Follow
Waqar Khalid
Title
Cited by
Cited by
Year
A survey of local/cooperative-based malicious information detection techniques in VANETs
M Arshad, Z Ullah, N Ahmad, M Khalid, H Criuckshank, Y Cao
EURASIP Journal on Wireless Communications and Networking 2018 (1), 62, 2018
712018
Beacon trust management system and fake data detection in vehicular ad-hoc networks
M Arshad, Z Ullah, M Khalid, N Ahmad, W Khalid, D Shahwar, Y Cao
IET Intelligent Transport Systems, 2018
402018
A Taxonomy on Misbehaving Nodes in Delay Tolerant Networks (Threat Intelligence)
W Khalid, Z Ullah, N Ahmad, Y Cao, M Khalid, M Arshad, F Ahmad, ...
Computer & Security, 2018
392018
Radius-based Multi-path Courier Node Routing Protocol for Acoustic Communications
M Khalid, Y Cao, N Ahmad, W Khalid, P Dhawankar
IET Wireless Sensor System, 2018
332018
Comparison of Localization Free Routing Protocols in Underwater Wireless Sensor Networks
M Khalid, Z Ullah, N Ahmad, A Adnan, W Khalid, A Ashfaq
INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS 8 (3 …, 2017
282017
E2MR: Energy Efficient Multipath Routing Protocol for Underwater Wireless Sensor Networks
M Khalid, Y Cao, M Arshad, W Khalid, F Ahmed
IET Networks, 2019
272019
Optimized Pricing & Scheduling Model for Long-range Autonomous Valet Parking
M Khalid, Y Cao, N Aslam, C Suthaputchakun, M Arshard, W Khalid
IEEE International Confrence on Frontier of Information Technology (FIT), 2018
172018
FRID: Flood attack mitigation using Resources efficient Intrusion Detection techniques in Delay Tolerant Networks (reinforcement learning)
W Khalid, N Ahmad, M Khalid, A Uddin, A Khan, M Arshad
IEEE Access, 2019
112019
Routing Challenges and Associated Protocols in Acoustic Communication
M Khalid, Y Cao, M Arshad, W Khalid, N Ahmad
Book Chapter of Taylor & Francis - Magnetic and Acoustic Communication., 2018
62018
FAPMIC: Fake Packet and Selective Packet Drops Attacks Mitigation by Merkle Hash Tree in Intermittently Connected Networks (Threat Intelligence)
W Khalid, N Ahmad, S Khan, N U Saqiub, M Arshad, D Shahwar
IEEE Access, 2023
42023
Simulative Survey of Flooding Attacks in Intermittently Connected Vehicular Delay Tolerant Networks (Threat Intelligence)
W Khalid, N Ahmad, S Khan, Z Ullah, Y Javed
IEEE Access, 2023
12023
Content Based Email Spam Filtering and Detection using Hybrid Supervised Learning Approach
NU Saquib, W Khalid, SA Shaheen, N Ahmad
IEEE WCCCT, 2024
2024
Cyber-Threat-Intelligence: Detection of Selective Packet Drops and Fake Packet Attacks in Opportunistic Networks (DOSFAN)
W Khalid, Y Javed, N Ahmad, A Alam, M Arshad
ICISDM, 2024
2024
Reinforcement Threat Intelligence: Fake Packet and Selective Packet Drops Attacks Detection in Opportunistic Networks (FASADON)
W Khalid, A Alam, N Ahmad, M Arshad, M Alshara
IEEE Access, 2024
2024
Access Authentication Via Blockchain in Space Infromation Networks
M Arshad, L Jianwei, M Khalid, W Khalid, Y Cao, F Alam
Plos ONE, 2023
2023
Mitigation of Misbehaving Nodes in Delay Tolerant Networks (MS Thesis)
W Khalid
http://dx.doi.org/10.13140/RG.2.2.34863.82084, 2018
2018
The system can't perform the operation now. Try again later.
Articles 1–16