Comparison of ECC and RSA algorithm in resource constrained devices M Bafandehkar, SM Yasin, R Mahmod, ZM Hanapi 2013 international conference on IT convergence and security (ICITCS), 1-3, 2013 | 126 | 2013 |
A framework based on RSA and AES encryption algorithms for cloud computing services N Khanezaei, ZM Hanapi 2014 IEEE conference on systems, process and control (ICSPC 2014), 58-62, 2014 | 99 | 2014 |
Neighbor-based dynamic connectivity factor routing protocol for mobile ad hoc network AME Ejmaa, S Subramaniam, ZA Zukarnain, ZM Hanapi IEEE Access 4, 8053-8064, 2016 | 73 | 2016 |
An efficient anomaly intrusion detection method with feature selection and evolutionary neural network S Sarvari, NFM Sani, ZM Hanapi, MT Abdullah IEEE Access 8, 70651-70663, 2020 | 64 | 2020 |
An adaptive relay selection scheme for enhancing network stability in VANETs NM Al-Kharasani, ZA Zukarnain, SK Subramaniam, ZM Hanapi IEEE Access 8, 128757-128765, 2020 | 60 | 2020 |
An energy aware distributed clustering algorithm using fuzzy logic for wireless sensor networks with non-uniform node distribution N Nokhanji, ZM Hanapi, S Subramaniam, MA Mohamed Wireless Personal Communications 84, 395-419, 2015 | 53 | 2015 |
Task offloading paradigm in mobile edge computing-current issues, adopted approaches, and future directions MY Akhlaqi, ZBM Hanapi Journal of Network and Computer Applications 212, 103568, 2023 | 49 | 2023 |
Multi-objective grey wolf optimizer algorithm for task scheduling in cloud-fog computing FA Saif, R Latip, ZM Hanapi, K Shafinah IEEE Access 11, 20635-20646, 2023 | 45 | 2023 |
Cooperation stimulation mechanisms for wireless multihop networks: A survey N Samian, ZA Zukarnain, WKG Seah, A Abdullah, ZM Hanapi Journal of Network and Computer Applications 54, 88-106, 2015 | 45 | 2015 |
Reliability review of interconnection networks NA Md Yunus, M Othman, Z Mohd Hanapi, KY Lun IETE Technical Review 33 (6), 596-606, 2016 | 43 | 2016 |
An adaptive call admission control with bandwidth reservation for downlink LTE networks M Mamman, ZM Hanapi, A Abdullah, A Muhammed IEEE Access 5, 10986-10994, 2017 | 42 | 2017 |
Comparative study of high-speed Linux TCP variants over high-BDP networks MA Alrshah, M Othman, B Ali, ZM Hanapi Journal of network and computer applications 43, 66-75, 2014 | 42 | 2014 |
Quality of service class identifier (QCI) radio resource allocation algorithm for LTE downlink M Mamman, ZM Hanapi, A Abdullah, A Muhammed PloS one 14 (1), e0210310, 2019 | 41 | 2019 |
Trufix: A configurable trust-based cross-layer protocol for wireless sensor networks IA Umar, ZM Hanapi, A Sali, ZA Zulkarnain IEEE Access 5, 2550-2562, 2017 | 39 | 2017 |
A review on LiFi network research: Open issues, applications and future directions R Badeel, SK Subramaniam, ZM Hanapi, A Muhammed Applied Sciences 11 (23), 11118, 2021 | 35 | 2021 |
A survey of Sybil attack countermeasures in IoT-based wireless sensor networks A Arshad, ZM Hanapi, S Subramaniam, R Latip PeerJ Computer Science 7, e673, 2021 | 34 | 2021 |
An efficient framework model for optimizing routing performance in VANETs NM Al-Kharasani, ZA Zulkarnain, S Subramaniam, ZM Hanapi Sensors 18 (2), 597, 2018 | 33 | 2018 |
Multi-mobile agent itinerary planning algorithms for data gathering in wireless sensor networks: A review paper HQ Qadori, ZA Zulkarnain, ZM Hanapi, S Subramaniam International Journal of Distributed Sensor Networks 13 (1), 1550147716684841, 2017 | 32 | 2017 |
Hybrid of fuzzy clustering neural network over NSL dataset for intrusion detection system DAA Zainaddin, ZM Hanapi Journal of Computer Science 9 (3), 391, 2013 | 32 | 2013 |
Dynamic backoff collision resolution for massive M2M random access in cellular IoT networks HD Althumali, M Othman, NK Noordin, ZM Hanapi IEEE Access 8, 201345-201359, 2020 | 31 | 2020 |