Publications

JOURNAL ARTICLES

  1. D-D. Tran, S. K. Sharma, V. N. Ha, S. Chatzinotas I. Woungang, Multi-Agent DRL Approach for Energy-Efficiency Resource Allocation in URLLC-Enabled Grant-Free NOMA Systems IEEE Open Journal of the Communications Society. IEEE Open Journal of the Communications Society. 4: 1470-1486 (2023). [PDF]
  2. S. K. Dhurandher, B. Kumar, I. Woungang, H-C. Chao, A Hybrid Channel Transmission Method for Effective Spectrum Access in Cognitive Radio Networks (Accepted June 26, 2023), Int. J. of Ad Hoc and Ubiquitous Computing, Inderscience. In Press.
  3. L. Ferdouse, I. Woungang, A. Anpalagan A Resource Allocation Policy for Downlink Communication in Distributed IRS Aided Multiple-Input Single-Output Systems IEEE Transactions on Communications 71(4): 2410-2424 (2023).
  4. P. G. Quinan, I. Traore, I. Woungang, U. R. Gondhi, C. Nie. Hybrid intrusion detection using the AEN graph model Adv. Sci. Technol. Eng. Syst. J. 8(2), 44-63 (2023).
  5. L. Ferdouse, I. Woungang, A. Anpalagan Resource Allocation and User Assignment Schemes in Cellular Supported Industrial IoT Networks Trans. on Emerg. Telecommun. Technol. 34(6) (2023).
  6. J. Singh, S. K. Dhurandher, I. Woungang, and L. Barolli Double Q-Learning based Routing Protocol for Opportunistic Networks. J. High Speed Networks 29(1): 1-14 (2023).
  7. G.H.S. Carvalho,I. Woungang, A. Anpalagan, and I. Traore Admission and Placement Policies for Latency Compliant Secure Services in 5G Edge-Cloud System. IEEE Syst. J. 17(2): 3105-3116 (2023).
  8. D. W. White, I. Woungang, F. O. Akinladejo, S. K. Dhurandher, and L. Barolli An Investigation of Theoretical Network Communication Speedup Using both Multiple Fungible Paths and Non-Fungible Paths. Internet of Things Journal, Elsevier. pp. 1-21 (2023).
  9. A. Balaji, S. K. Dhurandher, and I. Woungang PINE: Post-quantum based Incentive technique for Non-cooperating nodes in Internet of Everything. Sensors. 22(18): 1-29 (2022).
  10. D-D. Tran, S.K. Sharma, S. Chatzinotas, I. Woungang, and B. Ottersten. Short-Packet Communications for MIMO NOMA Systems over Nakagami-m Fading: BLER and Minimum Blocklength Analysis IEEE Trans. Veh. Technol. 70(4): 3583-3598 (2021)
  11. G. H.S. Carvalho, I. Woungang, A. Anpalagan, I. Traore. Optimal Security Risk Management Mechanism for the 5G Cloudified Infrastructure. IEEE Trans. Netw. Serv. Manag. 18(2): 1260-1274 (2021).
  12. J. Singh, I. Woungang, S. K. Dhurandher, K. Khalid. A Jamming Attack Detection Technique for Opportunistic Networks, Internet Things 17: 100464 (2022)
  13. H. Alhindi, I. Traore, I. Woungang Preventing Data Loss by Harnessing Semantic Similarity and Relevance. Journal of Internet Services and Information Security (JISIS), volume: 11, number: 2 (May 2021), pp. 78-99, DOI:10.22667/JISIS.2021.05.31.07
  14. L. Ferdouse, I. Woungang, A. Anpalagan, S. Erkucuk. Energy Efficient Downlink Resource Allocation in Cellular IoT Supported H-CRANs. IEEE Trans. Veh. Technol. 70(6): 5803-5816 (2021)
  15. K. Khalid, I. Woungang, S. K. Dhurandher, J. Singh. Reinforcement Learning-based Fuzzy Geocast Routing Protocol for Opportunistic Networks. Internet of Things 14 (2021) 100384, pp. 1-12
  16. N. Kandhoul, S. K. Dhurandher, I. Woungang. Random forest classifier-based safe and reliable routing for opportunistic IoT networks. Int. J. Comm. Syst. 34(1) (2021)
  17. A. Kumar, S. K Dhurandher, I. Woungang, J.J.P.C. Rodrigues. Securing Opportunistic Networks: An Encounter-based Trust-driven Barter Mechanism. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 12(2): 99-113 (2021)
  18. K. Khalid, I. Woungang, S. K. Dhurandher, J. Singh. A Geocast Fuzzy-based Check-and-Spray Routing Protocol in Opportunistic Networks. Journal of High Speed Networks, 1 Jan. 2021: 1-12.
  19. K. Khalid, I. Woungang, S. K. Dhurandher, J. Singh, J. J. P. C. Rodrigues. Energy-Efficient Check and Spray Geocast Routing Protocol for Opportunistic Networks. Information 2020, 11, 504, doi:10.3390/info11110504, pp. 1-18
  20. G. H.S. Carvalho, I. Woungang, A. Anpalagan, I. Traore. When Agile Security Meets 5G. IEEE Access 8: 166212-166225 (2020)
  21. A. Kitana, I. Traore, I. Woungang. Towards an Epidemic SMS-based Cellular Botnet. JISIS, DOI:10.22667/JISIS.2020.11.30.023), pp. 38-58 (2020)
  22. G. H. S. Carvalho, I. Woungang, A. Anpalagan, I. Traore. Optimal Security-Aware Virtual Machine Management for Mobile Edge Computing over 5G Networks. IEEE Syst. J. 15(3): 3403-3414 (2021)
  23. G. H. S. Carvalho, I. Woungang, A. Anpalagan. Cloud Firewall under Bursty and Correlated Data Traffic: A Theoretical Analysis. IEEE Trans. on Cloud Computing, PP(99):1-1, DOI: 10.1109/TCC.2020.3000674
  24. A. Sultana, I. Woungang, A. Anpalagan, L. Zhao, L. Ferdouse. Efficient Resource Allocation in SCMA-Enabled Device-to-Device Communication for 5G Networks. IEEE Trans. Veh. Technol. 69(5): 5343-5354 (2020)
  25. S. K. Sharma, I. Woungang, A. Anpalagan, S. Chatzinotas. Towards Tactile Internet in Beyong 5G Era: Recent Advances, Current Issues and Future Directions. IEEE Access 8: 56948-56991 (2020) [PDF]
  26. P. Kushal, S. K. Dhurandher, I. Woungang, V. Kumar, S, Jain, S. Gupta, L. Barolli. Pareto Set based Optimized Routing in Opportunistic Networks. J. Ambient Intell. Humaniz. Comput. 11(2): 777-797 (2020)
  27. L. Ferdouse, S. Erkucuk, A. Anpalagan, I. Woungang. Energy Efficient SCMA Supported Downlink Cloud-RANs for 5G Networks. IEEE Access 8: 1416-1430 (2020) [PDF]
  28. S.K. Dhurandher, J. Singh, I. Woungang, R. Kumar, G. Gupta. Message Trust-based Secure Multipath Routing Protocol for Opportunistic Networks. Int J Commun. Syst. 33 (8) (2020) pp. 1-19
  29. O. Flauzac, F. Nolot, C. Gonzales, I. Woungang. An SDN approach to route massive data flows of sensor networks. Int. J. Communication Systems 33(7) (2020)
  30. M. Bansal, S.K. Malik, S.K. Dhurandher, I. Woungang. Policies and Mechanisms for Enhancing the Resource Management in Cloud Computing: A Performance Perspective, Int. J. Grid and Utility Computing, Vol. 11, No. 3, 2020 pp. 345-366.
  31. S. K. Dhurandher, I. Woungang , J. Singh, S.J. Borah. Energy aware routing for efficient green communication in opportunistic networks IET Networks 8(4): 272-279 (2019)
  32. N. Kandhoul, S.K. Dhurandher, I. Woungang. T_CAFE: A Trust based Security approach for Opportunistic IoT. IET Communications 13(20): 3463-3471 (2019)
  33. S. K. Dhurandher, J. Singh, I. Woungang, J. J. P. C. Rodrigues. Disjoint Multipath based Secure Routing in Opportunistic Networks. Journal of Internet Technology Volume 20 (2019) No.6 pp. 1683-1692
  34. R. Siddavaatam, I. Woungang, A. Anpalagan Joint Optimization of Radio and Infrastructure Resources for Energy-Efficient Massive Data Storage in Mobile Cloud over 5G HetNet. IET Wireless Sensor Systems 9(5): 323-332 (2019)
  35. A. Sultana, I. Woungang, L. Zhao, A. Anpalagan. Two-Tier Architecture for Spectrum Auction in SDN-enabled Cloud Radio Access Network. IEEE Transactions on Vehicular Technology 68(9): 9191-9204 (2019)
  36. H. Alhindi, I. Traore, I. Woungang. Preventing Data Leak through Semantic Analysis. Internet of Things: 7 (2019)
  37. M. Alshahrani, I. Traore, I. Woungang. Anonymous mutual IoT interdevice authentication and key agreement scheme based on the ZigBee technique. Internet of Things: 7 (2019)
  38. R. Siddavaatam, I. Woungang, G. H. S. Carvalho, A. Anpalagan . A Radio Resource Management for Mobile Cloud Storage over 5G Based on Mechanism Design, IEEE Systems Journal, pp. 1-12, April 2019 [PDF]
  39. S. K. Dhurandher, I. Woungang, J. Singh, S. J. Borah, M. S. Obaidat . Energy Aware Routing for Efficient Green Communication in Opportunistic Networks, IET Networks 8(4): 272-279 (2019).
  40. N. Gupta, S. K. Dhurandher, I. Woungang, J.J.P.C. Rodrigues. On the Target Channel Sequence Selection for Multiple Handoffs in Cognitive Radio based Wireless Regional Area Networks. Int. J. Space-Based and Situated Computing, Vol. 8, No. 4, (2018), pp. 214-224
  41. A. Alnoman, G. H. S. Carvalho, A.Anpalagan, I. Woungang. Energy Efficiency on Fully Cloudified Mobile Networks: Survey, Challenges, and Open Issues, IEEE Communications Surveys and Tutorials 20(2): 1271-1291 (2018) [PDF]
  42. G. H. S. Carvalho, I. Woungang, A.Anpalagan, M. Jaseemuddin, Analysis of Joint Parallelism in Wireless and Cloud Domains on Mobile Edge Computing over 5G Systems, Journal of Communications and Networks, vol. 20, No. 6, Dec. 2018, pp. 1-12. [PDF]
  43. N. Gupta, S. K. Dhurandher , I. Woungang Subcarriers assignment scheme for multiple secondary users in OFDMA-based IEEE 802.22 WRAN: A game theoretic approach Trans. Emerging Telecommunications Technologies 29(11) , (2018)
  44. S. Tang, A. Alnoman, A. Anpalagan, I. Woungang, A user-centric cooperative edge caching scheme for minimizing delay in 5G content delivery networks Trans. Emerging Telecommunications Technologies 29(8) , (2018)
  45. M. S. Raniyal, I. Woungang, S. K. Dhurandher, S. S. Ahmed, Passphrase protected device-to-device mutual authentication schemes for smart homes. Security and Privacy, Wiley, 2018, e42. https://doi.org/10.1002/spy2.42, vol. 1, Issue 3, pp. 1-19
  46. B. Kumar, S. K. Dhurandher, I. Woungang, A survey of overlay and underlay paradigms in cognitive radio networks Int. J. Communication Systems 31(2) (2018)
  47. S. J. Borah, S. K. Dhurandher, I. Woungang, V. Kumar, L. Barolli A Multi-Objectives based Technique for Optimized Routing in Opportunistic Networks J. Ambient Intelligence and Humanized Computing 9(3): 655-666 (2018)
  48. S. K. Dhurandher, S. J. Borah, I. Woungang , S, Tibarewal, L. Barolli. DEEP: Distance and Encounter based Energy-efficient Protocol for Opportunistic Networks J. High Speed Networks 24(2): 119-131 (2018)
  49. S. K. Dhurandher, S. J. Borah, I. Woungang , A. Bansal, A. Gupta, A location Prediction-based routing scheme for opportunistic networks in an IoT scenario, J. Parallel Distrib. Comput.118(Part): 369-378 (2018)
  50. A. S. Pillai, K. Singh, V. Saravanan, A. Anpalagan, I. Woungang , L. Barolli, A Genetic Algorithm-based Method for Optimizing the Energy Consumption and Performance of Multiprocessor Systems. Soft Comput. 22(10): 3271-3285 (2018)
  51. S. J. Borah, S. K. Dhurandher, I. Woungang , V. Kumar, Game Theoretic Context-Based Routing for Opportunistic Networks in an IoT Scenario. Computer Networks 129: 572-584 (2017)
  52. P. Kuchhal, S. K. Dhurandher, S. J. Borah, I. Woungang , S. Jain, S. Gupta, A* Search Based Next Hop Selection for Routing in Opportunistic Networks. Int. J. of Space-Based and Situated Computing. Vol.7, No.3, pp.177-186 (2017)
  53. S. K. Malik, M. Dave, S. K. Dhurandher, I. Woungang, L. Barolli, An Ant-based QoS Aware Routing Protocol for Heterogeneous Wireless Sensor Soft Computing, Nov 2017, Vol. 21, Issue 21, pp. 6225-6236.
  54. S. K. Dhurandher, D. K. Sharma, I. Woungang, A. Saini An energy-efficient history-based routing scheme for opportunistic networks. Intl. J. Communication Systems 30(7)(2017).
  55. G. H. S. Calvalho, I. Woungang, A. Anpalagan, Intercloud and HetNet for Mobile Cloud Computing in 5G Systems: Design Issues, Challenges, and Optimization, IEEE Network 31(3): 80-89 (2017) [PDF]
  56. A. Alnoman, A. Anpalagan, I. Woungang, Base Station Sleeping Mechanism for Reduced Delay Using Traffic Load Prediction Journal of Traffic and Logistics Engineering, Engineering and Technology Publishing, USA, Feb. 2017.
  57. S. K. Dhurandher, D. K. Sharma, I. Woungang, A. Saini, An energy-efficient history-based routing scheme for opportunistic networks. Int. J. Communication Systems 30(7), 2017
  58. F. Hussain, L. Ferdouse, A. Anpalagan, L. Karim, I. Woungang, Security threats in M2M networks: a survey with case study Computer Systems Science and Engineering Journal, CRL Publishing, Vol. 32, No. 1, March 2017
  59. S. K. Dhurandher, S. J. Borah, I. Woungang, A. Gupta, A. Bansal, A Location Prediction-based Routing Scheme for Opportunistic Networks in an IoT Scenario, Journal of Parallel and Distributed Computing , Vol. 118, Part 2, Aug. 2018, pp. 369-378
  60. S. K. Dhurandher, S. J. Borah, I. Woungang, S. Tibarewal, and L. Barolli, DEEP: Distance and Encounter based Energy-efficient Protocol for Opportunistic Networks. High Speed Networks. vol. 24, no. 2, pp. 119-131, 2018
  61. A. S. Pillai, K. Singh, V. Saravanan, A. Anpalagan, I. Woungang, L. Barolli, A Genetic Algorithm-based Method for Optimizing the Energy Consumption and Performance of Multiprocessor Systems. Soft Computing 22, 3271-3285, 2018.
  62. B. Kumar, S. K. Dhurandher, I. Woungang, A survey of overlay and underlay paradigms in cognitive radio networks. Int. J. Communication Systems 31(2) (2018)
  63. M. L. Brocardo, I. Traore, I. Woungang, M. S. Obaidat, Authorship Verification using Deep Belief Network Systems, Int. J. Communication Systems 30(12) (2017).
  64. A. Kumar, S. K. Dhurandher, M. S. Obaidat, I. Woungang, S. Gupta, J. J. P. C. Rodrigues, An Altruism-based Trust-Dependent Message Forwarding Protocol for Opportunistic Networks Int. J. Communication Systems 30(10) (2017).
  65. D. K. Sharma, S. K. Dhurandher, I. Woungang, R. K. Srivastava, A. Mohananey, J. J. P. C. Rodrigues, A Machine Learning-based Protocol for Efficient Routing in Opportunistic Networks IEEE Systems Journal, Vol. PP., Issue 99, pp. 1-7, Dec. 2016
  66. D. K. Sharma, S. K. Dhurandher, I. Woungang, J. Arora, I. Gupta, History Based Secure Routing Protocol to Detect Blackhole and Greyhole Attacks in Opportunistic Networks Recent Advances in Communications and Networking Technology (RACNT), Benham Science, Vol. 5, No. 2, pp. 73-89, 2016
  67. H-C Wang, I. Woungang, K-C Ting, C-C Tseng, F-C Kuo, H-T Huang, Co-Tier Downlink Interference Management in Dense Femtocell Networks Int. J. Commun. Syst., 29: 2534-2541. doi: 10.1002/dac.3196, 2016
  68. A. Kitana, I. Traore, I. Woungang, Impact Study of a Mobile Botnet over LTE Networks Journal of Internet Services and Information Security (JISIS) , Vol. 6, No. 2, pp. 1-22, May 2016
  69. F. Rashid, A. Miri, I. Woungang, Secure Image Deduplication through Image Compression Journal of Information Security and Applications, Springer, Vol. 27-28, pp. 54-64, Apr-May 2016
  70. G.H.S. Carvalho, I. Woungang, A. Anpalagan, E. Hossain, QoS-Aware Energy-Efficient Joint Radio Resource Management in Multi-RAT Heterogeneous Networks IEEE Trans. on Vehicular Technology, Vol. 65. Issue 8, pp. 6343-6365, 2015. [PDF]
  71. S. K. Dhurandher, I. Woungang, M. S. Obaidat, K. Kumar, M. Joshi, M. Verma, A Distributed Adaptive Admission Control Scheme for Multimedia Wireless Mesh Networks IEEE Systems Journal . 9(2): 595-604, 2015
  72. J-M Chang, P-C Tsou, I. Woungang, H-C Chao, J-L Chen, Defending Against Collaborative Attacks by Malicious Nodes in MANETs: a Cooperative Bait Detection Approach IEEE Systems Journal 9(1): 65-75, 2015
  73. S. K. Dhurandher, D. K. Sharma, I. Woungang, S. Gupta, Integration of Fixed and Mobile Infrastructure for Message Passing in Opportunistic Networks Journal of Networks, Vol. 10, No. 12, pp. 642-657, Dec. 2015
  74. M. L. Brocardo, I. Traore, I. Woungang, Authorship Verification of Email and Tweet Messages Applied for Continuous Authentication Journal of Computer and System Sciences, Vol. 31, Issue 8, pp. 1429-1440, Dec. 2015
  75. A. Behzadan, A. Anpalagan, I. Woungang, B. Ma, H-C. Chao, An Energy Efficient Utility-based Distributed Data Routing Scheme for Heterogeneous Sensor Networks Wirel. Commun. Mob. Comput., 15: 2020-2037. doi: 10.1002/wcm.2474, 2015
  76. S. K. Dhurandher, D. K. Sharma, I. Woungang, A. Saini, Efficient Routing based on Past Information to Predict the Future Location for Message Passing in Infrastructureless Opportunistic Networks Journal of Supercomputing, 71(5): 1694-1711, 2015
