


Остановите войну!
for scientists:


default search action
Sherali Zeadally
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j364]Sri Harsha Mekala, Zubair A. Baig
, Adnan Anwar
, Sherali Zeadally:
Cybersecurity for Industrial IoT (IIoT): Threats, countermeasures, challenges and future directions. Comput. Commun. 208: 294-320 (2023) - [j363]Ali Mustapha, Rida Khatoun, Sherali Zeadally, Fadlallah Chbib, Ahmad Fadlallah, Walid Fahs
, Ali El Attar:
Detecting DDoS attacks using adversarial neural network. Comput. Secur. 127: 103117 (2023) - [j362]Badis Hammi
, Sherali Zeadally
:
Software Supply-Chain Security: Issues and Countermeasures. Computer 56(7): 54-66 (2023) - [j361]Varun Kohli
, Sombuddha Chakravarty
, Vinay Chamola
, Kuldip Singh Sangwan
, Sherali Zeadally:
An analysis of energy consumption and carbon footprints of cryptocurrencies and possible solutions. Digit. Commun. Networks 9(1): 79-89 (2023) - [j360]Alfredo J. Perez
, Farhan Siddiqui, Sherali Zeadally, Derek Lane:
A review of IoT systems to enable independence for the elderly and disabled individuals. Internet Things 21: 100653 (2023) - [j359]Anjum Mohd Aslam, Rajat Chaudhary, Aditya Bhardwaj, Ishan Budhiraja, Neeraj Kumar, Sherali Zeadally:
Metaverse for 6G and Beyond: The Next Revolution and Deployment Challenges. IEEE Internet Things Mag. 6(1): 32-39 (2023) - [j358]Badis Hammi, Sherali Zeadally, Alfredo J. Perez:
Non-Fungible Tokens: A Review. IEEE Internet Things Mag. 6(1): 46-50 (2023) - [j357]Adnan Akhunzada
, Sherali Zeadally
, Saif ul Islam
:
Toward Performance and Energy-Efficient Edge-of-Things. IT Prof. 25(1): 17-23 (2023) - [j356]Sana Sharif, Sherali Zeadally, Waleed Ejaz
:
Space-aerial-ground-sea integrated networks: Resource optimization and challenges in 6G. J. Netw. Comput. Appl. 215: 103647 (2023) - [j355]Wenyu Zhang
, Sherali Zeadally
, Wei Li, Haijun Zhang
, Jingyi Hou, Victor C. M. Leung
:
Edge AI as a Service: Configurable Model Deployment and Delay-Energy Optimization With Result Quality Constraints. IEEE Trans. Cloud Comput. 11(2): 1954-1969 (2023) - [j354]Wenyu Zhang
, Sherali Zeadally
, Huan Zhou
, Haijun Zhang
, Ning Wang
, Victor C. M. Leung
:
Joint Service Quality Control and Resource Allocation for Service Reliability Maximization in Edge Computing. IEEE Trans. Commun. 71(2): 935-948 (2023) - [i13]Vinay Chamola, Gaurang Bansal, Tridib Kumar Das, Vikas Hassija, Naga Siva Sai Reddy, Jiacheng Wang, Sherali Zeadally, Amir Hussain, F. Richard Yu, Mohsen Guizani, Dusit Niyato:
Beyond Reality: The Pivotal Role of Generative AI in the Metaverse. CoRR abs/2308.06272 (2023) - 2022
- [j353]Ouadoudi Zytoune, Hacène Fouchal, Sherali Zeadally:
A realistic relay selection scheme for cooperative MIMO networks. Ad Hoc Networks 124: 102706 (2022) - [j352]Oladayo Bello
, Sherali Zeadally:
Internet of underwater things communication: Architecture, technologies, research challenges and future opportunities. Ad Hoc Networks 135: 102933 (2022) - [j351]Mario Collotta, Ilsun You, Sherali Zeadally, Fei Song:
Introduction to the special section on Smart Green Applications: QoS and Security-aware solutions in collaborative wireless networks (VSI-cwn). Comput. Electr. Eng. 97: 107656 (2022) - [j350]Adel Thaljaoui, Salim El Khediri
, Sherali Zeadally, Abdullah Alourani:
Remote monitoring system using Light Fidelity and InfraRed technologies. Comput. Electr. Eng. 101: 108073 (2022) - [j349]Muhammad Taimoor Khan
, Adnan Akhunzada, Sherali Zeadally:
Proactive Defense for Fog-to-Things Critical Infrastructure. IEEE Commun. Mag. 60(12): 44-49 (2022) - [j348]Rafael S. Lopes
, Denis Rosário, Eduardo Cerqueira, Helder M. N. S. Oliveira, Sherali Zeadally:
Priority-aware traffic routing and resource allocation mechanism for space-division multiplexing elastic optical networks. Comput. Networks 218: 109389 (2022) - [j347]Nouman Bashir, Saadi Boudjit, Sherali Zeadally:
A closed-loop control architecture of UAV and WSN for traffic surveillance on highways. Comput. Commun. 190: 78-86 (2022) - [j346]Badis Hammi
, Sherali Zeadally, Rida Khatoun, Jamel Nebhen
:
Survey on smart homes: Vulnerabilities, risks, and countermeasures. Comput. Secur. 117: 102677 (2022) - [j345]Alfredo J. Perez
, Sherali Zeadally:
Secure and privacy-preserving crowdsensing using smart contracts: Issues and solutions. Comput. Sci. Rev. 43: 100450 (2022) - [j344]Jinglin Zou, Debiao He, Sherali Zeadally, Neeraj Kumar
, Huaqun Wang, Kim-Kwang Raymond Choo:
Integrated Blockchain and Cloud Computing Systems: A Systematic Survey, Solutions, and Challenges. ACM Comput. Surv. 54(8): 160:1-160:36 (2022) - [j343]Jacques Bou Abdo, Sherali Zeadally:
Multi-utility framework: blockchain exchange platform for sustainable development. Int. J. Pervasive Comput. Commun. 18(4): 388-406 (2022) - [j342]Tu N. Nguyen
, Sherali Zeadally
, Abhijith B. Vuduthala
:
Cyber-Physical Cloud Manufacturing Systems With Digital Twins. IEEE Internet Comput. 26(3): 15-21 (2022) - [j341]Usman Mahmood Malik
, Muhammad Awais Javed
, Sherali Zeadally
, Saif ul Islam
:
Energy-Efficient Fog Computing for 6G-Enabled Massive IoT: Recent Trends and Future Opportunities. IEEE Internet Things J. 9(16): 14572-14594 (2022) - [j340]Faisal Karim Shaikh
, Sarang Karim
, Sherali Zeadally
, Jamel Nebhen
:
Recent Trends in Internet-of-Things-Enabled Sensor Technologies for Smart Agriculture. IEEE Internet Things J. 9(23): 23583-23598 (2022) - [j339]Dwij Mehta, Aditya Mehta, Pratik Narang, Vinay Chamola, Sherali Zeadally:
Deep Learning Enhanced UAV Imagery for Critical Infrastructure Protection. IEEE Internet Things Mag. 5(2): 30-34 (2022) - [j338]Faisal Karim Shaikh
, Mohsin Ali Memon, Naeem Ahmed Mahoto, Sherali Zeadally
, Jamel Nebhen
:
Artificial Intelligence Best Practices in Smart Agriculture. IEEE Micro 42(1): 17-24 (2022) - [j337]Biwen Chen
, Libing Wu
, Sherali Zeadally
, Debiao He
:
Dual-Server Public-Key Authenticated Encryption with Keyword Search. IEEE Trans. Cloud Comput. 10(1): 322-333 (2022) - [j336]Badis Hammi
, Sherali Zeadally
, Yves-Christian Adja Elloh, Manlio Del Giudice
, Jamel Nebhen
:
Blockchain-Based Solution for Detecting and Preventing Fake Check Scams. IEEE Trans. Engineering Management 69(6): 3710-3725 (2022) - [j335]Sandeep Verma
, Sherali Zeadally
, Satnam Kaur
, Ajay Kumar Sharma:
Intelligent and Secure Clustering in Wireless Sensor Network (WSN)-Based Intelligent Transportation Systems. IEEE Trans. Intell. Transp. Syst. 23(8): 13473-13481 (2022) - [j334]Furqan Jameel
, Muhammad Awais Javed
, Sherali Zeadally
, Riku Jäntti
:
Secure Transmission in Cellular V2X Communications Using Deep Q-Learning. IEEE Trans. Intell. Transp. Syst. 23(10): 17167-17176 (2022) - [j333]Badis Hammi
, Yacine Mohamed Idir, Sherali Zeadally
, Rida Khatoun, Jamel Nebhen
:
Is it Really Easy to Detect Sybil Attacks in C-ITS Environments: A Position Paper. IEEE Trans. Intell. Transp. Syst. 23(10): 18273-18287 (2022) - [j332]Jun Huang
, Qiang Duan
, Cong-Cong Xing
, Bo Gu
, Guodong Wang, Sherali Zeadally
, Erich J. Baker
:
A Fine-Grained Video Traffic Control Mechanism in Software-Defined Networks. IEEE Trans. Netw. Serv. Manag. 19(3): 3501-3515 (2022) - [j331]Tu N. Nguyen, Sherali Zeadally:
Mobile Crowd-sensing Applications: Data Redundancies, Challenges, and Solutions. ACM Trans. Internet Techn. 22(2): 48:1-48:15 (2022) - [j330]Feng Sun
, Zhenjiang Zhang
, Sherali Zeadally
, Guangjie Han
, Shiyuan Tong
:
Edge Computing-Enabled Internet of Vehicles: Towards Federated Learning Empowered Scheduling. IEEE Trans. Veh. Technol. 71(9): 10088-10103 (2022) - [j329]Abir Mchergui
, Tarek Moulahi, Sherali Zeadally:
Survey on Artificial Intelligence (AI) techniques for Vehicular Ad-hoc Networks (VANETs). Veh. Commun. 34: 100403 (2022) - [j328]Adamu Sani Yahaya, Nadeem Javaid
, Sherali Zeadally, Hassan Farooq:
Blockchain based optimized data storage with secure communication for Internet of Vehicles considering active, passive, and double spending attacks. Veh. Commun. 37: 100502 (2022) - [j327]Fadlallah Chbib, Sherali Zeadally, Rida Khatoun, Lyes Khoukhi, Walid Fahs, Jamal Haydar:
A secure cross-layer architecture for reactive routing in vehicle to vehicle (V2V) communications. Veh. Commun. 38: 100541 (2022) - [j326]Jean Moraes
, Helder M. N. S. Oliveira, Eduardo Cerqueira
, Cristiano Both
, Sherali Zeadally, Denis Rosário
:
Evaluation of an Adaptive Resource Allocation for LoRaWAN. J. Signal Process. Syst. 94(1): 65-79 (2022) - [c55]Lucas Bastos, Bruno Martins, Iago Medeiros, Augusto Neto, Sherali Zeadally, Denis Rosário, Eduardo Cerqueira:
Ensemble Learning Method for Human Identification in Wearable Devices. IWCMC 2022: 1052-1057 - [c54]Sana Sharif, Sherali Zeadally, Waleed Ejaz:
Space-Aerial-Ground-Sea Integrated Networks: Resource Optimization Security in 6G Networks. MILCOM 2022: 7-12 - [i12]Sabah Suhail, Sherali Zeadally, Raja Jurdak, Rasheed Hussain, Raimundas Matulevicius, Davor Svetinovic:
Security Attacks and Solutions for Digital Twins. CoRR abs/2202.12501 (2022) - [i11]Varun Kohli, Sombuddha Chakravarty, Vinay Chamola, Kuldip Singh Sangwan, Sherali Zeadally:
An Analysis of Energy Consumption and Carbon Footprints of Cryptocurrencies and Possible Solutions. CoRR abs/2203.03717 (2022) - 2021
- [j325]Bushra Feroz
, Amjad Mehmood
, Hafsa Maryam
, Sherali Zeadally
, Carsten Maple
, Munam Ali Shah
:
Vehicle-Life Interaction in Fog-Enabled Smart Connected and Autonomous Vehicles. IEEE Access 9: 7402-7420 (2021) - [j324]Teodora Sanislav
, George Dan Mois
, Sherali Zeadally
, Silviu C. Folea
:
Energy Harvesting Techniques for Internet of Things (IoT). IEEE Access 9: 39530-39549 (2021) - [j323]Chun-Wei Tsai
, Mu-Yen Chen, Francesco Piccialli, Tie Qiu, Jason J. Jung, Patrick C. K. Hung, Sherali Zeadally:
IEEE Access Special Section Editorial: Data Mining for Internet of Things. IEEE Access 9: 90418-90427 (2021) - [j322]Felipe Sampaio Dantas da Silva
, Emidio P. Neto
, Helder M. N. S. Oliveira, Denis do Rosário
, Eduardo Cerqueira
, Cristiano Both
, Sherali Zeadally
, Augusto José Venâncio Neto
:
A Survey on Long-Range Wide-Area Network Technology Optimizations. IEEE Access 9: 106079-106106 (2021) - [j321]Eduardo Lima
, Jean Moraes, Helder M. N. S. Oliveira, Eduardo Cerqueira, Sherali Zeadally, Denis do Rosário:
Adaptive priority-aware LoRaWAN resource allocation for Internet of Things applications. Ad Hoc Networks 122: 102598 (2021) - [j320]Mohammad Aazam
, Sherali Zeadally, Eduardo Feo Flushing
:
Task offloading in edge computing for machine learning-based smart healthcare. Comput. Networks 191: 108019 (2021) - [j319]Yves-Christian Adja Elloh, Badis Hammi, Ahmed Serhrouchni, Sherali Zeadally:
A blockchain-based certificate revocation management and status verification system. Comput. Secur. 104: 102209 (2021) - [j318]Malcolm Shore, Sherali Zeadally, Astha Keshariya:
Zero Trust: The What, How, Why, and When. Computer 54(11): 26-35 (2021) - [j317]Maxim Chernyshev, Zubair Ahmed Baig, Sherali Zeadally:
Cloud-Native Application Security: Risks, Opportunities, and Challenges in Securing the Evolving Attack Surface. Computer 54(11): 47-57 (2021) - [j316]Qinwen Hu, Muhammad Rizwan Asghar
, Sherali Zeadally:
Blockchain-based public ecosystem for auditing security of software applications. Computing 103(11): 2643-2665 (2021) - [j315]Rasheed Hussain, Fatima Hussain, Sherali Zeadally, JooYoung Lee:
On the Adequacy of 5G Security for Vehicular Ad Hoc Networks. IEEE Commun. Stand. Mag. 5(1): 32-39 (2021) - [j314]Gerasimos Razis
, Ioannis Anagnostopoulos, Sherali Zeadally:
Modeling Influence with Semantics in Social Networks: A Survey. ACM Comput. Surv. 53(1): 7:1-7:38 (2021) - [j313]Juan Antonio Guerrero Ibáñez, Juan Contreras-Castillo
, Sherali Zeadally:
Deep learning support for intelligent transportation systems. Trans. Emerg. Telecommun. Technol. 32(3) (2021) - [j312]Vikas Hassija, Sherali Zeadally, Ishan Jain, Aman Tahiliani, Vinay Chamola
, Shashank Gupta:
Framework for determining the suitability of blockchain: Criteria and issues to consider. Trans. Emerg. Telecommun. Technol. 32(10) (2021) - [j311]Matthew Carter, Michail Tsikerdekis
, Sherali Zeadally
:
Approaches for Fake Content Detection: Strengths and Weaknesses to Adversarial Attacks. IEEE Internet Comput. 25(2): 73-83 (2021) - [j310]Sherali Zeadally, Oladayo Bello:
Harnessing the power of Internet of Things based connectivity to improve healthcare. Internet Things 14: 100074 (2021) - [j309]Sherali Zeadally, Ashok Kumar Das, Nicolas Sklavos
:
Cryptographic technologies and protocol standards for Internet of Things. Internet Things 14: 100075 (2021) - [j308]Farhan Siddiqui, Jake Beley, Sherali Zeadally, Grant Braught:
Secure and lightweight communication in heterogeneous IoT environments. Internet Things 14: 100093 (2021) - [j307]Joel J. P. C. Rodrigues, Korhan Cengiz, Muhammad Awais Javed, Sudeep Tanwar, Zhaolong Ning, Sherali Zeadally:
GUEST EDITORIAL: Internet of Medical Things in the Context of COVID-19. IEEE Internet Things Mag. 4(2): 2-3 (2021) - [j306]Rajesh Gupta
, Pronaya Bhattacharya, Sudeep Tanwar, Neeraj Kumar, Sherali Zeadally:
GaRuDa: A Blockchain-Based Delivery Scheme Using Drones for Healthcare 5.0 Applications. IEEE Internet Things Mag. 4(4): 60-66 (2021) - [j305]Jacques Bou Abdo, Sherali Zeadally:
Neural network-based blockchain decision scheme. Inf. Secur. J. A Glob. Perspect. 30(3): 173-187 (2021) - [j304]Nimish Mishra
, SK Hafizul Islam
, Sherali Zeadally:
A comprehensive review on collision-resistant hash functions on lattices. J. Inf. Secur. Appl. 58: 102782 (2021) - [j303]Leila Ismail
, Sherali Zeadally
:
Healthcare Insurance Frauds: Taxonomy and Blockchain-Based Detection Framework (Block-HI). IT Prof. 23(4): 36-43 (2021) - [j302]Adnan Akhunzada
, Sherali Zeadally
, Saif ul Islam
:
Power and Performance Efficient SDN-Enabled Fog Architecture. IT Prof. 23(6): 24-30 (2021) - [j301]Shumaila Javaid
, Zhenqiang Wu, Zara Hamid, Sherali Zeadally, Hamza Fahim
:
Temperature-aware routing protocol for Intrabody Nanonetworks. J. Netw. Comput. Appl. 183-184: 103057 (2021) - [j300]Insaf Ullah, Sherali Zeadally, Noor Ul Amin, Muhammad Asghar Khan
, Hizbullah Khattak:
Lightweight and provable secure cross-domain access control scheme for internet of things (IoT) based wireless body area networks (WBAN). Microprocess. Microsystems 81: 103477 (2021) - [j299]Hesham El-Sayed, Sherali Zeadally, Manzoor Ahmed Khan, Henry Alexander Ignatious:
Edge-centric trust management in vehicular networks. Microprocess. Microsystems 84: 104271 (2021) - [j298]Muhammad Awais Javed, Sherali Zeadally:
AI-Empowered Content Caching in Vehicular Edge Computing: Opportunities and Challenges. IEEE Netw. 35(3): 109-115 (2021) - [j297]Alfredo J. Perez
, Sherali Zeadally
:
Recent Advances in Wearable Sensing Technologies. Sensors 21(20): 6828 (2021) - [j296]Rajesh Gupta
, Mohil Maheshkumar Patel
, Sudeep Tanwar
, Neeraj Kumar
, Sherali Zeadally
:
Blockchain-Based Data Dissemination Scheme for 5G-Enabled Softwarized UAV Networks. IEEE Trans. Green Commun. Netw. 5(4): 1712-1721 (2021) - [j295]Shidrokh Goudarzi
, Mohammad Hossein Anisi
, Seyed Ahmad Soleymani
, Masri Ayob
, Sherali Zeadally
:
An IoT-Based Prediction Technique for Efficient Energy Consumption in Buildings. IEEE Trans. Green Commun. Netw. 5(4): 2076-2088 (2021) - [j294]Waleed Ejaz
, Muhammad Naeem
, Sherali Zeadally
:
On-Demand Sensing and Wireless Power Transfer for Self-Sustainable Industrial Internet of Things Networks. IEEE Trans. Ind. Informatics 17(10): 7075-7084 (2021) - [j293]Rasheed Hussain
, JooYoung Lee, Sherali Zeadally
:
Trust in VANET: A Survey of Current Solutions and Future Research Opportunities. IEEE Trans. Intell. Transp. Syst. 22(5): 2553-2571 (2021) - [j292]Fushan Wei
, Sherali Zeadally
, Pandi Vijayakumar
, Neeraj Kumar
, Debiao He
:
An Intelligent Terminal Based Privacy-Preserving Multi-Modal Implicit Authentication Protocol for Internet of Connected Vehicles. IEEE Trans. Intell. Transp. Syst. 22(7): 3939-3951 (2021) - [j291]Furqan Jameel
, Muhammad Awais Javed
, Sherali Zeadally
, Riku Jäntti
:
Efficient Mining Cluster Selection for Blockchain-Based Cellular V2X Communications. IEEE Trans. Intell. Transp. Syst. 22(7): 4064-4072 (2021) - [j290]Kuljeet Kaur
, Georges Kaddoum
, Sherali Zeadally
:
Blockchain-Based Cyber-Physical Security for Electrical Vehicle Aided Smart Grid Ecosystem. IEEE Trans. Intell. Transp. Syst. 22(8): 5178-5189 (2021) - [j289]Chao Lin, Debiao He, Sherali Zeadally, Xinyi Huang, Zhe Liu:
Blockchain-based Data Sharing System for Sensing-as-a-Service in Smart Cities. ACM Trans. Internet Techn. 21(2): 40:1-40:21 (2021) - [j288]Jing Wang, Libing Wu, Sherali Zeadally, Muhammad Khurram Khan
, Debiao He:
Privacy-preserving Data Aggregation against Malicious Data Mining Attack for IoT-enabled Smart Grid. ACM Trans. Sens. Networks 17(3): 25:1-25:25 (2021) - [i10]Adnan Akhunzada, Sherali Zeadally, Saif ul Islam:
Power and Performance Efficient SDN-Enabled Fog Architecture. CoRR abs/2105.14607 (2021) - 2020
- [j287]Sherali Zeadally
, Erwin Adi
, Zubair A. Baig
, Imran A. Khan
:
Harnessing Artificial Intelligence Capabilities to Improve Cybersecurity. IEEE Access 8: 23817-23837 (2020) - [j286]Badis Hammi, Sherali Zeadally, Houda Labiod, Rida Khatoun, Youcef Begriche, Lyes Khoukhi:
A secure multipath reactive protocol for routing in IoT and HANETs. Ad Hoc Networks 103: 102118 (2020) - [j285]Anirudh Paranjothi, Mohammad S. Khan, Sherali Zeadally:
A survey on congestion detection and control in connected vehicles. Ad Hoc Networks 108: 102277 (2020) - [j284]Mohammad Aazam
, Sherali Zeadally, Khaled A. Harras:
Health Fog for Smart Healthcare. IEEE Consumer Electron. Mag. 9(2): 96-102 (2020) - [j283]Chao Lin, Debiao He, Sherali Zeadally, Neeraj Kumar, Kim-Kwang Raymond Choo
:
SecBCS: a secure and privacy-preserving blockchain-based crowdsourcing system. Sci. China Inf. Sci. 63(3) (2020) - [j282]Alireza Shamsoshoara, Ashwija Korenda, Fatemeh Afghah, Sherali Zeadally:
A survey on physical unclonable function (PUF)-based security solutions for Internet of Things. Comput. Networks 183: 107593 (2020) - [j281]Arzoo Miglani, Neeraj Kumar
, Vinay Chamola, Sherali Zeadally:
Blockchain for Internet of Energy management: Review, solutions, and challenges. Comput. Commun. 151: 395-418 (2020) - [j280]Tejasvi Alladi
, Vinay Chamola, Sherali Zeadally:
Industrial Control Systems: Cyberattack trends and countermeasures. Comput. Commun. 155: 1-8 (2020) - [j279]Sherali Zeadally, Muhammad Awais Javed, Elyes Ben Hamida:
Vehicular Communications for ITS: Standardization and Challenges. IEEE Commun. Stand. Mag. 4(1): 11-17 (2020) - [j278]Max Ismailov, Michail Tsikerdekis
, Sherali Zeadally
:
Vulnerabilities to Online Social Network Identity Deception Detection Research and Recommendations for Mitigation. Future Internet 12(9): 148 (2020) - [j277]Sherali Zeadally
, Michail Tsikerdekis:
Securing Internet of Things (IoT) with machine learning. Int. J. Commun. Syst. 33(1) (2020) - [j276]Sudeep Tanwar
, Shriya Kaneriya, Neeraj Kumar
, Sherali Zeadally
:
ElectroBlocks: A blockchain-based energy trading scheme for smart grid systems. Int. J. Commun. Syst. 33(15) (2020) - [j275]Kayhan Zrar Ghafoor
, Linghe Kong, Sherali Zeadally
, Ali Safaa Sadiq, Gregory Epiphaniou
, Mohammad Hammoudeh
, Ali Kashif Bashir
, Shahid Mumtaz
:
Millimeter-Wave Communication for Internet of Vehicles: Status, Challenges, and Perspectives. IEEE Internet Things J. 7(9): 8525-8546 (2020) - [j274]SK Hafizul Islam, Sherali Zeadally:
Provably secure identity-based two-party authenticated key agreement protocol based on CBi-ISIS and Bi-ISIS problems on lattices. J. Inf. Secur. Appl. 54: 102540 (2020) - [j273]Michail Tsikerdekis, Sherali Zeadally:
Detecting Online Content Deception. IT Prof. 22(2): 35-44 (2020) - [j272]Hai Lin, Sherali Zeadally, Zhihong Chen, Houda Labiod, Lusheng Wang:
A survey on computation offloading modeling for edge computing. J. Netw. Comput. Appl. 169: 102781 (2020) - [j271]Wenyu Zhang
, Zhenjiang Zhang
, Sherali Zeadally
, Han-Chieh Chao
, Victor C. M. Leung
:
Energy-efficient Workload Allocation and Computation Resource Configuration in Distributed Cloud/Edge Computing Systems With Stochastic Workloads. IEEE J. Sel. Areas Commun. 38(6): 1118-1132 (2020) - [j270]Erwin Adi
, Adnan Anwar
, Zubair A. Baig
, Sherali Zeadally:
Machine learning and data analytics for the IoT. Neural Comput. Appl. 32(20): 16205-16233 (2020) - [j269]Adnan Akhunzada
, Saif ul Islam
, Sherali Zeadally:
Securing Cyberspace of Future Smart Cities with 5G Technologies. IEEE Netw. 34(4): 336-342 (2020) - [j268]Umair Sarfraz
, Sherali Zeadally
, Masoom Alam:
Outsourcing IOTA proof-of-work to volunteer public devices. Secur. Priv. 3(2) (2020) - [j267]Badis Hammi
, Achraf Fayad, Rida Khatoun, Sherali Zeadally
, Youcef Begriche:
A Lightweight ECC-Based Authentication Scheme for Internet of Things (IoT). IEEE Syst. J. 14(3): 3440-3450 (2020) - [j266]Sherali Zeadally
, Juan Antonio Guerrero Ibáñez, Juan Contreras-Castillo:
A tutorial survey on vehicle-to-vehicle communications. Telecommun. Syst. 73(3): 469-489 (2020) - [j265]Sehrish Shafeeq
, Sherali Zeadally
, Masoom Alam
, Abid Khan
:
Curbing Address Reuse in the IOTA Distributed Ledger: A Cuckoo-Filter-Based Approach. IEEE Trans. Engineering Management 67(4): 1244-1255 (2020) - [j264]Qi Feng, Debiao He
, Sherali Zeadally
, Kaitai Liang
:
BPAS: Blockchain-Assisted Privacy-Preserving Authentication System for Vehicular Ad Hoc Networks. IEEE Trans. Ind. Informatics 16(6): 4146-4155 (2020) - [j263]Honggang Wang
, Shui Yu
, Sherali Zeadally
, Danda B. Rawat
, Yue Gao
:
Introduction to the Special Section on Network Science for Internet of Things (IoT). IEEE Trans. Netw. Sci. Eng. 7(1): 237-238 (2020) - [j262]Hesham El-Sayed, Sherali Zeadally, Deepak Puthal:
Design and evaluation of a novel hierarchical trust assessment approach for vehicular networks. Veh. Commun. 24: 100227 (2020) - [j261]