Menu
CQUniversity Profiles
CQUniversity Profiles
Search Find an Expert Sign In
Publications
Journal article
Optimal allocation of grid-connected converter-based energy resources for securing power system stability: A comprehensive review

Ugwuagbo, E., Ray, B., Sul, J., Nabi, N., Datta, U., & Emami, K. (2025). Optimal allocation of grid-connected converter-based energy resources for securing power system stability: A comprehensive review. Electric Power Systems Research, 248, 111978. doi:10.1016/j.epsr.2025.111978


Intelligent weed management using aerial image processing and precision herbicide spraying: An overview

Ehrampoosh, A., Hettiarachchi, P., Koirala, A., Hassan, J., Islam, N., Ray, B., . . . Moore, S. (2025). Intelligent weed management using aerial image processing and precision herbicide spraying: An overview. Crop Protection, 194, 1-15. doi:10.1016/j.cropro.2025.107206


AI-based seagrass morphology measurement

Halder, S., Islam, N., Ray, B., Andrews, E., Hettiarachchi, P., & Jackson, E. (2024). AI-based seagrass morphology measurement. Journal of Environmental Management, 369, 1-14. doi:10.1016/j.jenvman.2024.122246


A comprehensive framework for effective long-short term solar yield forecasting

Ray, B., Lasantha, D., Beeravalli, V., Anwar, A., Nabi, M. N., Sheng, H., . . . Muyeen, S. M. (2024). A comprehensive framework for effective long-short term solar yield forecasting. Energy Conversion and Management: X, 22, 1-12. doi:10.1016/j.ecmx.2024.100535


Battery health estimation based on multi-domain transfer learning

Sheng, H., Ray, B., Kayamboo, S., Xu, X., & Wang, S. (2024). Battery health estimation based on multi-domain transfer learning. IEEE Transactions on Power Electronics, 39(4), 4758-4770. doi:10.1109/tpel.2023.3346335


Blockchain based secure Ownership Transfer Protocol for smart objects in the Internet of Things

M., K., Ray, B., Hassan, J., Kashyap, A., & Chandrappa, V. (2024). Blockchain based secure Ownership Transfer Protocol for smart objects in the Internet of Things. Internet of Things, 25, 1-19. doi:10.1016/j.iot.2023.101002


RFID localization in construction with IoT and security integration

Khan, S. I., Ray, B. R., & Karmakar, N. C. (2024). RFID localization in construction with IoT and security integration. Automation in Construction, 159, 1-12. doi:10.1016/j.autcon.2023.105249


Chipless RFID physical layer security with MIMO-based multi-dimensional data points for Internet of Things

Khan, S., Ray, B., & Karmakar, N. (2024). Chipless RFID physical layer security with MIMO-based multi-dimensional data points for Internet of Things. IEEE Internet of Things Journal, 11(15), 26384-26394. doi:10.1109/jiot.2024.3395485


Toward transparent AI for neurological disorders: A feature extraction and relevance analysis framework

Woodbright, M. D., Morshed, A., Browne, M., Ray, B., & Moore, S. (2024). Toward transparent AI for neurological disorders: A feature extraction and relevance analysis framework. IEEE Access, 12, 37731-37743. doi:10.1109/ACCESS.2024.3375877


Parametric analysis and prediction of energy consumption of electric vehicles using machine learning

Nabi, M. N., Ray, B., Rashid, F., Al Hussam, W., & Muyeen, S. M. (2023). Parametric analysis and prediction of energy consumption of electric vehicles using machine learning. Journal of Energy Storage, 72, 1-13. doi:10.1016/j.est.2023.108226


Total harmonics distortion prediction at the point of common coupling of industrial load with the grid using artificial neural network

Ugwuagbo, E., Balogun, A., Ray, B., Anwar, A., & Ugwuishiwu, C. (2023). Total harmonics distortion prediction at the point of common coupling of industrial load with the grid using artificial neural network. Energy and AI, 14, 1-10. doi:10.1016/j.egyai.2023.100281


Spatiotemporal modelling to predict soil moisture for sustainable smart irrigation

Yarehalli Chandrappa, V., Ray, B., Ashwath, N., & Shrestha, P. (2023). Spatiotemporal modelling to predict soil moisture for sustainable smart irrigation. Internet of Things (Netherlands), 21, 1-17. doi:10.1016/j.iot.2022.100671


An online parsing framework for semi-structured streaming system logs of Internet of Things systems

Bhattacharya, S., Ray, B., Chugh, R., & Gordon, S. (2023). An online parsing framework for semi-structured streaming system logs of Internet of Things systems. IEEE Open Journal of Instrumentation and Measurement, 2(2023), 1-18. doi:10.1109/ojim.2022.3232650


Generalization of solar power yield modelling using knowledge transfer

Sheng, H., Ray, B., Shao, J., Lasantha, D., & Das, N. (2022). Generalization of solar power yield modelling using knowledge transfer. Expert Systems with Applications, 201, 1-10. doi:10.1016/j.eswa.2022.116992


Virtual Laboratories in Tertiary Education: Case Study Analysis by Learning Theories

Hassan, J., Devi, A., & Ray, B. (2022). Virtual Laboratories in Tertiary Education: Case Study Analysis by Learning Theories. Education Sciences, 12(8), 1-15. doi:10.3390/educsci12080554


Hybrid framework for predicting and forecasting State of Health of Lithium-ion batteries in Electric Vehicles

Maleki, S., Ray, B., & Hagh, M. T. (2022). Hybrid framework for predicting and forecasting State of Health of Lithium-ion batteries in Electric Vehicles. Sustainable Energy, Grids and Networks, 30, 1-11. doi:10.1016/j.segan.2022.100603


Physical Layer Detection and Security of Printed Chipless RFID Tag for Internet of Things Applications

Khadka, G., Ray, B., Karmakar, N. C., & Choi, J. (2022). Physical Layer Detection and Security of Printed Chipless RFID Tag for Internet of Things Applications. IEEE Internet of Things Journal, 9(17), 15714-15724. doi:10.1109/jiot.2022.3151364


A Novel Insider Attack and Machine Learning Based Detection for the Internet of Things

Chowdhury, M., Ray, B., Chowdhury, S., & Rajasegarar, S. (2021). A Novel Insider Attack and Machine Learning Based Detection for the Internet of Things. ACM Transactions on Internet of Things, 2(4), 1-23. doi:10.1145/3466721


A review of applications and communication technologies for Internet of Things (IoT) and Unmanned Aerial Vehicle (UAV) based sustainable smart farming

Islam, N., Rashid, M. M., Pasandideh, F., Ray, B. R., Moore, S. T., & Kadel, R. (2021). A review of applications and communication technologies for Internet of Things (IoT) and Unmanned Aerial Vehicle (UAV) based sustainable smart farming. Sustainability, 13(4), 1-20. doi:10.3390/su13041821


Smart farming through responsible leadership in Bangladesh: Possibilities, opportunities, and beyond

Haque, M. D. A. J., Islam, N., Samrat, N. H., Dey, S., & Ray, B. R. (2021). Smart farming through responsible leadership in Bangladesh: Possibilities, opportunities, and beyond. Sustainability, 13(8), 1-18. doi:10.3390/su13084511


Vulnerability and impact analysis of the IEC 61850 GOOSE protocol in the smart grid

Reda, H. T., Ray, B. R., Peidaee, P., Anwar, A., Mahmood, A., Kalam, A., & Islam, N. (2021). Vulnerability and impact analysis of the IEC 61850 GOOSE protocol in the smart grid. Sensors, 21(4), 1-20. doi:10.3390/s21041554


Solar power forecasting based on domain adaptive learning

Sheng, H., Ray, B. R., Chen, K., & Cheng, Y. (2020). Solar power forecasting based on domain adaptive learning. IEEE Access, 8, 198580-198590. doi:10.1109/access.2020.3034100


A new data driven long-term solar yield analysis model of photovoltaic power plants

Ray, B. R., Shah, M. R., Islam, M. R., & Islam, S. (2020). A new data driven long-term solar yield analysis model of photovoltaic power plants. IEEE Access, 8, 136223-136233. doi:10.1109/access.2020.3011982


Machine learning to ensure data integrity in power system topological network database

Anwar, A., Mahmood, A., Ray, B. R., Mahmud, M. A., & Tari, Z. (2020). Machine learning to ensure data integrity in power system topological network database. Electronics, 9(4), 1-17. doi:10.3390/electronics9040693


Analysis of using biogas resources for electric vehicle charging in Bangladesh: A techno-economic-environmental perspective

Karmaker, A. K., Hossain, M. A., Manoj Kumar, N., Jagadeesan, V., Jayakumar, A., & Ray, B. R. (2020). Analysis of using biogas resources for electric vehicle charging in Bangladesh: A techno-economic-environmental perspective. Sustainability, 12(7), 1-19. doi:10.3390/su12072579


Universal and secure object ownership transfer protocol for the Internet of Things

Ray, B. R., Abawajy, J., Chowdhury, M., & Alelaiwi, A. (2018). Universal and secure object ownership transfer protocol for the Internet of Things. Future Generation Computer Systems, 78(2), 838-849. doi:10.1016/j.future.2017.02.020


Performance analysis of Internet of Things sensor architectures and security primitives

Bevinakoppa, S., Sundhoro, K., Kumar, N., Sadeque, M., & Ray, B. (2017). Performance analysis of Internet of Things sensor architectures and security primitives. Recent Advances in Communications and Networking Technology, 6(1), 15-25. doi:10.2174/2215081106666170509164502


Secure Object Tracking Protocol for the Internet of Things

Ray, B. R., Chowdhury, M. U., & Abawajy, J. H. (2016). Secure Object Tracking Protocol for the Internet of Things. IEEE Internet of Things, 3(4), 544-553. doi:10.1109/JIOT.2016.2572729


Effectiveness of problem based learning implementation

Bevinakoppa, S., Ray, B., & Sabrina, F. (2016). Effectiveness of problem based learning implementation. International Journal of Quality Assurance in Engineering and Technology Education, 5(3), 46-58. doi:10.4018/IJQAETE.2016070104


Scenarios for an RFID tag ownership transfer protocol for a closed loop system

Gaith, K. D. A., Ray, B. R., & Chowdhury, M. (2015). Scenarios for an RFID tag ownership transfer protocol for a closed loop system. International Journal of Networked and Distributed Computing, 3(2), 128-136. doi:10.2991/ijndc.2015.3.2.7


Academic debate on using social networking media: Teachers’ and students’ perceptions from two tertiary institutions

Ray, B. R., & Devi, A. (2015). Academic debate on using social networking media: Teachers’ and students’ perceptions from two tertiary institutions. International Journal of Learning and Teaching, 1(2), 168-173. doi:10.18178/ijlt.1.2.168-173


Scalable RFID security framework and protocol supporting Internet of Things

Ray, B. R., Abawajy, J., & Chowdhury, M. (2014). Scalable RFID security framework and protocol supporting Internet of Things. Computer Networks, 67, 89-103. doi:10.1016/j.comnet.2014.03.023


Conference paper
Transfer learning-enhanced gradient boosting models for wildfire detection using UAV imagery

Wijikumar, P., Partheepan, S., Hassan, J., Sanati, F., & Ray, B. (2025). Transfer learning-enhanced gradient boosting models for wildfire detection using UAV imagery. In Proceedings: 26th IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM 2025) (pp. 311-316). Piscataway, NJ: IEEE. doi:10.1109/WoWMoM65615.2025.00061


Optimised hybrid-model selection for the autonomous relevance technique explainable framework

