Publications

book5 book2 book1 book3 book4 book6 book7 book8

Authored/Edited Books
Edited Special Issues

Contributed Book Chapters
Journal Articles
Conference Papers
Magazine Articles and Editorials

 

Authored/Edited Books

  1. M. S. Obaidat, I. Traore, I. Woungang, Biometric-Based Physical and Cybersecurity Systems, 1st Ed. , Springer, ISBN 10: 3319489461 ISBN: 978-3-319-98734-7, 590 pages, 2019
  2. I. Traore, I. Woungang S. A. Sherif, M. Yasir (Eds.). Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments, 2nd International Conference, ISDDC 2018, Vancouver, BC, Canada, Nov 28-30, 2018 Springer, Lecture Notes in Computer Science (LNCS) 11317
  3. I. Traore, I. Woungang, A. Awad (Eds.). Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments, 1st International Conference, ISDDC 2018, Vancouver, BC, Canada, Oct.26-28, 2017 Springer, Lecture Notes in Computer Science (LNCS) 10618
  4. I. Traore, A. Awad, I. Woungang, Information Security Practices: Emerging Threats and Perspectives , Springer, ISBN 10: 3319489461 ISBN 13: 9783319489469, 100 pages, 2017
  5. J. E. Mason, I, Traore, I. Woungang, (Authored book), Springer, ISBN 978-3-319-29086-7, doi: 10.1007/978-3-319-29088-1, 247 pages, Feb. 8, 2016
  6. I. Woungang, S. K. Dhurandher, A. Anpalagan and T. Vasilakos (Eds), Routing in Opportunistic Networks, Springer, ISBN: 978-1461435136, 410 pages, 2013

Edited Special Issues

  1. I. Woungang, S. K. Dhurandher, J. J. P. C. Rodrigues, A. Awad Special Issue on Security and Privacy in IoT and Cloud Computing Systems , Security and Privacy Journal, Wiley, doi: 10.1002/spy2.43, vol. 1, Issue 3, 2018, pp. 1-2
  2. L. Barolli,I. Woungang, O. K. Hussain Advances in Intelligent Networking and Collaborative Systems, The 9th International Conference on Intelligent Networking and Collaborative Systems, INCoS-2017 , Springer, Lecture Notes on Data Engineering and Communications Technologies 8, Springer 2017, ISBN 978-3-319-65635-9
  3. I. Woungang, S. K. Dhurandher, Introduction to the Special Section on Cognitive Radios as Next-Generation Wireless Networks, , Computers & Electrical Engineering , Vol. 52, Issue C, pp. 223-225, May 2016
  4. I. You, M. R. Ogiela, I. Woungang, K. Yim, Innovative security technologies against insider threats and data leakage, , International Journal Computer Mathematics 93(2): 236-238, 2016

Contributed Book Chapters

  1. V. Saravanan, A. Anpalagan, I. Woungang, Big Data in Massive Parallel Processing: A Multi-core Processors Perspective , Big Data Storage and Visualization Techniques, Richard S. Segall, Jeffrey S. Cook, Neha Gupta (Eds.), IGI Global, USA, pp. 276-302, 2018.
  2. M. L. Brocardo, I. Traore, I. Woungang, Continuous authentication using writing style , in Biometric-based Security Systems: State of the Art and Perspectives, Obaidat et al. (Eds.), Cambridge University Press, pp. 211-232, 2017.
  3. E. Mason, I. Traore, I. Woungang, Facets and Promises of Gait Biometrics Recognition , in Biometric-based Security Systems: State of the Art and Perspectives, Obaidat et al. (Eds.), Cambridge University Press, pp. 233-253, 2017.
  4. I. Woungang et al., Energy Efficient Mobile Wireless Network Operations for 4G and Beyond Using HetNets , Advances in Mobile Computing and Communications: 4G and Beyond (5G), M. Bala Krishna, Jaime Lloret Mauri (Eds.), CRC Press, ISBN 9781498701136, 397 pages, July 12, 2016

