WARNING: This information is likely out-of-date and will not be updated!
Last updated on 2010-12-31
Ahornstr. 55,
52072 Aachen,
Germany
Email: fahad.samad@comsys.rwth-aachen.de
Phone: +49 (241) 80 21420
Skype: fahad.samad2
Fahad Samad is a PhD student at the Communications and Distributed Systems Chair (Informatik 4) of RWTH Aachen University since April 2007. His doctoral studies are funded by German Academic Exchange Service (DAAD) Germany and Higher Education Commission (HEC) Pakistan.
He did his Masters in Computer Networks from National University of Science and Technology (NUST), Rawalpindi, Pakistan.
8. |
CAD+: Detecting Colluding Nodes in Gray Hole Attacks
Lecture Notes in Informatics GI-Edition,
S-10(Informatiktage 2011):279-282
March
2011
ISSN: 1614-3213
ISBN: 978-3-88579- 444-8
|
7. |
Adaptive Security Established on the Requirements and Resource Abilities of Network Nodes
The 10th IEEE Wireless Local Networks(WLN 2010) in the 35th IEEE Local Computer Networks (LCN 2010), Denver, Colorado, U.S.A. Volume 1
, page 752-755.
Publisher: IEEE,
October
2010
ISBN: 978-1-4244-8388-4
|
6. |
PiCAT: Palliating Channel Assignment Assaults using Adjustable Trust in Wireless Mesh Networks
The 19th International Conference on Computer Communications and Networks (ICCCN 2010), Zurich, Switzerland Volume 1
, page 1 - 7.
Publisher: IEEE,
August
2010
ISBN: 978-1-4244-7114-0
|
5. |
REALISM: Rendering Anonymity and Lightweight Security with Mobility in Wireless Ad hoc and Mesh Networks
The 5th ACM International Symposium on QoS and Security for Wireless and Mobile Networks (Q2SWinet 2009), Tenerife, The Canary Islands, Spain
, page 97-102.
Publisher: ACM New York, NY, USA,
October
2009
ISBN: 978-1-60558-619-9
|
4. |
Protection based on Neighborhood-Trust in Clustered Wireless Mesh Networks
IEEE NGMAST 2009 Volume 1
, page 487-493.
Publisher: IEEE,
September
2009
ISBN: 978-0-7695-3786-3
|
3. |
Neighborhood Nodes Collaboration to Support QoS Routing in Wireless Mesh Networks
IEEE Symposium on Computers and Communications (ISCC 2009), Sousse, Tunisia
, page 763-769.
Publisher: IEEE,
July
2009
ISBN: 978-1-4244-4671-1
|
2. |
Handling Security Vulnerabilities in Clustered Wireless Mesh Networks
The 2nd International Workshop on Mobile and Wireless Networks Security in conjunction with IFIP NETWORKING 2009, Aachen, Germany.
, page 51-62.
Publisher: Shaker Verlag,
May
2009
ISBN: 978-3-8322-8177-9
|
1. |
Controlling Physical Objects with Privacy using Secure RFID System
2nd International Conference on New Technologies, Mobility, and Security (NTMS 2008), Tangier, Morocco
, page 1-5.
Publisher: IEEE,
November
2008
ISBN: 978-2-9532443-0-4
|