Fariha Jaigirdar
Title
Cited by
Cited by
Year
A proposed architecture of cloud computing for education system in Bangladesh and the impact on current education system
S Al Noor, G Mustafa, SA Chowdhury, MZ Hossain, FT Jaigirdar
IJCSNS International Journal of Computer Science and Network Security 10 (10 …, 2010
932010
Simulation and performance analysis of adaptive filtering algorithms in noise cancellation
L Ferdouse, N Akhter, TH Nipa, FT Jaigirdar
arXiv preprint arXiv:1104.1962, 2011
382011
Can I trust the data I see? A Physician's concern on medical data in IoT health architectures
FT Jaigirdar, C Rudolph, C Bain
Proceedings of the Australasian computer science week multiconference, 1-10, 2019
292019
Security improvement of WPA 2 (Wi-Fi protected access 2)
AKMN Sakib, FT Jaigirdar, M Munim, A Akter
IJEST 3 (1), 2011
212011
A new cost-effective approach for battlefield surveillance in wireless sensor networks
FT Jaigirdar, MM Islam
2016 International Conference on Networking Systems and Security (NSysS), 1-6, 2016
182016
Performance study and simulation analysis of CSMA and IEEE 802.11 in wireless sensor networks and limitations of IEEE 802.11
SA Chowdhury, MT Islam, FT Jaigirdar, MRU Faruqui, S Al Noor
2009 12th International Conference on Computers and Information Technology …, 2009
162009
An efficient and cost effective maximum clique analysis based approximation in military application of wireless sensor network
FT Jaigirdar, MM Islam, SR Huq
14th International Conference on Computer and Information Technology (ICCIT …, 2011
132011
Grid approximation based inductive charger deployment technique in wireless sensor networks
FT Jaigirdar, MM Islam, SR Huq
International Journal of Advanced Computer Science and Applications-IJACSA 2 (1), 2011
132011
A Performance Analysis of LMS, RLS and Lattice based Algorithms as Applied to the Area of Linear Prediction
N Akhter
Journal of Global Research in Computer Science 1 (5), 2010
52010
Trust based security solution for Internet of Things healthcare solution: an end-to-end trustworthy architecture
FT Jaigirdar
Proceedings of the 2018 ACM International Joint Conference and 2018 …, 2018
32018
Assurance of the maximum destruction in battlefield using cost-effective approximation techniques
FT Jaigirdar, MM Islam
Journal of Networks, Academy Publisher, 2012
32012
What Information is Required for Explainable AI?: A Provenance-based Research Agenda and Future Challenges
FT Jaigirdar, C Rudolph, G Oliver, D Watts, C Bain
2020 IEEE 6th International Conference on Collaboration and Internet …, 2020
22020
Sustainable approach to segmented digital display: Complete, precise and economic
FT Jaigirdar, MAH Bhuiyan, S Al Noor
2010 13th International Conference on Computer and Information Technology …, 2010
22010
Prov-IoT: A Security-Aware IoT Provenance Model
FT Jaigirdar, C Rudolph, C Bain
2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020
12020
MAXIMIZING NETWORK INTERRUPTION IN WIRELESS SENSOR NETWORK: AN INTRUDER'S PERSPECTIVE
MM Islam, FT Jaigirdar, MM Islam
International Journal of Computer Networks & Communications 7 (2), 103, 2015
2015
Secure Authentication and Key Establishment protocol with perfect Forward Secrecy for Multi and Broad cast service in IEEE 802.16 e
AKMN Sakib, FT Jaigirdar, S Rahman, T Mahmud, MM Ra
Global Journal of Computer Science and Technology, 2011
2011
Maximizing network interruption: an intruder's perspective
FT Jaigirdar
Department of Computer Science and Engineering (CSE), 2011
2011
Risk and Compliance in IoT-Health Data Propagation: A Security-Aware Provenance based Approach
FT Jaigirdar, C Rudolph, C Bain
Sub-Reviewers
F Jaigirdar, P Smeros, AT Neumann, T Elmas, T Duong, DP Liyanage, ...
The system can't perform the operation now. Try again later.
Articles 1–19