ORCID as entered in ROS

Select Publications
2012, 'Advances in network and system security', Concurrency and Computation Practice and Experience, 24, pp. 1035 - 1036, http://dx.doi.org/10.1002/cpe.2810
,2012, 'A new dimensionality reduction algorithm for hyperspectral image using evolutionary strategy', IEEE Transactions on Industrial Informatics, 8, pp. 935 - 943, http://dx.doi.org/10.1109/TII.2012.2205397
,2012, 'A structural approach for modelling the hierarchical dynamic process of Web workload in a large-scale campus network', Journal of Network and Computer Applications, 35, pp. 2081 - 2091, http://dx.doi.org/10.1016/j.jnca.2012.08.010
,2012, 'Advances in network and system security: Editorial statement', Computer Journal, 55, pp. 382 - 383, http://dx.doi.org/10.1093/comjnl/bxr123
,2012, 'Alignment-free cancelable fingerprint template design: A densely infinite-to-one mapping (DITOM) approach', Pattern Recognition, 45, pp. 4129 - 4137, http://dx.doi.org/10.1016/j.patcog.2012.05.004
,2012, 'Attacking anonymous web browsing at local area networks through browsing dynamics', Computer Journal, 55, pp. 410 - 421, http://dx.doi.org/10.1093/comjnl/bxr065
,2012, 'Free search with adaptive differential evolution exploitation and quantum-inspired exploration', Journal of Network and Computer Applications, 36, pp. 1035 - 1051, http://dx.doi.org/10.1016/j.jnca.2011.12.004
,2012, 'Mobile device access control: an improved correlation based face authentication scheme and its Java ME application', Concurrency and Computation - Practice and Experience, 24, pp. 1066 - 1085, http://dx.doi.org/10.1002/cpe.1797
,2012, 'Scalable Hyper-Grid k-NN-based Online Anomaly Detection in Wireless Sensor Networks', IEEE Transactions on Parallel and Distributed Systems, http://dx.doi.org/10.1109/TPDS.2012.261
,2012, 'Using incremental subspace and contour template for object tracking', Journal of Network and Computer Applications, 35, pp. 1740 - 1748, http://dx.doi.org/10.1016/j.jnca.2012.06.005
,2011, 'Statistical analysis and security estimation of fingerprint minutia local structure in bio-cryptographic system', Proceedings of the 2011 6th IEEE Conference on Industrial Electronics and Applications Iciea 2011, pp. 1016 - 1021, http://dx.doi.org/10.1109/ICIEA.2011.5975736
,2011, 'Editorial: Advances in network and system security', Computers and Security, 30, pp. 295 - 296, http://dx.doi.org/10.1016/j.cose.2011.06.001
,2011, 'Biometric security for mobile computing', Security and Communication Networks, 4, pp. 483 - 486, http://dx.doi.org/10.1002/sec.240
,2011, 'A chaos based encryption technique to protect ECG packets for time critical telecardiology applications', Journal of Security and Communication Networks, 4, pp. 515 - 524, http://dx.doi.org/10.1002/sec.226
,2011, 'A fingerprint based bio-cryptographic security protocol designed for client/server authentication in mobile computing environment', Journal of Security and Communication Networks, 4, pp. 487 - 499, http://dx.doi.org/10.1002/sec.225
,2011, 'A frequency domain subspace blind channel estimation method for trailing zero OFDM systems', Journal of Network and Computer Applications, 34, pp. 116 - 120
,2011, 'A mutual-healing key distribution scheme in wireless sensor networks', Journal of Network and Computer Applications, 34, pp. 80 - 88
,2011, 'A pitfall in fingerprint bio-cryptographic key generation', Computers and Security, 30, pp. 311 - 319, http://dx.doi.org/10.1016/j.cose.2011.02.003
,2011, 'An embedded DSP hardware encryption module for secure E-commerce transactions', Journal of Security and Communication Networks, 4, pp. 902 - 909
,2011, 'Biometric security for mobile computing: Guest Editorial Statements', Journal of Security and Communication Networks, 4, pp. 483 - 486
,2011, 'Correlation keystroke verification scheme for user access control in cloud computing environment', Computer Journal, 54, pp. 1632 - 1644, http://dx.doi.org/10.1093/comjnl/bxr064
,2011, 'Global Ridge Orientation Modeling for Partial Fingerprint Identification', IEEE Transactions on Pattern Analysis and Machine Intelligence, 33, pp. 72 - 87, http://dx.doi.org/10.1109/TPAMI.2010.73
,2011, 'Pair-polar coordinate-based cancelable fingerprint templates', Pattern Recognition, 44, pp. 2555 - 2564, http://dx.doi.org/10.1016/j.patcog.2011.03.015
,2011, 'Seamless integration of dependability and security concepts in SOA: A feedback control system based framework and taxonomy', Journal of Network and Computer Applications, 34, pp. 1150 - 1159, http://dx.doi.org/10.1016/j.jnca.2010.11.013
,2011, 'Self-healing Key Distribution Schemes for Wireless Networks: A Survey', Computer Journal, 54, pp. 549 - 569, http://dx.doi.org/10.1093/comjnl/bxr022
,2011, 'The exploration of network coding in IEEE 802.15.4 networks', International Journal of Digital Multimedia Broadcasting, 2011, pp. Art. No. 310647, http://dx.doi.org/10.1155/2011/310647
,2010, 'An efficient self-healing key distribution scheme with constant-size personal keys for wireless sensor networks', IEEE International Conference on Communications, http://dx.doi.org/10.1109/ICC.2010.5501988
,2007, 'A Fingerprint Orientation Model Based on 2D Fourier Expansion (FOMFE) and Its Application to Singular-Point Detection and Fingerprint Indexing', IEEE Transactions on Pattern Analysis and Machine Intelligence, 29, pp. 573 - 585, http://dx.doi.org/10.1109/TPAMI.2007.1003
,2005, 'Simulation study of TCP performance under mobile IPv4 within integrated wired and wireless networks', 2004 IEEE Workshop on Ip Operations and Management Proceedings Ipom 2004 Self Measurement and Self Management of Ip Networks and Services, pp. 273 - 277
,2004, 'An efficient hidden markov model training scheme for anomaly intrusion detection of server applications based on system calls', Proceedings IEEE International Conference on Networks Icon, 2, pp. 470 - 474, http://dx.doi.org/10.1109/ICON.2004.1409210
,2004, 'Analytic models for highspeed TCP fairness analysis', Proceedings IEEE International Conference on Networks Icon, 2, pp. 725 - 730, http://dx.doi.org/10.1109/ICON.2004.1409271
,2003, 'A multi-layer model for anomaly intrusion detection using program sequences of system calls', IEEE International Conference on Networks Icon, pp. 531 - 536, http://dx.doi.org/10.1109/icon.2003.1266245
,2003, 'A note on an analytic model for slow start in TCP', IEEE International Conference on Networks Icon, pp. 261 - 264, http://dx.doi.org/10.1109/icon.2003.1266200
,2003, 'Comparative evaluation of immune response after laparoscopical and open total mesorectal excisions with anal sphincter preservation in patients with rectal cancer', WORLD JOURNAL OF GASTROENTEROLOGY, 9, pp. 2690 - 2694
,2002, 'New encryption model for secure e-commerce transactions using DSP host, board and server communication issues', Proceeding of the International Conference on Telecommunications, 1, pp. 166 - 170
,2001, 'DSP application in E-Commerce security', ICASSP IEEE International Conference on Acoustics Speech and Signal Processing Proceedings, 2, pp. 1005 - 1008
,2000, 'Systematic H∞ weighting function selection and its application to the real-time control of a vertical take-off aircraft', Control Engineering Practice, 8, pp. 241 - 252, http://dx.doi.org/10.1016/s0967-0661(99)00157-4
,1999, 'New insights for the filtered-X algorithm and robust adaptive equalization', Conference Record of the 33rd Asilomar Conference on Signals Systems and Computers, 1, pp. 544 - 546, http://dx.doi.org/10.1109/ACSSC.1999.832389
,1998, 'Comments on "design of decentralized control for symmetrically interconnected systems"', Automatica, 34, pp. 925 - 927
,'Modified Operation to Treat Types II and III Adenocarcinoma of the Esophagogastric Junction', HEPATO-GASTROENTEROLOGY, 59, pp. 422 - 425, http://dx.doi.org/10.5754/hge11435
,