Publications

List of publications authored by members of the DABNEL Research Group directed by Prof. Woungang.

book1 book2 book3 book4

Authored/Edited Books
Edited Special Issues

Contributed Book Chapters
Journal Articles
Conference Papers
Magazine Articles and Editorials

 

Authored/Edited Books

  1. I. Traore, A. Awad, I. Woungang, Information Security Practices: Emerging Threats and Perspectives , Springer, ISBN 10: 3319489461 ISBN 13: 9783319489469, 100 pages, 2017
  2. J. E. Mason, I, Traore I. Woungang, Machine Learning Techniques for Gait Biometric Recognition using the Ground Reaction Force , (Authored book), Springer, ISBN 978-3-319-29086-7, DOI: 10.1007/978-3-319-29088-1, 247 pages, Feb. 8, 2016
  3. I. Woungang, S. K. Dhurandher, A. Anpalagan and T. Vasilakos (Eds), Routing in Opportunistic Networks, Springer, ISBN: 978-1461435136, 410 pages, 2013
  4. M. Obaidat, A. Anpalagan, I. Woungang (Eds), Handbook on Green Information and Communication Systems, Elsevier, ISBN:978-0-387-09750-3, 816 pages, 2012

Edited Special Issues

  1. I. Woungang, S. K. Dhurandher, Introduction to the Special Section on Cognitive Radios as Next-Generation Wireless Networks, , Computers & Electrical Engineering , Vol. 52, Issue C, pp. 223-225, May 2016
  2. I. You, M. R. Ogiela, I. Woungang, K. Yim, Innovative security technologies against insider threats and data leakage, , International Journal Computer Mathematics 93(2): 236-238, 2016
  3. T. Shon, C-H Hsu,I. Woungang, Recent Advanced Technologies and Theories for Grid and Cloud Computing, , Computers & Electrical Engineering , Vol. 39, Issue 1, pp. 1-2, 2013
  4. J. H. Park, I. Woungang, J. Ma, F. Kawsar, Ubiquitous computing for communications and broadcasting, , Int. J. Communication Systems, Vol. 25, No. 6, pp. 689-690, 2012

Contributed Book Chapters

  1. V. Saravanan, A. Anpalagan, I. Woungang, Big Data in Massive Parallel Processing: A Multi-core Processors Perspective , Big Data Storage and Visualization Techniques, Richard S. Segall, Jeffrey S. Cook, Neha Gupta (Eds.), IGI Global, USA, 2017. In Press
  2. I. Woungang, G. Carvalho, A. Anpalagan, et al., Energy Efficient Mobile Wireless Network Operations for 4G and Beyond Using HetNets , Advances in Mobile Computing and Communications: 4G and Beyond (5G), M. Bala Krishna, Jaime Lloret Mauri (Eds.), CRC Press, ISBN 9781498701136, 397 pages, July 12, 2016
  3. S. K. Dhurandher, D. K. Sharma, I. Woungang, S. Gupta, S. Goyal, Routing Protocols in Infrastructure-Based Opportunistic Networks, Routing in Opportunistic Networks, I. Woungang et al. (Eds.), Springer, USA, ISBN 9781461435143, pp. 125-144, June 2013
  4. S. K. Dhurandher, D. K. Sharma, I. Woungang, S. Bhati, Routing Protocols in Infrastructure-less Opportunistic Networks , Routing in Opportunistic Networks, I. Woungang et al. (Eds.), Springer, USA, ISBN 9781461435143, pp. 353-382, June 2013
  5. I. Traore, I. Woungang, Software Security Engineering –Part I: Security Requirements and Risk Analysis , Software Development Techniques for Constructive Information Systems Design, Khalid A Buragga and Noor Zaman (Eds.), IGI Global, USA, ISBN 10:1466636793, pp. 221-255, Jan. 2013
  6. I. Traore, I. Woungang, Software Security Engineering –Part II: Security Policy, Analysis, and Design , Software Development Techniques for Constructive Information Systems Design, Khalid A Buragga and Noor Zaman (Eds.), IGI Global, USA, ISBN 10:1466636793, pp. 256-284, Jan. 2013
  7. I. Woungang, S. K. Dhurandher, M. S. Obaidat, Using Ant Colony Agents for Designing Energy-Efficient Protocols for Wireless Ad Hoc and Sensor Networks , Handbook on Green Communication and Systems, Obaidat et al. (Eds.), Elsevier, pp. 609-622, Nov. 6, 2012
  8. G. H. S. Carvalho, I. Woungang, A. Anpalagan, Towards Energy Efficiency in Next Generation Green Mobile Networks: a Queueing Theory Approach , Handbook on Green Communication and Systems, Obaidat et al. (Eds.), Elsevier, pp. 687-719, Nov. 6, 2012

Journal and Magazine Articles

  1. G. H. S. Calvalho, I. Woungang, A. Anpalagan, Intercloud and HetNet for Mobile Cloud Computing in 5G Systems: Design Issues, Challenges, and Optimization IEEE Network, 2017
  2. S. K. Dhurandher, D. K. Sharma, I. Woungang, A. Saini, An energy-efficient history-based routing scheme for opportunistic networks Int. J. Communication Systems 30(7), 2017
  3. S. J. Borah, S. K. Dhurandher, I. Woungang, V. Kumar, Game theoretic context-based Routing for opportunistic networks in an IoT scenario Computer Networks, 2017. In Press.
  4. A. Alnoman, A. Anpalagan, I. Woungang, Base Station Sleeping Mechanism for Reduced Delay Using Traffic Load Prediction Journal of Traffic and Logistics Engineering, Engineering and Technology Publishing, USA, Feb. 2017. In Press
  5. F. Hussain, L. Ferdouse, A. Anpalagan, L. Karim, I. Woungang, Security threats in M2M networks: a survey with case study Computer Systems Science and Engineering Journal, CRL Publishing, Vol. 32, No. 1, March 2017
  6. S. J. Borah, S. K. Dhurandher, I. Woungang, V. Kumar, L. Barolli, A multi-objectives based technique for optimized routing in opportunistic networks Journal of Ambient Intelligence and Humanized Computing, Springer, DOI 10.1007/s12652-017-0462-z, 12 pages.
  7. D. K. Sharma, S. K. Dhurandher, I. Woungang, J. Arora, I. Gupta, History Based Secure Routing Protocol to Detect Blackhole and Greyhole Attacks in Opportunistic Networks Recent Advances in Communications and Networking Technology (RACNT), Benham Science, Vol. 5, No. 2, pp. 73-89, 2016
  8. M. L. Brocardo, I. Traore, I. Woungang, M. S. Obaidat, Authorship Verification using Deep Belief Network Systems, Int J Commun Syst. 2017;e3259. doi:10.1002/dac.3259
  9. S. K. Malik, M. Dave, S. K. Dhurandher, I. Woungang, L. Barolli, An Ant-based QoS Aware Routing Protocol for Heterogeneous Wireless Sensor Soft Computing, Springer, Online, doi:10.1007/s00500-016-234-z, pp. 1-12, 2016
  10. A. Kumar, S. K. Dhurandher, M. S. Obaidat, I. Woungang, S. Gupta, J. J. P. C. Rodrigues, An Altruism-based Trust-Dependent Message Forwarding Protocol for Opportunistic Networks Int J Commun Syst. 2017;30:e3232. https://doi.org/10.1002/dac.3232
  11. D. K. Sharma, S. K. Dhurandher, I. Woungang, R. K. Srivastava, A. Mohananey, J. J. P. C. Rodrigues, A Machine Learning-based Protocol for Efficient Routing in Opportunistic Networks IEEE Systems Journal, Vol. PP., Issue 99, pp. 1-7, Dec. 2016
  12. H-C Wang, I. Woungang, K-C Ting, C-C Tseng, F-C Kuo, H-T Huang, Co-Tier Downlink Interference Management in Dense Femtocell Networks Int J Commun Syst, 29: 2534–2541. doi: 10.1002/dac.3196, 2016
  13. A. Kitana, I. Traore, I. Woungang, Impact Study of a Mobile Botnet over LTE Networks Journal of Internet Services and Information Security (JISIS) , Vol. 6, No. 2, pp. 1-22, May 2016
  14. F. Rashid, A. Miri, I. Woungang, Secure Image Deduplication through Image Compression Journal of Information Security and Applications, Springer, Vol. 27-28, pp. 54-64, Apr-May 2016
  15. G.H.S. Carvalho, I. Woungang, A. Anpalagan, E. Hossain, QoS-Aware Energy-Efficient Joint Radio Resource Management in Multi-RAT Heterogeneous Networks IEEE Trans. on Vehicular Technology, Vol. 65. Issue 8, pp. 6343-6365, 2015
  16. S. K. Dhurandher, I. Woungang, M. S. Obaidat, K. Kumar, M. Joshi, M. Verma, A Distributed Adaptive Admission Control Scheme for Multimedia Wireless Mesh Networks IEEE Systems Journal . 9(2): 595-604, 2015
  17. J-M Chang, P-C Tsou, I. Woungang, H-C Chao, J-L Chen, Defending Against Collaborative Attacks by Malicious Nodes in MANETs: a Cooperative Bait Detection Approach IEEE Systems Journal 9(1): 65-75, 2015
  18. S. K. Dhurandher, D. K. Sharma, I. Woungang, S. Gupta, Integration of Fixed and Mobile Infrastructure for Message Passing in Opportunistic Networks Journal of Networks, Vol. 10, No. 12, pp. 642-657, Dec. 2015
  19. M. L. Brocardo, I. Traore, I. Woungang, Authorship Verification of Email and Tweet Messages Applied for Continuous Authentication Journal of Computer and System Sciences, Vol. 31, Issue 8, pp. 1429-1440, Dec. 2015
  20. A. Behzadan, A. Anpalagan, I. Woungang, B. Ma, H-C. Chao, An Energy Efficient Utility-based Distributed Data Routing Scheme for Heterogeneous Sensor Networks Wirel. Commun. Mob. Comput., 15: 2020–2037. doi: 10.1002/wcm.2474, 2015
  21. S. K. Dhurandher, D. K. Sharma, I. Woungang, A. Saini, Efficient Routing based on Past Information to Predict the Future Location for Message Passing in Infrastructureless Opportunistic Networks Journal of Supercomputing, 71(5): 1694-1711, 2015
  22. M. L. Brocardo, I. Traore, S. Saad, I. Woungang, Verifying Online User Identity using Stylometric Analysis for Short Messages Journal of Networks, Vol. 9, No. 12, Dec. 2014, pp. 3347-3355
  23. G. H.S. Carvalho, I. Woungang, A. Anpalagan, Analysis of Sub-band Allocation in Multi-Service Cognitive Radio Access Networks IEEE Wireless Communications Letters, Vol. PP., Issue 99, doi: 10.1109/LWC 2014.2344669, July 31, 2014, pp. 645-648
  24. S. K. Dhurandher, D. K. Sharma, I. Woungang, R. Gupta, S. Garg, GAER: Genetic Algorithm based Energy-efficient Routing Protocol for Infrastructureless Opportunistic Networks Journal of Supercomputing, DOI: 10.1007/s11227-014-1195-9, May 3, 2014
  25. I. Traore, I. Woungang, M. S. Obaidat, Y. Nakkabi, I. Lai, Online Risk-Based Authentication Using Behavioral Biometrics Multimedia Tools and Appl., July 2014, Vol. 71, Issue 2, pp. 575-605
  26. I. Woungang, F-H Tseng, Y-H Lin, L-D Chou, H-C Chao, M. S. Obaidat, MR-Chord: Improved Chord Look-Up Performance in Structured Mobile P2P Networks IEEE Systems Journal , DOI: 10.1109/JSYST.2014.2306147, pp. 743-751, March 2014
  27. L. Karim, A. Anpalagan, N. Nasser, J. Almhana, I. Woungang, Fault Tolerant, Energy Efficient and Secure Clustering Scheme for Mobile M2M Communications Transactions on Emerging Telecommunications Technologies, Vol. 25, Issue 10, pp. 1028-1044, Oct. 2014
  28. V. Ngo, I. Woungang, A. Anpalagan, A Schedule-based Medium Access Control Protocol for Mobile Wireless Sensor Networks, Wirel. Commun. Mob. Comput., 14(6): 629-643, 2014
  29. A. Behzadan, A. Anpalagan, I. Woungang, B. Ma, Utility Driven Construction of Balanced Data Routing Trees in Wireless Sensor Networks Wirel. Commun. Mob. Comput., 14(8): 770-788, 2014