Woodbright, M. D., Morshed, A., Browne, M., Ray, B., & Moore, S. (2024). Optimised hybrid-model selection for the autonomous relevance technique explainable framework. In 2024 International Conference on Data Science and Its Applications Icodsa 2024 (pp. 380-385). Piscataway, NJ: IEEE. doi:10.1109/ICoDSA62899.2024.10651906


Bushfire severity prediction optimization: Feature combination study with XGBoost regression and satellite-derived data

Wijikumar, P., Partheepan, S., Hassan, J., Sanati, F., & Ray, B. (2024). Bushfire severity prediction optimization: Feature combination study with XGBoost regression and satellite-derived data. In The 17th International Conference on Security of Information and Networks (SIN'24) (pp. 45-51). Piscataway, NJ: IEEE. doi:10.1109/SIN63213.2024.10871827


Taxonomy of user-centric errors leading to cyber attacks in LoRaWAN

Parajuli, I., Ray, B. R., Hassan, J., & Cowling, M. (2024). Taxonomy of user-centric errors leading to cyber attacks in LoRaWAN. In IEEE Xplore (pp. 1-10). Online: IEEE. doi:10.1109/SIN63213.2024.10871891


Very short-term feeder load forecasting using deep learning for real-time stability monitoring in smart power grids

Ugwuagbo, E., Ray, B., Sul, J., Nabi, N., & Datta, U. (2024). Very short-term feeder load forecasting using deep learning for real-time stability monitoring in smart power grids. In 2024 IEEE Smartblock4africa: Emerging and Resilient Technologies in Building and Securing African Nations Smartblock4africa 2024 (pp. 1-7). Piscataway, NJ: IEEE. doi:10.1109/SmartBlock4Africa61928.2024.10779529


Vulnerability assessment and risk modeling of IoT smart home devices

Baddula, M., Ray, B., ElKhodr, M., Anwar, A., & Hettiarachchi, P. (2024). Vulnerability assessment and risk modeling of IoT smart home devices. In L. Barolli (Ed.), Advanced Information Networking and Applications: Proceedings of the 38th International Conference on Advanced Information Networking and Applications (AINA-2024), Volume 5 Vol. 5 (pp. 459-469). Cham, Switzerland: Springer. doi:10.1007/978-3-031-57931-8_44


Online machine learning-based anomaly detection in Internet of Things applications

Rashid, M. D. M., Sabrina, F., Imam, T., Ray, B., Gordon, S., Morshed, A., & Wibowo, S. (2023). Online machine learning-based anomaly detection in Internet of Things applications. In Proceedings of The IEEE CSDE (pp. 306-310). Piscataway, NJ: IEEE. doi:10.1109/CSDE59766.2023.10487703


Fuzzy logic based trajectory optimization for livestock health monitoring using Internet of Drones (IoD)

Nibir, R., Hassan, J., Bokani, A., & Ray, B. (2023). Fuzzy logic based trajectory optimization for livestock health monitoring using Internet of Drones (IoD). In Proceedings of the 13th International Conference on Cloud Computing, Data Science and Engineering, Confluence 2023 (pp. 692-697). Piscataway, NJ: IEEE. doi:10.1109/Confluence56041.2023.10048844


IoT-Based Cyber-Physical Distribution System Planning

Kayamboo, S., Ray, B., Das, N., & Tom, M. (2022). IoT-Based Cyber-Physical Distribution System Planning. In S. Chakrabarti, R. Paul, B. Gill, M. Gangopadhyay, & S. Poddar (Eds.), 2022 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS) (pp. 726-731). Piscataway, NJ: IEEE. doi:10.1109/iemtronics55184.2022.9795702


Anomaly Detection in IoT Applications Using Deep Learning with Class Balancing

Rashid, M. M., Sabrina, F., Ray, B., Morshed, A., Steven, G., & Wibowo, S. (2022). Anomaly Detection in IoT Applications Using Deep Learning with Class Balancing. In Proceedings of the IEEE CSDE (pp. 643-648). Piscataway, NJ: IEEE. Retrieved from https://ieeexplore.ieee.org/document/10089252


Cyber Attack Detection in IoT Networks with Small Samples: Implementation And Analysis

Kanthuru, V., Rajasegarar, S., Rathore, P., Doss, R., Pan, L., Ray, B., . . . Durai, M. A. S. (2022). Cyber Attack Detection in IoT Networks with Small Samples: Implementation And Analysis. In W. Chen, L. Yao, T. Cai, S. Pan, T. Shen, & X. Li (Eds.), Advanced Data Mining and Applications: 18th International Conference, ADMA 2022 Brisbane, QLD, Australia, November 28–30, 2022 Proceedings, Part I (pp. 118-130). Cham, Switzerland: Springer. doi:10.1007/978-3-031-22064-7_10


PV cell output power enhancement by cooling and reduction of reflection losses from mirror

Basavaraj, G., Das, N., Ray, B., & Alam, F. (2021). PV cell output power enhancement by cooling and reduction of reflection losses from mirror. In S. Rajakaruna, A. Abu-Siada, H. C. Iu, A. Ghosh, & T. Fernando (Eds.), Proceedings of 2021 31st Australasian Universities Power Engineering Conference (AUPEC) (pp. 1-6). Online: IEEE. doi:10.1109/aupec52110.2021.9597820


User perspective on usages and privacy of eHealth systems in Bangladesh: A Dhaka based survey

Ray, B., Saha, K. K., Biswas, M., & Rahman, M. M. (2020). User perspective on usages and privacy of eHealth systems in Bangladesh: A Dhaka based survey. In 2020 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE) (pp. 1-5). Piscataway, NJ: IEEE. doi:10.1109/csde50874.2020.9411593


Priority based modeling and comparative study of Google Cloud resources between 2011 and 2019

Lasantha, D., & Ray, B. R. (2020). Priority based modeling and comparative study of Google Cloud resources between 2011 and 2019. In G. Wang, R. Ko, M. Z. A. Bhuiyan, & Y. Pan (Eds.), Proceedings of the 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications: TrustCom 2020 (pp. 1310-1317). Piscataway, NJ: IEEE. doi:10.1109/TrustCom50675.2020.00176


Application of Internet of Things (IoT) to develop a smart watering system for Cairns Parklands: A case study

Chandrappa, V. Y., Ray, B. R., Ashwath, N., & Shrestha, P. (2020). Application of Internet of Things (IoT) to develop a smart watering system for Cairns Parklands: A case study. In IEEE Region 10 Symposium (TENSYMP 2020) (pp. 1118-1122). Piscataway, NJ: IEEE. doi:10.1109/tensymp50017.2020.9230827


Contract cheating and plagiarism in technical disciplines: A conceptual reflection from multidisciplinary perspectives

Imam, T., Grose, R. J., Das, N. K., Sharma, S., Ray, B., Islam, N., . . . Mazid, A. M. (2020). Contract cheating and plagiarism in technical disciplines: A conceptual reflection from multidisciplinary perspectives. In Proceedings of the AAEE2020 Conference (pp. 1-8). Online: Engineers Australia. Retrieved from https://www.aaee2020.com.au/program-3/


IoT based smart farming: Are the LPWAN technologies suitable for remote communication?

Islam, N., Ray, B. R., & Pasandideh, F. (2020). IoT based smart farming: Are the LPWAN technologies suitable for remote communication?. In Proceedings: 2020 IEEE International Conference on Smart Internet of Things (SmartIoT) (pp. 270-276). Los Alamitos, CA: IEEE. doi:10.1109/smartiot49966.2020.00048


IoT insider attack: Survey

Chowdhury, M. U., Doss, R., Ray, B. R., Rajasegarar, S., & Chowdhury, S. (2020). IoT insider attack: Survey. In D. -J. Deng, A. -C. Pang, & C. -C. LIn (Eds.), Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Vol. LNICST 324 (pp. 28-41). Cham, Switzerland: Springer. doi:10.1007/978-3-030-49610-4_3


Performance evaluation of Aloha and CSMA for LoRaWAN Network

Baddula, M., Ray, B. R., & Chowdhury, M. (2020). Performance evaluation of Aloha and CSMA for LoRaWAN Network. In 2020 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE) (pp. 1-6). Piscataway, NJ: IEEE. doi:10.1109/csde50874.2020.9411539


A lightweight protocol for RFID authentication

Azad, S. A., & Ray, B. R. (2019). A lightweight protocol for RFID authentication. In Proceedings 2019 IEEE Asia-Pacific Conference on Computer Science and Data Engineering (CSDE) (pp. 1-6). Piscataway, NJ: IEEE. doi:10.1109/CSDE48274.2019.9162420


Performance assessment of prospective PV systems in Queensland and New South Wales of Australia

Ray, B. R., & Shah, M. R. (2019). Performance assessment of prospective PV systems in Queensland and New South Wales of Australia. In IEEE PES GTD 2019 : Grand International Conference & Exposition Asia : conference (pp. 200-205). Piscataway, NJ.: IEEE. doi:10.1109/GTDAsia.2019.8715931


Insider attacks on Zigbee based IoT networks by exploiting AT commands

Piracha, W. A., Chowdhury, M., Ray, B. R., Rajasegarar, S., & Doss, R. (2019). Insider attacks on Zigbee based IoT networks by exploiting AT commands. In V. S. Shankar Sriram, V. Subramaniyaswamy, N. Sasikaladevi, L. Zhang, L. Batten, & G. Li (Eds.), Communications in Computer and Information Science Vol. 1116 CCIS (pp. 77-91). Singapore: Springer. doi:10.1007/978-981-15-0871-4_6


Performance evaluation of LoRaWAN for mission-critical IOT networks

Ahmad, A. I., Ray, B. R., & Chowdhury, M. (2019). Performance evaluation of LoRaWAN for mission-critical IOT networks. In R. Doss, S. Piramuthu, & W. Zhou (Eds.), Communications in Computer and Information Science Vol. 1113 CCIS (pp. 37-51). Cham, Switzerland: Springer. doi:10.1007/978-3-030-34353-8_3


Reverse Engineering Technique (RET) to predict resource allocation in a Google cloud system

Ray, B. R., & Chowdhury, S. (2018). Reverse Engineering Technique (RET) to predict resource allocation in a Google cloud system. In Proceedings of the 8th International Conference Confluence 2018 on Cloud Computing, Data Science and Engineering (pp. 688-693). Piscataway, NJ: IEEE. doi:10.1109/CONFLUENCE.2018.8442524


To Confluence 2018 organizers and delegates [Letter]

Ray, B. R. (2018). To Confluence 2018 organizers and delegates [Letter]. In Proceedings of the 8th International Conference Confluence 2018 on Cloud Computing, Data Science and Engineering (pp. xiii). Piscataway, NJ: IEEE. doi:10.1109/CONFLUENCE.2018.8442596


A multi-protocol security framework to support Internet of Things

Ray, B. R., Chowdhury, M. U., & Abawajy, J. H. (2017). A multi-protocol security framework to support Internet of Things. In R. Deng, J. Weng, K. Ren, & V. Yegneswaran (Eds.), Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Vol. 198 LNICST (pp. 257-270). Cham, Switzerland: Springer. doi:10.1007/978-3-319-59608-2_14


Is high performance computing (HPC) ready to handle big data?

Ray, B. R., Chowdhury, M., & Atif, U. (2017). Is high performance computing (HPC) ready to handle big data?. In R. Doss, S. Piramuthu, & W. Zhou (Eds.), Communications in Computer and Information Science Vol. 759 (pp. 97-112). Cham, Switzerland: Springer. doi:10.1007/978-3-319-65548-2_8


False signal injection attack detection of cyber physical systems by event-triggered distributed filtering over sensor networks

Lin, Y., Ray, B., Jarvis, D., & Wang, J. (2016). False signal injection attack detection of cyber physical systems by event-triggered distributed filtering over sensor networks. In L. Batten, & G. Li (Eds.), Communications in Computer and Information Science Vol. 651 (pp. 142-153). Singapore: Springer. doi:10.1007/978-981-10-2741-3_12


