Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Hussain, Sajid
add a person with the name Hussain, Sajid
 

Other publications of authors with the same name

Intelligent systems for future generation communications., , and . The Journal of Supercomputing, 54 (1): 1-3 (2010)Security analysis of pure DDP-based cipher proper for multimedia and ubiquitous device., , , , and . Telecommunication Systems, 44 (3-4): 267-279 (2010)Structural Monitoring using Wireless Sensors and Controller Area Network., and . CNSR, page 26-34. IEEE Computer Society, (2007)Communication Issues within HPC Grids., , , and . HPCS, page 101-107. University of Manitoba, Department of Computer Science, (2004)An Energy Efficient Spanning Tree Based Multi-Hop Routing in Wireless Sensor Networks., and . WCNC, page 4383-4388. IEEE, (2007)Using received signal strength variation for surveillance in residential areas., , and . Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security, volume 6973 of SPIE Proceedings, page 69730L. SPIE, (2008)Using received signal strength indicator to detect node replacement and replication attacks in wireless sensor networks., and . Data Mining, Intrusion Detection, Information Security and Assurance, and Data Networks Security, volume 7344 of SPIE Proceedings, page 73440G. SPIE, (2009)Fault-Tolerant and Ubiquitous Computing in Sensor Networks., , , and . IJDSN, (2013)Scalable and efficient key management for heterogeneous sensor networks., , , and . The Journal of Supercomputing, 45 (1): 44-65 (2008)Simulation-Based Fault Propagation Analysis - Application on Hydrogen Production Plant., , and . IEA/AIE, volume 7906 of Lecture Notes in Computer Science, page 441-448. Springer, (2013)