WEAMR—A weighted energy aware multipath reliable routing mechanism for hotline-based WSNs A Tufail, A Qamar, AM Khan, WA Baig, KH Kim Sensors 13 (5), 6295-6318, 2013 | 17 | 2013 |
Simple service location protocol (sslp) for 6lowpan KH Kim, W Baig, SW Yoo, SD Park, H Mukhtar IETF ID work in progress),[Expires October 2009], 2009 | 15 | 2009 |
On improved relay nodes placement in two-tiered wireless sensor networks B Zafar, ZH Mir, SMS Shams, M Ikram, WA Baig, KH Kim, SW Yoo MILCOM 2009-2009 IEEE Military Communications Conference, 1-7, 2009 | 14 | 2009 |
Formal model of random walk mobility model for WMN using coloured petri nets NA Khan, F Ahmad, WA Baig Proceedings of 2014 11th International Bhurban Conference on Applied …, 2014 | 11 | 2014 |
Application-based Classification and Comparison of Secure Routing Protocols in Wireless sensor Networks: A Survey: A Survey IA Khan, F Ahmad, WA Baig, M Naseer SmartCR 5 (3), 209-223, 2015 | 6 | 2015 |
On the reliability of backbone-assisted end-to-end transmissions in WSNs A Tufail, SA Khayam, A Ali, WA Baig, FM Anwar, KH Kim, SW Yoo 2009 First International Conference on Ubiquitous and Future Networks, 22-27, 2009 | 6 | 2009 |
Optimizing time schedule of key updates in ISA100. 11a H Jung, DY Hwang, WA Baig, KH Kim, SW Yoo 2012 Fourth International Conference on Ubiquitous and Future Networks …, 2012 | 3 | 2012 |
Privacy assuring protocol using simple cryptographic operations for smart metering WA Baig, FI Khan, KH Kim, SW Yoo International Journal of Multimedia and Ubiquitous Engineering 7 (2), 315-322, 2012 | 3 | 2012 |
DOS attack on the availability of cloud network and its avoidance mechanism SMA Zaidi, WA Baig, H Redwan, KH Kim 한국정보처리학회 학술대회논문집 18 (1), 760-762, 2011 | 1 | 2011 |
Using Channel Diversity to Defend Against Wormhole Attacks in Wireless Sensor Networks SMA Zaidi, WA Baig, KH Kim International Information Institute (Tokyo). Information 15 (5), 2031, 2012 | | 2012 |
A Resilient Privacy Ensuring Protocol for Smart Metering in Smart Grid WA Baig, FI Khan, KH Kim, SW Yoo ISA 2012, 2012 | | 2012 |
Efficient Service Discovery Architecture for 6LoWPAN Network WA Baig, H Redwan, AH Chowdhury, KH Kim 대한전자공학회 학술대회, 120-121, 2009 | | 2009 |
Analysis of Sinkhole Security Threats to Fragments in the Adaptation Layer of the 6LoWPAN Network H Redwan, WA Baig, AH Chowdhury, KH Kim 대한전자공학회 학술대회, 90-91, 2009 | | 2009 |
The Pros and Cons of Route-over and Mesh-under Routing in 6LoWPAN AH Chowdhury, H Redwan, WA Baig, KH Kim 대한전자공학회 학술대회, 118-119, 2009 | | 2009 |