default search action
Husnu S. Narman
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2023
- [j14]Neil Loftus, Husnu S. Narman:
Use of Machine Learning in Interactive Cybersecurity and Network Education. Sensors 23(6): 2977 (2023) - 2022
- [j13]Amrit Pal, Abishi Chowdhury, Satakshi, Husnu S. Narman, Arkabandhu Chowdhury, Manish Kumar:
Random Partition Based Adaptive Distributed Kernelized SVM for Big Data. IEEE Access 10: 95623-95637 (2022) - [j12]Arnob Paul, Md. Hasanul Islam, Md. Shohrab Hossain, Husnu S. Narman:
A Novel Zone-Walking Protection for Secure DNS Server. Int. J. Interdiscip. Telecommun. Netw. 14(1): 1-15 (2022) - 2021
- [j11]Husnu S. Narman, Haroon Malik, Govind Yatnalkar:
An enhanced ride sharing model based on human characteristics, machine learning recommender system, and user threshold time. J. Ambient Intell. Humaniz. Comput. 12(1): 13-26 (2021) - [j10]Jinwei Liu, Haiying Shen, Hongmei Chi, Husnu S. Narman, Yongyi Yang, Long Cheng, Wingyan Chung:
A Low-Cost Multi-Failure Resilient Replication Scheme for High-Data Availability in Cloud Storage. IEEE/ACM Trans. Netw. 29(4): 1436-1451 (2021) - 2020
- [j9]Ankur Sarker, Haiying Shen, Mizanur Rahman, Mashrur Chowdhury, Kakan C. Dey, Fangjian Li, Yue Wang, Husnu S. Narman:
A Review of Sensing and Communication, Human Factors, and Controller Aspects for Information-Aware Connected and Automated Vehicles. IEEE Trans. Intell. Transp. Syst. 21(1): 7-29 (2020) - 2019
- [j8]Kuo-Chi Fang, Husnu S. Narman, Ibrahim Hussein Mwinyi, Wook-Sung Yoo:
PPHA-Popularity Prediction Based High Data Availability for Multimedia Data Center. Int. J. Interdiscip. Telecommun. Netw. 11(1): 17-29 (2019) - [j7]Abishi Chowdhury, Shital A. Raut, Husnu S. Narman:
DA-DRLS: Drift adaptive deep reinforcement learning based scheduling for IoT resource management. J. Netw. Comput. Appl. 138: 51-65 (2019) - [j6]Jinwei Liu, Haiying Shen, Husnu S. Narman:
Popularity-Aware Multi-Failure Resilient and Cost-Effective Replication for High Data Durability in Cloud Storage. IEEE Trans. Parallel Distributed Syst. 30(10): 2355-2369 (2019) - 2018
- [j5]Jinwei Liu, Haiying Shen, Husnu S. Narman, Wingyan Chung, Zongfang Lin:
A Survey of Mobile Crowdsensing Techniques: A Critical Component for The Internet of Things. ACM Trans. Cyber Phys. Syst. 2(3): 18:1-18:26 (2018) - [j4]Jinwei Liu, Haiying Shen, Lei Yu, Husnu S. Narman, Jiannan Zhai, Jason O. Hallstrom, Yangyang He:
Characterizing Data Deliverability of Greedy Routing in Wireless Sensor Networks. IEEE Trans. Mob. Comput. 17(3): 543-559 (2018) - 2017
- [j3]Husnu S. Narman, Md. Shohrab Hossain, Mohammed Atiquzzaman, Haiying Shen:
Scheduling internet of things applications in cloud computing. Ann. des Télécommunications 72(1-2): 79-93 (2017) - 2016
- [j2]Husnu S. Narman, Mohammed Atiquzzaman, Mehdi Rahmani-Andebili, Haiying Shen:
Joint and selective periodic component carrier assignment for LTE-A. Comput. Networks 110: 192-205 (2016) - 2015
- [j1]Husnu S. Narman, Md. Shohrab Hossain, Mohammed Atiquzzaman:
Management and Analysis of Multi Class Traffic in Single and Multi-band Systems. Wirel. Pers. Commun. 83(1): 231-258 (2015)
Conference and Workshop Papers
- 2024
- [c36]Neil Loftus, Cade Parlato, Amelia McGinty, Furkan Kizilay, Husnu S. Narman:
A Feasibility Study of Real-Time Image Processing Techniques for Small Flying Object Detection in Drones. ICCE 2024: 1-6 - 2023
- [c35]Shawon Kumar Saha, Md. Rafidul Islam Sarker, Md. Shohrab Hossain, Husnu S. Narman:
Android Malware Detection Using Incremental Learning Approach. BlackSeaCom 2023: 232-237 - 2022
- [c34]Eric M. Dillon, Craig Carpenter, John Cook, Thomas D. Wills, Husnu S. Narman:
A Machine Learning-Based Automatic Feedback System to Teach Cybersecurity Principles to K-12 and College Students. GHTC 2022: 219-225 - [c33]Neil Loftus, Cameron Green, Husnu S. Narman:
The Cybersecurity Packet Control Simulator: CSPCS. GHTC 2022: 226-233 - 2021
- [c32]Nusrath Tabassum, Farhin Faiza Neha, Md. Shohrab Hossain, Husnu S. Narman:
A Hybrid Machine Learning based Phishing Website Detection Technique through Dimensionality Reduction. BlackSeaCom 2021: 1-6 - [c31]Kazi Samiul Kader, Md Tareque Hasan Tahsin, Md. Shohrab Hossain, Husnu S. Narman:
Ransomware Detection Using Binary Classification. DASC/PiCom/CBDCom/CyberSciTech 2021: 979-984 - [c30]Neamat Al Sarah, Fahmida Yasmin Rifat, Md. Shohrab Hossain, Husnu S. Narman:
An Efficient Android Malware Prediction Using Ensemble machine learning algorithms. FNC/MobiSPC 2021: 184-191 - 2020
- [c29]Kanimozhi Kalaichelavan, Haroon Malik, Husnu S. Narman, Sreehari Sreenath:
What Do People Complain About Drone Apps? A Large-Scale Empirical Study of Google Play Store Reviews. ANT/EDI40 2020: 547-554 - [c28]Govind Yatnalkar, Husnu S. Narman, Haroon Malik:
An Enhanced Ride Sharing Model Based on Human Characteristics and Machine Learning Recommender System. ANT/EDI40 2020: 626-633 - [c27]Sreehari Sreenath, Haroon Malik, Husnu S. Narman, Kanimozhi Kalaichelavan:
Assessment and Use of Unmanned Aerial Vehicle for Civil Structural Health Monitoring. ANT/EDI40 2020: 656-663 - [c26]Husnu S. Narman, Cameron Berry, Alex Canfield, Logan Carpenter, Jeremy Giese, Neil Loftus, Isabella Schrader:
Augmented Reality for Teaching Data Structures in Computer Science. GHTC 2020: 1-7 - [c25]Jared Lee Lewis, Geanina F. Tambaliuc, Husnu S. Narman, Wook-Sung Yoo:
IP Reputation Analysis of Public Databases and Machine Learning Techniques. ICNC 2020: 181-186 - [c24]Husnu S. Narman, Alymbek Damir Uulu:
Impacts of Positive and Negative Comments of Social Media Users to Cryptocurrency. ICNC 2020: 187-192 - [c23]Tanjim Munir Dipon, Md. Shohrab Hossain, Husnu S. Narman:
Detecting Network Intrusion through Anomalous Packet Identification. ITNAC 2020: 1-6 - [c22]Md. Khairul Islam, Prithula Hridi, Md. Shohrab Hossain, Husnu S. Narman:
Network Anomaly Detection Using LightGBM: A Gradient Boosting Classifier. ITNAC 2020: 1-7 - [c21]Md Shohel Khan, Ajoy Das, Md. Shohrab Hossain, Husnu S. Narman:
Prediction of Dengue Infected Areas using A Novel Blockchain based Crowdsourcing Framework. UEMCON 2020: 720-726 - [c20]Md. Turab Hossain, Md. Shohrab Hossain, Husnu S. Narman:
Detection of Undesired Events on Real-World SCADA Power System through Process Monitoring. UEMCON 2020: 779-785 - [c19]Renascence Tarafder Prapty, Shuhana Azmin, Md. Shohrab Hossain, Husnu S. Narman:
Preventing Session Hijacking using Encrypted One-Time-Cookies. WTS 2020: 1-6 - 2019
- [c18]Anh T. Nguyen, Greg Weed, Husnu S. Narman:
Oral Therapeutic Tool for Speech and Feeding Therapies. GLOBECOM 2019: 1-6 - [c17]Md. Ishtiaq Ashiq, Protick Bhowmick, Md. Shohrab Hossain, Husnu S. Narman:
Domain Flux-based DGA Botnet Detection Using Feedforward Neural Network. MILCOM 2019: 1-6 - [c16]Mainduddin Ahmad Jonas, Md. Shohrab Hossain, Risul Islam, Husnu S. Narman, Mohammed Atiquzzaman:
An Intelligent System for Preventing SSL Stripping-based Session Hijacking Attacks. MILCOM 2019: 1-6 - 2018
- [c15]Husnu S. Narman, Alymbek Damir Uulu, Jinwei Liu:
Profile Analysis for Cryptocurrency in Social Media. ISSPIT 2018: 229-234 - [c14]Govind Yatnalkar, Husnu S. Narman:
Survey on Wireless Charging and Placement of Stations for Electric Vehicles. ISSPIT 2018: 526-531 - [c13]Ibrahim Hussein Mwinyi, Husnu S. Narman, Kuo-Chi Fang, Wook-Sung Yoo:
Predictive self-learning content recommendation system for multimedia contents. WTS 2018: 1-6 - 2016
- [c12]Jinwei Liu, Haiying Shen, Husnu S. Narman:
CCRP: Customized cooperative resource provisioning for high resource utilization in clouds. IEEE BigData 2016: 243-252 - [c11]Husnu S. Narman, Mohammed Atiquzzaman:
Primary Component Carrier Assignment in LTE-A. QSHINE 2016: 160-170 - 2015
- [c10]Husnu S. Narman, Mohammed Atiquzzaman:
Selective Periodic Component Carrier Assignment Technique in LTE and LTE-A Systems. GLOBECOM 2015: 1-6 - [c9]Husnu S. Narman, Mohammed Atiquzzaman:
Analysis of Joint and Partial Component Carrier Assignment Techniques in LTE and LTE-A. GLOBECOM 2015: 1-6 - [c8]Husnu S. Narman, Mohammed Atiquzzaman:
Energy aware scheduling and queue management for next generation Wi-Fi routers. WCNC Workshops 2015: 148-152 - [c7]Husnu S. Narman, Mohammed Atiquzzaman:
Joint and partial carrier components assignment techniques based on user profile in LTE systems. WCNC 2015: 983-988 - 2014
- [c6]Husnu S. Narman, Mohammed Atiquzzaman:
Carrier components assignment method for LTE and LTE-A systems based on user profile and application. GLOBECOM Workshops 2014: 1020-1025 - [c5]Husnu S. Narman, Md. Shohrab Hossain, Mohammed Atiquzzaman:
DDSS: Dynamic dedicated servers scheduling for multi priority level classes in cloud computing. ICC 2014: 3082-3087 - [c4]Husnu S. Narman, Md. Shohrab Hossain, Mohammed Atiquzzaman:
h-DDSS: Heterogeneous Dynamic Dedicated servers scheduling in cloud computing. ICC 2014: 3475-3480 - 2013
- [c3]Husnu S. Narman, Md. Shohrab Hossain, Mohammed Atiquzzaman:
Multi class traffic analysis of single and multi-band queuing system. GLOBECOM 2013: 1422-1427 - [c2]Md. Shohrab Hossain, Husnu S. Narman, Mohammed Atiquzzaman:
A novel scheduling and queue management scheme for multi-band mobile routers. ICC 2013: 3787-3791 - [c1]Husnu S. Narman, Turgay Korkmaz, Suleyman Tek:
Utilizing distance distribution in determining topological characteristics of multi-hop wireless networks. ICNC 2013: 149-154
Informal and Other Publications
- 2019
- [i1]Ankur Sarker, Haiying Shen, Mizanur Rahman, Mashrur Chowdhury, Kakan C. Dey, Fangjian Li, Yue Wang, Husnu S. Narman:
A Review of Sensing and Communication, Human Factors, and Controller Aspects for Information-Aware Connected and Automated Vehicles. CoRR abs/1903.08712 (2019)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint