default search action
Rami Ahmad
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j18]Rami Ahmad, Waseem Alhasan, Raniyah Wazirali, Noura Aleisa:
Optimization Algorithms for Wireless Sensor Networks Node Localization: An Overview. IEEE Access 12: 50459-50488 (2024) - [j17]Fatma Foad Ashrif, Elankovan A. Sundararajan, Mohammad Kamrul Hasan, Rami Ahmad, Aisha Hassan Abdalla Hashim, Azhar Abu Talib:
Provably secured and lightweight authenticated encryption protocol in machine-to-machine communication in industry 4.0. Comput. Commun. 218: 263-275 (2024) - [j16]Fatma Foad Ashrif, Elankovan A. Sundararajan, Mohammad Kamrul Hasan, Rami Ahmad, Salwani Abdullah, Raniyah Wazirali:
Secured lightweight authentication for 6LoWPANs in machine-to-machine communications. Comput. Secur. 145: 104002 (2024) - [j15]Fatma Foad Ashrif, Elankovan A. Sundararajan, Rami Ahmad, Mohammad Kamrul Hasan, Elaheh Yadegaridehkordi:
Survey on the authentication and key agreement of 6LoWPAN: Open issues and future direction. J. Netw. Comput. Appl. 221: 103759 (2024) - [j14]Rami Ahmad, Eman H. Alkhammash:
Online Adaptive Kalman Filtering for Real-Time Anomaly Detection in Wireless Sensor Networks. Sensors 24(15): 5046 (2024) - [j13]Rami Ahmad:
Smart remote sensing network for disaster management: an overview. Telecommun. Syst. 87(1): 213-237 (2024) - 2023
- [j12]Rami Ahmad, Matti Hämäläinen, Raniyah Wazirali, Tarik Abu-Ain:
Digital-care in next generation networks: Requirements and future directions. Comput. Networks 224: 109599 (2023) - [j11]Waseem Alhasan, Rami Ahmad, Raniyah Wazirali, Noura Aleisa, Weaam Abo Shdeed:
Adaptive mean center of mass particle swarm optimizer for auto-localization in 3D wireless sensor networks. J. King Saud Univ. Comput. Inf. Sci. 35(9): 101782 (2023) - [j10]Sohaib K. M. Abujayyab, Rania Almajalid, Raniyah Wazirali, Rami Ahmad, Enes Tasoglu, Ismail R. Karas, Ihab Hijazi:
Integrating object-based and pixel-based segmentation for building footprint extraction from satellite images. J. King Saud Univ. Comput. Inf. Sci. 35(10): 101802 (2023) - 2022
- [j9]Rami Ahmad, Raniyah Wazirali, Tarik Abu-Ain:
Machine Learning for Wireless Sensor Networks Security: An Overview of Challenges and Issues. Sensors 22(13): 4730 (2022) - 2021
- [j8]Osama Ahmed Khashan, Rami Ahmad, Nour Mahmoud Khafajah:
An automated lightweight encryption scheme for secure and energy-efficient communication in wireless sensor networks. Ad Hoc Networks 115: 102448 (2021) - [j7]Raniyah Wazirali, Rami Ahmad, Ashraf Abdel-Karim Helal Abu-Ein:
Sustaining accurate detection of phishing URLs using SDN and feature selection approaches. Comput. Networks 201: 108591 (2021) - [j6]Rami Ahmad, Raniyah Wazirali, Qusay Bsoul, Tarik Abu-Ain, Waleed Abdel Karim Abu-Ain:
Feature-Selection and Mutual-Clustering Approaches to Improve DoS Detection and Maintain WSNs' Lifetime. Sensors 21(14): 4821 (2021) - 2020
- [j5]Rami Ahmad, Elankovan A. Sundararajan, Alá F. Khalifeh:
A survey on femtocell handover management in dense heterogeneous 5G networks. Telecommun. Syst. 75(4): 481-507 (2020) - 2018
- [j4]Rami Ahmad, Elankovan A. Sundararajan, Nor Effendy Othman, Mahamod Ismail:
An efficient handover decision in heterogeneous LTE-A networks under the assistance of users' profile. Telecommun. Syst. 68(1): 27-45 (2018) - 2017
- [j3]Rami Ahmad, Elankovan A. Sundararajan, Nor Effendy Othman, Mahamod Ismail:
Handover in LTE-advanced wireless networks: state of art and survey of decision algorithm. Telecommun. Syst. 66(3): 533-558 (2017) - 2001
- [j2]Gabriele Piccoli, Rami Ahmad, Blake Ives:
Web-Based Virtual Learning Environments: A Research Framework and a Preliminary Assessment of Effectiveness in Basic IT Skills Training. MIS Q. 25(4): 401-426 (2001) - 2000
- [j1]Gabriele Piccoli, Rami Ahmad, Blake Ives:
Knowledge management in academia: A proposed framework. Inf. Technol. Manag. 1(4): 229-245 (2000)
Conference and Workshop Papers
- 2021
- [c3]Rami Ahmad, Elankovan A. Sundararajan, Tarik Abu-Ain:
Analysis the Effect of Clustering and Lightweight Encryption Approaches on WSNs Lifetime. ICEEI 2021: 1-6 - [c2]Fatma Foad Alshrif, Elankovan A. Sundararajan, Rami Ahmad, Yousef Alkhatib:
New Framework for Authentication and key Establishment to Secure 6LoWPAN Networks. ICEEI 2021: 1-6 - 1998
- [c1]Rami Ahmad, Gabriele Piccoli, Blake Ives:
Effectiveness of virtual learning environments in basic skills business education: a field study in progress. ICIS 1998: 352-357
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint