default search action
Farooq Anjum
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2010
- [j11]Farooq Anjum:
Location dependent key management in sensor networks without using deployment knowledge. Wirel. Networks 16(6): 1587-1600 (2010)
2000 – 2009
- 2007
- [j10]Farooq Anjum, Sunghyun Choi, Virgil D. Gligor, Ralf Guido Herrtwich, Jean-Pierre Hubaux, P. R. Kumar, Rajeev Shorey, Chin-Tau Lea:
Guest Editorial Vehicular Networks. IEEE J. Sel. Areas Commun. 25(8): 1497-1500 (2007) - [c25]Farooq Anjum:
Location dependent key management in sensor networks without using deployment knowledge. COMSWARE 2007 - [p1]Santosh Pandey, Farooq Anjum, Prathima Agrawal:
TRaVarSeL-Transmission Range Variation based Secure Localization. Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks 2007: 215-236 - 2006
- [j9]Dhanant Subhadrabandhu, Saswati Sarkar, Farooq Anjum:
A framework for misuse detection in ad hoc Networks-part I. IEEE J. Sel. Areas Commun. 24(2): 274-289 (2006) - [j8]Dhanant Subhadrabandhu, Saswati Sarkar, Farooq Anjum:
A framework for misuse detection in ad hoc networks- part II. IEEE J. Sel. Areas Commun. 24(2): 290-304 (2006) - [c24]Dhanant Subhadrabandhu, Saswati Sarkar, Farooq Anjum:
A Statistical Framework for Intrusion Detection in Ad Hoc Networks. INFOCOM 2006 - [c23]Farooq Anjum:
Challenges on providing services in a Ubiquitous, Mobile Environment. MobiQuitous 2006: 1-3 - [c22]Santosh Pandey, Farooq Anjum, Byungsuk Kim, Prathima Agrawal:
A low-cost robust localization scheme for WLAN. WICON 2006: 17 - [c21]Farooq Anjum:
Location dependent key management using random key-predistribution in sensor networks. Workshop on Wireless Security 2006: 21-30 - 2005
- [j7]Saswati Sarkar, Farooq Anjum, Ratul K. Guha:
Optimal communication in bluetooth piconets. IEEE Trans. Veh. Technol. 54(2): 709-721 (2005) - [c20]Farooq Anjum, Santosh Pandey, Prathima Agrawal:
Secure localization in sensor networks using transmission range variation. MASS 2005 - [c19]Abhrajit Ghosh, Farooq Anjum:
Last hop topology sensitive multicasting key managment. Q2SWinet 2005: 63-70 - [c18]Dhanant Subhadrabandhu, Saswati Sarkar, Farooq Anjum:
RIDA: Robust Intrusion Detection in Ad Hoc Networks. NETWORKING 2005: 1069-1082 - [c17]Santosh Pandey, Byungsuk Kim, Farooq Anjum, Prathima Agrawal:
Client assisted location data acquisition scheme for secure enterprise wireless networks. WCNC 2005: 1174-1179 - 2004
- [j6]Rabih Zbib, Farooq Anjum, Abhrajit Ghosh, Amjad Umar:
Intrusion Tolerance in Distributed Middleware. Inf. Syst. Frontiers 6(1): 67-75 (2004) - [j5]Farooq Anjum:
TCP Algorithms and Multiple Paths: Considerations for the Future of the Internet. Inf. Syst. Frontiers 6(1): 91-104 (2004) - [j4]Rahul Shah, Zulfikar Ramzan, Ravi Jain, Raghu Dendukuri, Farooq Anjum:
Efficient Dissemination of Personalized Information Using Content-Based Multicast. IEEE Trans. Mob. Comput. 3(4): 394-408 (2004) - [c16]Farooq Anjum, Dhanant Subhadrabandhu, Saswati Sarkar, Rahul Shetty:
On Optimal Placement of Intrusion Detection Modules in Sensor Networks. BROADNETS 2004: 690-699 - [c15]Dhanant Subhadrabandhu, Saswati Sarkar, Farooq Anjum:
Efficacy of misuse detection in ad hoc networks. SECON 2004: 97-107 - [c14]Farooq Anjum, Rajesh Talpade:
LiPaD: lightweight packet drop detection for ad hoc networks. VTC Fall (2) 2004: 1233-1237 - 2003
- [j3]Farooq Anjum, Leandros Tassiulas:
Comparative study of various TCP versions over a wireless link with correlated losses. IEEE/ACM Trans. Netw. 11(3): 370-383 (2003) - [c13]Dennis Hromin, Michael Chladil, Natalie Vanatta, David A. Naumann, Susanne Wetzel, Farooq Anjum, Ravi Jain:
CodeBLUE: a Bluetooth interactive dance club system. GLOBECOM 2003: 2814-2818 - [c12]Farooq Anjum, Moncef Elaoud, David Famolari, Abhrajit Ghosh, Ravichander Vaidyanathan, Ashutosh Dutta, Prathima Agrawal, Toshikazu Kodama, Yasuhiro Katsube:
Voice performance in WLAN networks - an experimental study. GLOBECOM 2003: 3504-3508 - 2002
- [c11]Farooq Anjum, David Famolari:
A robust and adaptive algorithm for enabling efficient communication in Bluetooth networks. GLOBECOM 2002: 217-221 - [c10]David Famolari, Farooq Anjum:
Improving simultaneous voice and data performance in Bluetooth systems. GLOBECOM 2002: 1810-1814 - [c9]Manish Rathi, Farooq Anjum, Rabih Zbib, Abhrajit Ghosh, Amjad Umar:
Investigation of intrusion tolerance for COTS middleware. ICC 2002: 1169-1173 - [c8]Rahul Shah, Ravi Jain, Farooq Anjum:
Efficient Dissemination of Personalized Information Using Content-Based Multicast. INFOCOM 2002: 930-939 - 2001
- [j2]Farooq Anjum, Francesco Caruso, Ravi Jain, Paolo Missier, Adalberto Zordan:
CitiTime: a system for rapid creation of portable next-generation telephony services. Comput. Networks 35(5): 579-595 (2001) - 2000
- [j1]Ravi Jain, Farooq Anjum, Paolo Missier, Subramanya Shastry:
Java call control, coordination, and transactions. IEEE Commun. Mag. 38(1): 108-114 (2000) - [c7]Ravi Jain, Farooq Anjum, Amjad Umar:
A Comparison of Mobile Agent and Client-Server Paradigms for Information Retrieval Tasks in Virtual Enterprises. AIWoRC 2000: 209-214 - [c6]Farooq Anjum, Ravi Jain:
Performance of TCP over lossy upstream and downstream links with link-level retransmissions. ICON 2000: 3-7 - [c5]Ravi Jain, Farooq Anjum:
Mobile agents for personalized information retrieval: when are they a good idea? WCNC 2000: 242-245 - [c4]Farooq Anjum, Amjad Umar:
Agent based intrusion tolerance using fragmentation-redundancy-scattering technique. WCNC 2000: 1101-1106
1990 – 1999
- 1999
- [c3]Farooq Anjum, Leandros Tassiulas:
Fair Bandwidth Sharing among Adaptive and Non-Adaptive Flows in the Internet. INFOCOM 1999: 1412-1420 - [c2]Farooq Anjum, Leandros Tassiulas:
On the Behavior of Different TCP Algorithms over a Wireless Channel With Correlated Packet Losses. SIGMETRICS 1999: 155-165 - [c1]Farooq Anjum, Leandros Tassiulas:
An analytical model for the various TCP algorithms operating over a wireless channel. WCNC 1999: 943-947
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:03 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint