Decentralized consensus for edge-centric internet of things: A review, taxonomy, and research issues K Yeow, A Gani, RW Ahmad, JJPC Rodrigues, K Ko IEEE Access 6, 1513-1524, 2017 | 290 | 2017 |
Energy harvesting for wearable devices: A review YW Chong, W Ismail, K Ko, CY Lee IEEE Sensors Journal 19 (20), 9047-9062, 2019 | 222 | 2019 |
A review on the role of blockchain technology in the healthcare domain HD Zubaydi, YW Chong, K Ko, SM Hanshi, S Karuppayah Electronics 8 (6), 679, 2019 | 140 | 2019 |
An uncertainty-aware integrated fuzzy AHP-WASPAS model to evaluate public cloud computing services KA Alam, R Ahmed, FS Butt, SG Kim, KM Ko Procedia computer science 130, 504-509, 2018 | 72 | 2018 |
Software-defined network forensics: Motivation, potential locations, requirements, and challenges S Khan, A Gani, AWA Wahab, A Abdelaziz, K Ko, MK Khan, M Guizani IEEE Network 30 (6), 6-13, 2016 | 59 | 2016 |
Cost effective network flow measurement for software defined networks: A distributed controller scenario H Tahaei, RB Salleh, MF Ab Razak, K Ko, NB Anuar IEEE Access 6, 5182-5198, 2018 | 53 | 2018 |
Towards native code offloading based MCC frameworks for multimedia applications: A survey J Shuja, A Gani, MH ur Rehman, E Ahmed, SA Madani, MK Khan, K Ko Journal of Network and Computer Applications 75, 335-354, 2016 | 49 | 2016 |
Characterizing dynamic load balancing in cloud environments using virtual machine deployment models M Liaqat, A Naveed, RL Ali, J Shuja, KM Ko IEEE Access 7, 145767-145776, 2019 | 40 | 2019 |
Adaptive Path Finding Algorithm in Dynamic Environment for Warehouse Robot KM Ko Informations, 0 | 40* | |
SIMDOM: a framework for SIMD instruction translation and offloading in heterogeneous mobile architectures J Shuja, A Gani, K Ko, K So, S Mustafa, SA Madani, MK Khan Transactions on Emerging Telecommunications Technologies 29 (4), e3174, 2018 | 38 | 2018 |
Secure outsourced blockchain-based medical data sharing system using proxy re-encryption YH Park, Y Kim, SO Lee, K Ko Applied Sciences 11 (20), 9422, 2021 | 27 | 2021 |
Localization free energy efficient and cooperative routing protocols for underwater wireless sensor networks S Shah, A Khan, I Ali, KM Ko, H Mahmood Symmetry 10 (10), 498, 2018 | 26 | 2018 |
Intersection-based distance and traffic-aware routing (IDTAR) protocol for smart vehicular communication AIA Ahmed, A Gani, SH Ab Hamid, S Khan, N Guizani, K Ko 2017 13th international wireless communications and mobile computing …, 2017 | 26 | 2017 |
Java virtual machine T Downing, J Meyer OREILLY, Mar, 1997 | 26 | 1997 |
A fog computing architecture with multi-layer for computing-intensive iot applications M Muneeb, KM Ko, YH Park Applied Sciences 11 (24), 11585, 2021 | 24 | 2021 |
Towards an applicability of current network forensics for cloud networks: A SWOT analysis S Khan, A Gani, AWA Wahab, S Iqbal, A Abdelaziz, OA Mahdi, ... IEEE Access 4, 9800-9820, 2016 | 23 | 2016 |
Enabling far-edge analytics: performance profiling of frequent pattern mining algorithms KA Alam, R Ahmad, K Ko IEEE Access 5, 8236-8249, 2017 | 19 | 2017 |
Profiling and predicting the cumulative helpfulness (Quality) of crowd-sourced reviews M Bilal, M Marjani, IAT Hashem, A Gani, M Liaqat, K Ko Information 10 (10), 295, 2019 | 15 | 2019 |
DisCO: A distributed and concurrent offloading framework for mobile edge cloud computing K Ko, Y Son, S Kim, Y Lee 2017 ninth international conference on ubiquitous and future networks (ICUFN …, 2017 | 14 | 2017 |
Comparative study of AI-enabled DDoS detection technologies in SDN KM Ko, JM Baek, BS Seo, WB Lee Applied Sciences 13 (17), 9488, 2023 | 12 | 2023 |