default search action
Niki Pissinou
Person information
- affiliation: Florida International University, University Park, FL, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [c136]Mohammed Rajhi, Niki Pissinou:
Adversarial Training on Limited-Resource Devices Through Asymmetric Disturbances. DCOSS-IoT 2024: 27-34 - [c135]Ahmed Hakami, Niki Pissinou, Mohammed Rajhi:
Adaptive Dynamic Adversarial Training with Real-Time Feedback in 6G. DCOSS-IoT 2024: 44-49 - [c134]Hussein Zangoti, Niki Pissinou:
An Efficient Approach for Merging Multidimensional Blockchains in Mobile IoT. DCOSS-IoT 2024: 269-276 - 2023
- [c133]Mohammed Rajhi, Niki Pissinou:
Resource-Limited Localized Adaptive Adversarial Training for Machine Learning Model. ISPA/BDCloud/SocialCom/SustainCom 2023: 1113-1120 - [c132]Hussein Zangoti, Niki Pissinou, Charles A. Kamhoua:
An Efficient Approach for Merging Multidimensional Blockchains in Mobile IoT. DCOSS-IoT 2023: 142-149 - [c131]Sheila Alemany, Alberto Luis Dominguez, Ilan Grapel, Niki Pissinou:
Towards Parametric Robust Activation Functions in Adversarial Machine Learning. Tiny Papers @ ICLR 2023 - [c130]Mohammed Rajhi, Niki Pissinou:
Adversarial Training Method for Machine Learning Model in a Resource-Constrained Environment. Q2SWinet 2023: 87-95 - 2022
- [c129]Sheila Alemany, Niki Pissinou:
The Dilemma Between Data Transformations and Adversarial Robustness for Time Series Application Systems. SafeAI@AAAI 2022 - [c128]Hussein Zangoti, Alex Pissinou Makki, Niki Pissinou, Abdur R. Shahid, Omar J. Guerra, Joel Rodriguez:
A Multidimensional Blockchain Framework For Mobile Internet of Things. TrustCom 2022: 935-944 - 2021
- [j56]Abdur R. Shahid, Niki Pissinou, S. S. Iyengar, Kia Makki:
Delay-aware privacy-preserving location-based services under spatiotemporal constraints. Int. J. Commun. Syst. 34(1) (2021) - [c127]Sheila Alemany, Jason Nucciarone, Niki Pissinou:
Jespipe: A Plugin-Based, Open MPI Framework for Adversarial Machine Learning Analysis. IEEE BigData 2021: 3663-3670 - 2020
- [i2]Sheila Alemany, Niki Pissinou:
The Dilemma Between Dimensionality Reduction and Adversarial Robustness. CoRR abs/2006.10885 (2020)
2010 – 2019
- 2019
- [j55]Wenrui Ma, Jonathan Beltran, Deng Pan, Niki Pissinou:
Placing Traffic-Changing and Partially-Ordered NFV Middleboxes via SDN. IEEE Trans. Netw. Serv. Manag. 16(4): 1303-1317 (2019) - [c126]Mingming Guo, Niki Pissinou, S. Sitharama Iyengar:
Privacy-Preserving Deep Learning for Enabling Big Edge Data Analytics in Internet of Things. IGSC 2019: 1-6 - [c125]Abdur R. Shahid, Niki Pissinou, Corey Staier, Rain Kwan:
Sensor-Chain: A Lightweight Scalable Blockchain Framework for Internet of Things. iThings/GreenCom/CPSCom/SmartData 2019: 1154-1161 - [c124]Abdur R. Shahid, Niki Pissinou, Laurent Njilla, Edwin Aguilar, Eric Perez:
Demo: Towards the Development of a Differentially Private Lightweight and Scalable Blockchain for IoT. MASS Workshops 2019: 172-173 - [c123]Abdur R. Shahid, Niki Pissinou, Laurent Njilla, Sheila Alemany, Ahmed Imteaj, Kia Makki, Edwin Aguilar:
Quantifying location privacy in permissioned blockchain-based internet of things (IoT). MobiQuitous 2019: 116-125 - [i1]Wei Zeng, Abdur Bin Shahid, Keyan Zolfaghari, Aditya Shetty, Niki Pissinou, S. Sitharama Iyengar:
n-VDD: Location Privacy Protection Based on Voronoi-Delaunay Duality. CoRR abs/1906.09158 (2019) - 2018
- [c122]Concepcion Sanchez Aleman, Niki Pissinou, Sheila Alemany, Georges A. Kamhoua:
Using Candlestick Charting and Dynamic Time Warping for Data Behavior Modeling and Trend Prediction for MWSN in IoT. IEEE BigData 2018: 2884-2889 - [c121]Yujian Charles Tang, Samia Tasnim, Niki Pissinou, S. S. Iyengar, Abdur R. Shahid:
Reputation-Aware Data Fusion and Malicious Participant Detection in Mobile Crowdsensing. IEEE BigData 2018: 4820-4828 - [c120]Samia Tasnim, Juan Caldas, Niki Pissinou, S. S. Iyengar, Ziqian Ding:
Semantic-Aware Clustering-based Approach of Trajectory Data Stream Mining. ICNC 2018: 88-92 - [c119]Concepcion Sanchez Aleman, Niki Pissinou, Sheila Alemany, Kianoosh G. Boroojeni, Jerry Miller, Ziqian Ding:
Context-Aware Data Cleaning for Mobile Wireless Sensor Networks: A Diversified Trust Approach. ICNC 2018: 226-230 - [c118]Mingming Guo, Kianoosh G. Boroojeni, Niki Pissinou, Kia Makki, Jerry Miller, S. Sitharama Iyengar:
Query-Aware User Privacy Protection for LBS over Query-Feature-based Attacks. ISCC 2018: 1-7 - [c117]Abdur R. Shahid, Niki Pissinou, S. S. Iyengar, Jerry Miller, Ziqian Ding, Teresita Lemus:
KLAP for Real-World Protection of Location Privacy. SERVICES 2018: 17-18 - [c116]Concepcion Sanchez Aleman, Niki Pissinou, Sheila Alemany, Georges A. Kamhoua:
A Dynamic Trust Weight Allocation Technique for Data Reconstruction in Mobile Wireless Sensor Networks. TrustCom/BigDataSE 2018: 61-67 - [c115]Abdur R. Shahid, Niki Pissinou, S. S. Iyengar, Kia Makki:
Check-ins and Photos: Spatiotemporal Correlation-Based Location Inference Attack and Defense in Location-Based Social Networks. TrustCom/BigDataSE 2018: 1852-1857 - 2017
- [j54]Cuong T. Do, Nguyen Hoang Tran, Choong Seon Hong, Charles A. Kamhoua, Kevin A. Kwiat, Erik Blasch, Shaolei Ren, Niki Pissinou, Sundaraja Sitharama Iyengar:
Game Theory for Cyber Security and Privacy. ACM Comput. Surv. 50(2): 30:1-30:37 (2017) - [j53]Wenrui Ma, Jonathan Beltran, Zhenglin Pan, Deng Pan, Niki Pissinou:
SDN-Based Traffic Aware Placement of NFV Middleboxes. IEEE Trans. Netw. Serv. Manag. 14(3): 528-542 (2017) - [c114]Samia Tasnim, Niki Pissinou, S. S. Iyengar:
A novel cleaning approach of environmental sensing data streams. CCNC 2017: 632-633 - [c113]Laurent L. Njilla, Charles A. Kamhoua, Kevin A. Kwiat, Patrick Hurley, Niki Pissinou:
Cyber Security Resource Allocation: A Markov Decision Process Approach. HASE 2017: 49-52 - [c112]Abdur R. Shahid, Liz Jeukeng, Wei Zeng, Niki Pissinou, S. S. Iyengar, Sartaj Sahni, Maite Varela-Conover:
PPVC: Privacy Preserving Voronoi Cell for location-based services. ICNC 2017: 351-355 - [c111]Georges A. Kamhoua, Niki Pissinou, S. S. Iyengar, Jonathan Beltran, Charles A. Kamhoua, Brandon L. Hernandez, Laurent Njilla, Alex Pissinou Makki:
Preventing Colluding Identity Clone Attacks in Online Social Networks. ICDCS Workshops 2017: 187-192 - [c110]Wenrui Ma, Oscar Sandoval, Jonathan Beltran, Deng Pan, Niki Pissinou:
Traffic aware placement of interdependent NFV middleboxes. INFOCOM 2017: 1-9 - [c109]Georges A. Kamhoua, Niki Pissinou, S. S. Iyengar, Jonathan Beltran, Jerry Miller, Charles A. Kamhoua, Laurent L. Njilla:
Approach to detect non-adversarial overlapping collusion in crowdsourcing. IPCCC 2017: 1-8 - [c108]Laurent Njilla, Harold N. Ouete, Niki Pissinou, Kia Makki:
Game theoretic analysis for resource allocation in dynamic multi-hop networks with arbitration. SysCon 2017: 1-8 - 2016
- [j52]Laurent Yamen Njilla, Niki Pissinou, Kia Makki:
Game theoretic modeling of security and trust relationship in cyberspace. Int. J. Commun. Syst. 29(9): 1500-1512 (2016) - [c107]Mingming Guo, Niki Pissinou, S. Sitharama Iyengar:
Privacy-aware mobile sensing in vehicular networks. ICNC 2016: 1-5 - [c106]Laurent Yamen Njilla, Patricia Echual, Niki Pissinou, Kia Makki:
A game-theoretic approach on resource allocation with colluding nodes in MANETs. SysCon 2016: 1-8 - 2015
- [j51]Vasanth Iyer, S. S. Iyengar, Niki Pissinou:
Ensemble stream model for data-cleaning in sensor networks. AI Matters 1(4): 29-32 (2015) - [j50]Mingming Guo, Xinyu Jin, Niki Pissinou, Sebastián A. Zanlongo, Bogdan Carbunar, S. Sitharama Iyengar:
In-Network Trajectory Privacy Preservation. ACM Comput. Surv. 48(2): 23:1-23:29 (2015) - [j49]Hien Nguyen, Ebtissam Wahman, Niki Pissinou, S. S. Iyengar, Kia Makki:
Mobile learning object authoring tool and management system for mobile ad hoc wireless networks. Int. J. Commun. Syst. 28(17): 2180-2196 (2015) - [j48]Mohammad A. Islam, Shaolei Ren, Niki Pissinou, A. Hasan Mahmud, Athanasios V. Vasilakos:
Distributed temperature-aware resource management in virtualized data center. Sustain. Comput. Informatics Syst. 6: 3-16 (2015) - [c105]Mingming Guo, Niki Pissinou, S. Sitharama Iyengar:
Pseudonym-based anonymity zone generation for mobile service with strong adversary model. CCNC 2015: 335-340 - [c104]Laurent Yamen Njilla, Niki Pissinou:
Dynamics of data delivery in mobile ad-hoc networks: A bargaining game approach. CISDA 2015: 1-6 - 2014
- [c103]Samia Tasnim, Mohammad Ataur Rahman Chowdhury, Kishwar Ahmed, Niki Pissinou, S. Sitharama Iyengar:
Location aware code offloading on mobile cloud with QoS constraint. CCNC 2014: 74-79 - [c102]Ian Michael Terry, Anita Wu, Sebastian Ramirez, Alex Pissinou Makki, Leonardo Bobadilla, Niki Pissinou, S. Sitharama Iyengar, Bogdan Carbunar:
Geofit: Verifiable Fitness Challenges. MASS 2014: 720-724 - 2013
- [j47]Bogdan Carbunar, Mahmudur Rahman, Niki Pissinou:
A survey of privacy vulnerabilities and defenses in geosocial networks. IEEE Commun. Mag. 51(11): 114-119 (2013) - [j46]Hao Jin, Deng Pan, Jason Liu, Niki Pissinou:
OpenFlow-Based Flow-Level Bandwidth Provisioning for CICQ Switches. IEEE Trans. Computers 62(9): 1799-1812 (2013) - [c101]Mohammad A. Islam, Shaolei Ren, Niki Pissinou, A. Hasan Mahmud, Athanasios V. Vasilakos:
Distributed resource management in data center with temperature constraint. IGCC 2013: 1-10 - [c100]Sitthapon Pumpichet, Xinyu Jin, Niki Pissinou:
Sketch-based data recovery in sensor data streams. ICON 2013: 1-6 - [c99]Hao Jin, Tosmate Cheocherngngarn, Dmita Levy, Alex Smith, Deng Pan, Jason Liu, Niki Pissinou:
Joint Host-Network Optimization for Energy-Efficient Data Center Networking. IPDPS 2013: 623-634 - [c98]Xinyu Jin, Niki Pissinou, Sitthapon Pumpichet, Charles A. Kamhoua, Kevin A. Kwiat:
Modeling cooperative, selfish and malicious behaviors for Trajectory Privacy Preservation using Bayesian game theory. LCN 2013: 835-842 - [c97]Vasanth Iyer, S. Sitharama Iyengar, Niki Pissinou, Shaolei Ren:
SPOTLESS: Similarity patterns of trajectories in label-less sensor streams. PerCom Workshops 2013: 487-492 - 2012
- [j45]Vinayak Ganapathy, Niki Pissinou, S. Kami Makki, Qutub Bakhtiar Ali:
An epistemic event-based correlation approach for managing pervasive networks. Int. J. Netw. Manag. 22(1): 81-94 (2012) - [j44]Qutub Bakhtiar Ali, Niki Pissinou, Kia Makki:
Belief based data cleaning for wireless sensor networks. Wirel. Commun. Mob. Comput. 12(5): 406-419 (2012) - [c96]Hao Jin, Deng Pan, Jing Xu, Niki Pissinou:
Efficient VM placement with multiple deterministic and stochastic resources in data centers. GLOBECOM 2012: 2505-2510 - [c95]Sitthapon Pumpichet, Niki Pissinou, Xinyu Jin, Deng Pan:
Belief-based cleaning in trajectory sensor streams. ICC 2012: 208-212 - [c94]Xinyu Jin, Niki Pissinou, Cody Chesneau, Sitthapon Pumpichet, Deng Pan:
Hiding trajectory on the fly. ICC 2012: 403-407 - [c93]Charles A. Kamhoua, Niki Pissinou, Kia Makki, Kevin A. Kwiat, S. Sitharama Iyengar:
Game theoretic analysis of users and providers behavior in network under scarce resources. ICNC 2012: 1149-1155 - [e12]Tai-Hoon Kim, Hojjat Adeli, William I. Grosky, Niki Pissinou, Timothy K. Shih, Edward J. Rothwell, Byeong Ho Kang, Seung-Jung Shin:
Multimedia, Computer Graphics and Broadcasting - International Conference, MulGraB 2011, Held as Part of the Future Generation Information Technology Conference, FGIT 2011, in Conjunction with GDC 2011, Jeju Island, Korea, December 8-10, 2011. Proceedings, Part I. Communications in Computer and Information Science 262, Springer 2012, ISBN 978-3-642-27203-5 [contents] - [e11]Tai-Hoon Kim, Jeong-Jin Kang, William I. Grosky, Tughrul Arslan, Niki Pissinou:
Computer Applications for Bio-technology, Multimedia, and Ubiquitous City - International Conferences MulGraB, BSBT and IUrC 2012 Held as Part of the Future Generation Information Technology Conference, FGIT 2012, Gangneug, Korea, December 16-19, 2012. Proceedings. Communications in Computer and Information Science 353, Springer 2012, ISBN 978-3-642-35520-2 [contents] - 2011
- [j43]Kai Chen, Kia Makki, Niki Pissinou:
Machine Learning on Congestion Analysis Based Real-Time Navigation System. Int. J. Artif. Intell. Tools 20(4): 753-781 (2011) - [j42]Garth V. Crosby, Lance Hester, Niki Pissinou:
Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks. Int. J. Netw. Secur. 12(2): 107-117 (2011) - [c92]Hao Jin, Deng Pan, Niki Pissinou:
