עקוב אחר
Garth V. Crosby
Garth V. Crosby
ETID, Texas A & M University College Station
כתובת אימייל מאומתת בדומיין tamu.edu
כותרת
צוטט על ידי
צוטט על ידי
שנה
Wireless body area networks for healthcare: A survey
GV Crosby, T Ghosh, R Murimi, CA Chin
International Journal of Ad Hoc, Sensor & Ubiquitous Computing 3 (3), 1, 2012
2142012
A framework for trust-based cluster head election in wireless sensor networks
GV Crosby, N Pissinou, J Gadze
Second IEEE Workshop on Dependability and Security in Sensor Networks and …, 2006
2122006
Cluster-based reputation and trust for wireless sensor networks
N Pissinou, GV Crosby
2007 4th IEEE consumer communications and networking conference, 604-608, 2007
1052007
Advances and challenges of wireless body area networks for healthcare applications
CA Chin, GV Crosby, T Ghosh, R Murimi
2012 International Conference on Computing, Networking and Communications …, 2012
772012
Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks.
GV Crosby, L Hester, N Pissinou
Int. J. Netw. Secur. 12 (2), 107-117, 2011
742011
Wireless sensor networks and LTE-A network convergence
GV Crosby, F Vafa
38th Annual IEEE conference on local computer networks, 731-734, 2013
642013
Evolution of cooperation in multi-class wireless sensor networks
GV Crosby, N Pissinou
32nd IEEE Conference on Local Computer Networks (LCN 2007), 489-495, 2007
562007
DeepFeat: A bottom-up and top-down saliency model based on deep features of convolutional neural networks
A Mahdi, J Qin, G Crosby
IEEE Transactions on Cognitive and Developmental Systems 12 (1), 54-63, 2019
512019
New security approach for ZigBee weaknesses
W Razouk, GV Crosby, A Sekkaki
Procedia Computer Science 37, 376-381, 2014
372014
SaRa: A stochastic model to estimate reliability of edge resources in volunteer cloud
Y Alsenani, G Crosby, T Velasco
2018 IEEE international conference on EDGE computing (EDGE), 121-124, 2018
322018
Implementing IPsec in wireless sensor networks
P Varadarajan, G Crosby
2014 6th international conference on new technologies, mobility and security …, 2014
212014
ProTrust: A probabilistic trust framework for volunteer cloud computing
YS Alsenani, GV Crosby, KR Ahmed, T Velasco
IEEE Access 8, 135059-135074, 2020
182020
ReMot reputation and resource-based model to estimate the reliability of the host machines in volunteer cloud environment
Y Alsenani, GV Crosby, T Velasco, A Alahmadi
2018 IEEE 6th international conference on future internet of things and …, 2018
142018
Reducing the peak to average power ratio of MIMO-OFDM Systems
AM Mazin, GV Crosby
International Journal of Computer Networks & communications 5 (3), 33, 2013
132013
Blockchain technology for global supply chain management: a survey of applications, challenges, opportunities & implications (March 2024)
P Dudczyk, J Dunston, GV Crosby
IEEE Access, 2024
122024
Securing the internet of robotic things: a comprehensive review on machine learning-based intrusion detection
M Nkoom, SG Hounsinou, GV Crosby
Journal of Cyber Security Technology, 1-50, 2024
82024
Wireless body area networks in mhealth
GV Crosby, CA Chin, T Ghosh, R Murimi
Mobile Health: A Technology Road Map, 873-915, 2015
72015
On optimal slot allocation for reservation TDMA MAC protocol in shadow fading environment
J Gadze, N Pissinou, K Makki, G Crosby
2007 4th International Symposium on Wireless Communication Systems, 809-813, 2007
62007
Using network traffic to infer power levels in wireless sensor nodes
L Watkins, GV Crosby, A Sharmin
2014 International Conference on Computing, Networking and Communications …, 2014
42014
Evaluation of the effect of wireshark-based laboratories on increasing student understanding of learning outcomes in a data communications course
CA Chin, L Sharma, GV Crosby
2013 ASEE Annual Conference & Exposition, 23.554. 1-23.554. 13, 2013
42013
המערכת אינה יכולה לבצע את הפעולה כעת. נסה שוב מאוחר יותר.
מאמרים 1–20