Skip to main content

and
  1. No Access

    Article

    Prioritization and offloading in P4 switch integrated with NFV

    The architecture of integrating Software Defined Networking (SDN) with Network Function Virtualization (NFV) is excellent because the former virtualizes the control plane, and the latter virtualizes the data p...

    Farhin Faiza Neha, Yuan-Cheng Lai, Md. Shohrab Hossain in Telecommunication Systems (2024)

  2. No Access

    Article

    A relaxed and faster switch migration framework to balance the load of distributed control plane in software defined networks

    By decoupling the data plane and the control plane of networking devices, Software Defined Network (SDN) enables the control plane devices to obtain the abstract view of the entire network and accomplish netwo...

    Ratul Sikder, Md. Shohrab Hossain, Mohammed J. F. Alenazi in Cluster Computing (2024)

  3. No Access

    Chapter and Conference Paper

    DDoS Attack Detection Using Ensemble Machine Learning

    A distributed denial of service (DDoS) attack targets at hindering authorized individuals from accessing a server or website by flooding it with traffic from many sources. To avoid a DDoS attack from damaging ...

    Adeeba Anis, Md. Shohrab Hossain in Artificial Intelligence and Sustainable Computing (2024)

  4. No Access

    Article

    Denial-of-Service Attacks on Wireless Sensor Network and Defense Techniques

    The basic characteristic of a wireless sensor network is to sense the environment and to gather different types of data. It is used in various vital sectors, such as military, health-care, traffic monitoring, ...

    Mohammad Nafis Ul Islam, Ahmed Fahmin in Wireless Personal Communications (2021)

  5. No Access

    Chapter and Conference Paper

    A Novel Approach to Manage Ownership and VAT Using Blockchain-Based Digital Identity

    Blockchain is a revolutionary technology due to its security and transparency . A digital identity system based on blockchain technology can play an important role in securing the asset ownership information a...

    S. M. Maksudul Alam, Md Abdullah Al Mamun, Md Shohrab Hossain in Ubiquitous Networking (2021)

  6. No Access

    Chapter and Conference Paper

    Towards an Attention-Based Accurate Intrusion Detection Approach

    With the advancement of 5G and IoT, the volume of network traffic is growing in a tremendous rate (e.g., 235.7 Exabytes (EB) in Internet traffic, a 3.2-fold increase from 2016), leading to an alarming rise in ...

    Arunavo Dey, Md. Shohrab Hossain in Quality, Reliability, Security and Robustn… (2021)

  7. No Access

    Chapter and Conference Paper

    A Novel Approach to Blockchain-Based Digital Identity System

    In today’s life, the demand for privacy and transparency is everywhere. Blockchain is going to lead the modern world with its revolutionary technology because of its security, transparency altogether. Identit...

    Md Abdullah Al Mamun, S. M. Maksudul Alam in Advances in Information and Communication (2020)

  8. No Access

    Chapter and Conference Paper

    A Novel Image Steganography Using Multiple LSB Substitution and Pixel Randomization Using Stern-Brocot Sequence

    Steganography is a technology of hiding confidential information within regularly used data files such as image, audio, video files. There have been several research works on the image steganography. Most of t...

    Md. Abdullah Al Mamun, S. M. Maksudul Alam in Advances in Information and Communication (2020)

  9. No Access

    Article

    Survivability and scalability of space networks: a survey

    Survivability and scalability are key terms for any network. The challenge is greater in space networks than in terrestrial networks. Satellites have various uses, some notable uses are communication, observat...

    Md. Shohrab Hossain, Shaikh Shahriar Hassan in Telecommunication Systems (2018)

  10. No Access

    Article

    Scheduling internet of things applications in cloud computing

    Internet of Things (IoT) is one of the greatest technology revolutions in the history. Due to IoT potential, daily objects will be consciously worked in harmony with optimized performances. However, today, tec...

    Husnu S. Narman, Md. Shohrab Hossain, Mohammed Atiquzzaman in Annals of Telecommunications (2017)

  11. No Access

    Article

    Management and Analysis of Multi Class Traffic in Single and Multi-band Systems

    A recent trend in Internet usage has seen large amounts of multimedia data due to increasingly large numbers of mobile users. To facilitate higher bandwidth, modern mobile routers are capable of supporting sim...

    Husnu S. Narman, Md. Shohrab Hossain in Wireless Personal Communications (2015)

  12. No Access

    Chapter and Conference Paper

    Permutation Free Encoding Technique for Evolving Neural Networks

    This paper presents a new evolutionary system using genetic algorithm for evolving artificial neural networks (ANNs). The proposed algorithm is “Permutation free Encoding Technique for Evolving Neural Networks...

    Anupam Das, Md. Shohrab Hossain in Advances in Neural Networks - ISNN 2008 (2008)