Follow
Farah Kandah, IEEE Senior Member
Title
Cited by
Cited by
Year
A secured cost-effective multi-cloud storage in cloud computing
Y Singh, F Kandah, W Zhang
2011 IEEE conference on computer communications workshops (INFOCOM WKSHPS …, 2011
1432011
Radio identity verification-based IoT security using RF-DNA fingerprints and SVM
D Reising, J Cancelleri, TD Loveless, F Kandah, A Skjellum
IEEE Internet of Things Journal 8 (10), 8356-8371, 2020
582020
Buterin's scalability trilemma viewed through a state-change-based classification for common consensus algorithms
A Altarawneh, T Herschberg, S Medury, F Kandah, A Skjellum
2020 10th Annual Computing and Communication Workshop and Conference (CCWC …, 2020
542020
A blockchain-based trust management approach for connected autonomous vehicles in smart cities
F Kandah, B Huber, A Skjellum, A Altarawneh
2019 IEEE 9th Annual Computing and Communication Workshop and Conference …, 2019
342019
A hardware-software codesign approach to identity, trust, and resilience for iot/cps at scale
F Kandah, J Cancelleri, D Reising, A Altarawneh, A Skjellum
2019 International Conference on Internet of Things (iThings) and IEEE Green …, 2019
252019
Dynamic light trail routing in WDM optical networks
W Zhang, F Kandah, C Wang, H Li
Photonic Network Communications 21, 78-89, 2011
252011
Mitigating colluding injected attack using monitoring verification in mobile ad‐hoc networks
F Kandah, Y Singh, W Zhang, C Wang
Security and Communication Networks 6 (4), 539-547, 2013
222013
Colluding injected attack in mobile ad-hoc networks
F Kandah, Y Singh, C Wang
2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS …, 2011
222011
Interference-aware robust topology design in multi-channel wireless mesh networks
W Zhang, F Kandah, J Tang, K Nygard
2010 7th IEEE Consumer Communications and Networking Conference, 1-5, 2010
202010
BLAST: Blockchain-based trust management in smart cities and connected vehicles setup
F Kandah, B Huber, A Altarawneh, S Medury, A Skjellum
2019 IEEE High Performance Extreme Computing Conference (HPEC), 1-7, 2019
172019
Efficient key management for Big Data gathering in dynamic sensor networks
FI Kandah, O Nichols, L Yang
2017 International Conference on Computing, Networking and Communications …, 2017
152017
An analysis of signal energy impacts and threats to deep learning based sei
JH Tyler, MMK Fadul, DR Reising, FI Kandah
ICC 2022-IEEE International Conference on Communications, 2077-2083, 2022
142022
Intelligent threat hunting in software-defined networking
S Schmitt, FI Kandah, D Brownell
2019 IEEE International Conference on Consumer Electronics (ICCE), 1-5, 2019
142019
Behavioral model based trust management design for iot at scale
B Huber, F Kandah
2020 international conferences on internet of things (iThings) and IEEE …, 2020
102020
Behavioral model anomaly detection in automatic identification systems (ais)
J Coleman, F Kandah, B Huber
2020 10th Annual Computing and Communication Workshop and Conference (CCWC …, 2020
102020
Interference-aware robust wireless mesh network design
F Kandah, W Zhang, Y Singh, J Li
2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 1-5, 2010
102010
Towards trusted and energy-efficient data collection in unattended wireless sensor networks
F Kandah, J Whitehead, P Ball
Wireless Networks 26 (7), 5455-5471, 2020
92020
Mitigating Eavesdropping Attack Using Secure Key Management Scheme in Wireless Mesh Networks.
FI Kandah, Y Singh, W Zhang
J. Commun. 7 (8), 596-605, 2012
82012
Diverse path routing with interference and reusability consideration in wireless mesh networks
F Kandah, W Zhang, C Wang, J Li
Mobile Networks and Applications 17, 100-109, 2012
72012
Advanced threat hunting over software-defined networks in smart cities
S Schmitt
University of Tennessee at Chattanooga, 2018
62018
The system can't perform the operation now. Try again later.
Articles 1–20