Journal Articles

  1. R. Siddavaatam, I. Woungang, A. Anpalagan . Joint Optimization of Radio and Infrastructure Resources for Energy-Efficient Massive Data Storage in Mobile Cloud over 5G HetNet. Accepted May 31, 2019, IET Wireless Sensor Systems. In Press
  2. A. Sultana, I. Woungang, L. Zhao, A. Anpalagan . Two-Tier Architecture for Spectrum Auction in SDN-enabled Cloud Radio Access Network, (Accepted May 15, 2019), IEEE Trans. on Vehicular Technology. In Press
  3. M. Alshahrani, I. Traore, I. Woungang. . Anonymous mutual IoT interdevice authentication and key agreement scheme based on the ZigBee technique, (Accepted May 20, 2019), Internet of Things: Engineering Cyber Physical Human Systems. In Press
  4. R. Siddavaatam, I. Woungang, G. H. S. Carvalho, A. Anpalagan . A Radio Resource Management for Mobile Cloud Storage over 5G Based on Mechanism Design, (Accepted March 16, 2019), IEEE Systems Journal. In Press
  5. M. Bansal, S. K. Malik, S. K. Dhurandher, I. Woungang. Policies and Mechanisms for Enhancing the Resource Management in Cloud Computing: A Performance Perspective, (Accepted April 25, 2019), International Journal of Grid and Utility Computing (IGJUC), Inderscience, UK. In Press
  6. S. K. Dhurandher, I. Woungang, J. Singh, S. J. Borah, M.S. Obaidat . Energy Aware Routing for Efficient Green Communication in Opportunistic Networks, (Accepted March 8, 2019), IET Networks. In Press
  7. N. Gupta, S. K. Dhurandher, I. Woungang, J. J. P. C. Rodrigues. On the Target Channel Sequence Selection for Multiple Handoffs in Cognitive Radio based Wireless Regional Area Networks, Int. J. Space-Based and Situated Computing, Vol. 8, No. 4, (2018), pp. 214-224
  8. A. Alnoman, G. H. S. Carvalho, A.Anpalagan, I. Woungang. Energy Efficiency on Fully Cloudified Mobile Networks: Survey, Challenges, and Open Issues, IEEE Communications Surveys and Tutorials 20(2): 1271-1291 (2018)
  9. G. H. S. Carvalho, I. Woungang, A.Anpalagan, M. Jaseemuddin, Analysis of Joint Parallelism in Wireless and Cloud Domains on Mobile Edge Computing over 5G Systems, Journal of Communications and Networks, vol. 20, No. 6, Dec. 2018, pp. 1-12.
  10. N. Gupta, S. K. Dhurandher , I. Woungang, J. J. P. C. Rodrigues. On the Target Channel Sequence Selection for Multiple Handoffs in Cognitive Radio based Wireless Regional Area Networks, Int. J. Signal and Imaging Systems Engineering, Inderscience, UKvol. x, No. x, 201X
  11. N. Gupta, S. K. Dhurandher , I. Woungang Subcarriers assignment scheme for multiple secondary users in OFDMA-based IEEE 802.22 WRAN: A game theoretic approach Trans. Emerging Telecommunications Technologies29(11) , (2018)
  12. S. Tang, A. Alnoman, A. Anpalagan, I. Woungang, A user-centric cooperative edge caching scheme for minimizing delay in 5G content delivery networks Trans. Emerging Telecommunications Technologies 29(8) , (2018)
  13. M. S. Raniyal, I. Woungang, S. K. Dhurandher, S. S. Ahmed, Passphrase protected device-to-device mutual authentication schemes for smart homes, Security and Privacy, Wiley, 2018, e42. https://doi.org/10.1002/spy2.42, vol. 1, Issue 3, pp. 1-19
  14. B. Kumar, S. K. Dhurandher, I. Woungang, A survey of overlay and underlay paradigms in cognitive radio networks Int. J. Communication Systems 31(2) (2018)
  15. S. J. Borah, S. K. Dhurandher, I. Woungang, V. Kumar, L. Barolli A Multi-Objectives based Technique for Optimized Routing in Opportunistic Networks J. Ambient Intelligence and Humanized Computing 9(3): 655-666 (2018)
  16. S. K. Dhurandher, S. J. Borah, I. Woungang , S, Tibarewal, L. Barolli, DEEP: Distance and Encounter based Energy-efficient Protocol for Opportunistic Networks J. High Speed Networks 24(2): 119-131 (2018)
  17. S. K. Dhurandher, S. J. Borah, I. Woungang , A. Bansal, A. Gupta, A location Prediction-based routing scheme for opportunistic networks in an IoT scenario, J. Parallel Distrib. Comput.118(Part): 369-378 (2018)
  18. A. S. Pillai, K. Singh, V. Saravanan, A. Anpalagan, I. Woungang , L. Barolli, A Genetic Algorithm-based Method for Optimizing the Energy Consumption and Performance of Multiprocessor Systems, Soft Comput. 22(10): 3271-3285 (2018)
  19. S. J. Borah, S. K. Dhurandher, I. Woungang , V. Kumar, Game Theoretic Context-Based Routing for Opportunistic Networks in an IoT Scenario, Computer Networks 129: 572-584 (2017)
  20. P. Kuchhal, S. K. Dhurandher, S. J. Borah, I. Woungang , S. Jain, S. Gupta, A* Search Based Next Hop Selection for Routing in Opportunistic Networks, Int. J. of Space-Based and Situated Computing, Vol.7, No.3, pp.177-186 (2017)
  21. S. K. Malik, M. Dave, S. K. Dhurandher, I. Woungang, L. Barolli, An Ant-based QoS Aware Routing Protocol for Heterogeneous Wireless Sensor Soft Computing, Nov 2017, Vol. 21, Issue 21, pp. 6225-6236.
  22. S. K. Dhurandher, D. K. Sharma, I. Woungang, A. Saini An energy-efficient history-based routing scheme for opportunistic networks. Intl. J. Communication Systems 30(7)(2017).
  23. G. H. S. Calvalho, I. Woungang, A. Anpalagan, Intercloud and HetNet for Mobile Cloud Computing in 5G Systems: Design Issues, Challenges, and Optimization, IEEE Network 31(3): 80-89 (2017)
  24. A. Alnoman, A. Anpalagan, I. Woungang, Base Station Sleeping Mechanism for Reduced Delay Using Traffic Load Prediction Journal of Traffic and Logistics Engineering, Engineering and Technology Publishing, USA, Feb. 2017.
  25. S. K. Dhurandher, D. K. Sharma, I. Woungang, A. Saini, An energy-efficient history-based routing scheme for opportunistic networks Int. J. Communication Systems 30(7), 2017
  26. F. Hussain, L. Ferdouse, A. Anpalagan, L. Karim, I. Woungang, Security threats in M2M networks: a survey with case study Computer Systems Science and Engineering Journal, CRL Publishing, Vol. 32, No. 1, March 2017
  27. S. K. Dhurandher, S. J. Borah, I. Woungang, A. Gupta, A. Bansal, A Location Prediction-based Routing Scheme for Opportunistic Networks in an IoT Scenario, Journal of Parallel and Distributed Computing , 2017. In Press
  28. S. K. Malik, M. Dave, S. K. Dhurandher, I. Woungang, L. Barolli, An Ant-based QoS Aware Routing Protocol for Heterogeneous Wireless Sensor, Soft Comput. 21(21): 6225-6236 , (2017)
  29. S. K. Dhurandher, S. J. Borah, I. Woungang, S. Tibarewal, and L. Barolli, DEEP: Distance and Encounter based Energy-efficient Protocol for Opportunistic Networks (Accepted Sept. 5, 2017), High Speed Networks, IoS Pres. In Press
  30. A. S. Pillai, K. Singh, V. Saravanan, A. Anpalagan, I. Woungang, L. Barolli, A Genetic Algorithm-based Method for Optimizing the Energy Consumption and Performance of Multiprocessor Systems?, (Accepted Au 6, 2017), Soft Computing. In Press
  31. B. Kumar, S. K. Dhurandher, I. Woungang, A survey of overlay and underlay paradigms in cognitive radio networks, Int. J. Communication Systems 31(2) (2018)
  32. D. K. Sharma, S. K. Dhurandher, I. Woungang, J. Arora, I. Gupta, History Based Secure Routing Protocol to Detect Blackhole and Greyhole Attacks in Opportunistic Networks Recent Advances in Communications and Networking Technology (RACNT), Benham Science, Vol. 5, No. 2, pp. 73-89, 2016
  33. M. L. Brocardo, I. Traore, I. Woungang, M. S. Obaidat, Authorship Verification using Deep Belief Network Systems, Int. J. Communication Systems 30(12) (2017).
  34. S. K. Malik, M. Dave, S. K. Dhurandher, I. Woungang, L. Barolli, An Ant-based QoS Aware Routing Protocol for Heterogeneous Wireless Sensor Soft Computing, Springer, Online, doi:10.1007/s00500-016-234-z, pp. 1-12, 2016
  35. A. Kumar, S. K. Dhurandher, M. S. Obaidat, I. Woungang, S. Gupta, J. J. P. C. Rodrigues, An Altruism-based Trust-Dependent Message Forwarding Protocol for Opportunistic Networks [J1] . Int. J. Communication Systems 30(10)
  36. (2017)
  37. D. K. Sharma, S. K. Dhurandher, I. Woungang, R. K. Srivastava, A. Mohananey, J. J. P. C. Rodrigues, A Machine Learning-based Protocol for Efficient Routing in Opportunistic Networks IEEE Systems Journal, Vol. PP., Issue 99, pp. 1-7, Dec. 2016
  38. H-C Wang, I. Woungang, K-C Ting, C-C Tseng, F-C Kuo, H-T Huang, Co-Tier Downlink Interference Management in Dense Femtocell Networks Int J Commun Syst, 29: 2534-2541. doi: 10.1002/dac.3196, 2016
  39. A. Kitana, I. Traore, I. Woungang, Impact Study of a Mobile Botnet over LTE Networks Journal of Internet Services and Information Security (JISIS) , Vol. 6, No. 2, pp. 1-22, May 2016
  40. F. Rashid, A. Miri, I. Woungang, Secure Image Deduplication through Image Compression Journal of Information Security and Applications, Springer, Vol. 27-28, pp. 54-64, Apr-May 2016
  41. G.H.S. Carvalho, I. Woungang, A. Anpalagan, E. Hossain, QoS-Aware Energy-Efficient Joint Radio Resource Management in Multi-RAT Heterogeneous Networks IEEE Trans. on Vehicular Technology, Vol. 65. Issue 8, pp. 6343-6365, 2015
  42. S. K. Dhurandher, I. Woungang, M. S. Obaidat, K. Kumar, M. Joshi, M. Verma, A Distributed Adaptive Admission Control Scheme for Multimedia Wireless Mesh Networks IEEE Systems Journal . 9(2): 595-604, 2015
  43. J-M Chang, P-C Tsou, I. Woungang, H-C Chao, J-L Chen, Defending Against Collaborative Attacks by Malicious Nodes in MANETs: a Cooperative Bait Detection Approach IEEE Systems Journal 9(1): 65-75, 2015
