Biplob R. Ray

Orcid: 0000-0002-3016-1695

Affiliations:
  • Central Queensland University, Cairns, QLD, Australia


According to our database1, Biplob R. Ray authored at least 31 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Blockchain based secure Ownership Transfer Protocol for smart objects in the Internet of Things.
Internet Things, April, 2024

Toward Transparent AI for Neurological Disorders: A Feature Extraction and Relevance Analysis Framework.
IEEE Access, 2024

Vulnerability Assessment and Risk Modeling of IoT Smart Home Devices.
Proceedings of the Advanced Information Networking and Applications, 2024

2023
Spatiotemporal modeling to predict soil moisture for sustainable smart irrigation.
Internet Things, April, 2023

2022
Physical-Layer Detection and Security of Printed Chipless RFID Tag for Internet of Things Applications.
IEEE Internet Things J., 2022

Generalization of solar power yield modeling using knowledge transfer.
Expert Syst. Appl., 2022

Cyber Attack Detection in IoT Networks with Small Samples: Implementation And Analysis.
Proceedings of the Advanced Data Mining and Applications - 18th International Conference, 2022

2021
A Novel Insider Attack and Machine Learning Based Detection for the Internet of Things.
ACM Trans. Internet Things, 2021

Vulnerability and Impact Analysis of the IEC 61850 GOOSE Protocol in the Smart Grid.
Sensors, 2021

2020
Solar Power Forecasting Based on Domain Adaptive Learning.
IEEE Access, 2020

A New Data Driven Long-Term Solar Yield Analysis Model of Photovoltaic Power Plants.
IEEE Access, 2020

Priority based Modeling and Comparative study of Google Cloud Resources between 2011 and 2019.
Proceedings of the 19th IEEE International Conference on Trust, 2020

IoT Based Smart Farming: Are the LPWAN Technologies Suitable for Remote Communication?
Proceedings of the 2020 IEEE International Conference on Smart Internet of Things, 2020

2019
IoT Insider Attack - Survey.
Proceedings of the Smart Grid and Internet of Things - Third EAI International Conference, 2019

Performance Evaluation of LoRaWAN for Mission-Critical IoT Networks.
Proceedings of the Future Network Systems and Security - 5th International Conference, 2019

Insider Attacks on Zigbee Based IoT Networks by Exploiting AT Commands.
Proceedings of the Applications and Techniques in Information Security, 2019

2018
Universal and secure object ownership transfer protocol for the Internet of Things.
Future Gener. Comput. Syst., 2018

2017
Is High Performance Computing (HPC) Ready to Handle Big Data?
Proceedings of the Future Network Systems and Security - Third International Conference, 2017

2016
Secure Object Tracking Protocol for the Internet of Things.
IEEE Internet Things J., 2016

Effectiveness of Problem-Based Learning Implementation.
Int. J. Qual. Assur. Eng. Technol. Educ., 2016

A Multi-protocol Security Framework to Support Internet of Things.
Proceedings of the Security and Privacy in Communication Networks, 2016

Secure RFID Protocol to Manage and Prevent Tag Counterfeiting with Matryoshka Concept.
Proceedings of the Future Network Systems and Security - Second International Conference, 2016

False Signal Injection Attack Detection of Cyber Physical Systems by Event-Triggered Distributed Filtering over Sensor Networks.
Proceedings of the Applications and Techniques in Information Security, 2016

2015
Scenarios for An RFID Tag Ownership Transfer Protocol for A Closed Loop System.
Int. J. Networked Distributed Comput., 2015

Secure object tracking protocol for Networked RFID Systems.
Proceedings of the 16th IEEE/ACIS International Conference on Software Engineering, 2015

2014
Scalable RFID security framework and protocol supporting Internet of Things.
Comput. Networks, 2014

RFID Tag Ownership Transfer Protocol for a Closed Loop System.
Proceedings of the IIAI 3rd International Conference on Advanced Applied Informatics, 2014

2013
Hybrid Approach to Ensure Data Confidentiality and Tampered Data Recovery for RFID Tag.
Int. J. Networked Distributed Comput., 2013

Critical Analysis and Comparative Study of Security for Networked RFID Systems.
Proceedings of the 14th ACIS International Conference on Software Engineering, 2013

2011
Smart RFID Reader Protocol for Malware Detection.
Proceedings of the 12th ACIS International Conference on Software Engineering, 2011

2010
Enhanced RFID Mutual Authentication Scheme Based on Shared Secret Information.
Proceedings of the ISCA 23rd International Conference on Computer Applications in Industry and Engineering, 2010


  Loading...