Cyber-Security Teaming and Research Lab

Publications

  • Zhipeng Huang, Ahmad Javaid, Vijay Kumar Devabhaktuni, Yingjie Li, and Xiaoli Yang, "Development of Cognitive Training Program With EEG Headset," in IEEE Access, vol. 7, issue 1, pp. 126191-126200, 2019. (2018 Impact Factor: 4.098) (doi: 10.1109/ACCESS.2019.2937866) (Online)
  • Ankit Renduchintala, Farha Jahan, Raghav Khanna, and Ahmad Y Javaid, "A Comprehensive Micro Unmanned Aerial Vehicle (UAV/Drone) Forensic Framework," In Digital Investigation, 2019. (2018 Impact Factor: 1.660, doi: 10.1016/j.diin.2019.07.002) (Online)
  • Dhwani Mehta, Mohammad Faridul Haque Siddiqui, and Ahmad Y Javaid, "Recognition of Emotion Intensities using Machine Learning Algorithms: A Comparative Study," In Sensors, vol 19, issue 8, article 1897, 2019 (Special Issue on Emotion and Stress Recognition Related Sensors and Machine Learning Technologies, 2018 Impact Factor: 3.031, doi: 10.3390/s19081897) (Online)
  • Parashar Dhakal, Praveen Damacharla, Ahmad Javaid, and Vijay Devabhaktuni, "A Near Real-Time Automatic Speaker Recognition Architecture for Voice-Based User Interface," In Machine Learning and Knowledge Extraction, vol. 1, no. 1, pp. 504-520, 2019 (doi:10.3390/make1010031) (Online)
  • Aakif Mairaj, Asif I. Baba, Ahmad Y. Javaid, "Application Specific Drone Simulators: Recent Advances and Challenges," In Simulation Modelling Practice and Theory (Elsevier), 2019 (2018 Impact Factor: 2.092) (doi: 10.1016/j.simpat.2019.01.004) (Online)
  • Blen Keneni, Devinder Kaur, Ali Saleh Al Bataineh, Vijay Devabhaktuni, Ahmad Y Javaid, Jack Zaientz, Robert Marinier, "Evolving Rule Based Explainable Artificial Intelligence for Unmanned Aerial Vehicles," IEEE Access, 2019 (2017 Impact Factor: 3.557) (doi: 10.1109/ACCESS.2019.2893141) (Online)
  • Praveen Damacharla, Ahmad Y. Javaid, Jennie J. Gallimore, and Vijay Devabhaktuni, “Common Metrics to Benchmark Human-Machine Teams (HMT): A Review,” IEEE Access, vol. 6, pp. 38637-38655, 2018. (2017 Impact Factor: 3.557, doi: 10.1109/ACCESS.2018.2853560)(Online)
  • Shahrukh Ashraf, Priyanka Aggarwal, Praveen Damacharla, Hong Wang, Ahmad Javaid, and Vijay Devabhaktuni, "A low-cost solution for UAV navigation in a GPS-denied environment," in International Journal of Distributed Sensor Networks, Vol. 14, Issue 6, 2018. (2017 Impact Factor: 1.787, doi: 10.1177/1550147718781750) (Online)
  • Abdulsahib Albehadili, Khair Al Shamaileh, Ahmad Javaid, Jared Oluoch, and Vijay Devabhaktuni, "An Upper Bound on PHY-layer Key Generation for Secure Communications over a Nakagami-m Fading Channel with Asymmetric Additive Noise," IEEE Access, vol. 6, pp. 28137-28149, 2018. (2017 Impact Factor: 3.577, doi: 10.1109/ACCESS.2018.2827925) (Online)
  • Praveen Damacharla, Parashar Dhakal, Sebastian Stumbo, Ahmad Y. Javaid, Subhashini Ganapathy, David A. Malek, Douglas C. Hodge, and Vijay Devabhaktuni, “Effects of Voice‐Based Synthetic Assistant on Performance of Emergency Medical Responders in Training,” International Journal of Artificial Intelligence in Education, 2018. (SNIP: 1.953, doi: 10.1007/s40593-018-0166-3) (Online)
  • Dhwani Mehta, Mohammad Faridul Haque Siddiqui, Ahmad Javaid, "Facial Emotion Recognition: A Survey and Real-World User Experiences in Mixed Reality," In Sensors, Vol. 18, Issue 2, Number 416, 2018 (2017 Impact Factor: 2.475, doi: 10.3390/s18020416) (Online) (PubMed)
  • Quamar Niyaz, Weiqing Sun, and Ahmad Y. Javaid, A Deep Learning Based DDoS Detection System in Software-Defined Networking (SDN)”, In EAI Endorsed Transactions on Security and Safety, 2017 (Accepted)
  • Ahmad Y. Javaid, Farha Jahan, and Weiqing Sun, “Analysis of Global Positioning System-based attacks and a novel Global Positioning System spoofing detection/mitigation algorithm for unmanned aerial vehicle simulation ”, In SIMULATION: Transactions of The International Society for Modeling and Simulation, Vol. 93, Issue 5, pp: 427-441, 2017. doi: 10.1177/0037549716685874 (Online)
  • Quamar Niyaz, Weiqing Sun, Ahmad Javaidand Mansoor Alam, “A Deep Learning Approach for Network Intrusion Detection System”, In EAI Endorsed Transactions on Security and Safety, Vol. 16, Issue 9, 2016. doi: 10.4108/eai.3-12-2015.2262516 (Online)
  • Farha Jahan, Ahmad Y. Javaid, Weiqing Sun and Mansoor Alam, "GNSSim: An open source GNSS/GPS framework for Unmanned Aerial Vehicular Network Simulation", In EAI Endorsed Transactions on Mobile Communication and Applications. doi: 10.4108/eai.11-8-2015.150091 (Online)
  • Ahmad Y. Javaid, Weiqing Sun, and Mansoor Alam. "Single and Multiple UAV Cyber-Attack Simulation and Performance Evaluation." In EAI Endorsed Transactions on Scalable Information Systems, Vol. 2 Issue 4, pp 1-11, 2015. doi: 10.4108/sis.2.4.e4 (Online)
  • Kaveh Ahmadi, Ahmad Y. Javaid and Ezzatollah Salari. “An Efficient Compression Scheme based on Adaptive Thresholding in Wavelet Domain Using Particle Swarm Optimization”, In Signal Processing: Image Communication, Vol. 32, pp 33-39, 2015. doi: 10.1016/j.image.2015.01.001 (Online)
  • Ahmad Javaid, Weiqing Sun, and Mansoor Alam. "UAVNet Simulation in UAVSim: A Performance Evaluation and Enhancement." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Vol. 137, pp. 107-115, Springer International Publishing, 2014. doi: 10.1007/978-3-319-13326-3_11 (Online)
  • Mohammed A. Qadeer, Shahid Habib, and Ahmad Y Javaid. "Apportioning Bandwidth to Clients as per Privileges." In International Journal of Future Generation Communication and Networking, 2008, Vol. 2: 55-68. (Online)
  • Mohammed A. Qadeer, Shahid Habib, and Ahmad Y. Javaid. “Dynamic Resource Allocation for providing Quality of Service”. In International Journal of Information Processing, 2009, Vol. 3 Issue 4, pp 84 – 96.
  • Subhrajit Majumder, Jared Oluoch, Tod Shockey, Kiyan Khaloodzadeh, Charlene M. Czerniak and Ahmad Javaid, "A Study of Common Concerns Inhibiting Teacher Enactment of Computational Thinking into Project‐Based Mathematics and Career Technical Education" CSEDU 2020: 12th International Conference on Computer Supported Education. Prague, Czech Republic, May 2-4, 2020.
  • Tod Shockey, Charlene M. Czerniak, Jared Oluoch, Ahmad Y Javaid, and Thehahzhnan Ponnaiyan, "An Exploration of Mathematics Teachers Concerns Enacting Project-Based Instruction," SITE 2020: The Society for Information Technology & Teacher Education, New Orleans, Louisiana, April 6-10, 2020.
  • Charlene M. Czerniak, Tod Shockey, Jared Oluoch, and Ahmad Y Javaid, "Look Ma, No Hands! Using Project-Based Learning and Computational Thinking to Teach Mathematics, Career/Technical Education," SITE 2020: The Society for Information Technology & Teacher Education, New Orleans, Louisiana, April 6-10, 2020.
  • Charlene M. Czerniak, Thihal Ponnaiyan, Jared Oluoch, and Ahmad Y Javaid, "How Can We Make Smart Vehicles Safer?: A Project To Improve Mathematics And Career-Technology Education," 2020 Hawaii International Conference on Education (HICE 2020), January 4-7, 2020.
  • Safia Rahmat, Quamar Niyaz, Akshay Mathur, Ahmad Y Javaid, and Weiqing Sun, "Network Traffic-Based Hybrid Malware Detection for Smartphone and Traditional Networked Systems," 2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), New York City, NY, USA, 2019, pp. 0322-0328. (doi: 10.1109/UEMCON47517.2019.8992934) (Online)
  • Yaswanth Kolli, Ahmad Y. Javaid, "A Hands-on Oriented Cyber-learning Curriculum for Undergraduate Cybersecurity Education," 15th International Conference on Frontiers in Education: Computer Science and Computer Engineering (FECS'19), Las Vegas, USA, July 29 - August 1, 2019. (Online)
  • Gabriel Castro Aguayo, Ulises Morales, Xiaoyu Long, Quamar Niyaz, Xiaoli Yang, and Ahmad Y. Javaid, "An Introductory Visualization Aid for Cybersecurity Education," 15th International Conference on Frontiers in Education: Computer Science and Computer Engineering, (FECS 19), Las Vegas, USA, July 29 - August 1, 2019. (Online)
  • Kevin A. Denker, and Ahmad Y. Javaid, "Quantum Computing as a Threat to Modern Cryptography Techniques," 15th International Conference on Foundations of Computer Science (FCS 2019), Las Vegas, USA, July 29 - August 1, 2019. (Online)
  • Caleb Davenport, and Ahmad Y. Javaid, "An Exploratory Study on Fuzzing and Concolic Execution Engines for Automated Vulnerability Discovery," 17th International Conference on Software Engineering Research and Practice (SERP 2019), Las Vegas, USA, July 29 - August 1, 2019. (Online)
  • Aakif Mairaj, Ali Al Bataineh, Devinder Kaur, and Ahmad Y. Javaid, "Identifying the Optimal Solutions of Bohachevsky Test Function Using Swarming Algorithms," 21st International Conference on Artificial Intelligence (ICAI 2019), Las Vegas, USA, July 29 - August 1, 2019. (Online)
  • Md Kabir Faisal, Ahmad Y. Javaid, and Vijay Devabhaktuni, "Application of Deep Learning in Wireless Signal Identification for Intelligent Channel Sensing," 21st International Conference on Artificial Intelligence (ICAI 2019), Las Vegas, USA, July 29 - August 1, 2019. (Online)
  • Venkata Mayukha Cheekati, Bhargav Pingle, Ahmad Y. Javaid, "A Data Mining Approach for Sepsis Validation," 21st International Conference on Artificial Intelligence (ICAI 2019), Las Vegas, USA, July 29 - August 1, 2019. (Online)
  • Subhrajit Majumdar, Akshay Mathur, and Ahmad Y. Javaid, "A Study on Recent Applications of Blockchain Technology in Vehicular Adhoc Network (VANET)," National Cyber Summit (NCS) 2019, Huntsville, Alabama, USA, June 4-6, 2019 (doi: 10.1007/978-3-030-31239-8_22) (Online)
  • Mohammed Sarkhi, Abdulsahib Albehadili, Osama Hussein, Ahmad Y Javaid, and Vijay Devabhaktuni, "Performance Investigation of Polar Codes Over Nakagami-M Fading and Real Wireless Channel Measurements," 14th International Conference on Wireless Algorithms, Systems, and Applications, Honolulu, Hawaii, USA, June 24-26, 2019. (doi: https://doi.org/10.1007/978-3-030-23597-0_23) (Online)
  • Aakif Mairaj, Subhrajit Majumder, and Ahmad Y Javaid, "Game-Theoretic Strategies for an Unmanned Aerial Vehicle Network Host Under DDoS Attack," 2019 International Conference on Unmanned Aircraft Systems (ICUAS 2019), Atlanta, GA, USA, June 11-14, 2019.
  • Abdulsahib Albehadili, Farha Jahan, Atif Ali, Ahmad Y Javaid, Jared Oluoch, and Vijay Devabhaktuni, "Machine Learning-based Primary User Emulation Attack Detection In Cognitive Radio Networks using Pattern Described Link-Signature (PDLS)" In 2019 IEEE Wireless Telecommunications Symposium (WTS 2019), New York City, NY, USA, April 9-12 2019.
  • Tauheed Khan Mohd, Subhrajit Majumdar, Akshay Mathur, and Ahmad Y. Javaid, "Simulation and Analysis of DDoS Attack on Connected Autonomous Vehicular Network using OMNET++," In 9th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference, Columbia University, New York City, NY, USA, 8 - 10 November 2018.
  • Parashar Dhakal, Praveen Damacharla, Ahmad Y Javaid, and Vijay Devabhaktuni, “Detection and Identification of Background Sounds to Improvise Voice Interface in Critical Environments”, in 2018 IEEE International Symposium on Signal Processing and Information Technology (ISSPIT), Louisville, Kentucky, USA, 6–8 Dec 2018. (doi: 10.1109/ISSPIT.2018.8642755) (Online)
  • Praveen Damacharla, Dhwani Mehta, Ahmad Y Javaid, and Vijay Devabhaktuni, “Study on State-of-the-art Cloud Systems Integration Capabilities with Autonomous Ground Vehicles”, in IEEE Vehicle Technologies Conference, VTC2018-Fall, Chicago, USA, 27–30 August 2018. (doi: 10.1109/VTCFall.2018.8690650)  (Online)
  • Tauheed Khan Mohd, Subhrajit Majumdar, Akshay Mathur, and Ahmad Y. Javaid, "Simulation and Analysis of DDoS Attack on Connected Autonomous Vehicular Network using OMNET++," In 9th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference, Columbia University, New York City, NY, USA, 8 - 10 November 2018.
  • Yaswanth Kolli, Tauheed Khan Mohd, and Ahmad Y. Javaid, "Remote Desktop Backdoor Implementation with Reverse TCP Payload using Open Source Tools for Instructional Use," In 9th IEEE Annual Information Technology, Electronics & Mobile Communications Conference, Vancouver, BC, Canada, Nov 1-3, 2018. (Online)
  • Md Tanzin Farhat, Ahmad Y Javaid, Vijay Devabhaktuni, and Zhiqiang Wu, "A Signal Verification Approach to Cognitive Radio Network Security," In 2018 IEEE National Aerospace & Electronics Conference (NAECON), Fairborn, Ohio, USA, July 23-26, 2018. (doi: 10.1109/NAECON.2018.8556763) (Online)
  • Blen Keneni, Devinder Kaur, Vijay Devabhaktuni, Ahmad Javaid, Jack Zaientz, and Robert Marinier, "Evolving Rule-Based Explainable Artificial Intelligence (XAI) for Decision Support System of Unmanned Air Vehicles (UAV)," in 3rd Annual Nature Inspired Exploration Summit Biocene 2018, Cleveland, Ohio, August 14-17, 2018.
  • Akshay Chawan, Weiqing Sun, Ahmad Javaid, and Umesh Gurav, "Security Enhancement of Over-the-Air Update for Connected Vehicles," In 2018 International Conference on Wireless Algorithms, Systems, and Applications (WASA 2018), Tianjin, China, June 20-22, 2018. (doi: 10.1007/978-3-319-94268-1_78) (Online)
  • Quamar Niyaz, Wei Liu, Weiqing Sun, and Ahmad Y. Javaid, "A Web-based Lightweight Testbed for Supporting Network Security Hands-on Labs," 2018 IEEE International Conference on Electro/Information Technology (EIT), Rochester, Michigan, USA, May 3-5, 2018. (doi:10.1109/EIT.2018.8500270) (Online)
  • Arun Prasath Sivanesan, Akshay Mathur, and Ahmad Y. Javaid, "A Google Chromium Browser Extension for Detecting XSS attack in HTML5 based Websites," 2018 IEEE International Conference on Electro/Information Technology (EIT), Rochester, Michigan, USA, May 3-5, 2018. (doi:10.1109/EIT.2018.8500284) (Online)
  • Benjamin Cechner, Akshay Mathur, and Ahmad Y. Javaid, "Software Cracking: An Exploration of the Physical Realities of Software," 2018 IEEE International Conference on Electro/Information Technology (EIT), Rochester, Michigan, USA, May 3-5, 2018. (doi:10.1109/EIT.2018.8500125) (Online)
  • Ankita Chordiya, Subhrajit Majumder, and Ahmad Y. Javaid, "Man-in-the-Middle (MITM) Attack Based Hijacking of HTTP Traffic Using Open Source Tools," 2018 IEEE International Conference on Electro/Information Technology (EIT), Rochester, Michigan, USA, May 3-5, 2018. (doi:10.1109/EIT.2018.8500144) (Online)
  • Bhargav Pingle, Aakif Mairaj, and Ahmad Y. Javaid, "Real-world Man-in-the-middle (MITM) Attack Implementation Using Open Source Tools for Instructional Use," 2018 IEEE International Conference on Electro/Information Technology (EIT), Rochester, Michigan, USA, May 3-5, 2018. (doi:10.1109/EIT.2018.8500082) (Online)
  • Shriya Vyamajala, Tauheed Mohd Khan, and Ahmad Y. Javaid, "A Real-World Implementation of SQL Injection Attack Using Open Source Tools for Enhanced Cybersecurity Learning," 2018 IEEE International Conference on Electro/Information Technology (EIT), Rochester, Michigan, USA, May 3-5, 2018. (doi:10.1109/EIT.2018.8500136) (Online)
  • Tejaswi Kakarla, Aakif Mairaj, Ahmad Y. Javaid, "A Real-World Password Cracking Demonstration Using Open Source Tools for Instructional Use," 2018 IEEE International Conference on Electro/Information Technology (EIT), Rochester, Michigan, USA, May 3-5, 2018. (doi:10.1109/EIT.2018.8500257) (Online)
  • Praveen Damacharla, Ruthwik R Junuthula, Ahmad Y. Javaid, and Vijay K. Devabhaktuni, “Autonomous ground vehicle error prediction modeling to facilitate human-machine cooperation”, In: Chen J. (eds) Advances in Human Factors in Robots and Unmanned Systems. AHFE 2018. Advances in Intelligent Systems and Computing, vol 784, pp 36-45. Springer, Cham, 2018. (doi: 10.1007/978-3-319-94346-6_4) (Online)
