ABDUL RAZAQUE
ABDUL RAZAQUE
Reseacher
Verified email at my.bridgeport.edu
Title
Cited by
Cited by
Year
Compression in wireless sensor networks: A survey and comparative evaluation
A Razaque, C Bleakley, S Dobson
ACM Transactions on Sensor Networks (TOSN) 10 (1), 5, 2013
1362013
Multi-constrained QoS geographic routing for heterogeneous traffic in sensor networks
A Razaque, MM Alam, M Mamun-Or-Rashid, CS Hong
IEICE Transactions on communications 91 (8), 2589-2601, 2008
1192008
Semantic security against web application attacks
A Razaque, K Latif, HF Ahmad, A Hur, Z Anwar, PC Bloodsworth
Information Sciences 254, 19-38, 2014
702014
Energy-efficient boarder node medium access control protocol for wireless sensor networks
A Razaque, KM Elleithy
Sensors 14 (3), 5074-5117, 2014
592014
P-LEACH: Energy efficient routing protocol for Wireless Sensor Networks
A Razaque, M Abdulgader, C Joshi, F Amsaad, M Chauhan
2016 IEEE Long Island Systems, Applications and Technology Conference (LISAT …, 2016
582016
Ontology for attack detection: An intelligent approach to web application security
A Razaque, Z Anwar, HF Ahmad, K Latif, F Munir
computers & security 45, 124-146, 2014
532014
H-LEACH: Hybrid-low energy adaptive clustering hierarchy for wireless sensor networks
A Razaque, S Mudigulam, K Gavini, F Amsaad, M Abdulgader, ...
2016 IEEE Long Island Systems, Applications and Technology Conference (LISAT …, 2016
452016
ecMTCP: an energy-aware congestion control algorithm for multipath TCP
TA Le, CS Hong, A Razaque, S Lee, H Jung
IEEE communications letters 16 (2), 275-277, 2012
452012
The use of mobile phone among farmers for agriculture development
A Razaque, M Sallah
Int. J. Sci. Res 2, 95-98, 2013
412013
Task scheduling in cloud computing
A Razaque, NR Vennapusa, N Soni, GS Janapati
2016 IEEE Long Island Systems, Applications and Technology Conference (LISAT …, 2016
372016
Cyber security: Threats, reasons, challenges, methodologies and state of the art solutions for industrial applications
A Razaque, A Hur, HF Ahmad, M Masood
2013 IEEE Eleventh International Symposium on Autonomous Decentralized …, 2013
342013
Ontology based application level intrusion detection system by using bayesian filter
A Razaque, HF Ahmed, A Hur, N Haider
2009 2nd International Conference on Computer, Control and Communication, 1-6, 2009
292009
Factors associated with an explosive HIV epidemic among injecting drug users in Sargodha, Pakistan
F Emmanuel, C Archibald, A Razaque, P Sandstrom
JAIDS Journal of Acquired Immune Deficiency Syndromes 51 (1), 85-90, 2009
282009
Triangular data privacy-preserving model for authenticating all key stakeholders in a cloud environment
A Razaque, SS Rizvi
Computers & Security 62, 328-347, 2016
262016
Privacy preserving model: a new scheme for auditing cloud stakeholders
A Razaque, SS Rizvi
Journal of Cloud Computing 6 (1), 7, 2017
252017
Low duty cycle, energy-efficient and mobility-based boarder node—MAC hybrid protocol for wireless sensor networks
A Razaque, KM Elleithy
Journal of Signal Processing Systems 81 (2), 265-284, 2015
232015
Risky sexual behavior, knowledge of sexually transmitted infections and treatment utilization among a vulnerable population in Rawalpindi, Pakistan.
NH Saleem, A Adrien, A Razaque
232008
Fostering project scheduling and controlling risk management
A Razaque, C Bach, A Alotaibi
arXiv preprint arXiv:1210.2021, 2012
222012
Evaluation and comparison of TCP and UDP over Wired-cum-Wireless LAN
AR Rind, K Shahzad, MA Qadir
2006 IEEE International Multitopic Conference, 337-342, 2006
222006
Third-party auditor (TPA): a potential solution for securing a cloud environment
S Rizvi, A Razaque, K Cover
2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing …, 2015
212015
The system can't perform the operation now. Try again later.
Articles 1–20