1. Brij G, Dharma PA, and Shingo Y, eds (2016) Handbook of research on modern cryptographic solutions for computer and cyber security. IGI global.
2. Mohammad AA, Yaser J, Islam O, and Brij BG (2016) Automated wireless video surveillance: an evaluation framework. J Real-Time Image Proc 13(3):527–546
3. Md Zakirul Alam B, Jie W, Guojun W, Zhigang C, Jianer C, and Tian W (2017) Quality-guaranteed event-sensitive data collection and monitoring in vibration sensor networks. IEEE Trans on Industria Informatic 13(2):572–583
4. Ching-Lung C, Wei-Ming C, and Chi-Han H (2014) Reliable consideration of P2P-based VoD system with interleaved video frame distribution. IEEE Syst J 8(1):304–312
5. Bin C, Xiuzheng L, Zheng Z, Hai J, Lex S, and Xiaofei L (2008) Evaluation and optimization of a peer-to-peer video-on-demand system. J Syst Archit 54(7):651–663