  30. M. S. Obaidat, I. Woungang, S. K. Dhurandher, V. Koo, A Cryptography-Based Protocol Against Packet Dropping and Message Tampering Attacks on Mobile Ad Hoc Networks Security and Communication Networks 7(2): 376-384, 2014
  31. R. Siddavaatam, A. Anpalagan, I. Woungang, S. Misra, Ant Colony Optimization based Sub-channel Allocation Algorithm for Small Cell LTE-A HetNets Wireless Pers Commun. 77: 411. doi:10.1007/s11277-013-1513-1, 2014
  32. G. H. S. Carvalho, I. Woungang, A. Anpalagan, R. W. L. Coutinho, J. C. W. A. Costa, A Semi-Markov Decision Process-Based Joint Call Admission Control for Inter-RAT Cell Re-Selection in Next Generation Wireless Networks Computer Networks, Vol. 57, pp. 3545-3562, 2013
  33. I. Woungang, S. K. Dhurandher, L. Agnani, A. Mahendru, A. Anpalagan, An Ant-Swarm Inspired Dynamic Multiresolution Data Dissemination Protocol for Wireless Sensor Networks Journal of Supercomputing, Vol. 65, Issue 2, pp. 524-542, 2013
  34. L-S Chen, H-C Wang, I. Woungang, F-C Kuo, EOBDBR: An efficient Optimum Branching-based Distributed Broadcast Routing Protocol for Wireless Ad Hoc Networks, Telecommunication Systems, Vol. 52, Issue 2, pp. 497-512, 2013
  35. B. Sayed, I. Traore, I. Woungang, M. S. Obaidat, Biometric Authentication using Mouse Gesture Dynamics IEEE Systems Journal, Vol. 7, No. 2, June 2013, pp. 262-274
  36. I. Woungang, S. K. Dhurandher, M. S. Obaidat, R. D. Peddi, A DSR-based routing protocol for mitigating blackhole attacks on mobile ad hoc networks Security and Communication Networks, 9(5): 420-428, 2013
  37. G. H.S. Carvalho, I. Woungang, A. Anpalagan, S. K. Dhurandher, Energy-efficient Radio Resource Management Scheme for Heterogeneous Wireless Networks: a Queueing Theory Perspective Journal of Convergence, Thomson Router ISI, Vol. 3, No. 4, pp. 15-22, Dec. 2012
  38. I. Traore, I. Woungang, Y. Nakkabi, M. S. Obaidat, A. A. Ahmed, B. Khalilian, Dynamic Sample Size Selection in Learning Command Line Sequence for Continuous Authentication IEEE Trans. on Systems, Man and Cybernetics , Part B, Vol. 42, Issue 5, pp. 1343-1356, Oct., 2012
  39. I. Woungang, F. O. Akinladejo, D. W. White, M. S. Obaidat, Coding-Error Based Defects in Enterprise Resource Planning Software: Prevention, Discovery, Elimination and Mitigation Journal of Systems and Software, 85, pp. 1682-1698, 2012
  40. H-C Wang, I. Woungang, C-W Yao, A. Anpalagan, M. S. Obaidat, Energy-Efficient Task Scheduling Algorithm for Real-Time Multi-Processor Embedded Systems Journal of Supercomputing, Vol. 62, Issue 2, pp. 967-988, 2012
  41. I. Traore, I. Woungang, A. A. E. Ahmed, M. S. Obaidat, A Framework for Bottleneck Analysis of High-performance Software Design Journal of Internet Technology, Taiwan Academic Network, Vol.13, No. 3, May, 2012
  42. M. Subramaniam, A. Anpalagan, I. Woungang, Performance of a Distributed Full Inversion Power Control and Base Station Assignment Scheme in a Cellular CDMA Network with Hot-Spots Wireless Personal Comm., Vol. 65, Issue 3, pp. 713-729, 2012
  43. I. Traore, I. Woungang, A. A. E. Ahmed, M. S. Obaidat, Software Performance Modeling using the UML: a Case Study Journal of Networks , Academy Publisher, vol. 7, No. 1, pp. 4-20, Feb., 2012

