Jonathan Kok-Keong Loo
Citeret af
Citeret af
Mobile Ad Hoc Networks: Current Status and Future Trends
J Loo, JL Mauri, JH Ortiz
Taylor & Francis Group, 0
Joint computation and communication design for UAV-assisted mobile edge computing in IoT
T Zhang, Y Xu, J Loo, D Yang, L Xiao
IEEE Transactions on Industrial Informatics 16 (8), 5505-5516, 2019
Customer churn prediction in telecommunication industry using data certainty
A Amin, F Al-Obeidat, B Shah, A Adnan, J Loo, S Anwar
Journal of Business Research 94, 290-301, 2019
Recent advances in radio resource management for heterogeneous LTE/LTE-A networks
YL Lee, TC Chuah, J Loo, A Vinel
IEEE Communications Surveys & Tutorials 16 (4), 2142-2180, 2014
Recent advances in information-centric networking-based Internet of Things (ICN-IoT)
S Arshad, MA Azam, MH Rehmani, J Loo
IEEE Internet of Things Journal 6 (2), 2128-2158, 2018
A specification-based IDS for detecting attacks on RPL-based network topology
A Le, J Loo, KK Chai, M Aiash
Information 7 (2), 25, 2016
The impact of rank attack on network topology of routing protocol for low-power and lossy networks
A Le, J Loo, A Lasebae, A Vinel, Y Chen, M Chai
IEEE Sensors Journal 13 (10), 3685-3692, 2013
Real-time detection of denial-of-service attacks in IEEE 802.11 p vehicular networks
N Lyamin, A Vinel, M Jonsson, J Loo
IEEE Communications letters 18 (1), 110-113, 2013
6LoWPAN: a study on QoS security threats and countermeasures using intrusion detection system approach
A Le, J Loo, A Lasebae, M Aiash, Y Luo
International Journal of Communication Systems 25 (9), 1189-1212, 2012
Dynamic network slicing for multitenant heterogeneous cloud radio access networks
YL Lee, J Loo, TC Chuah, LC Wang
IEEE Transactions on Wireless Communications 17 (4), 2146-2161, 2018
Specification-based IDS for securing RPL from topology attacks
A Le, J Loo, Y Luo, A Lasebae
2011 IFIP Wireless Days (WD), 1-3, 2011
Authentication of smartphone users based on activity recognition and mobile sensing
M Ehatisham-ul-Haq, MA Azam, J Loo, K Shuang, S Islam, U Naeem, ...
Sensors 17 (9), 2043, 2017
Continuous authentication of smartphone users based on activity pattern recognition using passive mobile sensing
M Ehatisham-ul-Haq, MA Azam, U Naeem, Y Amin, J Loo
Journal of Network and Computer Applications 109, 24-35, 2018
The impacts of internal threats towards routing protocol for low power and lossy network performance
A Le, J Loo, Y Luo, A Lasebae
2013 IEEE symposium on computers and communications (ISCC), 000789-000794, 2013
An integrated antenna system for 4G and millimeter-wave 5G future handheld devices
SI Naqvi, AH Naqvi, F Arshad, MA Riaz, MA Azam, MS Khan, Y Amin, ...
IEEE Access 7, 116555-116566, 2019
On the investigation of cloud-based mobile media environments with service-populating and QoS-aware mechanisms
F Sardis, G Mapp, J Loo, M Aiash, A Vinel
IEEE transactions on multimedia 15 (4), 769-777, 2013
Secure routing protocol using cross-layer design and energy harvesting in wireless sensor networks
NA Alrajeh, S Khan, J Lloret, J Loo
International Journal of Distributed Sensor Networks 9 (1), 374796, 2013
User preference aware caching deployment for device-to-device caching networks
T Zhang, H Fan, J Loo, D Liu
IEEE Systems Journal 13 (1), 226-237, 2017
Hierarchical and flat-based hybrid naming scheme in content-centric networks of things
S Arshad, B Shahzaad, MA Azam, J Loo, SH Ahmed, S Aslam
IEEE Internet of Things Journal 5 (2), 1070-1080, 2018
Case study of a black hole attack on LoWPAN-RPL
K Chugh, L Aboubaker, J Loo
Proc. of the Sixth International Conference on Emerging Security Information …, 2012
Systemet kan ikke foretage handlingen nu. Prøv igen senere.
Artikler 1–20