Energy harvesting for wearable devices: A review YW Chong, W Ismail, K Ko, CY Lee IEEE Sensors Journal 19 (20), 9047-9062, 2019 | 106 | 2019 |
A review on the role of blockchain technology in the healthcare domain HD Zubaydi, YW Chong, K Ko, SM Hanshi, S Karuppayah Electronics 8 (6), 679, 2019 | 73 | 2019 |
Detection techniques of distributed denial of service attacks on software-defined networking controller–a review MA Aladaileh, M Anbar, IH Hasbullah, YW Chong, YK Sanjalawe IEEE Access 8, 143985-143995, 2020 | 44 | 2020 |
Comparative performance analysis of classification algorithms for intrusion detection system M Anbar, R Abdullah, IH Hasbullah, YW Chong, OE Elejla 2016 14th Annual Conference on Privacy, Security and Trust (PST), 282-288, 2016 | 31 | 2016 |
Security mechanism for IPv6 stateless address autoconfiguration S Praptodiyono, RK Murugesan, IH Hasbullah, CY Wey, MM Kadhum, ... 2015 International Conference on Automation, Cognitive Science, Optics …, 2015 | 26 | 2015 |
Enhanced handover mechanism using mobility prediction in wireless networks KL Yap, YW Chong, W Liu PloS one 15 (1), e0227982, 2020 | 19 | 2020 |
Optimized access point selection with mobility prediction using hidden Markov model for wireless network KL Yap, YW Chong 2017 ninth international conference on ubiquitous and future networks (ICUFN …, 2017 | 19 | 2017 |
Proposed statistical-based approach for detecting distribute denial of service against the controller of software defined network (SADDCS) MA Al-Adaileh, M Anbar, YW Chong, A Al-Ani MATEC Web of Conferences 218, 02012, 2018 | 18 | 2018 |
Securing duplicate address detection on IPv6 using distributed trust mechanism S Praptodiyono, IH Hasbullah, MM Kadhum, CY Wey, RK Murugesan, ... Int J Simulation—Systems, Sci Technol 17 (26), 2016 | 18 | 2016 |
An optimized flow management mechanism in OpenFlow network ETB Hong, CY Wey 2017 International Conference on Information Networking (ICOIN), 143-147, 2017 | 17 | 2017 |
Hybrid monitoring technique for detecting abnormal behaviour in rpl-based network. M Alzubaidi, M Anbar, YW Chong, S Al-Sarawi J. Commun. 13 (5), 198-208, 2018 | 15 | 2018 |
Adaptive path finding algorithm in dynamic environment for warehouse robot MK Ng, YW Chong, K Ko, YH Park, YB Leau Neural Computing and Applications 32, 13155-13171, 2020 | 13 | 2020 |
Network security situation assessment: A review and discussion YB Leau, S Manickam, YW Chong Information Science and Applications, 407-414, 2015 | 13 | 2015 |
Comparative Performance Analysis of classification algorithm for Internal Intrusion Detection M Anbar, R Abdulah, IH Hasbullah, YW Chong, OE Elejla 2016 14th Annual Conference on Privacy Security and Trust (PCT), 2016 | 11 | 2016 |
Augmented intelligence: Surveys of literature and expert opinion to understand relations between human intelligence and artificial intelligence KLA Yau, HJ Lee, YW Chong, MH Ling, AR Syed, C Wu, HG Goh IEEE Access 9, 136744-136761, 2021 | 10 | 2021 |
Improving security of duplicate address detection on IPv6 local network in public area S Praptodiyono, IH Hasbullah, MM Kadhum, RK Murugesan, CY Wey, ... 2015 9th Asia Modelling Symposium (AMS), 123-128, 2015 | 10 | 2015 |
Artificial Intelligence Marketing (AIM) for Enhancing Customer Relationships KLA Yau, NM Saad, YW Chong Applied Sciences 11 (18), 8562, 2021 | 9 | 2021 |
Software-defined networking techniques to improve mobile network connectivity: technical review KL Yap, YW Chong IETE Technical review 35 (3), 292-304, 2018 | 9 | 2018 |
Applications of Multi-Agent Deep Reinforcement Learning: Models and Algorithms AM Ibrahim, KLA Yau, YW Chong, C Wu Applied Sciences 11 (22), 10870, 2021 | 8 | 2021 |
Comparative study on hybrid header compression over satellite-wireless networks YW Chong, TC Wan IETE Technical Review 30 (6), 461-472, 2013 | 8 | 2013 |