  77. M. L. Brocardo, I. Traore, S. Saad, I. Woungang, Verifying Online User Identity using Stylometric Analysis for Short Messages Journal of Networks, Vol. 9, No. 12, Dec. 2014, pp. 3347-3355
  78. G. H.S. Carvalho, I. Woungang, A. Anpalagan, Analysis of Sub-band Allocation in Multi-Service Cognitive Radio Access Networks IEEE Wireless Communications Letters, Vol. PP., Issue 99, doi: 10.1109/LWC 2014.2344669, July 31, 2014, pp. 645-648
  79. S. K. Dhurandher, D. K. Sharma, I. Woungang, R. Gupta, S. Garg, GAER: Genetic Algorithm based Energy-efficient Routing Protocol for Infrastructureless Opportunistic Networks Journal of Supercomputing, DOI: 10.1007/s11227-014-1195-9, May 3, 2014
  80. I. Traore, I. Woungang, M. S. Obaidat, Y. Nakkabi, I. Lai, Online Risk-Based Authentication Using Behavioral Biometrics Multimedia Tools and Appl., July 2014, Vol. 71, Issue 2, pp. 575-605
  81. I. Woungang, F-H Tseng, Y-H Lin, L-D Chou, H-C Chao, M. S. Obaidat, MR-Chord: Improved Chord Look-Up Performance in Structured Mobile P2P Networks IEEE Systems Journal , DOI: 10.1109/JSYST.2014.2306147, pp. 743-751, March 2014
  82. L. Karim, A. Anpalagan, N. Nasser, J. Almhana, I. Woungang, Fault Tolerant, Energy Efficient and Secure Clustering Scheme for Mobile M2M Communications Trans. on Emerging Telecom. Technologies, Vol. 25, Issue 10, pp. 1028-1044, Oct. 2014
  83. V. Ngo, I. Woungang, A. Anpalagan, A Schedule-based Medium Access Control Protocol for Mobile Wireless Sensor Networks, Wirel. Commun. Mob. Comput., 14(6): 629-643, 2014
  84. A. Behzadan, A. Anpalagan, I. Woungang, B. Ma, Utility Driven Construction of Balanced Data Routing Trees in Wireless Sensor Networks Wirel. Commun. Mob. Comput., 14(8): 770-788, 2014
  85. M. S. Obaidat, I. Woungang, S. K. Dhurandher, V. Koo, A Cryptography-Based Protocol Against Packet Dropping and Message Tampering Attacks on Mobile Ad Hoc Networks Security and Communication Networks 7(2): 376-384, 2014
  86. R. Siddavaatam, A. Anpalagan, I. Woungang, S. Misra, Ant Colony Optimization based Sub-channel Allocation Algorithm for Small Cell LTE-A HetNets Wireless Personal Communications 77: 411. doi:10.1007/s11277-013-1513-1, 2014

CONFERENCE PAPERS

  1. J. Singh, S. K. Dhurandher, I. Woungang. Deep Q-Network Dueling-Based Opportunistic Data Transmission in Blockchain-Enabled M2M Communication. (Accepted Aug. 27, 2023), IEEE Global Communications Conference(GLOBECOM), Kuala-Lumpur, Malaysia.
  2. E. N. Mambou, I. Woungang Bandit algorithms applied in online advertisement to optimize click-through rates (Accepted May 30, 2023), IEEE AFRICON 2023, Nairobi, Kenya.
  3. D. W. White, I. Woungang, F. O. Akinladejo, S. K. Dhurandher. A Model to Estimate the Minimum Data Transmission Time in IoT Networks using Multiple Fungible Paths. (Accepted Aug. 23, 2023), The 18th International Conference on Broadband and Wireless Computing, Communication and Application (BWCCA-2023), Daegu, Korea, South, Nov. 2023.
  4. A. M. Bagha, I. Woungang, I. Traore. Score-Based Unsupervised Anomaly Detection Using Graph Clustering and the Activity and Event Network Model. (Accepted July 19, 2023), 7th Cyber Security in Networking Conference (CSNet 2023), Oct. 16-18, Montreal, Canada.
  5. O. Gueye, I. Woungang, S. K. Dhurandher, A. Zeltov. Optimal Routing in IP/MPLS Networks with Differentiated Services. (Accepted May 23, 2023). The 21th International Conference of Numeric Analysis and Applied Mathematics (ICNAAM 2023), Sept 11-17, Heraklion, Crete, Greece.
  6. N. Hassan, X. N Fernando, I. Woungang, A. Anpalagan. Towards Optimal Association of Coexisting RF, THz and mmWave Users in 6G Networks. (Accepted May 29, 2023).IEEE 34th Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC 2023), Sept. 5-7, 2023, Toronto, Canada.
  7. J. Singh, S. K. Dhurandher, I. Woungang, P. Chatzimisios. A Buffer Occupancy Estimation Model for Opportunistic Networks. Biennial Symposium on Communications (BSC), Montreal, QC, Canada, 2023, pp. 125-130, doi: 10.1109/BSC57238.2023.10201831
  8. D. W. White, I. Woungang, , F. O. Akinladejo, S. K. Dhurandher An Analysis of Theoretical Network Communication Speedup using Multiple Fungible Paths IMIS 2023: 68-77.
  9. A. Maksimoski, I. Woungang, I. Traore, and S. K. Dhurandher Botnet Detection Mechanism using Graph Neural Network AINA (2) 2023: 247-257
  10. P. Kisanga, I. Woungang, I. Traore, and G. H. S. Carvalho Network Anomaly Detection using a Graph Neural Network ICNC 2023: 61-65
  11. J. Singh, S. K. Dhurandher, I. Woungang, P. Chatzimisios, and J. J. P. C. Rodrigues Reinforcement Learning Based Congestion Control Mechanism for Opportunistic Networks GLOBECOM (Workshops) 2022: 67-73
  12. J. Singh, S. K. Dhurandher, I. Woungang, and T. M. N. Ngatched. Multi-Agent Reinforcement Learning-based Approach for Vehicle Routing Problem Pan-African Artificial Intelligence and Smart Systems Conference, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 459. Springer, Cham. https://doi.org/10.1007/978-3-031-25271-6-26, pp. 411-422.
  13. R. K. M. Ahiaklo-Kuz, C. Jnr. Asiedu, T. M. N. Ngatched, and I. Woungang. Deep Matrix Factorization for Multi-view Clustering Using Density-Based Preprocessing. Pan-African Artificial Intelligence and Smart Systems Conference, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 459. Springer, Cham. https://doi.org/10.1007/978-3-031-25271-6_26, pp. 124-134.
  14. J. Singh, S. K. Dhurandher, I. Woungang, J. Mishra, T. Dhankhar, P. Chatzimisios. Multivariate Gaussian Mixture-based Prediction Model for Opportunistic Networks. ICC 2022: 4932-4937
  15. G. H. S. Carvalho, I. Woungang, A. Anpalagan, I. Traore, P. Catzimitios. Edge-Assisted Secure and Dependable Optimal Policies for the 5G Cloudified Infrastructure. ICC 2022: 847-852
  16. V. Kumar, S. K. Dhurandher, I. Woungang, S. Gupta, S. Singh. Channel Allocation in Cognitive Radio Networks: A Game-Theoretic Approach. NBiS 2022: 182-192
  17. J. Singh, S. K. Dhurandher, I. Woungang. Game Theory-based Energy Efficient Routing in Opportunistic Networks. AINA (1) 2022: 627-639
  18. C. Nie, P. G. Quinan, I. Traore, I. Woungang. Intrusion Detection using a Graphical Fingerprint Model. CCGRID 2022: 806-813
  19. A. M. Bagha, I. Woungang, S. K. Dhurandher, I. Traore. An Elliptic Curve Biometric based User Authentication Protocol for Smart Homes Using Smartphone. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, Springer, vol 405, pp. 203-216, 2022.
  20. I. Traore, P. G. Quinan, U. R. Ghondi, I. Woungang. Unsupervised Anomaly Detection using a new Network Activity and Events Knowledge Graph Model. Proc. of the 4th International Conference on Machine Learning for Networking (MLN'2021), Online, Dec 1-3, 2021
  21. D-D Tran, S. K. Sharma, S. Chatzinotas, I. Woungang. Learning-Based Multiplexing of Grant-Based and Grant-Free Heterogeneous Services with Short Packets. IEEE Global Communications Conference (GLOBECOM 2021). pp. 01-06, doi: 10.1109/GLOBECOM46510.2021.9685321.
  22. D-D Tran, S. K. Sharma, S. Chatzinotas, I. Woungang. Q-Learning-Based SCMA for Efficient Random Access in mMTC Networks with Short Packets. IEEE 32nd Annual International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC), 2021, pp. 1334-1338, doi: 10.1109/PIMRC50174.2021.9569713.
  23. J. Singh, S. K. Dhurandher, I. Woungang, S. Diwakar, P. Chatsimisios. Energy Efficient Multi-Objective Optimized Routing for Opportunistic Networks. IEEE International Conference on Communications (ICC 2021), 2021, pp. 1-6, doi: 10.1109/ICC42927.2021.9500645.
  24. J. Singh, S. K.Dhurandher and I. Woungang. Multi-agent Reinforcement Learning Based Efficient Routing in Opportunistic Networks IEEE 17th India Council International Conference (INDICON), 2020, pp. 1-6, doi: 10.1109/INDICON49873.2020.9342138.
  25. G. H. S. Carvalho, I. Woungang, A. Anpalagan, I. Traore. Optimal Security Cost for Latency-Aware Service Provisioning in Mobile Edge Computing. International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI), 2020, pp. 1-5, doi: 10.1109/CCCI49893.2020.9256664 (Best paper award)
  26. K. Khalid, I. Woungang, S. K. Dhurandher, J. Singh. Energy-Efficient Fuzzy Geocast Routing Protocol for Opportunistic Networks. In: Barolli, L., Woungang, I., Enokido, T. (eds) Advanced Information Networking and Applications. AINA 2021. Lecture Notes in Networks and Systems, vol 225. Springer, Cham. https://doi.org/10.1007/978-3-030-75100-5_48
  27. S.K. Dhurandher, J. Singh, M. S. Obaidat, I. Woungang, S. Srivastava, J. J. P. C. Rodrigues. Reinforcement Learning-Based Routing Protocol for Opportunistic Networks. ICC 2020: 1-6
  28. G.H.S. Carvalho, I. Woungang, A. Anpalagan, I. Traore. Optimal Security Cost for Latency-Aware Service Provisioning in Mobile Edge Computing. 2020 International Conference on Communications, Computing, Cybersecurity, and Informatics (CCCI), Sharjah, United Arab Emirates, 2020, pp. 1-5, doi: 10.1109/CCCI49893.2020.9256664. (Best paper award)
  29. Arun Anpalagan, I. Woungang. Tsunami Prediction and Impact Estimation using Classifiers on Historical Data. (Accepted Aug 30, 2020), 2020 International Conference on Intelligent Data Science Technologies and Applications (IDSTA), Valencia, Spain, 2020, pp. 119-126, doi: 10.1109/IDSTA50958.2020.9264040.
  30. G.H.S. Carvalho, I. Woungang, A. Anpalagan, I. Traore, L. Barolli. Malware Detection using Machine Learning Models. NBiS 2020: 238-246
  31. J. Singh, S.K. Dhurandher, I. Woungang. Multi-Agent Reinforcement Learning Based Efficient Routing in Opportunistic Networks. 2020 IEEE 17th India Council International Conference (INDICON), New Delhi, India, 2020, pp. 1-6, doi: 10.1109/INDICON49873.2020.9342138.
  32. G.H.S. Carvalho, I. Woungang, A. Anpalagan, I. Traore. Security- and Location-Aware Optimal Virtual Machine Management for 5G-Driven MEC Systems. WIDECOM 2020: 123-134
  33. A.M. Bagha, I. Woungang, S. K. Dhurandher, I. Traore. A RSA-Biometric Based User Authentication Scheme for Smart Homes Using Smartphones. AINA 2020: 845-857
  34. S. K. Dhurandher, J. Singh, I. Woungang, Joel J. P. C. Rodrigues. Priority based Buffer Management Technique for Opportunistic Networks. GLOBECOM 2019: 1-6 .
  35. O. Nwamuo, P. M. de Faria Quinan, I. Traore, I. Woungang, A. Aldribi. Arguments against using the 1998 DARPA Dataset for Cloud IDS Design and Evaluation and Some Alternative. MLN 2019: LNCS, Vol. 12081, pp. 315-332
  36. M. Alshahrani, I. Traore, I. Woungang. Design and Implementation of a Lightweight Authentication Framework for the Internet of Things (IoT). IoTSMS 2019: 185-194
  37. S. K. Dhurandher, J. Singh, I. Woungang, M. Gupta, N. Sabharwal. Geometric Shapes-based PSO Approach for Routing in Vehicular Networks. Proc. of IEEE AFRICON 2019. .
  38. M. Alshahrani, I. Traore, I. Woungang. Anonymous IoT Mutual Inter-device Authentication Scheme based on Incremental Counter. FiCloud 2019: 31-41 .
  39. S. K. Dhurandher, J. Singh, I. Woungang, M. Takizawa, G. Gupta, R. Kumar. Fuzzy Geocasting in Opportunistic Networks. BWCCA 2019: 279-292
  40. M. W. L. Moreira, J. J. P. C. Rodrigues, G. A. B. Marcondes, V. Furtado, N. Kumar, I. Woungang. Fetal Birth Weight Estimation in High-risk Pregnancies through Machine Learning Techniques. ICC 2019: 1-6 .
  41. J. Singh, S. K. Dhurandher, I. Woungang, M. Takizawa, Centrality-Based Geocasting for Opportunistic Networks. AINA 2019: 702-712
  42. H. Alhindi, I. Traore, I. Woungang. Data Loss Prevention Using Document Semantic Signature. WIDECOM 2019: 75-99
  43. R. Siddavaatam, I. Woungang, S. K. Dhurandher, An Efficient Data Transmission Technique for Big Video Files over HetNet in Emerging 5G Networks. AINA 2019: 713-724
  44. M. S. Raniyal, I. Woungang, S. K. Dhurandher, An RSA-Based User Authentication Scheme for Smart-Homes Using Smart Card ISDDC 2018: 16-29 .
  45. R. de C. D. Leles, J. J. P. C. Rodrigues,, I. Woungang, R. A. L. Rabelo, V. Furtado. Railways Networks Challenges for IoT Underground Wireless Communications IEEE LATINCOM 2018, DOI: 10.1109/LATINCOM.2018.8613203
  46. S. K. Dhurandher, I. Woungang, N. Gupta, R. Jain, D. Singhal, J. Agarwal, M. S. Obaidat Optimal Secondary Users Selection for Cooperative Spectrum Sensing in Cognitive Radio Networks GLOBECOM Workshops 2018: 1-6
  47. T. El Salti, M. Orlando, S. Hood, G. Knelsen, M. Iarocci, Z. Lazzara, Y. Xie, J. C-C Cheung, I. Woungang. New Set of Bluetooth-Based Fingerprinting Algorithms for Indoor Location Services. IEMCON 2018, DOI: 10.1109/IEMCON.2018.8614852, Nov. 1-3, Vancouver (Best paper award)
  48. O. Gueye, I. Woungang, F. Khandaker, B. Alam Design and Analysis of a Survivable ATM Network LOPAL 2018: 60:1-60:6
  49. U. Choudhary, S. K. Dhurandher, V. Kumar, I. Woungang, J. J. P. C. Rodrigues, Online Signature Verification Using the Information Set Based Models AINA 2018: 1104-1109
  50. J. Agarwal, R. Jain, S. K. Dhurandher, I. Woungang, N. Gupta, Fair sub-carrier allocation in OFDMA and cognitive radio based IEEE 802.22 WRAN INFOCOM Workshops 2018: 571-576
  51. P. N. Ba, J. J. P. Rodrigues, S. Ouya, A. S. Maiga, I. Woungang, S. K. Dhurandher, S. Mumtaz Performance Evaluation of LTE and 5G Modeling over OFDM and GFDM Physical Layers ICC 2018: 1-6
  52. S. J. Borah, S. K. Dhurandher, I. Woungang, N. Kandhoul, J. J. P. C. Rodrigues An Energy-Efficient Location Prediction-Based Forwarding Scheme for Opportunistic Networks ICC 2018: 1-6
  53. N. Gupta, S. K. Dhurandher, I. Woungang, M. S. Obaidat, Proactive Decision Based Handoff Scheme for Cognitive Radio Networks ICC 2018: 1-6
  54. A. Kumar, S. K. Dhurandher, I. Woungang, V. Kumar, M. Takizawa Interference Aware Metric-Based Routing Protocol in Cognitive Radio Networks BWCCA 2017: 502-515
  55. M. W. L. Moreira, J. J. P. C. Rodrigues, N. Kumar, J. Niu, I. Woungang, Performance Assessment of Decision Tree-based Predictive Classifiers for Risk Pregnancy Care, GLOBECOM 2017: 1-5
  56. N. Gupta, S. K. Dhurandher, I. Woungang, J. J.P.C. Rodrigues, Game Theoretic Analysis of Post Handoff Target Channel Sharing in Cognitive Radio Networks, GLOBECOM 2017: 1-6 .
  57. S. K. Dhurandher, S. J. Borah, S. Tibarewala, I. Woungang, Mohammad S. Obaidat, Energy-Efficient Prophet-PRoWait-EDR Protocols for Opportunistic Networks, GLOBECOM 2017: 1-6
  58. M. S. Raniyal, I. Woungang, and S. K. Dhurandher, An Inter-Device Authentication Scheme for Smart Homes using One-Time-Password over Infrared Channel, ISDDC 2017: 95-117 (Best paper award)
  59. A. Alenazi, I. Traore, K. Ganame, I. Woungang, Holistic Model for HTTP Botnet Detection based on DNS Traffic Analysis, ISDDC 2017: 1-18
  60. G. H. S. Carvalho, I. Woungang, A. Anpalagan, E. Degtiareva, J. J. P. C. Rodrigues, A Semi-Markov Decision Model-based Brokering Mechanism for Mobile Cloud Market ICC 2017: 1-6
  61. D. K. Sharma, S. K. Dhurandher, I. Woungang, A. Bansal, A. Gupta, A. Anpalagan, GD-CAR: A Genetic algorithm based dynamic context aware routing protocol for Opportunistic networks NBiS 2017: 611-622
  62. L. Karim, A. Anpalagan, N. Nasser, I. Woungang, J. Almhana, N. Khan, An Efficient Cluster-Based and Energy Aware Scheme for M2M Communication Networks Proc. of IEEE IST-Africa 2017, Windhoek, Namibia, May 2017
  63. S. K. Dhurandher, A. Kumar, I. Woungang, M. S. Obaidat, Supernova and Hypernova Misbehavior Detection Scheme for Opportunistic Networks AINA 2017: 387-391
  64. A. Kitana, I. Traore, I. Woungang, Impact of Base Transceiver Station Selection Mechanisms on a Mobile Botnet Over a LTE Network MALWARE 2016: 20-30
  65. N. Gupta, S. K. Dhurandher, I. Woungang, On the Probability of Appearance of Primary User in IEEE 802.22 WRAN using an Artificial Neural Network Learning Technique Proc. of IEEE India Intl. Conference on Information Processing (IICIP 2016), Delhi, Aug. 12-14, 2016
  66. R. Siddavaatam, I. Woungang, G. H. S. Carvalho, A. Anpalagan, An Efficient Method for Mobile Big Data Transfer Over HetNet in Emerging 5G Systems CAMAD 2016: 59-64
  67. V. Shrivastav, S. K. Dhurandher, I. Woungang, V. Teotia, J. J. P. C. Rodrigues, Game Theory-Based Channel Allocation in Cognitive Radio Networks GLOBECOM 2016: 1-5
  68. R. Siddavaatam, I. Woungang, G. H. S. Carvalho, A. Anpalagan, Efficient Ubiquitous Big Data Storage Strategy for Mobile Cloud Computing over HetNet GLOBECOM 2016: 1-6
  69. K. Khalid, I. Woungang, S. K. Dhurandher, L. Barolli, G. H.S. Carvalho, M. Takizawa, An Energy-Efficient Routing Protocol for Infrastructure-less Opportunistic Networks IMIS 2016: 237-244
  70. A. Bamrah, I. Woungang, L. Barolli, S. K. Dhurandher, G. H.S. Carvalho, M. Takizawa, A Centrality-Based History Prediction Routing Protocol for Opportunistic Networks CISIS 2016: 130-136
  71. B. Tushir, S. K. Dhurandher, I. Woungang, M. S. Obaidat, V. Kumar, Graph Colouring Technique for Efficient Channel Allocation in Cognitive Radio Networks ICC 2016: 1-5
  72. S. K. Dhurandher, I. Woungang, B. Tushir, V. Kumar, M. Takizawa, L. Barolli, Power Control Scheme for Underlay Approach in Cognitive Radio Networks NBiS 2016: 114-118
  73. S. K. Dhurandher, S. J. Borah, D. K. Sharma, I. Woungang, K. Arora, D. Agarwal, EDR: An Encounter and Distance based Routing Protocol for Opportunistic Networks AINA 2016: 297-302
  74. V. Teotia, S. K. Dhurandher, I. Woungang, M. S. Obaidat, Markovian Model Based Channel Allocation in Cognitive Radio Networks DSDIS 2015: 478-482
  75. G. H. S. Carvalho, I. Woungang, A. Anpalagan, L. Barolli, M. Takizawa, Optimal Cloud Broker Method for Cloud Selection in Mobile Inter-Cloud Computing IMIS 2015: 239-244
  76. S. K. Dhurandher, I. Woungang, A. Rajendra, P. Ghaie, P. Chatzimisios, A Centrality-based ACK Forwarding Mechanism for Efficient Routing in Opportunistic Networks IoT 360 (1) 2015: 99-108
  77. F. Rashid, A. Miri, I. Woungang, Proof of Storage for Video Deduplication in the Cloud BigData Congress 2015: 499-505
  78. A. Ojo, N-W Ma, I. Woungang, Modified Floyd-Warshall Algorithm for Equal Cost Multipath in Software-Defined Data Center ICC Workshops 2015: 346-351
  79. V. Teotia, S. K. Dhurandher, I. Woungang, M. S. Obaidat, Wormhole Prevention using COTA Mechanism in Position Based Environment over MANETs ICC 2015: 7036-7040
  80. F. Rashid, A. Miri, I. Woungang, A Secure Video Deduplication Scheme in Cloud Storage Environments Using H.264 Compression BigDataService 2015: 138-146
  81. A. H. Mohammed, A. S. Khwaja, A. Anpalagan, I. Woungang, Base Station Selection in M2M Communication using Q-learning Algorithm in LTE-A Networks AINA 2015: 17-22
  82. S. HariShankar, I. Woungang, S. K. Dhurandher, I. Traore, S. B. Kaleel, E-MAntNet: An ACO-based Energy Efficient Routing Protocol for Mobile Ad Hoc Networks AINA 2015: 29-36
  83. P. Sidhu, I. Woungang, G. H. S. Carvalho, A. Anpalagan, S. K. Dhurandher An Analysis of Machine-Type-Communication on Human-Type-Communication over Wireless Communication Networks AINA Workshops 2015: 332-337
  84. F. Rashid, A. Miri, I. Woungang Proof of Retrieval and Ownership Protocols for Images through SPIHT Compression HPCC/CSS/ICESS 2014: 835-838
  85. M. L. Brocardo, I. Traore, I. Woungang, Toward a Framework for Continuous Authentication using Stylometry AINA 2014: 106-115
  86. S. K. Dhurandher, I. Woungang, I. Traore, C-SCAN: An Energy-Efficient Network Layer Security Protocol for Mobile Ad Hoc Networks AINA Workshops 2014: 530-535
  87. S. K. Dhurandher, M. S. Obaidat, I. Woungang, P. Agarwal, A. Gupta, P. Gupta, A Cluster-Based Load Balancing Algorithm for Cloud Computing ICC 2014: 2921-2925
  88. L. Karim, A. Anpalagan, N. Nasser, J. Almhana, I. Woungang, An Energy Efficient, Fault Tolerant and Secure Clustering Scheme for M2M Communication Networks GLOBECOM Workshops 2013: 677-682
  89. F. Rashid, A. Miri, I. Woungang, Proof of Retrieval and Ownership Protocols for Enterprise-Level Data Deduplication CASCON 2013: 81-90
  90. F. Rashi, A. Miri, I. Woungang, Secure Enterprise Data Deduplication in the Cloud IEEE CLOUD 2013: 367-374

BOOKS

  1. I. Traore, I. Woungang, S. Saad. Artificial Intelligence for Cyber-Physical Systems Hardening.. Engineering Cyber-Physical Systems and Critical Infrastructures (ECPSCI, vol. 2), Springer Cham, DOI https://doi.org/10.1007/978-3-031-16237-4, ISBN 978-3-031-16236-7, 233 pages (2023).
  2. A. Verma, P. Verma, S. K. Dhurandher, I. Woungang. Opportunistic Networks: Fundamentals, Applications and Emerging Trends.. Routledge, Taylor & Francis Group, ISBN 9780367677305, 330 pages (2021).
  3. M. S. Obaidat, I. Traore, I. Woungang, Biometric-based Physical and Cybersecurity Systems, 1st Ed. , Springer, ISBN 10: 3319489461, 590 pages, (2019)
  4. J. E. Mason, I, Traore, I. Woungang, Machine Learning Techniques for Gait Biometric Recognition using the Ground Reaction Force . , (Authored book), Springer, ISBN 978-3-319-29086-7, doi: 10.1007/978-3-319-29088-1, 247 pages, Feb. 8 (2016).
  5. I. Traore, I. Woungang S. A. Sherif, M. Yasir (Eds.). Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments, 2nd International Conference, ISDDC 2018, Vancouver, BC, Canada, Nov 28-30, 2018 Springer, Lecture Notes in Computer Science (LNCS) 11317
  6. I. Traore, I. Woungang, A. Awad (Eds.). Intelligent, Secure, and Dependable Systems in Distributed and Cloud Environments, 1st International Conference, ISDDC 2018, Vancouver, BC, Canada, Oct.26-28, 2017 Springer, Lecture Notes in Computer Science (LNCS) 10618
  7. I. Traore, A. Awad, I. Woungang, Information Security Practices: Emerging Threats and Perspectives , Springer, ISBN 10: 3319489461 ISBN 13: 9783319489469, 100 pages, 2017

BOOK CHAPTERS

  1. P. G. Quinan, I. Traore, I. Woungang. Activity and event network graph and application to cyberphysical security. In: Fagerberg, J., Mowery, D.C., Nelson, R.R. (Eds.), The Oxford Handbook of Innovation. Oxford University Press, Oxford. Chapter 10, pp. 266-290, (2022).
  2. J. Singh, S. K. Dhurandher, I. Woungang. Geocommunity Based Data Forwarding in Social Delay Tolerant Networks. P. Nicopolitidis, S. Misra, L. T. Yang, B. Zeigler, Z. Ning. Advances in Computing, Informatics, Networking and Cybersecurity. 1(289): Springer, Lecture Notes in Networks and Systems (LNNS), 421-442, (2022).
  3. S. K. Dhurandher, I. Woungang. Environment Friendly Green Data Broadcasting in Delay Tolerant Opportunistic Networks. Chapter 7 in Advances in Delay-tolerant Networks (DTNs): Architecture and Enhanced Performance . J.J.P.C. Rodrigues. Advances in Delay-tolerant Networks (DTNs): Architecture and Enhanced Performance. 2nd Ed., Elsevier, pp: 135-154, (2020).
  4. V. Saravanan, A. Anpalagan, I. Woungang, Big Data in Massive Parallel Processing: A Multi-core Processors Perspective . Big Data Storage and Visualization Techniques, Richard S. Segall, Jeffrey S. Cook, Neha Gupta (Eds.), IGI Global, USA, pp. 276-302, (2018).
  5. M. L. Brocardo, I. Traore, I. Woungang, Continuous authentication using writing style . In Biometric-based Security Systems: State of the Art and Perspectives, Obaidat et al. (Eds.), Cambridge University Press, pp. 211-232, (2017).
  6. E. Mason, I. Traore, I. Woungang, Facets and Promises of Gait Biometrics Recognition , in Biometric-based Security Systems: State of the Art and Perspectives, Obaidat et al. (Eds.), Cambridge University Press, pp. 233-253, 2017.
  7. I. Woungang et al., Energy Efficient Mobile Wireless Network Operations for 4G and Beyond Using HetNets , Advances in Mobile Computing and Communications: 4G and Beyond (5G), M. Bala Krishna, Jaime Lloret Mauri (Eds.), CRC Press, ISBN 9781498701136, 397 pages, July 12, 2016

JOURNAL ISSUES

  1. M. R. Ogiela, W. Rahayu, I. Woungang Predictive intelligence in secure data processing, management, and forecasting. Inf. Process. Manag. 59(3): 102941 (2022)
  2. I. You, J. R.C. Nurse, I. Woungang, and A. F. Skarmeta. Special Section: Secure Communication for the Next Generation 5G and IoT Networks. IEEE Access (Jan 2020).
  3. I. Woungang, S.K. Dhurandher, A. Visconti. Internet of Things: design, architectures and protocols. Internet of Things, Elsevier, Available Online July 29, 2020, 100267, https://doi.org/10.1016/j.iot.2020.100267
  4. A. Visconti, I. Woungang, S.K. Dhurandher. Special Issue on Theoretical Aspects of Cryptography and Their Applications for Data Protection in Emerging 5G Systems. Security and Communication Networks, Wiley (2020)
  5. I. Woungang, S. K. Dhurandher, J. J. P. C. Rodrigues, A. Awad Special Issue on Security and Privacy in IoT and Cloud Computing Systems , Security and Privacy Journal, Wiley, doi: 10.1002/spy2.43, vol. 1, Issue 3, 2018, pp. 1-2
  6. I. Woungang, S. K. Dhurandher, A. Anpalagan and T. Vasilakos (Eds), Routing in Opportunistic Networks, Springer, ISBN: 978-1461435136, 410 pages, 2013
  7. L. Barolli,I. Woungang, O. K. Hussain Advances in Intelligent Networking and Collaborative Systems, The 9th International Conference on Intelligent Networking and Collaborative Systems, INCoS-2017 , Springer, Lecture Notes on Data Engineering and Communications Technologies 8, Springer 2017, ISBN 978-3-319-65635-9
  8. I. Woungang, S. K. Dhurandher, Introduction to the Special Section on Cognitive Radios as Next-Generation Wireless Networks, , Computers & Electrical Engineering , Vol. 52, Issue C, pp. 223-225, May 2016
  9. I. You, M. R. Ogiela, I. Woungang, K. Yim, Innovative security technologies against insider threats and data leakage, , International Journal Computer Mathematics 93(2): 236-238, 2016
  10. N. Mentens, D. Sauveron, J. M. Sierra, S-J Wang, I. Woungang, Lightweight and Energy-Efficient Security Solutions for Mobile Computing Devices IET Information Security 10(5): 223-224 (2016)

PRESENTATIONS

  1. I. Woungang Security Considerations for Private Standalone 5G. KIISC Research Group on 5G Security, Kookmin University, Seoul, Korea, South (2022).
  2. I. Woungang InterCloud and HetNet for Mobile Cloud Computing in 5G Systems: Design Issues, Challenges and Optimization. 12th International Conference on Broad-Band Wireless Computing, Communication and Applications (BWCCA 2017), Barcelona, Spain (2017).


    This site is maintained by Isaac Woungang.
    Last Modified: October 2023