  • Praveen Damacharla, Ahmad Y. Javaid, and Vijay K. Devabhaktuni, “Human Error Prediction Using Eye Tracking to Improvise Team Cohesion in Human-Machine Teams”, In: Boring R. (eds) Advances in Human Error, Reliability, Resilience, and Performance. AHFE 2018. Advances in Intelligent Systems and Computing, vol 778, pp 47-57. Springer, Cham8, 2018. (doi: 10.1007/978-3-319-94391-6_5) (Online)
  • Ankit L. P. S. Renduchintala, Abdulsahib Albehadili, and Ahmad Y. Javaid, "Drone Forensics: A Preliminary Flight Log Analysis of Micro Drones", In 2017 International Symposium on Cyber Warfare, Cyber Defense, and Security, in collaboration with 2017 Conference on Computational Science and Computational Intelligence (CSCI-ISCW 2017), December 14-16, 2017, Las Vegas, USA (Online)
  • Mohammad Faridul Haque Siddiqui, Jackson DeCarvalho, and Ahmad Y. Javaid, "Genetic Algorithm Based Approach for Data Fusion at Grammar Level", In 2017 International Symposium on Computational Science, in collaboration with 2017 International Conference on Computational Science and Computational Intelligence (CSCI-ISCS 2017), December 14-16, 2017, Las Vegas, USA (Online)
  • Tauheed Khan Mohd, Jackson Carvalho, and Ahmad Y. Javaid, "Multi-modal data fusion of Voice and EMG data for Robotic Control," In 8th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference, Columbia University, New York City, NY, USA, 19 - 21 October 2017 (Online)
  • Ashutosh Bandekar and Ahmad Y. Javaid, "Cyber-attack Mitigation and Impact Analysis for Low-power IoT Devices," In 7th Annual IEEE Int. Conf. on CYBER Technology in Automation, Control, and Intelligent Systems (IEEE CYBER), Hawaii, USA, July 31 - August 4, 2017. doi: 10.1109/CYBER.2017.8446380 (Online)
  • Bhavana Daddala, Hong Wang and Ahmad Y. Javaid, "Design and Implementation of a customized encryption algorithm for Authentication and Secure Communication between devices", at 2017 IEEE National Aerospace and Electronics Conference (NAECON), Dayton, OH, June 27-30, 2017 doi: 10.1109/NAECON.2017.8268781 (Online)
  • Mohammad Rahat Helal, Weiqing Sun, and Ahmad Y. Javaid, "Efficient Isolation Enabled Role-Based Access Control for Database Systems," In the 2017 International Conference on Security and Management (SAM 2017), Las Vegas, USA, July 17-20, 2017. (Online)
  • Safia Rahmat, Quamar Niyaz, Ahmad Y Javaid, and Weiqing Sun, "Normal and Anomalous Traffic Flow Pattern Analysis for Organizational Networks," In 2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE), Windsor, ON, April 30-May 3, 2017. doi: 10.1109/CCECE.2017.7946652 (Online)
  • Keyur Kulkarni and Ahmad Javaid, “Open Source Android Vulnerability Detection Tools: A Survey,” In 2017 IEEE International Symposium on Technologies for Homeland Security, Waltham, MA, USA, April 25-26, 2017. (Online)
  • Rishabh Chauhan, Hong Wang, and Ahmad Javaid, “Modified RSSI Fingerprinting Algorithm with Reliability Factor for Wi-Fi based Indoor Navigation System”, In 6th International Conference on Sensor Networks, February 19-21, 2017, Porto, Portugal.
  • Ashutosh Bandekar, Akshay Kotian, and Ahmad Javaid, "Comparative Analysis of Simulation and Real-world Energy Consumption for Battery-life Estimation of low-power IoT deployment in Varying Indoor Lighting Conditions using Zolertia Z1 motes", 7th EAI International Conference on Sensor Systems and Software, Nice, France, 2016. (Online) (Online)
  • Harsha Chenji, Gordon Stewart, Zhiqiang Wu, Ahmad Javaid, Vijay Devabhaktuni, Kul Bhasin and Bin Wang, "An Architecture Concept for Cognitive Space Communication Networks",  34th AIAA International Communications Satellite Systems Conference, International Communications Satellite Systems Conferences (ICSSC), (AIAA 2016-5728) doi: 10.2514/6.2016-5728 (Online
  • Zhiping Zhang, Zhiqiang Wu, Harsha Chenji, James Stewart, Ahmad Javaid, Vijay Devabhaktuni, Kul Bhasin and Bin Wang, "Intelligent Channel Sensing based Secure Cross Layer Cognitive Networking for Resilient Space Communication", at 2016 IEEE National Aerospace and Electronics Conference (NAECON) and Ohio Innovation Summit (OIS), Dayton, OH, 2016, pp. 407-411. doi: 10.1109/NAECON.2016.7856839 (Online
  • Ahmad Karimi, Quamar Niyaz, Weiqing Sun, Ahmad Javaid, and Vijay Devabhaktuni, "Distributed Network Traffic Feature Extraction for a Real-time IDS", In 2016 IEEE International Conference on Electro Information Technology (EIT), Grand Forks, ND, 2016, pp. 0522-0526 doi: 10.1109/EIT.2016.7535295 (Online)
  • Hailu Xu, Weiqing Sun, and Ahmad Javaid"Efficient Spam Detection across Online Social Networks." In IEEE International Conference on Big Data Analysis (ICBDA), pp 1-6, IEEE 2016 doi: 10.1109/ICBDA.2016.7509829 (Online)
  • Quamar Niyaz, Weiqing Sun, Ahmad Javaid, and Mansoor Alam, "A Deep Learning Approach for Network Intrusion Detection System." In Proceedings of 9th EAI International Conference on Bio-inspired Information and Communications Technologies (BICT), pp. 21-26, ACM 2015 (Online)
  • Junghwan Kim, Quamar Niyaz, and Ahmad Y. Javaid. "Performance evaluation of VoIP broadcasting over LTE for varying speeds and distances of mobile nodes." In Broadband Multimedia Systems and Broadcasting (BMSB), 2014 IEEE International Symposium on, pp. 1-5. IEEE, 2014. (Online)
  • Ahmad Y. Javaid, Weiqing Sun, and Mansoor Alam. "UAVSim: A simulation testbed for unmanned aerial vehicle network cyber security analysis." In Globecom Workshops (GC Wkshps), 2013 IEEE, pp. 1432-1436. (Online)
  • Ahmad Y. Javaid, Weiqing Sun, Vijay K. Devabhaktuni, and Mansoor Alam. "Cyber security threat analysis and modeling of an unmanned aerial vehicle system." In Homeland Security (HST), 2012 IEEE Conference on Technologies for, pp. 585-590. IEEE, 2012. (Online)
  • Mohammed Abdul Qadeer, S. Habib, Ahmad Y. Javaid, and M. A. Hafeez. "A novel approach for resource allocation in broadband access networks." In Proceedings of the International Conference and Workshop on Emerging Trends in Technology, pp. 268-272. ACM, 2010. (Online)
  • Shahid Habib, Mohammed A. Qadeer, and Ahmad Y. Javaid. "Authentication Based QoS Using Bandwidth Limitation." In Computer Science and its Applications, 2008. CSA'08. International Symposium on, pp. 7-12. (Online)
  • Mohammed A. Qadeer, Shahid Habib, and Ahmad Y. Javaid. "Differential allocation of Bandwidth to services based on priority." In Internet, 2008. ICI 2008. 4th IEEE/IFIP International Conference on, pp. 1-5. IEEE, 2008. (Online)
  • Mohammed A. Qadeer, Shahid Habib, and Ahmad Y. Javaid. "Bandwidth management using weighted fair queuing." In Proceedings of the 2008 International Conference on Advanced Infocomm Technology, p. 37. (Online)
  • Ahmad Y. Javaid, M. Inamullah, M. Naqvi, and M. S. Umar. “Feature Extraction through Edge Detection for Face Recognition”, Proceeding of National Conference on Modern Trends in Electronics and Communication Systems (MTECS-2008), Aligarh Muslim University, Aligarh, India, 2008.
Last Updated: 6/27/22