Habib-ur Rehman
Habib-ur Rehman
Verified email at ccis.imamu.edu.sa
Cited by
Cited by
Design and deployment of a trusted eucalyptus cloud
I Khan, H Rehman, Z Anwar
2011 IEEE 4th International Conference on Cloud Computing, 380-387, 2011
Performance enhancement in AODV with accessibility prediction
H Rehman, L Wolf
2007 IEEE International Conference on Mobile Adhoc and Sensor Systems, 1-6, 2007
A Protocol for Preventing Insider Attacks in Untrusted Infrastructure-as-a-Service Clouds
I Khan, Z Anwar, B Bordbar, E Ritter, H Rehman
IEEE Transactions on Cloud Computing 6 (4), 942-954, 2016
Recognition of arabic phonemes using fuzzy rule base system
MM Awais
7th International Multi Topic Conference, 2003. INMIC 2003., 367-370, 2003
A Multihop IEEE 802.11 MAC protocol for wireless ad hoc networks
H Rehman, L Wolf
2009 29th IEEE International Conference on Distributed Computing Systems …, 2009
A thin client friendly trusted execution framework for infrastructure-as-a-service clouds
I Khan, H Rehman, MHF Al-Khatib, Z Anwar, M Alam
Future generation computer systems 89, 239-248, 2018
A Genetic Algorithm based Approach for Change Management in Enterprise IT Systems: Optimal Change Scheduling
I Khan
International Journal of Computer Applications 51 (3), 2012
Analysis of Inconsistent Routing Components in Reactive Routing Protocols
H Rehman, L Wolf
Electronic Communications of the EASST 17, 2009
Multihop Connectivity in Wireless Ad hoc Networks
CW zu Braunschweig
The system can't perform the operation now. Try again later.
Articles 1–9