Skip to main content

Showing 1–6 of 6 results for author: Kabir, A F M S

.
  1. arXiv:1209.1678  [pdf

    cs.CR

    Policy based intrusion detection and response system in hierarchical WSN architecture

    Authors: Mohammad Saiful Islam Mamun, A. F. M Sultanul Kabir, Md. Sakhawat Hossen, Md. Razib Hayat Khan

    Abstract: In recent years, wireless sensor network becomes popular both in civil and military jobs. However, security is one of the significant challenges for sensor network because of their deployment in open and unprotected environment. As cryptographic mechanism is not enough to protect sensor network from external attacks, intrusion detection system (IDS) needs to be introduced. In this paper we propose… ▽ More

    Submitted 7 September, 2012; originally announced September 2012.

    Comments: 5 pages, IEEE International Conference on Wireless Communication,Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology, Wireless Vitae'09, May 17-20, 2009. Aalborg, Denmark. ISBN 978-1-4244-4067-2

  2. Graphical Query Builder in Opportunistic Sensor Networks to discover Sensor Information

    Authors: A. F. M. Sultanul Kabir, Mohammad Saiful Islam Mamun

    Abstract: A lot of sensor network applications are data-driven. We believe that query is the most preferred way to discover sensor services. Normally users are unaware of available sensors. Thus users need to pose different types of query over the sensor network to get the desired information. Even users may need to input more complicated queries with higher levels of aggregations, and requires more complex… ▽ More

    Submitted 18 August, 2012; originally announced August 2012.

    Comments: 15 pages, International Journal of Computer Applications (IJCA) (0975 - 8887) Volume 15- No.1, February 2011

    Journal ref: International Journal of Computer Applications 15(1):11-25, February 2011. Published by Foundation of Computer Science

  3. Hierarchical Design Based Intrusion Detection System For Wireless Ad hoc Network

    Authors: Mohammad Saiful Islam Mamun, A. F. M. Sultanul Kabir

    Abstract: In recent years, wireless ad hoc sensor network becomes popular both in civil and military jobs. However, security is one of the significant challenges for sensor network because of their deployment in open and unprotected environment. As cryptographic mechanism is not enough to protect sensor network from external attacks, intrusion detection system needs to be introduced. Though intrusion preven… ▽ More

    Submitted 18 August, 2012; originally announced August 2012.

    Comments: 16 pages, International Journal of Network Security & Its Applications (IJNSA), Vol.2, No.3, July 2010. arXiv admin note: text overlap with arXiv:1111.1933 by other authors

  4. arXiv:1208.3769  [pdf

    cs.NI

    WiMAX or Wi-Fi: The Best Suited Candidate Technology for Building Wireless Access Infrastructure

    Authors: A. F. M Sultanul Kabir, Md. Razib Hayat Khan, Abul Ahsan Md. Mahmudul Haque, Mohammad Saiful Islam Mamun

    Abstract: This paper presents a description of the existing wireless technology Wi-Fi and WiMAX, and try to compare Wi-Fi (IEEE 802.11) and WiMAX (IEEE 802.16), with respect to which technology provides a better solution to build a wireless access infrastructure. Each technology is evaluated based on some key characteristics. This paper concludes with a statement of, which technology will be the best and mo… ▽ More

    Submitted 18 August, 2012; originally announced August 2012.

    Comments: 6 pages,2 figures, Conference: ICLAN'2007, IEEE France

    ACM Class: C.2.1

  5. arXiv:1002.4830   

    cs.OH

    Nonlinear System Identification and Behavioral Modeling

    Authors: Kazi Mohammed Saidul Huq, Md. Taslim Arefin, A. F. M. Sultanul Kabir

    Abstract: This paper has been withdrawn by the author

    Submitted 19 April, 2010; v1 submitted 25 February, 2010; originally announced February 2010.

    Comments: This paper has been withdrawn by the author

    Journal ref: K. M. S. Huq, M. T. Arefin and A. F. M. S. Kabir, "Nonlinear System Identification and Behavioral Modeling", Journal of Telecommunications, Volume 1, Issue 1, pp94-98, February 2010

  6. arXiv:1002.1146  [pdf

    cs.NI

    Interconnection between 802.15.4 Devices and IPv6: Implications and Existing Approaches

    Authors: Md. Sakhawat Hossen, A. F. M. Sultanul Kabir, Razib Hayat Khan, Abdullah Azfar

    Abstract: The increasing role of home automation in routine life and the rising demand for sensor networks enhanced wireless personal area networks (WPANs) development, pervasiveness of wireless & wired network, and research. Soon arose the need of implementing the Internet Protocol in these devices in order to WPAN standards, raising the way for questions on how to provide seamless communication between… ▽ More

    Submitted 5 February, 2010; originally announced February 2010.

    Comments: International Journal of Computer Science Issues, IJCSI, Vol. 7, Issue 1, No. 1, January 2010, http://ijcsi.org/articles/Interconnection-between-802.15.4-Devices-and-IPv6-Implications-and-Existing-Approaches.php

    Journal ref: International Journal of Computer Science Issues, IJCSI, Vol. 7, Issue 1, No. 1, January 2010, http://ijcsi.org/articles/Interconnection-between-802.15.4-Devices-and-IPv6-Implications-and-Existing-Approaches.php