A secured cost-effective multi-cloud storage in cloud computing Y Singh, F Kandah, W Zhang 2011 IEEE conference on computer communications workshops (INFOCOM WKSHPS …, 2011 | 144 | 2011 |
Radio identity verification-based IoT security using RF-DNA fingerprints and SVM D Reising, J Cancelleri, TD Loveless, F Kandah, A Skjellum IEEE Internet of Things Journal 8 (10), 8356-8371, 2020 | 76 | 2020 |
Buterin's scalability trilemma viewed through a state-change-based classification for common consensus algorithms A Altarawneh, T Herschberg, S Medury, F Kandah, A Skjellum 2020 10th Annual Computing and Communication Workshop and Conference (CCWC …, 2020 | 73 | 2020 |
A blockchain-based trust management approach for connected autonomous vehicles in smart cities F Kandah, B Huber, A Skjellum, A Altarawneh 2019 IEEE 9th Annual Computing and Communication Workshop and Conference …, 2019 | 36 | 2019 |
A hardware-software codesign approach to identity, trust, and resilience for iot/cps at scale F Kandah, J Cancelleri, D Reising, A Altarawneh, A Skjellum 2019 International Conference on Internet of Things (iThings) and IEEE Green …, 2019 | 27 | 2019 |
Mitigating colluding injected attack using monitoring verification in mobile ad‐hoc networks F Kandah, Y Singh, W Zhang, C Wang Security and Communication Networks 6 (4), 539-547, 2013 | 25 | 2013 |
Dynamic light trail routing in WDM optical networks W Zhang, F Kandah, C Wang, H Li Photonic Network Communications 21, 78-89, 2011 | 25 | 2011 |
Colluding injected attack in mobile ad-hoc networks F Kandah, Y Singh, C Wang 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS …, 2011 | 23 | 2011 |
Interference-aware robust topology design in multi-channel wireless mesh networks W Zhang, F Kandah, J Tang, K Nygard 2010 7th IEEE Consumer Communications and Networking Conference, 1-5, 2010 | 21 | 2010 |
BLAST: Blockchain-based trust management in smart cities and connected vehicles setup F Kandah, B Huber, A Altarawneh, S Medury, A Skjellum 2019 IEEE High Performance Extreme Computing Conference (HPEC), 1-7, 2019 | 20 | 2019 |
An analysis of signal energy impacts and threats to deep learning based sei JH Tyler, MMK Fadul, DR Reising, FI Kandah ICC 2022-IEEE International Conference on Communications, 2077-2083, 2022 | 16 | 2022 |
Efficient key management for Big Data gathering in dynamic sensor networks FI Kandah, O Nichols, L Yang 2017 International Conference on Computing, Networking and Communications …, 2017 | 15 | 2017 |
Intelligent threat hunting in software-defined networking S Schmitt, FI Kandah, D Brownell 2019 IEEE International Conference on Consumer Electronics (ICCE), 1-5, 2019 | 14 | 2019 |
Behavioral model based trust management design for iot at scale B Huber, F Kandah 2020 international conferences on internet of things (iThings) and IEEE …, 2020 | 12 | 2020 |
Behavioral model anomaly detection in automatic identification systems (ais) J Coleman, F Kandah, B Huber 2020 10th Annual Computing and Communication Workshop and Conference (CCWC …, 2020 | 12 | 2020 |
Towards trusted and energy-efficient data collection in unattended wireless sensor networks F Kandah, J Whitehead, P Ball Wireless Networks 26 (7), 5455-5471, 2020 | 10 | 2020 |
Interference-aware robust wireless mesh network design F Kandah, W Zhang, Y Singh, J Li 2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 1-5, 2010 | 10 | 2010 |
Physical layer-based iot security: An investigation into improving preamble-based sei performance when using multiple waveform collections JH Tyler, DR Reising, FI Kandah, E Kaplanoglu, MMK Fadul IEEE Access 10, 133601-133616, 2022 | 8 | 2022 |
Mitigating Eavesdropping Attack Using Secure Key Management Scheme in Wireless Mesh Networks. FI Kandah, Y Singh, W Zhang J. Commun. 7 (8), 596-605, 2012 | 8 | 2012 |
Diverse path routing with interference and reusability consideration in wireless mesh networks F Kandah, W Zhang, C Wang, J Li Mobile Networks and Applications 17, 100-109, 2012 | 7 | 2012 |