default search action
Syed Adeel Ali Shah
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Asad Ali, Syed Adeel Ali Shah, Tamara Al Shloul, Muhammad Assam, Yazeed Yasin Ghadi, Sangsoon Lim, Ahmad Zia:
Multiobjective Harris Hawks Optimization-Based Task Scheduling in Cloud-Fog Computing. IEEE Internet Things J. 11(13): 24334-24352 (2024) - 2023
- [c4]Syed Adeel Ali Shah, Hubert Kroha, Marcello De Matteis, Andrea Baschirotto, Robert Richter:
65 nm CMOS 8 mV/fC, 14.6 ns Rising Time Analog Front-End for ATLAS Muon Drift Tubes Detectors. PRIME 2023: 97-100 - 2021
- [j14]Habiba Hamid, Rafidah Md Noor, Syaril Nizam Omar, Ismail Ahmedy, Shaik Shabana Anjum, Syed Adeel Ali Shah, Sheena Kaur, Fazidah Othman, Emran Mohd Tamil:
IoT-based botnet attacks systematic mapping study of literature. Scientometrics 126(4): 2759-2800 (2021) - [j13]Izaz Ahmad Khan, Syed Adeel Ali Shah, Adnan Akhunzada, Abdullah Gani, Joel J. P. C. Rodrigues:
TARS: A Novel Mechanism for Truly Autonomous Resource Selection in LTE-V2V Mode 4. Sensors 21(22): 7431 (2021) - 2020
- [j12]Iftikhar Ahmad, Muhammad Imran Khan Khalil, Syed Adeel Ali Shah:
Optimization-based workload distribution in geographically distributed data centers: A survey. Int. J. Commun. Syst. 33(12) (2020) - [j11]Iftikhar Ahmad, Gulzar Ahmed, Syed Adeel Ali Shah, Ejaz Ahmed:
A decade of big data literature: analysis of trends in light of bibliometrics. J. Supercomput. 76(5): 3555-3571 (2020) - [c3]Mahnoor Aftab, Syed Adeel Ali Shah, Abdul Rehman Aslam, Wala Saadeh, Muhammad Awais Bin Altaf:
Design of Energy-Efficient Electrocorticography Recording System for Intractable Epilepsy in Implantable Environments. ISCAS 2020: 1-5
2010 – 2019
- 2019
- [j10]Syed Adeel Ali Shah, Ejaz Ahmed, Muhammad Ahsan Qureshi, Sadeeq Jan, Rafidah Md Noor:
An effective back-off selection technique for reliable beacon reception in VANETs. Int. J. Commun. Syst. 32(13) (2019) - 2018
- [j9]Syed Adeel Ali Shah, Ejaz Ahmed, Muhammad Imran, Sherali Zeadally:
5G for Vehicular Communications. IEEE Commun. Mag. 56(1): 111-117 (2018) - [j8]Iftikhar Ahmad, Rafidah Md Noor, Ismail Ahmedy, Syed Adeel Ali Shah, Ibrar Yaqoob, Ejaz Ahmed, Muhammad Imran:
VANET-LTE based heterogeneous vehicular clustering for driving assistance and route planning applications. Comput. Networks 145: 128-140 (2018) - [j7]Syed Adeel Ali Shah, Ejaz Ahmed, Feng Xia, Ahmad Karim, Muhammad Ahsan Qureshi, Ihsan Ali, Rafidah Md Noor:
Coverage Differentiation Based Adaptive Tx-Power for Congestion and Awareness Control in VANETs. Mob. Networks Appl. 23(5): 1194-1205 (2018) - [j6]Syed Adeel Ali Shah, Ejaz Ahmed, Feng Xia, Ahmad Karim, Muhammad Shiraz, Rafidah Md Noor:
Adaptive Beaconing Approaches for Vehicular Ad Hoc Networks: A Survey. IEEE Syst. J. 12(2): 1263-1277 (2018) - [j5]Syed Adeel Ali Shah, Ejaz Ahmed, Joel J. P. C. Rodrigues, Ihsan Ali, Rafidah Md Noor:
Shapely Value Perspective on Adapting Transmit Power for Periodic Vehicular Communications. IEEE Trans. Intell. Transp. Syst. 19(3): 977-986 (2018) - 2016
- [i1]Syed Adeel Ali Shah, Ejaz Ahmed, Feng Xia, Ahmad Karim, Muhammad Shiraz, Rafidah Md Noor:
Adaptive Beaconing Approaches for Vehicular ad hoc Networks: A Survey. CoRR abs/1605.07329 (2016) - 2015
- [j4]Ahmad Karim, Syed Adeel Ali Shah, Rosli Bin Salleh, Muhammad Arif, Rafidah Md Noor, Shahaboddin Shamshirband:
Mobile Botnet Attacks - an Emerging Threat: Classification, Review and Open Issues. KSII Trans. Internet Inf. Syst. 9(4): 1471-1492 (2015) - [j3]Muhammad Shiraz, Mehdi Sookhak, Abdullah Gani, Syed Adeel Ali Shah:
A Study on the Critical Analysis of Computational Offloading Frameworks for Mobile Cloud Computing. J. Netw. Comput. Appl. 47: 47-60 (2015) - [c2]Ahmad Karim, Rosli Salleh, Syed Adeel Ali Shah:
DeDroid: A Mobile Botnet Detection Approach Based on Static Analysis. UIC/ATC/ScalCom 2015: 1327-1332 - 2014
- [j2]Syed Adeel Ali Shah, Muhammad Shiraz, Mostofa Kamal Nasir, Rafidah Binti Md Noor:
Unicast routing protocols for urban vehicular networks: review, taxonomy, and open research issues. J. Zhejiang Univ. Sci. C 15(7): 489-513 (2014) - [j1]Ahmad Karim, Rosli Bin Salleh, Muhammad Shiraz, Syed Adeel Ali Shah, Irfan Awan, Nor Badrul Anuar:
Botnet detection techniques: review, future trends, and issues. J. Zhejiang Univ. Sci. C 15(11): 943-983 (2014) - [c1]Ahmad Karim, Syed Adeel Ali Shah, Rosli Salleh:
Mobile Botnet Attacks: A Thematic Taxonomy. WorldCIST (2) 2014: 153-164
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint