default search action
Abu Hena Al Muktadir
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c14]Behnam Farzaneh, Nashid Shahriar, Abu Hena Al Muktadir, Md. Shamim Towhid:
DTL-IDS: Deep Transfer Learning-Based Intrusion Detection System in 5G Networks. CNSM 2023: 1-5 - 2021
- [c13]Abu Hena Al Muktadir, Ida S. R. Siahaan, Kwasi Boakye-Boateng, Dongyang Xu, Ali A. Ghorbani:
Recommending Location for Placing Data Collector in the OPC Classic. ICPS 2021: 158-165 - [c12]Kwasi Boakye-Boateng, Ida S. R. Siahaan, Abu Hena Al Muktadir, Dongyang Xu, Ali A. Ghorbani:
Sniffing Serial-Based Substation Devices: A Complement to Security-Centric Data Collection. ISGT-Europe 2021: 1-6 - 2020
- [j11]Ved P. Kafle, Abu Hena Al Muktadir:
Intelligent and Agile Control of Edge Resources for Latency-Sensitive IoT Services. IEEE Access 8: 207991-208002 (2020) - [c11]Abu Hena Al Muktadir, Ved P. Kafle:
Prediction and Dynamic Adjustment of Resources for Latency-Sensitive Virtual Network Functions. ICIN 2020: 235-242 - [c10]Ved P. Kafle, Abu Hena Al Muktadir:
Automation of Computational Resource Control of Cyber-Physical Systems with Machine Learning. Kaleidoscope 2020: 1-7
2010 – 2019
- 2019
- [j10]Abu Hena Al Muktadir, Masahiro Jibiki, Pedro Martinez-Julia, Ved P. Kafle:
Repeated Leader Follower Game for Managing Cloud Networks With Limited Resources. IEEE Access 7: 108174-108188 (2019) - [j9]Abu Hena Al Muktadir, Takaya Miyazawa, Pedro Martinez-Julia, Hiroaki Harai, Ved P. Kafle:
Multi-Target Classification Based Automatic Virtual Resource Allocation Scheme. IEICE Trans. Inf. Syst. 102-D(5): 898-909 (2019) - 2018
- [j8]Abu Hena Al Muktadir, Ved P. Kafle, Pedro Martinez-Julia, Hiroaki Harai:
A Bayesian Game to Estimate the Optimal Initial Resource Demand for Entrant Virtual Network Operators. IEICE Trans. Commun. 101-B(3): 667-678 (2018) - [j7]Abu Hena Al Muktadir, Kenji Fujikawa, Hiroaki Harai, Lixin Gao:
Route Advertisement Policies and Inbound Traffic Engineering for Border Gateway Protocol with Provider Aggregatable Addressing. IEICE Trans. Commun. 101-B(6): 1411-1426 (2018) - [j6]Kenji Fujikawa, Ved P. Kafle, Pedro Martinez-Julia, Abu Hena Al Muktadir, Hiroaki Harai:
Automatic Construction of Name-Bound Virtual Networks for IoT and its Management. J. Inf. Process. 26: 601-611 (2018) - [c9]Abu Hena Al Muktadir, Masahiro Jibiki, Pedro Martinez-Julia, Ved P. Kafle:
Resource Negotiation Game for Cloud Networks with Limited Resources. CloudNet 2018: 1-4 - [c8]Takahiro Hirayama, Takaya Miyazawa, Abu Hena Al Muktadir, Hiroaki Harai, Ved P. Kafle:
Salience-Based Distributed Controllers Placement in Software Defined Networks. GLOBECOM 2018: 1-7 - 2017
- [j5]Abu Hena Al Muktadir, Eiji Oki:
Differential delay aware instantaneous recovery scheme with traffic splitting. Int. J. Commun. Syst. 30(5) (2017) - [j4]Phong Vu Pham, Bijoy Chand Chatterjee, Abu Hena Al Muktadir, Eiji Oki:
Instantaneous recovery route design scheme using multiple coding-aware protection scenarios. Telecommun. Syst. 64(1): 75-85 (2017) - [c7]Kenji Fujikawa, Ved P. Kafle, Pedro Martinez-Julia, Abu Hena Al Muktadir, Hiroaki Harai:
Automatic Construction of Name-Bound Virtual Networks for IoT. COMPSAC (1) 2017: 529-537 - [c6]Feng Wang, Yusuke Fukushima, Kenji Fujikawa, Abu Hena Al Muktadir, Ved P. Kafle, Xiaozhe Shao, Hiroaki Harai, Lixin Gao:
Implementation of Location-Based Routing and ID-Based Forwarding Architecture for Internet of Things. GLOBECOM 2017: 1-7 - 2016
- [j3]Abu Hena Al Muktadir, Eiji Oki:
A coding-aware reliable route design scheme for instantaneous recovery. Telecommun. Syst. 62(3): 495-509 (2016) - [c5]Abu Hena Al Muktadir, Kenji Fujikawa, Hiroaki Harai:
Route advertisement policies for border gateway protocol with provider aggregatable addressing. HPSR 2016: 42-48 - 2015
- [c4]Kenji Fujikawa, Abu Hena Al Muktadir, Yusuke Fukushima, Hiroaki Harai, Xiaozhe Shao, Feng Wang, Lixin Gao:
Design and implementation of variable-length locator allocation protocol for scalable Internet addressing. APCC 2015: 114-119 - 2014
- [j2]Abu Hena Al Muktadir, Eiji Oki:
Optimum Route Design in 1+1 Protection with Network Coding for Instantaneous Recovery. IEICE Trans. Commun. 97-B(1): 87-104 (2014) - [c3]Abu Hena Al Muktadir, Eiji Oki:
A heuristic routing algorithm for network coding aware 1+1 protection route design for instantaneous recovery. HPSR 2014: 84-89 - [c2]Abu Hena Al Muktadir, Eiji Oki:
A heuristic routing algorithm with erasure correcting code based instantaneous recovery technique. ICC 2014: 1143-1147 - 2013
- [j1]Shunichi Tsunoda, Abu Hena Al Muktadir, Eiji Oki:
Load-Balanced Non-split Shortest-Path-Based Routing with Hose Model and Its Demonstration. IEICE Trans. Commun. 96-B(5): 1130-1140 (2013) - 2011
- [c1]Shunichi Tsunoda, Abu Hena Al Muktadir, Eiji Oki:
Load-Balanced Shortest-Path-Based Routing without Traffic Splitting in Hose Model. ICC 2011: 1-5
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:47 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint