2014

Characterizing the Performance of Security Functions in Mobile Computing Systems

Abd-ElhamidTaha, Journal Article, , Characterizing the Performance of Security Functions in Mobile Computing Systems. (2014). IEEE Internet of Things Journal 1 (5), 399-413, 2014, 1, 399–413.

2014

A fault-tolerant energy-efficient clustering protocol of a wireless sensor network

Nidal Nasser, Journal Article, , A fault-tolerant energy-efficient clustering protocol of a wireless sensor network. (2014). Wireless Communications and Mobile Computing, 14, 175–185.

2014

Wireless sensor network-based air quality monitoring system

Nidal Nasser, Journal Article, , Wireless sensor network-based air quality monitoring system. (2014). 2014 International Conference on Computing, Networking and Communications …, 2014.

2014

Rethinking the Machines in Which We Live

TarekMokhtar, Journal Article, , Rethinking the Machines in Which We Live. (2014). IEEE ROBOTICS & AUTOMATION MAGAZINE, 2014.

2014

Using brain signals patterns for biometric identity verification systems

Areej Suleiman Al-Wabil, Journal Article, , Using brain signals patterns for biometric identity verification systems. (2014). Computers in Human Behavior 31, 224-229, 2014.

2014

Characterizing the Performance of Security Functions in Mobile Computing Systems

Abd-ElhamidTaha, Journal Article, , Characterizing the Performance of Security Functions in Mobile Computing Systems. (2014). IEEE Internet of Things Journal, 1, 399–413.

2014

Coalitional relay selection game to extend battery lifetime of multi-standard mobile terminals

Abd-ElhamidTaha, Journal Article, , Coalitional relay selection game to extend battery lifetime of multi-standard mobile terminals. (2014). 2014 IEEE International Conference on Communications (ICC), 508-513, 2014.

2014

Fault tolerant, energy efficient and secure clustering scheme for mobile machine-to-machine communications

Nidal Nasser, Journal Article, , Fault tolerant, energy efficient and secure clustering scheme for mobile machine-to-machine communications. (2014). Transactions on Emerging Telecommunications Technologies.

2014

Fault tolerant, energy efficient and secure clustering scheme for mobile machine‐to‐machine communications

Nidal Nasser, Journal Article, , Fault tolerant, energy efficient and secure clustering scheme for mobile machine‐to‐machine communications. (2014). Transactions on Emerging Telecommunications Technologies 25 (10), 1028-1044, 2014.

2014

Mitigating cross-network interference in cognitive spectrum sharing with opportunistic relaying

Nidal Nasser, Journal Article, , Mitigating cross-network interference in cognitive spectrum sharing with opportunistic relaying. (2014). 2014 IEEE International Conference on Communications (ICC), 1561-1566, 2014.