Deepak Puthal

According to our database1, Deepak Puthal authored at least 106 papers between 2013 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Software Defined Internet of Things Security: Properties, State of the Art, and Future Research.
IEEE Wirel. Commun., 2020

A QoS-Aware Data Collection Protocol for LLNs in Fog-Enabled Internet of Things.
IEEE Trans. Network and Service Management, 2020

A User-centric Security Solution for Internet of Things and Edge Convergence.
TCPS, 2020

IoTSim-Edge: A simulation framework for modeling the behavior of Internet of Things and edge computing environments.
Softw. Pract. Exp., 2020

IoTSim-SDWAN: A simulation framework for interconnecting distributed datacenters over Software-Defined Wide Area Network (SD-WAN).
J. Parallel Distributed Comput., 2020

COMITMENT: A Fog Computing Trust Management Approach.
J. Parallel Distributed Comput., 2020

PAAL: A Framework Based on Authentication, Aggregation, and Local Differential Privacy for Internet of Multimedia Things.
IEEE Internet Things J., 2020

Fuzzy knowledge based performance analysis on big data.
Neurocomputing, 2020

A hybrid encryption technique for Secure-GLOR: The adaptive secure routing protocol for dynamic wireless mesh networks.
Future Gener. Comput. Syst., 2020

Privacy-preserving matrix product based static mutual exclusive roles constraints violation detection in interoperable role-based access control.
Future Gener. Comput. Syst., 2020

PoAh: A Novel Consensus Algorithm for Fast Scalable Private Blockchain for Large-scale IoT Frameworks.
CoRR, 2020

PUFchain: A Hardware-Assisted Blockchain for Sustainable Simultaneous Device and Data Security in the Internet of Everything (IoE).
IEEE Consumer Electron. Mag., 2020

Data Aware Web-Assembly Function Placement.
Proceedings of the Companion of The 2020 Web Conference 2020, 2020

2019
Big Data Stream Security Classification for IoT Applications.
Proceedings of the Encyclopedia of Big Data Technologies., 2019

Privacy Cube.
Proceedings of the Encyclopedia of Big Data Technologies., 2019

Internet of Autonomous Vehicles Communications Security: Overview, Issues, and Directions.
IEEE Wirel. Commun., 2019

Software Defined IoT Systems: Properties, State of the Art, and Future Research.
IEEE Wirel. Commun., 2019

PMsec: Physical Unclonable Function-Based Robust and Lightweight Authentication in the Internet of Medical Things.
IEEE Trans. Consumer Electronics, 2019

SEEN: A Selective Encryption Method to Ensure Confidentiality for Big Sensing Data Streams.
IEEE Trans. Big Data, 2019

Intrusion Detection and Prevention in Cloud, Fog, and Internet of Things.
Security and Communication Networks, 2019

Secure authentication and load balancing of distributed edge datacenters.
J. Parallel Distributed Comput., 2019

Lattice-Modeled Information Flow Control of Big Sensing Data Streams for Smart Health Application.
IEEE Internet Things J., 2019

Analytical Model for Sybil Attack Phases in Internet of Things.
IEEE Internet Things J., 2019

Orchestrating Development Lifecycle of Machine Learning Based IoT Applications: A Survey.
CoRR, 2019

IoTSim-Edge: A Simulation Framework for Modeling the Behaviour of IoT and Edge Computing Environments.
CoRR, 2019

Editorial to the Special Issue on Recent Advances on Trust, Security and Privacy in Computing and Communications.
Concurr. Comput. Pract. Exp., 2019

Ubiquitous Localization (UbiLoc): A Survey and Taxonomy on Device Free Localization for Smart World.
IEEE Commun. Surv. Tutorials, 2019

A predictive load balancing technique for software defined networked cloud services.
Computing, 2019

Editorial.
Comput. Intell., 2019

Fog Computing Security Challenges and Future Directions [Energy and Security].
IEEE Consumer Electron. Mag., 2019

Unmanned Aerial Vehicles in Consumer Applications: New Applications in Current and Future Smart Environments.
IEEE Consumer Electron. Mag., 2019

Introduction to the Special Section on Secure and Scalable Fog/Edge Computing.
Comput. Electr. Eng., 2019

Adaptive Task Offloading Auction for Industrial CPS in Mobile Edge Computing.
IEEE Access, 2019

A Traffic-Aware Approach for Enabling Unmanned Aerial Vehicles (UAVs) in Smart City Scenarios.
IEEE Access, 2019

PMsec: PUF-Based Energy-Efficient Authentication of Devices in the Internet of Medical Things (IoMT).
Proceedings of the IEEE International Symposium on Smart Electronic Systems, 2019