  44. S. K. Dhurandher, D. K. Sharma, I. Woungang, S. Gupta, Integration of Fixed and Mobile Infrastructure for Message Passing in Opportunistic Networks Journal of Networks, Vol. 10, No. 12, pp. 642-657, Dec. 2015
  45. M. L. Brocardo, I. Traore, I. Woungang, Authorship Verification of Email and Tweet Messages Applied for Continuous Authentication Journal of Computer and System Sciences, Vol. 31, Issue 8, pp. 1429-1440, Dec. 2015
  46. A. Behzadan, A. Anpalagan, I. Woungang, B. Ma, H-C. Chao, An Energy Efficient Utility-based Distributed Data Routing Scheme for Heterogeneous Sensor Networks Wirel. Commun. Mob. Comput., 15: 2020-2037. doi: 10.1002/wcm.2474, 2015
  47. S. K. Dhurandher, D. K. Sharma, I. Woungang, A. Saini, Efficient Routing based on Past Information to Predict the Future Location for Message Passing in Infrastructureless Opportunistic Networks Journal of Supercomputing, 71(5): 1694-1711, 2015
  48. M. L. Brocardo, I. Traore, S. Saad, I. Woungang, Verifying Online User Identity using Stylometric Analysis for Short Messages Journal of Networks, Vol. 9, No. 12, Dec. 2014, pp. 3347-3355
  49. G. H.S. Carvalho, I. Woungang, A. Anpalagan, Analysis of Sub-band Allocation in Multi-Service Cognitive Radio Access Networks IEEE Wireless Communications Letters, Vol. PP., Issue 99, doi: 10.1109/LWC 2014.2344669, July 31, 2014, pp. 645-648
  50. S. K. Dhurandher, D. K. Sharma, I. Woungang, R. Gupta, S. Garg, GAER: Genetic Algorithm based Energy-efficient Routing Protocol for Infrastructureless Opportunistic Networks Journal of Supercomputing, DOI: 10.1007/s11227-014-1195-9, May 3, 2014
  51. I. Traore, I. Woungang, M. S. Obaidat, Y. Nakkabi, I. Lai, Online Risk-Based Authentication Using Behavioral Biometrics Multimedia Tools and Appl., July 2014, Vol. 71, Issue 2, pp. 575-605
  52. I. Woungang, F-H Tseng, Y-H Lin, L-D Chou, H-C Chao, M. S. Obaidat, MR-Chord: Improved Chord Look-Up Performance in Structured Mobile P2P Networks IEEE Systems Journal , DOI: 10.1109/JSYST.2014.2306147, pp. 743-751, March 2014
  53. L. Karim, A. Anpalagan, N. Nasser, J. Almhana, I. Woungang, Fault Tolerant, Energy Efficient and Secure Clustering Scheme for Mobile M2M Communications Transactions on Emerging Telecommunications Technologies, Vol. 25, Issue 10, pp. 1028-1044, Oct. 2014
  54. V. Ngo, I. Woungang, A. Anpalagan, A Schedule-based Medium Access Control Protocol for Mobile Wireless Sensor Networks, Wirel. Commun. Mob. Comput., 14(6): 629-643, 2014
  55. A. Behzadan, A. Anpalagan, I. Woungang, B. Ma, Utility Driven Construction of Balanced Data Routing Trees in Wireless Sensor Networks Wirel. Commun. Mob. Comput., 14(8): 770-788, 2014
  56. M. S. Obaidat, I. Woungang, S. K. Dhurandher, V. Koo, A Cryptography-Based Protocol Against Packet Dropping and Message Tampering Attacks on Mobile Ad Hoc Networks Security and Communication Networks 7(2): 376-384, 2014
  57. R. Siddavaatam, A. Anpalagan, I. Woungang, S. Misra, Ant Colony Optimization based Sub-channel Allocation Algorithm for Small Cell LTE-A HetNets Wireless Pers Commun. 77: 411. doi:10.1007/s11277-013-1513-1, 2014

Conference Papers

  1. J. Singh, S. K. Dhurandher, I. Woungang, M. Takizawa, Centrality-Based Geo-casting for Opportunistic Networks. . AINA 2019: 702-712
  2. R. Siddavaatam, I. Woungang, S. K. Dhurandher, An Efficient Data Transmission Technique for Big Video Files over HetNet in Emerging 5G Networks AINA 2019: 713-724
  3. M. S. Raniyal, I. Woungang, S. K. Dhurandher, An RSA-Based User Authentication Scheme for Smart-Homes Using Smart Card Proc. of ISDDC 2018, , LNCS 11317, https://doi.org/10.1007/978-3-030-03712-3_2, 2018, pp. 1629
  4. R. de C. D. Leles, J. J. P. C. Rodrigues,, I. Woungang, R. A. L. Rabelo, V. Furtado, Railways Networks Challenges for IoT Underground Wireless Communications (Accepted Oct. 2, 2018), IEEE LATINCOM 2018
  5. S. K. Dhurandher, I. Woungang, N. Gupta, R. Jain, D. Singhal, J. Agarwal, M. S. Obaidat Optimal Secondary Users Selection for Cooperative Spectrum Sensing in Cognitive Radio Networks (Accepted Aug. 27, 2018) Globecom Workshops 2018
  6. T. El Salti, M. Orlando, S. Hood, G. Knelsen, M. Iarocci, Z. Lazzara, Y. Xie, J. C-C Cheung, I. Woungang New Set of Bluetooth-Based Fingerprinting Algorithms for Indoor Location Services, 2018 IEMCON (Best paper award)
  7. O. Gueye, I. Woungang, F. Khandaker, B. Alam Design and Analysis of a Survivable ATM Network LOPAL 2018: 60:1-60:6
  8. U. Choudhary, S. K. Dhurandher, V. Kumar, I. Woungang, J. J. P. C. Rodrigues, Online Signature Verification Using the Information Set Based Models AINA 2018: 1104-1109
  9. J. Agarwal, R. Jain, S. K. Dhurandher, I. Woungang, N. Gupta, Fair sub-carrier allocation in OFDMA and cognitive radio based IEEE 802.22 WRAN INFOCOM Workshops 2018: 571-576
  10. P. N. Ba, J. J. P. Rodrigues, S. Ouya, A. S. Maiga, I. Woungang, S. K. Dhurandher, S. Mumtaz Performance Evaluation of LTE and 5G Modeling over OFDM and GFDM Physical Layers ICC 2018: 1-6
  11. S. J. Borah, S. K. Dhurandher, I. Woungang, N. Kandhoul, J. J. P. C. Rodrigues An Energy-Efficient Location Prediction-Based Forwarding Scheme for Opportunistic Networks ICC 2018: 1-6
  12. N. Gupta, S. K. Dhurandher, I. Woungang, M. S. Obaidat, Proactive Decision Based Handoff Scheme for Cognitive Radio Networks ICC 2018: 1-6
  13. A. Kumar, S. K. Dhurandher, I. Woungang, V. Kumar, M. Takizawa Interference Aware Metric-Based Routing Protocol in Cognitive Radio Networks BWCCA 2017: 502-515
  14. M. W. L. Moreira, J. J. P. C. Rodrigues, N. Kumar, J. Niu, I. Woungang, Performance Assessment of Decision Tree-based Predictive Classifiers for Risk Pregnancy Care, GLOBECOM 2017: 1-5
  15. N. Gupta, S. K. Dhurandher, I. Woungang, J. J.P.C. Rodrigues, Game Theoretic Analysis of Post Handoff Target Channel Sharing in Cognitive Radio Networks, GLOBECOM 2017: 1-6 .
  16. S. K. Dhurandher, S. J. Borah, S. Tibarewala, I. Woungang, Mohammad S. Obaidat, Energy-Efficient Prophet-PRoWait-EDR Protocols for Opportunistic Networks, GLOBECOM 2017: 1-6
