
Topic
- Computing and Processing
- Components, Circuits, Devices and Systems
- Communication, Networking and Broadcast Technologies
- Power, Energy and Industry Applications
- Signal Processing and Analysis
- Robotics and Control Systems
- General Topics for Engineers
- Fields, Waves and Electromagnetics
- Engineered Materials, Dielectrics and Plasmas
- Bioengineering
- Transportation
- Photonics and Electrooptics
- Engineering Profession
- Aerospace
- Geoscience
- Nuclear Engineering
- Career Development
- Emerging Technologies
- Telecommunications
- English for Technical Professionals
Yawar Abbas
Also published under:Y. Abbas
Affiliation
Department of Information Security, National University of Sciences and Technology (NUST), Islamabad, Pakistan
Topic
Control Plane,Internet Of Things,Service Quality,Center For Control,Convolutional Neural Network,Deep Learning,Flow Dynamics,Flow Rule,Internet Of Things Networks,Learning Algorithms,Network Congestion,Network Performance,Routing Algorithm,Security Attacks,Traditional Network,Traffic Flow,Traffic Patterns,Traffic Prediction,Access Control,Amount Of Generation,Channel Resources,Cloud Computing,Comprehensive Survey,Congested,Consistent Results,Control Comparison,Conventional Route,Convolutional Neural Network Model,Convolutional Neural Network Training,Data Center,Data Center Networks,Deep Learning Models,Deep Learning Techniques,Deep Learning-based Models,Deep Reinforcement Learning,Denial Of Service,Different Types Of Attacks,Digital Era,Dijkstra’s Algorithm,Distributed Denial Of Service,DoS Attacks,Dynamic Balance,Dynamic Load Balancing,Dynamic Loading,Dynamics Calculations,Efficient Utilization Of Resources,Flow Routing,Flow Table,Heterogeneous Devices,Heterogeneous Network,
Biography
Yawar Abbas is currently an Associate Professor with the Department of Computer Software Engineering, National University of Sciences and Technology (NUST). His research interests include software defined networking, software defined storage, AI, ML, wireless sensor networks, formal methods in software engineering, information security, cloud computing, data center networking, the IoT, security in SDN, WSN, and the smart IoT.