Random-forests-based network intrusion detection systems J Zhang, M Zulkernine, A Haque IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and …, 2008 | 693 | 2008 |
Path planning for autonomous drones: Challenges and future directions G Gugan, A Haque Drones 7 (3), 169, 2023 | 70 | 2023 |
Network intrusion detection and comparative analysis using ensemble machine learning and feature selection S Das, S Saha, AT Priyoti, EK Roy, FT Sheldon, A Haque, S Shiva IEEE transactions on network and service management 19 (4), 4821-4833, 2021 | 62 | 2021 |
A new shared segment protection method for survivable networks with guaranteed recovery time J Tapolcai, PH Ho, D Verchére, T Cinkler, A Haque IEEE Transactions on Reliability 57 (2), 272-282, 2008 | 55 | 2008 |
The Mammoth Internet: Are We Ready? BB Yaser Al Mtawa, Anwar Haque IEEE Access 7, 132894-132908, 2019 | 39* | 2019 |
Detecting flooding-based DDoS attacks Y You, M Zulkernine, A Haque 2007 IEEE International Conference on Communications, 1229-1234, 2007 | 37 | 2007 |
Analysis of the effect of QoS on video conferencing QoE N Rao, A Maleki, F Chen, W Chen, C Zhang, N Kaur, A Haque 2019 15th International Wireless Communications & Mobile Computing …, 2019 | 35 | 2019 |
A reliability-based resource allocation approach for cloud computing ABMB Alam, M Zulkernine, A Haque 2017 IEEE 7th International Symposium on Cloud and Service Computing (SC2 …, 2017 | 35 | 2017 |
Towards network traffic monitoring using deep transfer learning H Dhillon, A Haque 2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020 | 31 | 2020 |
Spare capacity reprovisioning for shared backup path protection in dynamic generalized multi-protocol label switched networks PH Ho, J Tapolcai, A Haque IEEE Transactions on Reliability 57 (4), 551-563, 2008 | 30 | 2008 |
Towards an optimal feature selection method for AI-based DDoS detection system S Saha, AT Priyoti, A Sharma, A Haque 2022 IEEE 19th Annual Consumer Communications & Networking Conference (CCNC …, 2022 | 27 | 2022 |
Multi-component V2X applications placement in edge computing environment I Shaer, A Haque, A Shami ICC 2020-2020 IEEE International Conference on Communications (ICC), 1-6, 2020 | 27 | 2020 |
Towards a security architecture for protecting connected vehicles from malware S Iqbal, A Haque, M Zulkernine 2019 IEEE 89th Vehicular Technology Conference (VTC2019-Spring), 1-5, 2019 | 25 | 2019 |
Attacks in public clouds: Can they hinder the rise of the cloud? S Shafieian, M Zulkernine, A Haque Cloud Computing: Challenges, Limitations and R&D Solutions, 3-22, 2014 | 25 | 2014 |
A distributed defense framework for flooding-based DDoS attacks Y You, M Zulkernine, A Haque 2008 Third International Conference on Availability, Reliability and …, 2008 | 25 | 2008 |
Availability-constrained shared backup path protection (SBPP) for GMPLS-based spare capacity reprovisioning Q Guo, PH Ho, A Haque, HT Mouftah 2007 IEEE International Conference on Communications, 2186-2191, 2007 | 25 | 2007 |
Migrating from legacy to software defined networks: A network reliability perspective Y Al Mtawa, A Haque, H Lutfiyya IEEE Transactions on Reliability 70 (4), 1525-1541, 2021 | 23 | 2021 |
A study on the design of survivable optical virtual private networks (O-VPN) A Haque, PH Ho IEEE Transactions on Reliability 55 (3), 516-524, 2006 | 21 | 2006 |
CloudZombie: Launching and detecting slow-read distributed denial of service attacks from the Cloud S Shafieian, M Zulkernine, A Haque 2015 IEEE International Conference on Computer and Information Technology …, 2015 | 20 | 2015 |
Smart home networks: Security perspective and ml-based ddos detection Y Al Mtawa, H Singh, A Haque, A Refaey 2020 IEEE Canadian Conference on Electrical and Computer Engineering (CCECE …, 2020 | 15 | 2020 |