PUFchain: Hardware-Assisted Scalable Blockchain.
Proceedings of the IEEE International Symposium on Smart Electronic Systems, 2019

Proof-of-Authentication for Scalable Blockchain in Resource-Constrained Distributed Systems.
Proceedings of the IEEE International Conference on Consumer Electronics, 2019

A Novel Multi-Path Anonymous Randomized Key Distribution Scheme for Geo Distributed Networks.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

2018
An adaptive task allocation technique for green cloud computing.
J. Supercomput., 2018

Sustainable Service Allocation Using a Metaheuristic Technique in a Fog Server for Industrial Applications.
IEEE Trans. Ind. Informatics, 2018

Energy-efficient VM-placement in cloud data center.
Sustain. Comput. Informatics Syst., 2018

Accurate Traffic Flow Prediction in Heterogeneous Vehicular Networks in an Intelligent Transport System Using a Supervised Non-Parametric Classifier.
Sensors, 2018

Performance of Cognitive Radio Sensor Networks Using Hybrid Automatic Repeat ReQuest: Stop-and-Wait.
MONET, 2018

On the placement of controllers in software-Defined-WAN using meta-heuristic approach.
J. Syst. Softw., 2018

Response time optimization for cloudlets in Mobile Edge Computing.
J. Parallel Distributed Comput., 2018

An early detection of low rate DDoS attack to SDN based data center networks using information distance metrics.
Future Gener. Comput. Syst., 2018

Internet of Things (IoT) and Cloud Computing Enabled Disaster Management.
CoRR, 2018

Location of Things (LoT): A Review and Taxonomy of Sensors Localization in IoT Infrastructure.
IEEE Commun. Surv. Tutorials, 2018

Adaptive routing protocol for urban vehicular networks to support sellers and buyers on wheels.
Comput. Networks, 2018

Secure and Sustainable Load Balancing of Edge Data Centers in Fog Computing.
IEEE Communications Magazine, 2018

Building a Sustainable Internet of Things: Energy-Efficient Routing Using Low-Power Sensors Will Meet the Need.
IEEE Consumer Electron. Mag., 2018

Secure Computing for the Internet of Things and Network Edges: Protecting Communication in the Worldwide Network of Devices.
IEEE Consumer Electron. Mag., 2018

The Blockchain as a Decentralized Security Framework [Future Directions].
IEEE Consumer Electron. Mag., 2018

Everything You Wanted to Know About the Blockchain: Its Promise, Components, Processes, and Problems.
IEEE Consumer Electron. Mag., 2018

A Computing Perspective of Quantum Cryptography [Energy and Security].
IEEE Consumer Electron. Mag., 2018

A Novel Collaborative Task Offloading Scheme for Secure and Sustainable Mobile Cloudlet Networks.
IEEE Access, 2018

Energy-Efficient Deployment of Edge Dataenters for Mobile Clouds in Sustainable IoT.
IEEE Access, 2018

IoT-Based Wireless Polysomnography Intelligent System for Sleep Monitoring.
IEEE Access, 2018

Building Scalable Cyber-Physical-Social Networking Infrastructure Using IoT and Low Power Sensors.
IEEE Access, 2018

Towards System Implementation and Data Analysis for Crowdsensing Based Outdoor RSS Maps.
IEEE Access, 2018

Edge of Things: The Big Picture on the Integration of Edge, IoT and the Cloud in a Distributed Computing Environment.
IEEE Access, 2018

Blockchain Based Secured Identity Authentication and Expeditious Revocation Framework for Vehicular Networks.
Proceedings of the 17th IEEE International Conference On Trust, 2018

A Comparative Study of Machine Learning Techniques for Credit Card Fraud Detection Based on Time Variance.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2018

S2R: Service Trading Based Response Time Optimization in Mobile Edge Computing.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018

Introducing Network Multi-Tenancy for Cloud-Based Enterprise Resource Planning: An IoT Application.
Proceedings of the 27th IEEE International Symposium on Industrial Electronics, 2018

A fast and self-adaptive on-line learning detection system.
Proceedings of the INNS Conference on Big Data and Deep Learning 2018, 2018

Building Scalable Mobile Edge Computing by Enhancing Quality of Services.
Proceedings of the 2018 International Conference on Innovations in Information Technology (IIT), 2018

A Chain Topology for Efficient Monitoring of Food Grain Storage using Smart Sensors.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

CTOM: Collaborative Task Offloading Mechanism for Mobile Cloudlet Networks.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

A Novel Hybrid Authentication Model for Geo Location Oriented Routing in Dynamic Wireless Mesh Networks.
Proceedings of the 51st Hawaii International Conference on System Sciences, 2018

Graph-Based Symmetric Crypto-System for Data Confidentiality.
Proceedings of the IEEE Global Communications Conference, 2018

Software Defined Network Based Fault Detection in Industrial Wireless Sensor Networks.
Proceedings of the IEEE Global Communications Conference, 2018

First Score Auction for Pricing-Based Resource Selection in Vehicular Cloud.
Proceedings of the 2018 International Conference on Computer, 2018

A Fingerprinting Technique for Identification of Wireless Devices.
Proceedings of the 2018 International Conference on Computer, 2018

Probabilistic RSS Fingerprinting for Localization in Smart Platforms.
Proceedings of the International Conference on Information Technology, 2018

VM Selection using DVFS Technique to Minimize Energy Consumption in Cloud System.
Proceedings of the International Conference on Information Technology, 2018

Stock market analysis using social networks.
Proceedings of the Australasian Computer Science Week Multiconference, 2018

2017
Erratum to: Rendezvous based routing protocol for wireless sensor networks with mobile sink.
J. Supercomput., 2017

Rendezvous based routing protocol for wireless sensor networks with mobile sink.
J. Supercomput., 2017

DLSeF: A Dynamic Key-Length-Based Efficient Real-Time Security Verification Model for Big Data Stream.
ACM Trans. Embedded Comput. Syst., 2017

A dynamic prime number based efficient security mechanism for big sensing data streams.
J. Comput. Syst. Sci., 2017

Big-Sensing-Data Curation for the Cloud is Coming: A Promise of Scalable Cloud-Data-Center Mitigation for Next-Generation IoT and Wireless Sensor Networks.
IEEE Consumer Electron. Mag., 2017

Building Security Perimeters to Protect Network Systems Against Cyber Threats [Future Directions].
IEEE Consumer Electron. Mag., 2017

MSGR: A Mode-Switched Grid-Based Sustainable Routing Protocol for Wireless Sensor Networks.
IEEE Access, 2017

Secure-GLOR: An Adaptive Secure Routing Protocol for Dynamic Wireless Mesh Networks.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Privacy-Preserving Detection of Statically Mutually Exclusive Roles Constraints Violation in Interoperable Role-Based Access Control.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Fast Deformable Model for Pedestrian Detection with Haar-like features.
Proceedings of the 2017 IEEE Symposium Series on Computational Intelligence, 2017

IoT and Big Data: An Architecture with Data Flow and Security Issues.
Proceedings of the Cloud Infrastructures, Services, and IoT Systems for Smart Cities, 2017

Deep Learning Based Face Recognition with Sparse Representation Classification.
Proceedings of the Neural Information Processing - 24th International Conference, 2017

Metaheuristic Solutions for Solving Controller Placement Problem in SDN-based WAN Architecture.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

A Synchronized Shared Key Generation Method for Maintaining End-to-End Security of Big Data Streams.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

Private matching and set intersection computation in multi-agent and industrial control systems.
Proceedings of the 12th Annual Conference on Cyber and Information Security Research, 2017

Deadline-constraint services in cloud with heterogeneous servers.
Proceedings of the International Conference on Computer, 2017

Time efficient dynamic threshold-based load balancing technique for Cloud Computing.
Proceedings of the International Conference on Computer, 2017

Self Deployment Based on Circle Packing Algorithm for Movement Assisted Wireless Sensor Networks.
Proceedings of the 2017 International Conference on Information Technology, 2017

Secure Authentication Protocol for IoT Architecture.
Proceedings of the 2017 International Conference on Information Technology, 2017

An Overview of Security Challenges in Vehicular Ad-Hoc Networks.
Proceedings of the 2017 International Conference on Information Technology, 2017

2016
Threats to Networking Cloud and Edge Datacenters in the Internet of Things.
IEEE Cloud Comput., 2016

A Secure Big Data Stream Analytics Framework for Disaster Management on the Cloud.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

2015
A Dynamic Key Length Based Approach for Real-Time Security Verification of Big Sensing Data Stream.
Proceedings of the Web Information Systems Engineering - WISE 2015, 2015

DPBSV - An Efficient and Secure Scheme for Big Sensing Data Stream.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Efficient Algorithms for Social Network Coverage and Reach.
Proceedings of the 2015 IEEE International Congress on Big Data, New York City, NY, USA, June 27, 2015

2014
DRUG: An Energy-Efficient Data-Centric Routing Protocol for Wireless Sensor Network.
CoRR, 2014

ADCS: An adaptive data collection scheme in vehicular networks using 3G/LTE.
Proceedings of the International Conference on Connected Vehicles and Expo, 2014

2013
A Near Optimal Approximation Algorithm for Vertex-Cover Problem.
CoRR, 2013

Cross-layer architecture for congestion control in Vehicular Ad-hoc Networks.
Proceedings of the International Conference on Connected Vehicles and Expo, 2013


  Loading...