default search action
Mohamed Mostafa Abdel-Azim
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j14]Abdussalam Ahmed Alashhab, Mohd Soperi Mohd Zahid, Mohamed Mostafa A. Azim, Muhammad Yunis Daha, Babangida Isyaku, Shimhaz Ali:
A Survey of Low Rate DDoS Detection Techniques Based on Machine Learning in Software-Defined Networks. Symmetry 14(8): 1563 (2022) - 2020
- [j13]Ahlam Alrehili, Abdullah Alsaeedi, Mohamed Mostafa A. Azim:
A data dissemination scheme for a wireless nanosensor network towards IoNT. Int. J. Sens. Networks 34(2): 81-94 (2020)
2010 – 2019
- 2019
- [j12]Mohamed Mostafa A. Azim:
Assessing link availability in communications networks under regional failures. Int. J. Commun. Networks Distributed Syst. 23(1): 25-43 (2019) - 2018
- [j11]Muhammad Nomani Kabir, Md. Arafatur Rahman, Saiful Azad, Mohamed Mostafa A. Azim, Md. Zakirul Alam Bhuiyan:
A connection probability model for communications networks under regional failures. Int. J. Crit. Infrastructure Prot. 20: 16-25 (2018) - [j10]Ahmed Salem, Mohamed Mostafa A. Azim:
The effect of RBCs concentration in blood on the wireless communication in Nano-networks in the THz band. Nano Commun. Networks 18: 34-43 (2018) - 2017
- [j9]Aly Mohamed El-Semary, Mohamed Mostafa A. Azim, Hossam Diab:
SPCBC: A Secure Parallel Cipher Block Chaining Mode of Operation based on logistic Chaotic Map. KSII Trans. Internet Inf. Syst. 11(7): 3608-3628 (2017) - 2015
- [j8]Mohamed Mostafa A. Azim, Muhammad Nomani Kabir:
Availability analysis of shared backup path protection under multiple-link failure scenario in WDM networks. Ann. des Télécommunications 70(5-6): 249-262 (2015) - [j7]Aly Mohamed El-Semary, Mohamed Mostafa Abdel-Azim:
Counter Chain: A New Block Cipher Mode of Operation. J. Inf. Process. Syst. 11(2): 266-279 (2015) - 2013
- [j6]Aly Mohamed El-Semary, Mohamed Mostafa Abdel-Azim:
New Trends in Secure Routing Protocols for Wireless Sensor Networks. Int. J. Distributed Sens. Networks 9 (2013) - 2012
- [j5]Mohamed Mostafa A. Azim, Muhammad Nomani Kabir:
Availability analysis under multiple link failures in WDM networks with shared-link connections. Photonic Netw. Commun. 23(1): 83-91 (2012) - 2011
- [j4]Mohamed Mostafa A. Azim, Muhammad Nomani Kabir:
Availability study of M: N automatic protection switching scheme in WDM networks. J. High Speed Networks 18(1): 1-13 (2011) - [c6]Aly Mohamed El-Semary, Mohamed Mostafa A. Azim:
A two-tier energy-efficient secure routing protocol for Wireless Sensor Networks. IAS 2011: 331-337 - 2010
- [j3]Mohamed Mostafa A. Azim:
MAP: A Balanced Energy Consumption Routing Protocol for Wireless Sensor Networks. J. Inf. Process. Syst. 6(3): 295-306 (2010) - [c5]Aly Mohamed El-Semary, Mohamed Mostafa A. Azim:
Path energy weight: A global energy-aware routing protocol for wireless sensor networks. Wireless Days 2010: 1-6
2000 – 2009
- 2007
- [j2]Mohamed Mostafa A. Azim, Xiaohong Jiang, Pin-Han Ho, Susumu Horiguchi, Minyi Guo:
Restoration Probability Modelling for Active Restoration-Based Optical Networks with Correlation Among Backup Routes. IEEE Trans. Parallel Distributed Syst. 18(11): 1592-1606 (2007) - 2006
- [c4]Mohamed Mostafa Abdel-Azim, Xiaohong Jiang, Susumu Horiguchi:
On Modeling the Restoration Probability of Active Restoration-Based Optical Networks with Correlation Among Backup Routes. FCST 2006: 23-38 - [c3]Mohamed Mostafa A. Azim, Xiaohong Jiang, Susumu Horiguchi:
Performance Analysis for Active Restoration-Based Optical Networks Incorporating the Correlation Among Backup Routes. ICC 2006: 2483-2488 - 2005
- [j1]Mohamed Mostafa A. Azim, Xiaohong Jiang, Pin-Han Ho, Susumu Horiguchi:
Models of Restoration Probability in WDM Networks Employing Active Restoration. Photonic Netw. Commun. 10(2): 141-153 (2005) - [c2]Mohamed Mostafa A. Azim, Xiaohong Jiang, Pin-Han Ho, Susumu Horiguchi:
A New Hybrid Architecture for Optical Burst Switching Networks. HPCC 2005: 196-202 - 2004
- [c1]Mohamed Mostafa A. Azim, Xiaohong Jiang, Pin-Han Ho, Md. Mamun-ur-Rashid Khandker, Susumu Horiguchi:
A New Scheme for Lightpath Restoration in WDM Networks. ICPP Workshops 2004: 381-386
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:47 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint