz, T. & Raju, G. V. S., 2008, 2008 IEEE Global Telecommunications Conference, GLOBECOM 2008. p. 2119-2123 5 p. 4698183. (GLOBECOM - IEEE Global Telecommunications Conference).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    13 Scopus citations
  • Defending against malicious nodes using an SVM based reputation system

    Akbani, R., Korkmaz, T. & Raju, G. V. S., 2008, 2008 IEEE Military Communications Conference, MILCOM 2008 - Assuring Mission Success. 4753370. (Proceedings - IEEE Military Communications Conference MILCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • 2009

    A hybrid trust management system for automated fine-grained access control

    Akbani, R., Korkmaz, T. & Raju, G. V. S., 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference. 5379722. (Proceedings - IEEE Military Communications Conference MILCOM).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • 2012

    Mobile Ad-hoc networks security

    Akbani, R., Korkmaz, T. & Raju, G. V. S., 2012, Recent Advances in Computer Science and Information Engineering. VOL. 4 ed. Springer Verlag, p. 659-666 8 p. (Lecture Notes in Electrical Engineering; vol. 127 LNEE, no. VOL. 4).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    47 Scopus citations