Secure RFID protocol to manage and prevent tag counterfeiting with Matryoshka concept

Aliyev, G., Doss, R., Chowdhury, M., & Ray, B. (2016). Secure RFID protocol to manage and prevent tag counterfeiting with Matryoshka concept. In R. Doss, S. Piramuthu, & W. Zhou (Eds.), Communications in Computer and Information Science (pp. 126-141). Cham, Switzerland: Springer International Publishing. doi:10.1007/978-3-319-48021-3_9


Secure object tracking protocol for Networked RFID Systems

Ray, B. R., Howdhury, M., Abawajy, J., & Jesmin, M. (2015). Secure object tracking protocol for Networked RFID Systems. In K. Saisho (Ed.), 2015 IEEE/ACIS 16th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2015: Proceedings (pp. 135-142). Piscataway, NJ.: IEEE. doi:10.1109/SNPD.2015.7176190


PUF-based secure checker protocol for Networked RFID Systems

Ray, B. R., Chowdhury, M., & Abawaiy, J. (2014). PUF-based secure checker protocol for Networked RFID Systems. In Proceedings: 2014 IEEE Conference on Open Systems (ICOS 2014) (pp. 78-83). Piscataway, NJ.: IEEE. doi:10.1109/ICOS.2014.7042633


RFID tag ownership transfer protocol for a closed loop system

Gaith, K. D. A., Ray, B. R., & Chowdhury, M. (2014). RFID tag ownership transfer protocol for a closed loop system. In Proceedings: 2014 IIAI 3rd International Conference on Advanced Applied Informatics, (IIAIAAI 2014) (pp. 575-579). Piscataway, NJ.: IEEE. doi:10.1109/IIAI-AAI.2014.124


Edited Book
Intelligent internet of everything for automated and sustainable farming

Ray, B., Hassan, J., Huang, H., Islam, N., & Shahdat, Z. (Eds.) (2025). Intelligent internet of everything for automated and sustainable farming. Hershey, PA: IGI Global. doi:10.4018/979-8-3373-0020-7


Book chapter
Will quantum communication and processing accelerate the progress of automated and sustainable farming?

Wijikumar, P., Hassan, J., Ul-Haq, A., Ray, B. R., & Puvanendran, R. (2025). Will quantum communication and processing accelerate the progress of automated and sustainable farming?. In B. Ray (Ed.), Intelligent internet of everything for automated and sustainable farming (pp. 267-306). Hershey, PA: IGI Global. doi:10.4018/979-8-3373-0020-7.ch008


Intelligent radio frequency fingerprinting to identify malicious tags in the Internet of Things

Ray, B., Khadka, G., Lasantha, D., Chandrappa, V., Choi, J., & Karmakar, N. (2022). Intelligent radio frequency fingerprinting to identify malicious tags in the Internet of Things. In M. Ahmed, S. R. Islam, A. Anwar, N. Moustafa, & A. -S. Pathan (Eds.), Explainable artificial intelligence for cyber security: Next generation artificial intelligence (Vol. 1025, pp. 213-239). Cham, Switzerland: Springer. doi:10.1007/978-3-030-96630-0_10


Caring for carers of people with dementia: A protocol for harnessing innovation through deploying leading edge technologies to enable virtual support groups and services

Parkinson, L., Banbury, A. E., Livingstone, A., Gordon, S., Ray, B., Byrne, L. C., . . . Wood, D. L. (2018). Caring for carers of people with dementia: A protocol for harnessing innovation through deploying leading edge technologies to enable virtual support groups and services. In M. E. L. van den Berg, & A. J. Maeder (Eds.), Telehealth for our Ageing Society: Selected papers from Global Telehealth 2017 (Vol. 246, pp. 29-41). Amsterdam, Netherlands: IOS Press. doi:10.3233/978-1-61499-845-7-29