Parallel Packet Switch without Segmentation-and-Reassembly. GLOBECOM 2011: 1-5 - [c91]Charles A. Kamhoua, Niki Pissinou, Kia Makki:
Game Theoretic Modeling and Evolution of Trust in Autonomous Multi-Hop Networks: Application to Network Security and Privacy. ICC 2011: 1-6 - [c90]Hao Jin, Deng Pan, Jason Liu, Niki Pissinou:
OpenFlow based flow level bandwidth provisioning for CICQ switches. INFOCOM 2011: 476-480 - [c89]Kai Chen, Niki Pissinou, Kia Makki:
Cellular network location estimation via RSS-based data clean enhanced scheme. ISCC 2011: 924-930 - [c88]Kai Chen, Niki Pissinou, Kia Makki:
Fast Normalized Cross-Correlation enhanced floating car data estimation. WOCC 2011: 1-6 - [e10]Tai-Hoon Kim, Hojjat Adeli, William I. Grosky, Niki Pissinou, Timothy K. Shih, Edward J. Rothwell, Byeong Ho Kang, Seung-Jung Shin:
Multimedia, Computer Graphics and Broadcasting - International Conference, MulGraB 2011, Held as Part of the Future Generation Information Technology Conference, FGIT 2011, in Conjunction with GDC 2011, Jeju Island, Korea, December 8-10, 2011. Proceedings, Part II. Communications in Computer and Information Science 263, Springer 2011, ISBN 978-3-642-27185-4 [contents] - 2010
- [c87]Hao Jin, Deng Pan, Niki Pissinou, Kia Makki:
Achieving Flow Level Constant Performance Guarantees for CICQ Switches without Speedup. GLOBECOM 2010: 1-5 - [c86]Sitthapon Pumpichet, Niki Pissinou:
Virtual Sensor for Mobile Sensor Data Cleaning. GLOBECOM 2010: 1-5 - [c85]Zhuo Sun, Masoumeh Karimi, Deng Pan, Zhenyu Yang, Niki Pissinou:
Buffered Crossbar Based Parallel Packet Switch. GLOBECOM 2010: 1-5 - [c84]Qian Wang, Zesheng Chen, Chao Chen, Niki Pissinou:
On the Robustness of the Botnet Topology Formed by Worm Infection. GLOBECOM 2010: 1-6 - [c83]Charles A. Kamhoua, Niki Pissinou, Alan Busovaca, Kia Makki:
Belief-free equilibrium of packet forwarding game in ad hoc networks under imperfect monitoring. IPCCC 2010: 315-324 - [c82]Deng Pan, Kia Makki, Niki Pissinou:
Achieve constant performance guarantees using asynchronous crossbar scheduling without speedup. IPDPS 2010: 1-12 - [c81]Charles A. Kamhoua, Niki Pissinou:
Mitigating selfish misbehavior in multi-hop networks using stochastic game theory. LCN 2010: 232-235 - [e9]Tai-Hoon Kim, Sankar K. Pal, William I. Grosky, Niki Pissinou, Timothy K. Shih, Dominik Slezak:
Signal Processing and Multimedia - International Conferences, SIP and MulGraB 2010, Held as Part of the Future Generation Information Technology Conference, FGIT 2010, Jeju Island, Korea, December 13-15, 2010. Proceedings. Communications in Computer and Information Science 123, Springer 2010, ISBN 978-3-642-17640-1 [contents]
2000 – 2009
- 2009
- [j41]Xiangqian Chen, Kia Makki, Kang Yen, Niki Pissinou:
Sensor network security: a survey. IEEE Commun. Surv. Tutorials 11(2): 52-73 (2009) - [j40]Zhaomin Mo, Hao Zhu, Kia Makki, Niki Pissinou, Masoumeh Karimi:
On Peer-to-Peer Location Management in Vehicular Ad Hoc Networks. Int. J. Interdiscip. Telecommun. Netw. 1(2): 28-45 (2009) - [j39]Stylianos Drakatos, Niki Pissinou, Kia Makki, Christos Douligeris:
A future location-aware replacement policy for the cache management at the mobile terminal. Wirel. Commun. Mob. Comput. 9(5): 607-629 (2009) - [c80]Deng Pan, Kia Makki, Niki Pissinou:
Fair Queueing Based Packet Scheduling for Buffered Crossbar Switches. GLOBECOM 2009: 1-6 - [c79]Deng Pan, Zhenyu Yang, Kia Makki, Niki Pissinou:
Providing Performance Guarantees for Buffered Crossbar Switches without Speedup. QSHINE 2009: 297-314 - [c78]Kai Chen, Kia Makki, Niki Pissinou:
A Real-Time Wireless Route Guidance System for Urban Traffic Management and Its Performance Evaluation. VTC Fall 2009 - 2008
- [j38]Xiangqian Chen, Kia Makki, Kang K. Yen, Niki Pissinou:
Attack Distribution Modeling and Its Applications in Sensor Network Security. EURASIP J. Wirel. Commun. Netw. 2008 (2008) - [c77]Qutub Bakhtiar Ali, Niki Pissinou, Kia Makki:
Estimated replication of data in wireless sensor networks. COMSWARE 2008: 107-110 - [c76]Sharon Fan, Jeffrey Fan, Kia Makki, Niki Pissinou:
Communications via Systems-on-Chips Clustering in Large-Scaled Sensor Networks. EUC (2) 2008: 549-552 - [c75]Qian Wang, Zesheng Chen, Kia Makki, Niki Pissinou, Chao Chen:
Inferring Internet Worm Temporal Characteristics. GLOBECOM 2008: 2007-2012 - [c74]Xiwei Zhao, Vinayak Ganapathy, Niki Pissinou, Kia Makki:
Self-organized forensic support in MANETs. IPDPS 2008: 1-8 - [c73]Bakhtiar Qutub Ali, Niki Pissinou, Kia Makki:
Approximate replication of data using adaptive filters in Wireless Sensor Networks. ISWPC 2008: 365-369 - [c72]Xiangqian Chen, Kia Makki, Kang Yen, Niki Pissinou, Zhihua Liu:
A proactive secure routing algorithm defense against node compromise in sensor networks. LCN 2008: 557-559 - [c71]Zhiwen Wan, Jinsong Zhang, Hao Zhu, Kia Makki, Niki Pissinou:
On Energy-Efficient and Low-Latency Medium Access Control in Wireless Sensor Networks. WCNC 2008: 1905-1910 - [c70]Zhaomin Mo, Hao Zhu, Kia Makki, Niki Pissinou:
Mobility-Assisted Location Management for Vehicular Ad Hoc Networks. WCNC 2008: 2224-2228 - 2007
- [j37]Stylianos Drakatos, Niki Pissinou, Kia Makki, Christos Douligeris:
A context-aware cache structure for mobile computing environments. J. Syst. Softw. 80(7): 1102-1119 (2007) - [j36]Hai Liu, Xiaohua Jia, Peng-Jun Wan, Chih-Wei Yi, S. Kami Makki, Niki Pissinou:
Maximizing lifetime of sensor surveillance systems. IEEE/ACM Trans. Netw. 15(2): 334-345 (2007) - [c69]Xiwei Zhao, Niki Pissinou, S. Kami Makki:
The Optimization of Location Management. CCNC 2007: 380-384 - [c68]Niki Pissinou, Garth V. Crosby:
Cluster-Based Reputation and Trust for Wireless Sensor Networks. CCNC 2007: 604-608 - [c67]Yu Dong, Niki Pissinou, Jian Wang:
Concurrency Handling in TCP. CNSR 2007: 255-262 - [c66]Xiwei Zhao, Vinayak Ganapathy, Niki Pissinou, Kia Makki:
Revisiting Global Time Synchronization. GLOBECOM 2007: 1058-1063 - [c65]Xiangqian Chen, Kia Makki, Kang Yen, Niki Pissinou:
A New Network Topology Evolution Generator Based on Traffic Increase and Distribution Model. ICN 2007: 56 - [c64]James D. Gadze, Niki Pissinou, Kia Makki:
Wireless Networked-Based Sensing for Protection and Decentralized Control of Critical Infrastructures. ICNSC 2007: 644-649 - [c63]Te-Shun Chou, Kang K. Yen, Niki Pissinou, Kia Makki:
Fuzzy Belief Reasoning for Intrusion Detection Design. IIH-MSP 2007: 621-624 - [c62]Xiangqian Chen, Kia Makki, Kang Yen, Niki Pissinou:
Node Compromise Modeling and its Applications in Sensor Networks. ISCC 2007: 575-582 - [c61]James D. Gadze, Niki Pissinou, Kia Makki, Garth V. Crosby:
On Optimal Slot Allocation for Reservation TDMA MAC Protocol in Shadow Fading Environment. ISWCS 2007: 809-813 - [c60]Garth V. Crosby, Niki Pissinou:
Evolution of Cooperation in Multi-Class Wireless Sensor Networks. LCN 2007: 489-495 - [c59]Te-Shun Chou, Kang K. Yen, Liwei An, Niki Pissinou, Kia Makki:
Fuzzy belief pattern classification of incomplete data. SMC 2007: 535-540 - [c58]Chunming Liu, Chi Zhou, Niki Pissinou, Kia Makki:
Resource Management in the Next-Generation Integrated WLAN / 3G Cellular Networks. WCNC 2007: 3341-3346 - 2006
- [j35]Scott C.-H. Huang, Kia Makki, Niki Pissinou:
On Optimizing Compatible Security Policies in Wireless Networks. EURASIP J. Wirel. Commun. Netw. 2006 (2006) - [c57]Stylianos Drakatos, Niki Pissinou, Kia Makki, Christos Douligeris:
A context-aware prefetching strategy for mobile computing environments. IWCMC 2006: 1109-1116 - [c56]Zhaomin Mo, Hao Zhu, Kia Makki, Niki Pissinou:
MURU: A Multi-Hop Routing Protocol for Urban Vehicular Ad Hoc Networks. MobiQuitous 2006: 1-8 - [c55]Xiwei Zhao, S. Kami Makki, Niki Pissinou:
An Efficient and Robust Routing Protocol for Data Aggregation. WASA 2006: 175-186 - [c54]Scott C.-H. Huang, Shamila Makki, Niki Pissinou:
Accusation Resolution Using Security Metrology. WASA 2006: 435-444 - [c53]Stylianos Drakatos, Niki Pissinou, Kia Makki, Christos Douligeris:
A future location-prediction replacement strategy for mobile computing environments. WCNC 2006: 2252-2260 - 2005
- [j34]Tirthankar Ghosh, Niki Pissinou, S. Kami Makki:
Towards Designing a Trusted Routing Solution in Mobile Ad Hoc Networks. Mob. Networks Appl. 10(6): 985-995 (2005) - [c52]Hai Liu, Peng-Jun Wan, Chih-Wei Yi, Xiaohua Jia, S. A. M. Makki, Niki Pissinou:
Maximal lifetime scheduling in sensor surveillance networks. INFOCOM 2005: 2482-2491 - 2004
- [c51]Shamila Makki, Niki Pissinou, Hui Huang:
The Security Issues in the Ad-Hoc on Demand Distance Vector Routing Protocol (AODV). Security and Management 2004: 427- - [c50]Shamila Makki, Niki Pissinou, Tirthankar Bhowmick:
LEACH Protocol for Assigning Cluster-Heads Using a Deterministic and Stochastic Approach for Wireless Sensor Networks. International Conference on Wireless Networks 2004: 963-968 - [c49]S. A. M. Makki, Niki Pissinou, Saurabh D. Agrawal:
A Framework For Policy Based Coordinated Adaptation in Mobile Systems. International Conference on Wireless Networks 2004: 969-974 - [c48]Shamila Makki, Niki Pissinou, Sachin Vitthal Khare:
Simulation of Wireless Sensor Networks Based on Energy Aware Routing Approach. International Conference on Wireless Networks 2004: 982- - [c47]