Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Hashim, Fazirulhisyam
add a person with the name Hashim, Fazirulhisyam
 

Other publications of authors with the same name

Secure and Self-healing Control Centers of Critical Infrastructures using Intrusion Tolerance., , and . I. J. Network Security, 17 (4): 365-382 (2015)Depth error concealment based on decision making., , , and . ICSIPA, page 193-196. IEEE, (2013)Quality-improved and secure multicast delivery method in mobile IPv6 networks., , , , and . ISCC, page 538-543. IEEE Computer Society, (2011)A Survey and Taxonomy on Medium Access Control Strategies for Cooperative Communication in Wireless Networks: Research Issues and Challenges., , , , and . IEEE Communications Surveys and Tutorials, 18 (4): 2493-2521 (2016)Global Communications Newsletter., , , , , , , , , and 8 other author(s). IEEE Communications Magazine, 55 (1): 13-16 (2017)An investigation of vegetation effect on the performance of IEEE 802.11n technology at 5.18 GHz., , , , , , and . ICWCA, page 1-6. IEEE, (2012)A new cooperative spectrum sensing scheme based on discrete cosine transform., , , and . ISTT, page 108-111. IEEE, (2016)On the negative selection and the danger theory inspired security for heterogeneous networks., , and . IEEE Wireless Commun., 19 (3): 74-84 (2012)A Detection and Recovery Architecture Against DoS and Worm Attacks in NGMN., , and . ICC, page 1675-1679. IEEE, (2008)Authentication process enhancements in WiMAX networks., , , , and . Security and Communication Networks, 9 (17): 4703-4725 (2016)