Conference Papers (in IEEE Xplore)

  1. G. H. S. Carvalho, I. Woungang, A. Anpalagan, E. Degtiareva, J. J. P. C. Rodrigues, A Semi-Markov Decision Model-based Brokering Mechanism for Mobile Cloud Market IEEE ICC2017, Paris, France, May 21-25, 2017. In Press
  2. D. K. Sharma, S. K. Dhurandher, I. Woungang, A. Bansal, A. Gupta, A. Anpalagan, GD-CAR: A Genetic algorithm based dynamic context aware routing protocol for Opportunistic networks 20-th Intl. Conference on Network-Based Information Systems (NBiS-2017), Toronto, Aug. 24-26, 2017. (Accepted June 12, 2017)
  3. L. Karim, A. Anpalagan, N. Nasser, I. Woungang, J. Almhana, N. Khan, An Efficient Cluster-Based and Energy Aware Scheme for M2M Communication Networks IEEE IST-Africa 2017, Windhoek, Namibia, May 2017. In Press
  4. S. K. Dhurandher, A. Kumar, I. Woungang, M. S. Obaidat, Supernova and Hypernova Misbehavior Detection Scheme for Opportunistic Networks AINA 2017: 387-391
  5. A. Kitana, I. Traore, I. Woungang, Impact of Base Transceiver Station Selection Mechanisms on a Mobile Botnet Over a LTE Network MALWARE 2016: 20-30
  6. N. Gupta, S. K. Dhurandher, I. Woungang, On the Probability of Appearance of Primary User in IEEE 802.22 WRAN using an Artificial Neural Network Learning Technique Proc. of IEEE India Intl. Conference on Information Processing (IICIP 2016), Delhi, Aug. 12-14, 2016
  7. R. Siddavaatam, I. Woungang, G. H. S. Carvalho, A. Anpalagan, An Efficient Method for Mobile Big Data Transfer Over HetNet in Emerging 5G Systems CAMAD 2016: 59-64
  8. V. Shrivastav, S. K. Dhurandher, I. Woungang, V. Teotia, J. J. P. C. Rodrigues, Game Theory-Based Channel Allocation in Cognitive Radio Networks GLOBECOM 2016: 1-5
  9. R. Siddavaatam, I. Woungang, G. H. S. Carvalho, A. Anpalagan, Efficient Ubiquitous Big Data Storage Strategy for Mobile Cloud Computing over HetNet GLOBECOM 2016: 1-6
  10. K. Khalid, I. Woungang, S. K. Dhurandher, L. Barolli, G. H.S. Carvalho, M. Takizawa, An Energy-Efficient Routing Protocol for Infrastructure-less Opportunistic Networks IMIS 2016: 237-244
  11. A. Bamrah, I. Woungang, L. Barolli, S. K. Dhurandher, G. H.S. Carvalho, M. Takizawa, A Centrality-Based History Prediction Routing Protocol for Opportunistic Networks CISIS 2016: 130-136
  12. B. Tushir, S. K. Dhurandher, I. Woungang, M. S. Obaidat, V. Kumar, Graph Colouring Technique for Efficient Channel Allocation in Cognitive Radio Networks ICC 2016: 1-5
  13. S. K. Dhurandher, I. Woungang, B. Tushir, V. Kumar, M. Takizawa, L. Barolli, Power Control Scheme for Underlay Approach in Cognitive Radio Networks NBiS 2016: 114-118
  14. S. K. Dhurandher, S. J. Borah, D. K. Sharma, I. Woungang, K. Arora, D. Agarwal, EDR: An Encounter and Distance based Routing Protocol for Opportunistic Networks AINA 2016: 297-302
  15. V. Teotia, S. K. Dhurandher, I. Woungang, M. S. Obaidat, Markovian Model Based Channel Allocation in Cognitive Radio Networks DSDIS 2015: 478-482
  16. G. H. S. Carvalho, I. Woungang, A. Anpalagan, L. Barolli, M. Takizawa, Optimal Cloud Broker Method for Cloud Selection in Mobile Inter-Cloud Computing IMIS 2015: 239-244
  17. S. K. Dhurandher, I. Woungang, A. Rajendra, P. Ghaie, P. Chatzimisios, A Centrality-based ACK Forwarding Mechanism for Efficient Routing in Opportunistic Networks IoT 360 (1) 2015: 99-108
  18. F. Rashid, A. Miri, I. Woungang, Proof of Storage for Video Deduplication in the Cloud BigData Congress 2015: 499-505
  19. A. Ojo, N-W Ma, I. Woungang, Modified Floyd-Warshall Algorithm for Equal Cost Multipath in Software-Defined Data Center ICC Workshops 2015: 346-351
  20. V. Teotia, S. K. Dhurandher, I. Woungang, M. S. Obaidat, Wormhole Prevention using COTA Mechanism in Position Based Environment over MANETs ICC 2015: 7036-7040
  21. F. Rashid, A. Miri, I. Woungang, A Secure Video Deduplication Scheme in Cloud Storage Environments Using H.264 Compression BigDataService 2015: 138-146
  22. A. H. Mohammed, A. S. Khwaja, A. Anpalagan, I. Woungang, Base Station Selection in M2M Communication using Q-learning Algorithm in LTE-A Networks AINA 2015: 17-22
  23. S. HariShankar, I. Woungang, S. K. Dhurandher, I. Traore, S. B. Kaleel, E-MAntNet: An ACO-based Energy Efficient Routing Protocol for Mobile Ad Hoc Networks AINA 2015: 29-36
  24. P. Sidhu, I. Woungang, G. H. S. Carvalho, A. Anpalagan, S. K. Dhurandher An Analysis of Machine-Type-Communication on Human-Type-Communication over Wireless Communication Networks AINA Workshops 2015: 332-337
  25. F. Rashid, A. Miri, I. Woungang Proof of Retrieval and Ownership Protocols for Images through SPIHT Compression HPCC/CSS/ICESS 2014: 835-838
  26. M. L. Brocardo, I. Traore, I. Woungang, Toward a Framework for Continuous Authentication using Stylometry AINA 2014: 106-115
  27. S. K. Dhurandher, I. Woungang, I. Traore, C-SCAN: An Energy-Efficient Network Layer Security Protocol for Mobile Ad Hoc Networks AINA Workshops 2014: 530-535
  28. S. K. Dhurandher, M. S. Obaidat, I. Woungang, P. Agarwal, A. Gupta, P. Gupta, A Cluster-Based Load Balancing Algorithm for Cloud Computing ICC 2014: 2921-2925
  29. L. Karim, A. Anpalagan, N. Nasser, J. Almhana, I. Woungang, An Energy Efficient, Fault Tolerant and Secure Clustering Scheme for M2M Communication Networks GLOBECOM Workshops 2013: 677-682
  30. F. Rashid, A. Miri, I. Woungang, Proof of Retrieval and Ownership Protocols for Enterprise-Level Data Deduplication CASCON 2013: 81-90
  31. F. Rashi, A. Miri, I. Woungang, Secure Enterprise Data Deduplication in the Cloud IEEE CLOUD 2013: 367-374
  32. I. Woungang, S. K. Dhurandher, M. S. Obaidat, A. Ferworn, W. Shah, An Ant-Swarm Inspired Energy-Efficient Ad Hoc On-Demand Routing Protocol for Mobile Ad Hoc Networks ICC 2013: 3645-3649
  33. S. K. Dhurandher, I. Woungang, P. Khurana, R. Mathur, GAODV: A Modified AODV against single and collaborative Blackhole attacks in MANETs AINA Workshops 2013: 357-362
  34. S. K. Dhurandher, I. Woungang, P. Khurana, R. Mathur, S. Agrawal, A Priority Based Differentiation for Contention Mechanism in Legacy Distributed Coordination Function Method AINA Workshops 2013: 478-482.
  35. S. K. Dhurandher, D. Kumar Sharma, I. Woungang, S. Bhati, HBPR: History Based Prediction for Routing in Infrastructure-less Opportunistic Networks AINA 2013: 931-936.
  36. I. Traore, I. Woungang, M. S. Obaidat, Y. Nakkabi, I. Lai, Combining Mouse and Keystroke Dynamics Biometrics for Risk-Based Authentication in Web Environments IEEE ICDH 2012, DOI: 10.1109/ICDH.2012.59, Nov 23-25, 2012
  37. F. Rashid, A. Miri, I. Woungang, A Secure Data Deduplication Framework for Cloud Environments PST 2012: 81-87
  38. S. K. Dhurandher, I. Woungang, K. Kumar, M. Joshi, M. Verma, A Rate Adaptive Admission Control Protocol for Multimedia Wireless Mesh Networks AINA 2012: 38-43
  39. I. Woungang, S. K. Dhurandher, R. D. Peddi, I. Traore, Mitigating Collaborative Blackhole Attacks on DSR-Based Mobile Ad Hoc Networks FPS 2012: 308-323
  40. S. K. Dhurandher, I. Woungang, A. Gupta, B. K. Bhargava E2SIW: An Energy Efficient Scheme Immune to Wormhole Attacks in Wireless Ad Hoc Networks AINA Workshops 2012: 472-477
  41. I. Woungang, S. K. Dhurandher, V. Koo, I. Traore, Comparison of two security protocols for preventing packet dropping and message tampering attacks on AODV-based mobile ad Hoc networks GLOBECOM Workshops 2012: 1037-1041
  42. I. Woungang, M. S. Obaidat, S. K. Dhurandher, H-C Chao, C. Y Liu, Trust-Enhanced Message Security Protocol for Mobile Ad Hoc Networks ICC 2012: 988-992

Magazine Articles and Editorials

  1. N. Mentens, D. Sauveron, J. M. Sierra, S-J Wang, I. Woungang, Lightweight and Energy-Efficient Security Solutions for Mobile Computing Devices IET Information Security 10(5): 223-224 (2016)
  2. J. H. Park, I. Woungang, J. Ma, K. Lee, I. Awan, Advanced Challenges and Research Directions in Wireless Sensor Networks and Communications , Inderscience, UK, pp. 1-5, May 8, 2012.