Abraham Jibi

Orcid: 0000-0002-2807-9967

According to our database1, Abraham Jibi authored at least 20 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Resilient Fog-Based Adaptive Traffic Control System.
Proceedings of the 14th International Conference on Computing Communication and Networking Technologies, 2023

Techniques for Privacy-Preserving Data Aggregation in an Untrusted Distributed Environment.
Proceedings of the 6th Joint International Conference on Data Science & Management of Data (10th ACM IKDD CODS and 28th COMAD), 2023

2022
Secure cloud model for intellectual privacy protection of arithmetic expressions in source codes using data obfuscation techniques.
Theor. Comput. Sci., 2022

2021
Cost-based recommendation of parameters for local differentially private data aggregation.
Comput. Secur., 2021

Selection and Verification of Privacy Parameters for Local Differentially Private Data Aggregation.
Proceedings of the ICISDM 2021: 2021 the 5th International Conference on Information System and Data Mining, Silicon Valley, CA, USA, May 27, 2021

2018
Perceive Core Logical Blocks of a C Program Automatically for Source Code Transformations.
Proceedings of the Intelligent Systems Design and Applications, 2018

A LLC-based DoS Attack Technique on Virtualization System with Detection and Prevention Model.
Proceedings of the 2018 International Conference on Advances in Computing, 2018

Network recommendation based on route prediction and mobile tower localisation.
Proceedings of the 15th IEEE Annual Consumer Communications & Networking Conference, 2018

2015
Entropy Based Detection And Behavioral Analysis Of Hybrid Covert Channeling Secured Communication.
CoRR, 2015

Optimizing response time and synchronization in User Virtualization via adaptive memory compression.
Proceedings of the 2015 International Conference on Advances in Computing, 2015

Cascket: A binary protocol based c client-driver for Apache Cassandra.
Proceedings of the 2015 International Conference on Advances in Computing, 2015

2014
Secure process migration in cloud for load balancing and energy efficiency.
Int. J. Cloud Comput., 2014

Dynamic Selection of Symmetric Key Cryptographic Algorithms for Securing Data Based on Various Parameters.
CoRR, 2014

2011
Design of Transport Layer Based Hybrid Covert Channel Detection Engine
CoRR, 2011

2010
Behavioral Analysis of Transport Layer Based Hybrid Covert Channel.
Proceedings of the Recent Trends in Network Security and Applications, 2010

2009
Energy-efficient relaxed rekeying policies for distributed key management in sensor networks.
Int. J. Ad Hoc Ubiquitous Comput., 2009

Design of Energy Efficient Scheme for Conducting Secure E-Class Application on MANET.
Proceedings of the First International Conference on Computational Intelligence, 2009

2008
Energy Efficient Key Management Protocols to Securely Confirm Intrusion Detection in Wireless Sensor Networks.
Proceedings of the Wireless Sensor and Actor Networks II, 2008

Estimation of communication overhead during Pair-wise key establishment in wireless sensor networks.
Proceedings of the 16th International Conference on Networks, 2008

2007
A Complete Set of Protocols for Distributed Key Management in Clustered Wireless Sensor Networks.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007


  Loading...