  17. M. S. Raniyal, I. Woungang, and S. K. Dhurandher, An Inter-Device Authentication Scheme for Smart Homes using One-Time-Password over Infrared Channel, ISDDC 2017: 95-117 (Best paper award)
  18. A. Alenazi, I. Traore, K. Ganame, I. Woungang, Holistic Model for HTTP Botnet Detection based on DNS Traffic Analysis, ISDDC 2017: 1-18
  19. G. H. S. Carvalho, I. Woungang, A. Anpalagan, E. Degtiareva, J. J. P. C. Rodrigues, A Semi-Markov Decision Model-based Brokering Mechanism for Mobile Cloud Market ICC 2017: 1-6
  20. D. K. Sharma, S. K. Dhurandher, I. Woungang, A. Bansal, A. Gupta, A. Anpalagan, GD-CAR: A Genetic algorithm based dynamic context aware routing protocol for Opportunistic networks NBiS 2017: 611-622
  21. L. Karim, A. Anpalagan, N. Nasser, I. Woungang, J. Almhana, N. Khan, An Efficient Cluster-Based and Energy Aware Scheme for M2M Communication Networks Proc. of IEEE IST-Africa 2017, Windhoek, Namibia, May 2017
  22. S. K. Dhurandher, A. Kumar, I. Woungang, M. S. Obaidat, Supernova and Hypernova Misbehavior Detection Scheme for Opportunistic Networks AINA 2017: 387-391
  23. A. Kitana, I. Traore, I. Woungang, Impact of Base Transceiver Station Selection Mechanisms on a Mobile Botnet Over a LTE Network MALWARE 2016: 20-30
  24. N. Gupta, S. K. Dhurandher, I. Woungang, On the Probability of Appearance of Primary User in IEEE 802.22 WRAN using an Artificial Neural Network Learning Technique Proc. of IEEE India Intl. Conference on Information Processing (IICIP 2016), Delhi, Aug. 12-14, 2016
  25. R. Siddavaatam, I. Woungang, G. H. S. Carvalho, A. Anpalagan, An Efficient Method for Mobile Big Data Transfer Over HetNet in Emerging 5G Systems CAMAD 2016: 59-64
  26. V. Shrivastav, S. K. Dhurandher, I. Woungang, V. Teotia, J. J. P. C. Rodrigues, Game Theory-Based Channel Allocation in Cognitive Radio Networks GLOBECOM 2016: 1-5
  27. R. Siddavaatam, I. Woungang, G. H. S. Carvalho, A. Anpalagan, Efficient Ubiquitous Big Data Storage Strategy for Mobile Cloud Computing over HetNet GLOBECOM 2016: 1-6
  28. K. Khalid, I. Woungang, S. K. Dhurandher, L. Barolli, G. H.S. Carvalho, M. Takizawa, An Energy-Efficient Routing Protocol for Infrastructure-less Opportunistic Networks IMIS 2016: 237-244
  29. A. Bamrah, I. Woungang, L. Barolli, S. K. Dhurandher, G. H.S. Carvalho, M. Takizawa, A Centrality-Based History Prediction Routing Protocol for Opportunistic Networks CISIS 2016: 130-136
  30. B. Tushir, S. K. Dhurandher, I. Woungang, M. S. Obaidat, V. Kumar, Graph Colouring Technique for Efficient Channel Allocation in Cognitive Radio Networks ICC 2016: 1-5
  31. S. K. Dhurandher, I. Woungang, B. Tushir, V. Kumar, M. Takizawa, L. Barolli, Power Control Scheme for Underlay Approach in Cognitive Radio Networks NBiS 2016: 114-118
  32. S. K. Dhurandher, S. J. Borah, D. K. Sharma, I. Woungang, K. Arora, D. Agarwal, EDR: An Encounter and Distance based Routing Protocol for Opportunistic Networks AINA 2016: 297-302
  33. V. Teotia, S. K. Dhurandher, I. Woungang, M. S. Obaidat, Markovian Model Based Channel Allocation in Cognitive Radio Networks DSDIS 2015: 478-482
  34. G. H. S. Carvalho, I. Woungang, A. Anpalagan, L. Barolli, M. Takizawa, Optimal Cloud Broker Method for Cloud Selection in Mobile Inter-Cloud Computing IMIS 2015: 239-244
  35. S. K. Dhurandher, I. Woungang, A. Rajendra, P. Ghaie, P. Chatzimisios, A Centrality-based ACK Forwarding Mechanism for Efficient Routing in Opportunistic Networks IoT 360 (1) 2015: 99-108
  36. F. Rashid, A. Miri, I. Woungang, Proof of Storage for Video Deduplication in the Cloud BigData Congress 2015: 499-505
  37. A. Ojo, N-W Ma, I. Woungang, Modified Floyd-Warshall Algorithm for Equal Cost Multipath in Software-Defined Data Center ICC Workshops 2015: 346-351
  38. V. Teotia, S. K. Dhurandher, I. Woungang, M. S. Obaidat, Wormhole Prevention using COTA Mechanism in Position Based Environment over MANETs ICC 2015: 7036-7040
  39. F. Rashid, A. Miri, I. Woungang, A Secure Video Deduplication Scheme in Cloud Storage Environments Using H.264 Compression BigDataService 2015: 138-146
  40. A. H. Mohammed, A. S. Khwaja, A. Anpalagan, I. Woungang, Base Station Selection in M2M Communication using Q-learning Algorithm in LTE-A Networks AINA 2015: 17-22
  41. S. HariShankar, I. Woungang, S. K. Dhurandher, I. Traore, S. B. Kaleel, E-MAntNet: An ACO-based Energy Efficient Routing Protocol for Mobile Ad Hoc Networks AINA 2015: 29-36
  42. P. Sidhu, I. Woungang, G. H. S. Carvalho, A. Anpalagan, S. K. Dhurandher An Analysis of Machine-Type-Communication on Human-Type-Communication over Wireless Communication Networks AINA Workshops 2015: 332-337
  43. F. Rashid, A. Miri, I. Woungang Proof of Retrieval and Ownership Protocols for Images through SPIHT Compression HPCC/CSS/ICESS 2014: 835-838
  44. M. L. Brocardo, I. Traore, I. Woungang, Toward a Framework for Continuous Authentication using Stylometry AINA 2014: 106-115
  45. S. K. Dhurandher, I. Woungang, I. Traore, C-SCAN: An Energy-Efficient Network Layer Security Protocol for Mobile Ad Hoc Networks AINA Workshops 2014: 530-535
  46. S. K. Dhurandher, M. S. Obaidat, I. Woungang, P. Agarwal, A. Gupta, P. Gupta, A Cluster-Based Load Balancing Algorithm for Cloud Computing ICC 2014: 2921-2925
  47. L. Karim, A. Anpalagan, N. Nasser, J. Almhana, I. Woungang, An Energy Efficient, Fault Tolerant and Secure Clustering Scheme for M2M Communication Networks GLOBECOM Workshops 2013: 677-682
  48. F. Rashid, A. Miri, I. Woungang, Proof of Retrieval and Ownership Protocols for Enterprise-Level Data Deduplication CASCON 2013: 81-90
  49. F. Rashi, A. Miri, I. Woungang, Secure Enterprise Data Deduplication in the Cloud IEEE CLOUD 2013: 367-374

Magazine Articles and Editorials

  1. N. Mentens, D. Sauveron, J. M. Sierra, S-J Wang, I. Woungang, Lightweight and Energy-Efficient Security Solutions for Mobile Computing Devices IET Information Security 10(5): 223-224 (2016)

This site is maintained by Isaac Woungang.
Last Modified: April 2019.