Saqib Ali
Saqib Ali
Guangzhou University China
Verified email at gzhu.edu.cn
Title
Cited by
Cited by
Year
A taxonomy of cross layer routing metrics for wireless mesh networks
MAB Ngadi, S Ali, AH Abdullah, RH Khokhar
EURASIP Journal on Wireless Communications and Networking 2012 (1), 177, 2012
342012
Secure Data Provenance in Cloud-Centric Internet of Things via Blockchain Smart Contracts
S Ali, G Wang, MZA Bhuiyan, H Jiang
2018 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced …, 2018
142018
A Blockchain-Based Decentralized Data Storage and Access Framework for PingER
S Ali, G Wang, B White, RL Cottrell
2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018
142018
Energy based efficiency evaluation of cluster-based routing protocols for wireless sensor networks (WSNs)
M Faheem, AB Ngadi, S Ali, MA Shahid, L Sakar
International Journal of Software Engineering and Its Applications 7 (6 …, 2013
132013
Interference nomenclature in wireless mesh networks
S Ali, A Naveed, MAB Ngadi, JA Chaudhry
Wireless personal communications 75 (4), 1983-2003, 2014
62014
Multi-criteria receiver self-election scheme for optimal packet forwarding in vehicular ad hoc networks
RH Khokhar, MA Ngadi, MS Latiff, KZ Ghafoor, S Ali
International Journal of Computers Communications & Control 7 (5), 865-878, 2012
52012
Pinger malaysia-internet performance measuring project: A case study
S Ali, RL Cottrell, A Nveed
SLAC National Accelerator Lab., Menlo Park, CA (United States), 2016
42016
Risk Reduction Activities Identification in Software Component Integration for Component Based Software Development (CBSD)
F Fatima, S Ali, MU Ashraf
International Journal of Modern Education and Computer Science 9 (4), 19, 2017
32017
Detecting Anomalies from End-to-end Internet Performance Measurements ( PingER ) using Cluster Based Local Outlier Factor
S Ali, G Wang, RL Cottrell, T Anwar
15th IEEE International Symposium on Parallel and Distributed Processing …, 2017
32017
Ensemble of Clustering Algorithms for Anomaly Intrusion Detection System
S Benqdara, MDA NGADI, JM SHARIF, S ALI, SVT Sangeetha, S Ravi, ...
Journal of Theoretical and Applied Information Technology 70 (3), 425-431, 2014
32014
Internet Performance Analysis of South Asian Countries using End-to-end Internet Performance Measurements
S Ali, G Wang, RL Cottrell, S Masood
16th IEEE International Conference on Ubiquitous Computing and …, 2017
22017
Optimized interference aware joint channel assignment model for wireless mesh network
S Ali, MA Ngadi
Telecommunication Systems 62 (1), 215-230, 2016
22016
A synopsis of self-healing functions in wireless networks
KA Kamal, JA Chaudhry, S Ali, M Ahmad, MAB Ngadi, AH Abdullah
2011 IEEE 14th International Multitopic Conference, 176-181, 2011
22011
Autonomic service composition through context orientation approach
JA Chaudhry, S Ali, MA Binngadi, AH Abdullah
Journal of Theoretical and Applied Information Technology 34 (1), 50-56, 2011
22011
Applying big data warehousing and visualization techniques on pingER data
A Hameed, S Ali, RL Cottrell, B White
Proceedings of the 3rd IEEE/ACM International Conference on Big Data …, 2016
12016
Usability of information systems software in Pakistan in users perspective
S Shafeeq, Ayesha Ali
Journal of Software Engineering & Intelligent Systems 1 (2), 122-132, 2016
1*2016
Android Malware Detection Using Category-Based Permission Vectors
X Li, G Wang, S Ali, QL He
International Conference on Algorithms and Architectures for Parallel …, 2018
2018
Internet Performance Prediction Framework Based on PingER Dataset
W Zhang, X Xing, S Ali, G Wang
International Conference on Algorithms and Architectures for Parallel …, 2018
2018
Substituting Missing Values in End-to-End Internet Performance Measurements Using k-Nearest Neighbors
S Ali, G Wang, X Xing, RL Cottrell
2018 IEEE 16th Intl Conf on Dependable, Autonomic and Secure Computing, 16th …, 2018
2018
An Automatic Tool to Model and Remove Integration Dependencies in user stories using UML
T Afzal, S Ali
IJCSIS 15 (1), 2017
2017
The system can't perform the operation now. Try again later.
Articles 1–20