D. Manivannan

Orcid: 0000-0001-9895-3085

Affiliations:
  • University of Kentucky, Lexington, KY, USA
  • Ohio State University, Columbus, OH, USA (PhD 1997)


According to our database1, D. Manivannan authored at least 80 papers between 1996 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
A deep learning approach for intrusion detection in Internet of Things using focal loss function.
Internet Things, July, 2023

Conditional Privacy-preserving Authentication and Message Dissemination Scheme using Timestamp based Pseudonyms for VANETs.
Proceedings of the International Wireless Communications and Mobile Computing, 2023

FS3: Few-Shot and Self-Supervised Framework for Efficient Intrusion Detection in Internet of Things Networks.
Proceedings of the Annual Computer Security Applications Conference, 2023

2022
A Low-Overhead Message Authentication and Secure Message Dissemination Scheme for VANETs.
Network, 2022

CREASE: Certificateless and REused-pseudonym based Authentication Scheme for Enabling security and privacy in VANETs.
Internet Things, 2022

Effect of Balancing Data Using Synthetic Data on the Performance of Machine Learning Classifiers for Intrusion Detection in Computer Networks.
IEEE Access, 2022

A Secure and Improved Safety Message Collection with Increased Privacy-Preserving Algorithm for VANETs.
Proceedings of the Ninth International Conference on Social Networks Analysis, 2022

An On-Board Hardware Implementation of AODV Routing Protocol in VANET: Design and Experimental Evaluation.
Proceedings of the 9th International Conference on Internet of Things: Systems, 2022

A lightweight Privacy-Preserving V2I Mutual Authentication Scheme using Cuckoo Filter in VANETs.
Proceedings of the 19th IEEE Annual Consumer Communications & Networking Conference, 2022

2021
A scalable and distributed architecture for secure and privacy-preserving authentication and message dissemination in VANETs.
Internet Things, 2021

A secure and distributed architecture for vehicular cloud.
Internet Things, 2021

Intrusion detection based on Machine Learning techniques in computer networks.
Internet Things, 2021

2020
Secure authentication and privacy-preserving techniques in Vehicular Ad-hoc NETworks (VANETs).
Veh. Commun., 2020

Hybrid on-demand greedy routing protocol with backtracking for mobile ad-hoc networks.
Int. J. Pervasive Comput. Commun., 2020

Privacy-preserving and Authentication in VANETs.
Int. J. Next Gener. Comput., 2020

A Secure Source Routing Protocol for Mobile Ad Hoc Networks.
Int. J. Next Gener. Comput., 2020

An Efficient RSU Authentication Scheme based on Merkle Hash Tree for VANETs.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Blending Convergent Encryption and Access Control Scheme for Achieving A Secure and Storage Efficient Cloud.
Proceedings of the IEEE 17th Annual Consumer Communications & Networking Conference, 2020

2019
Classification, Challenges and Critical Comparison of Proposed Solutions for Vehicular Clouds.
Int. J. Next Gener. Comput., 2019

SecReS: A Secure and Reliable Storage Scheme for Cloud with Client-Side Data Deduplication.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

FaCS: Toward a Fault-Tolerant Cloud Scheduler Leveraging Long Short-Term Memory Network.
Proceedings of the 6th IEEE International Conference on Cyber Security and Cloud Computing, 2019

A Secure and Distributed Architecture for Vehicular Cloud.
Proceedings of the Advances on P2P, Parallel, Grid, Cloud and Internet Computing, 2019

2018
GRB: Greedy Routing Protocol with Backtracking for Mobile Ad Hoc Networks.
Int. J. Next Gener. Comput., 2018

GRB: Greedy Routing Protocol with Backtracking for Mobile Ad Hoc Network (Extended Version).
CoRR, 2018

2017
Predicting Application Failure in Cloud: A Machine Learning Approach.
Proceedings of the IEEE International Conference on Cognitive Computing, 2017

2016
An efficient protocol for authenticated and secure message delivery in vehicular ad hoc networks.
Veh. Commun., 2016

Triangle-based routing for mobile ad hoc networks.
Pervasive Mob. Comput., 2016

A Classification and Characterization of Security Threats in Cloud Computing.
Int. J. Next Gener. Comput., 2016

SAriadne: A secure source routing protocol to prevent hidden-channel attacks.
Proceedings of the 12th IEEE International Conference on Wireless and Mobile Computing, 2016

Hybrid On-demand greedy routing protocol with backtracking for Mobile Ad-Hoc Networks.
Proceedings of the 9th IFIP Wireless and Mobile Networking Conference, 2016

2015
Position Based and Hybrid Routing Protocols for Mobile Ad Hoc Networks: A Survey.
Wirel. Pers. Commun., 2015

Smart Sensing and Mobile Computing.
Int. J. Distributed Sens. Networks, 2015

An efficient scheme for authenticated and secure message delivery in Vehicular Ad Hoc Networks.
Proceedings of the 12th Annual IEEE Consumer Communications and Networking Conference, 2015

Secure Incentive-Based Architecture for Vehicular Cloud.
Proceedings of the Ad-hoc, Mobile, and Wireless Networks - 14th International Conference, 2015

2014
A Survey of Routing Protocols for Wireless Sensor Networks.
Int. J. Next Gener. Comput., 2014

2013
Performance Comparison of Two Channel Allocation Strategies in Cellular Networks.
Wirel. Pers. Commun., 2013

A fully informed model-based checkpointing protocol for preventing useless checkpoints.
Int. J. Parallel Emergent Distributed Syst., 2013

2012
HOPE: A Hybrid Optimistic checkpointing and selective Pessimistic mEssage logging protocol for large scale distributed systems.
Future Gener. Comput. Syst., 2012

RIVER: A reliable inter-vehicular routing protocol for vehicular ad hoc networks.
Comput. Networks, 2012

2011
Theoretical and experimental evaluation of communication-induced checkpointing protocols in F<sub>E</sub> and F<sub>Lazy-E</sub> families.
Perform. Evaluation, 2011

2009
Unicast routing protocols for vehicular ad hoc networks: A critical comparison and classification.
Pervasive Mob. Comput., 2009

An enhanced model-based checkpointing protocol for preventing useless checkpoints.
Int. J. Parallel Emergent Distributed Syst., 2009

FINE: A Fully Informed aNd Efficient communication-induced checkpointing protocol for distributed systems.
J. Parallel Distributed Comput., 2009

Necessary and sufficient conditions for transaction-consistent global checkpoints in a distributed database system.
Inf. Sci., 2009

Hybrid Bluetooth Scatternet Routing.
Proceedings of the Ubiquitous Intelligence and Computing, 6th International Conference, 2009

2008
An optimistic checkpointing and message logging approach for consistent global checkpoint collection in distributed systems.
J. Parallel Distributed Comput., 2008

A quasi-synchronous checkpointing algorithm that prevents contention for stable storage.
Inf. Sci., 2008

Theoretical and Experimental Evaluation of Communication-Induced Checkpointing Protocols in FE Family.
Proceedings of the 2008 IEEE International Performance, 2008

Delay-Tolerant Routing Protocols for Vehicular Ad Hoc Networks: A Critical Comparison and Classification.
Proceedings of the 2008 International Conference on Wireless Networks, 2008

FINE: A Fully Informed aNd Efficient Communication-Induced Checkpointing Protocol.
Proceedings of the Third International Conference on Systems, 2008

2007
RPSF: A Routing Protocol with Selective Forwarding for Mobile Ad-Hoc Networks.
Wirel. Pers. Commun., 2007

A Fault-Tolerant Channel-Allocation Algorithm for Cellular Networks With Mobile Base Stations.
IEEE Trans. Veh. Technol., 2007

An enhanced model-based checkpointing protocol.
Proceedings of the IASTED International Conference on Parallel and Distributed Computing and Networks, 2007

An optimistic checkpointing and selective message logging approach for consistent global checkpoint collection in distributed systems.
Proceedings of the 21th International Parallel and Distributed Processing Symposium (IPDPS 2007), 2007

2006
A fault-tolerant distributed formation protocol for Bluetooth scatternets.
Int. J. Pervasive Comput. Commun., 2006

An Efficient Non-intrusive Checkpointing Algorithm for Distributed Database Systems.
Proceedings of the Distributed Computing and Networking, 8th International Conference, 2006

2005
An Efficient Fault-Tolerant Distributed Channel Allocation Algorithm for Cellular Networks.
IEEE Trans. Mob. Comput., 2005

A Fault-Tolerant Distributed Channel Allocation Scheme for Cellular Networks.
IEEE Trans. Computers, 2005

Bluetooth scatternets: criteria, models and classification.
Ad Hoc Networks, 2005

A Communication-Induced Checkpointing and Asynchronous Recovery Protocol for Mobile Computing Systems.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

An Asynchronous Recovery Algorithm Based on a Staggered Quasi-Synchronous Checkpointing Algorithm.
Proceedings of the Distributed Computing, 2005

2004
Determining Consistent Global Checkpoints of a Distributed Computation.
IEICE Trans. Inf. Syst., 2004

Performance of Three Distributed Mutual Exclusion Algorithms.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2004

A Communication-Induced Checkpointing and Asynchronous Recovery Algorithm for Multithreaded Distributed Systems.
Proceedings of the Parallel and Distributed Computing: Applications and Technologies, 2004

Distributed Self-Healing Bluetooth Scatternet Formation.
Proceedings of the International Conference on Wireless Networks, 2004

Bluetooth scatternet formation: criteria, models and classification.
Proceedings of the 1st IEEE Consumer Communications and Networking Conference, 2004

Routing protocols for sensor networks.
Proceedings of the 1st IEEE Consumer Communications and Networking Conference, 2004

2003
An Efficient Distributed Algorithm for Detection of Knots and Cycles in a Distributed Graph.
IEEE Trans. Parallel Distributed Syst., 2003

A foundation for designing deadlock-free routing algorithms in wormhole networks.
J. ACM, 2003

Performance of communication-induced checkpointing algorithms.
Comput. Syst. Sci. Eng., 2003

A Fault-Tolerant Channel Allocation Algorithm for Cellular Networks with Mobile Base Stations.
Proceedings of the International Conference on Wireless Networks, 2003

A Fault-Tolerant Dynamic Channel Allocation Scheme for Enhancing QoS in Cellular Networks.
Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS-36 2003), 2003

Secure Connections in Bluetooth Scatternets.
Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS-36 2003), 2003

On Necessary and Sufficient Conditions for Deadlocks in AND and OR Models.
Proceedings of the ISCA 16th International Conference on Parallel and Distributed Computing Systems, 2003

2002
Asynchronous recovery without using vector timestamps.
J. Parallel Distributed Comput., 2002

A Distributed Algorithm for Knot Detection in a Distributed Graph.
Proceedings of the 31st International Conference on Parallel Processing (ICPP 2002), 2002

1999
Quasi-Synchronous Checkpointing: Models, Characterization, and Classification.
IEEE Trans. Parallel Distributed Syst., 1999

1997
Finding Consistent Global Checkpoints in a Distributed Computation.
IEEE Trans. Parallel Distributed Syst., 1997

1996
A foundation for designing deadlock-free routing algorithms in wormhole networks.
Proceedings of the Eighth IEEE Symposium on Parallel and Distributed Processing, 1996

A Low Overhead Recovery Technique Using Quasi-Synchronous Checkpointing.
Proceedings of the 16th International Conference on Distributed Computing Systems, 1996


  Loading...