Deepak Puthal

Orcid: 0000-0002-8332-278X

According to our database1, Deepak Puthal authored at least 186 papers between 2013 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Blockchain Data Structures and Integrated Adaptive Learning: Features and Futures.
IEEE Consumer Electron. Mag., March, 2024

NFTs in Smart Cities: Vision, Applications, and Challenges.
IEEE Consumer Electron. Mag., March, 2024

Security and Privacy-Aware Emerging Computing.
IEEE Consumer Electron. Mag., January, 2024

2023
Data Sampling In Federated Learning: Principles, Features And Taxonomy.
IEEE Commun. Stand. Mag., December, 2023

NFTs in Healthcare: Vision, Opportunities, and Challenges.
IEEE Consumer Electron. Mag., July, 2023

Guest Editorial: Special Section on Machine Learning and Artificial Intelligence for Managing Networks, Systems, and Services - Part II.
IEEE Trans. Netw. Serv. Manag., June, 2023

Hybrid Mode of Operation Schemes for P2P Communication to Analyze End-Point Individual Behaviour in IoT.
ACM Trans. Sens. Networks, May, 2023

Private Blockchain-Based AI-Envisioned Home Monitoring Framework in IoMT-Enabled COVID-19 Environment.
IEEE Consumer Electron. Mag., May, 2023

PharmaChain: A blockchain to ensure counterfeit-free pharmaceutical supply chain.
IET Networks, March, 2023

Special issue on privacy, security, and trust in computational intelligence.
Comput. Intell., February, 2023

SE-Loc: Security-Enhanced Indoor Localization With Semi-Supervised Deep Learning.
IEEE Trans. Netw. Sci. Eng., 2023

EasyChain: an IoT-friendly blockchain for robust and energy-efficient authentication.
Frontiers Blockchain, 2023

Revolutionizing Cyber Security: Exploring the Synergy of Machine Learning and Logical Reasoning for Cyber Threats and Mitigation.
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2023

IoMT Synthetic Cardiac Arrest Dataset for eHealth with AI-based Validation.
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2023

Fortified-Edge 2.0: Machine Learning based Monitoring and Authentication of PUF-Integrated Secure Edge Data Center.
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2023

A Secure RPL Rank Computation and Distribution Mechanism for Preventing Sinkhole Attack in IoT-based Systems.
Proceedings of the IEEE INFOCOM 2023, 2023

Role-Based Access Control in Private Blockchain for IoT Integrated Smart Contract.
Proceedings of the Internet of Things. Advances in Information and Communication Technology, 2023

A 2-Colorable DODAG Structured Hybrid Mode of Operations Architecture for RPL Protocol to Reduce Communication Overhead.
Proceedings of the Internet of Things. Advances in Information and Communication Technology, 2023

Pervasive AI for Secure and Scalable IoT- Edge-Cloud Continuum: A Big Picture.
Proceedings of the IEEE International Conference on High Performance Computing & Communications, 2023

JUHDM: IoT-Based Honk Detection and Novel Driver Profiling For Smart City.
Proceedings of the IEEE International Conference on High Performance Computing & Communications, 2023

Fortified-Edge: Secure PUF Certificate Authentication Mechanism for Edge Data Centers in Collaborative Edge Computing.
Proceedings of the Great Lakes Symposium on VLSI 2023, 2023

Next Generation Healthcare with Explainable AI: IoMT-Edge-Cloud Based Advanced eHealth.
Proceedings of the IEEE Global Communications Conference, 2023

Human-Centered Explainable AI at the Edge for eHealth.
Proceedings of the IEEE International Conference on Edge Computing and Communications, 2023

Privacy-aware Adaptive Collaborative Learning Approach for Distributed Edge Networks.
Proceedings of the 10th IEEE International Conference on Data Science and Advanced Analytics, 2023

LiDAR-based Building Damage Detection in Edge-Cloud Continuum.
Proceedings of the IEEE Intl Conf on Dependable, 2023

Machine Learning-based Adaptive Access Control Mechanism for Private Blockchain Storage.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023

A Hybrid Encryption Approach using DNA-Based Shift Protected Algorithm and AES for Edge-Cloud System Security.
Proceedings of the OITS International Conference on Information Technology, 2023

SECBlock-IIoT: A Secure Blockchain-enabled Edge Computing Framework for Industrial Internet of Things.
Proceedings of the Third International Symposium on Advanced Security on Software and Systems, 2023

2022
Guest Editorial: Special Issue on Machine Learning and Artificial Intelligence for Managing Networks, Systems, and Services - Part I.
IEEE Trans. Netw. Serv. Manag., December, 2022

Hybrid Mode of Operations for RPL in IoT: A Systematic Survey.
IEEE Trans. Netw. Serv. Manag., 2022

TFMD-SDVN: a trust framework for misbehavior detection in the edge of software-defined vehicular network.
J. Supercomput., 2022

Guest Editorial Special Issue on Computational Intelligence in Big Graph Data Management.
IEEE Trans. Emerg. Top. Comput. Intell., 2022

A Smart Logistic Classification Method for Remote Sensed Image Land Cover Data.
SN Comput. Sci., 2022

A Systematic Review on Healthcare Artificial Intelligent Conversational Agents for Chronic Conditions.
Sensors, 2022

A fuzzy rule-based efficient hospital bed management approach for coronavirus disease-19 infected patients.
Neural Comput. Appl., 2022

Introducing the Special Topic on "Mitigating Cyber Threats and Defense in Data Intensive Smart Cities".
Inf. Syst. Frontiers, 2022

Toward Advanced UAV Communications: Properties, Research Challenges, and Future Potential.
IEEE Internet Things Mag., 2022

QSFN: QoS-aware fog node provisioning in fog computing.
Int. J. Comput. Appl. Technol., 2022

A Novel Logo Identification Technique for Logo-Based Phishing Detection in Cyber-Physical Systems.
Future Internet, 2022

CryptoCliqIn: Graph-Theoretic Cryptography Using Clique Injection.
IEEE Intell. Syst., 2022

Smart Grid: Cyber Attacks, Critical Defense Approaches, and Digital Twin.
CoRR, 2022

Privacy-preserving cooperative localization in vehicular edge computing infrastructure.
Concurr. Comput. Pract. Exp., 2022

Security in Edge-Centric Intelligent Internet of Vehicles: Issues and Remedies.
IEEE Consumer Electron. Mag., 2022

Decision tree based user-centric security solution for critical IoT infrastructure.
Comput. Electr. Eng., 2022

Combination of Reduction Detection Using TOPSIS for Gene Expression Data Analysis.
Big Data Cogn. Comput., 2022

Secure and Scalable Collaborative Edge Computing using Decision Tree.
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2022

PharmaChain 2.0: A Blockchain Framework for Secure Remote Monitoring of Drug Environmental Parameters in Pharmaceutical Cold Supply Chain.
Proceedings of the IEEE International Symposium on Smart Electronic Systems, 2022

PUF-based Authentication Scheme for Edge Data Centers in Collaborative Edge Computing.
Proceedings of the IEEE International Symposium on Smart Electronic Systems, 2022

Blockchain and Federated Learning-enabled Distributed Secure and Privacy-preserving Computing Architecture for IoT Network.
Proceedings of the IEEE European Symposium on Security and Privacy, 2022

AI-based Block Identification and Classification in the Blockchain Integrated IoT.
Proceedings of the OITS International Conference on Information Technology, 2022

PharmaChain 3.0: Blockchain Integrated Efficient QR Code Mechanism for Pharmaceutical Supply Chain.
Proceedings of the OITS International Conference on Information Technology, 2022

2021
Lightweight Multi-party Authentication and Key Agreement Protocol in IoT-based E-Healthcare Service.
ACM Trans. Multim. Comput. Commun. Appl., 2021

Guest Editorial: Special Section on Embracing Artificial Intelligence for Network and Service Management.
IEEE Trans. Netw. Serv. Manag., 2021

AI-Enabled Fingerprinting and Crowdsource-Based Vehicle Localization for Resilient and Safe Transportation Systems.
IEEE Trans. Intell. Transp. Syst., 2021

Preserving Privacy in the Internet of Connected Vehicles.
IEEE Trans. Intell. Transp. Syst., 2021

Running Industrial Workflow Applications in a Software-Defined Multicloud Environment Using Green Energy Aware Scheduling Algorithm.
IEEE Trans. Ind. Informatics, 2021

Detection of SLA Violation for Big Data Analytics Applications in Cloud.
IEEE Trans. Computers, 2021

Energy Efficiency in Software Defined Networking: A Survey.
SN Comput. Sci., 2021

Integration of Internet of Things and blockchain toward portability and low-energy consumption.
Trans. Emerg. Telecommun. Technol., 2021

Orchestrating the Development Lifecycle of Machine Learning-based IoT Applications: A Taxonomy and Survey.
ACM Comput. Surv., 2021

Personal Internet of Things (PIoT): What Is It Exactly?
IEEE Consumer Electron. Mag., 2021

Federated Learning.
IEEE Consumer Electron. Mag., 2021

Toward Next-Generation Robust Cryptosystems.
IEEE Consumer Electron. Mag., 2021

Collaborative Edge Computing for Smart Villages [Energy and Security].
IEEE Consumer Electron. Mag., 2021

AI-Driven Security Solutions for the Internet of Everything.
IEEE Consumer Electron. Mag., 2021

When Do We Need the Blockchain?
IEEE Consumer Electron. Mag., 2021

Cybersecurity Issues in AI.
IEEE Consumer Electron. Mag., 2021

Performance Analysis of Classifier Techniques at the Edge Node.
Proceedings of the IEEE International Symposium on Smart Electronic Systems, 2021

Multilevel Color Image Segmentation using Modified Fuzzy Entropy and Cuckoo Search Algorithm.
Proceedings of the 30th IEEE International Conference on Fuzzy Systems, 2021

International Workshop on Privacy, Security and Trust in Computational Intelligence (PSTCI2021).
Proceedings of the CIKM '21: The 30th ACM International Conference on Information and Knowledge Management, Virtual Event, Queensland, Australia, November 1, 2021

2020
Software Defined Internet of Things Security: Properties, State of the Art, and Future Research.
IEEE Wirel. Commun., 2020

Design and evaluation of a novel hierarchical trust assessment approach for vehicular networks.
Veh. Commun., 2020

SDN-Assisted DDoS Defense Framework for the Internet of Multimedia Things.
ACM Trans. Multim. Comput. Commun. Appl., 2020

A QoS-Aware Data Collection Protocol for LLNs in Fog-Enabled Internet of Things.
IEEE Trans. Netw. Serv. Manag., 2020

A User-centric Security Solution for Internet of Things and Edge Convergence.
ACM Trans. Cyber Phys. Syst., 2020

IoTSim-Edge: A simulation framework for modeling the behavior of Internet of Things and edge computing environments.
Softw. Pract. Exp., 2020

IoTSim-SDWAN: A simulation framework for interconnecting distributed datacenters over Software-Defined Wide Area Network (SD-WAN).
J. Parallel Distributed Comput., 2020

COMITMENT: A Fog Computing Trust Management Approach.
J. Parallel Distributed Comput., 2020

PAAL: A Framework Based on Authentication, Aggregation, and Local Differential Privacy for Internet of Multimedia Things.
IEEE Internet Things J., 2020

ESMLB: Efficient Switch Migration-Based Load Balancing for Multicontroller SDN in IoT.
IEEE Internet Things J., 2020

Fuzzy knowledge based performance analysis on big data.
Neurocomputing, 2020

A hybrid encryption technique for Secure-GLOR: The adaptive secure routing protocol for dynamic wireless mesh networks.
Future Gener. Comput. Syst., 2020

Privacy-preserving matrix product based static mutual exclusive roles constraints violation detection in interoperable role-based access control.
Future Gener. Comput. Syst., 2020

PoAh: A Novel Consensus Algorithm for Fast Scalable Private Blockchain for Large-scale IoT Frameworks.
CoRR, 2020

PUFchain: A Hardware-Assisted Blockchain for Sustainable Simultaneous Device and Data Security in the Internet of Everything (IoE).
IEEE Consumer Electron. Mag., 2020

Data Aware Web-Assembly Function Placement.
Proceedings of the Companion of The 2020 Web Conference 2020, 2020

Proof-of-Authentication Consensus Algorithm: Blockchain-based IoT Implementation.
Proceedings of the 6th IEEE World Forum on Internet of Things, 2020

McPoRA: A Multi-chain Proof of Rapid Authentication for Post-Blockchain Based Security in Large Scale Complex Cyber-Physical Systems.
Proceedings of the 2020 IEEE Computer Society Annual Symposium on VLSI, 2020

Adaptive Software Defined Node Deployment for Green Internet of Things.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Software Defined Wide-Area Networks Control Plane Scaling using Bayesian Game Model.
Proceedings of the 2020 IEEE International Conference on Communications Workshops, 2020

Visualization Approach for Malware Classification with ResNeXt.
Proceedings of the IEEE Congress on Evolutionary Computation, 2020

2019
Big Data Stream Security Classification for IoT Applications.
Proceedings of the Encyclopedia of Big Data Technologies., 2019

Privacy Cube.
Proceedings of the Encyclopedia of Big Data Technologies., 2019

Internet of Autonomous Vehicles Communications Security: Overview, Issues, and Directions.
IEEE Wirel. Commun., 2019

Software Defined IoT Systems: Properties, State of the Art, and Future Research.
IEEE Wirel. Commun., 2019

PMsec: Physical Unclonable Function-Based Robust and Lightweight Authentication in the Internet of Medical Things.
IEEE Trans. Consumer Electron., 2019

SEEN: A Selective Encryption Method to Ensure Confidentiality for Big Sensing Data Streams.
IEEE Trans. Big Data, 2019

Intrusion Detection and Prevention in Cloud, Fog, and Internet of Things.
Secur. Commun. Networks, 2019

Secure authentication and load balancing of distributed edge datacenters.
J. Parallel Distributed Comput., 2019

Lattice-Modeled Information Flow Control of Big Sensing Data Streams for Smart Health Application.
IEEE Internet Things J., 2019

Analytical Model for Sybil Attack Phases in Internet of Things.
IEEE Internet Things J., 2019

Orchestrating Development Lifecycle of Machine Learning Based IoT Applications: A Survey.
CoRR, 2019

IoTSim-Edge: A Simulation Framework for Modeling the Behaviour of IoT and Edge Computing Environments.
CoRR, 2019

Editorial to the Special Issue on Recent Advances on Trust, Security and Privacy in Computing and Communications.
Concurr. Comput. Pract. Exp., 2019

Ubiquitous Localization (UbiLoc): A Survey and Taxonomy on Device Free Localization for Smart World.
IEEE Commun. Surv. Tutorials, 2019

A predictive load balancing technique for software defined networked cloud services.
Computing, 2019

Editorial.
Comput. Intell., 2019

Fog Computing Security Challenges and Future Directions [Energy and Security].
IEEE Consumer Electron. Mag., 2019

Unmanned Aerial Vehicles in Consumer Applications: New Applications in Current and Future Smart Environments.
IEEE Consumer Electron. Mag., 2019

Introduction to the Special Section on Secure and Scalable Fog/Edge Computing.
Comput. Electr. Eng., 2019

Adaptive Task Offloading Auction for Industrial CPS in Mobile Edge Computing.
IEEE Access, 2019

A Traffic-Aware Approach for Enabling Unmanned Aerial Vehicles (UAVs) in Smart City Scenarios.
IEEE Access, 2019

PMsec: PUF-Based Energy-Efficient Authentication of Devices in the Internet of Medical Things (IoMT).
Proceedings of the IEEE International Symposium on Smart Electronic Systems, 2019

PUFchain: Hardware-Assisted Scalable Blockchain.
Proceedings of the IEEE International Symposium on Smart Electronic Systems, 2019

Proof-of-Authentication for Scalable Blockchain in Resource-Constrained Distributed Systems.
Proceedings of the IEEE International Conference on Consumer Electronics, 2019

A Novel Multi-Path Anonymous Randomized Key Distribution Scheme for Geo Distributed Networks.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Coordinated Data Flow Control in IoT Networks.
Proceedings of the Algorithmic Aspects of Cloud Computing - 5th International Symposium, 2019

2018
An adaptive task allocation technique for green cloud computing.
J. Supercomput., 2018

Sustainable Service Allocation Using a Metaheuristic Technique in a Fog Server for Industrial Applications.
IEEE Trans. Ind. Informatics, 2018

Energy-efficient VM-placement in cloud data center.
Sustain. Comput. Informatics Syst., 2018

Accurate Traffic Flow Prediction in Heterogeneous Vehicular Networks in an Intelligent Transport System Using a Supervised Non-Parametric Classifier.
Sensors, 2018

Performance of Cognitive Radio Sensor Networks Using Hybrid Automatic Repeat ReQuest: Stop-and-Wait.
Mob. Networks Appl., 2018

On the placement of controllers in software-Defined-WAN using meta-heuristic approach.
J. Syst. Softw., 2018

Response time optimization for cloudlets in Mobile Edge Computing.
J. Parallel Distributed Comput., 2018

An early detection of low rate DDoS attack to SDN based data center networks using information distance metrics.
Future Gener. Comput. Syst., 2018

Internet of Things (IoT) and Cloud Computing Enabled Disaster Management.
CoRR, 2018

Location of Things (LoT): A Review and Taxonomy of Sensors Localization in IoT Infrastructure.
IEEE Commun. Surv. Tutorials, 2018

Adaptive routing protocol for urban vehicular networks to support sellers and buyers on wheels.
Comput. Networks, 2018

Secure and Sustainable Load Balancing of Edge Data Centers in Fog Computing.
IEEE Commun. Mag., 2018

Building a Sustainable Internet of Things: Energy-Efficient Routing Using Low-Power Sensors Will Meet the Need.
IEEE Consumer Electron. Mag., 2018

Secure Computing for the Internet of Things and Network Edges: Protecting Communication in the Worldwide Network of Devices.
IEEE Consumer Electron. Mag., 2018

The Blockchain as a Decentralized Security Framework [Future Directions].
IEEE Consumer Electron. Mag., 2018

Everything You Wanted to Know About the Blockchain: Its Promise, Components, Processes, and Problems.
IEEE Consumer Electron. Mag., 2018

A Computing Perspective of Quantum Cryptography [Energy and Security].
IEEE Consumer Electron. Mag., 2018

A Novel Collaborative Task Offloading Scheme for Secure and Sustainable Mobile Cloudlet Networks.
IEEE Access, 2018

Energy-Efficient Deployment of Edge Dataenters for Mobile Clouds in Sustainable IoT.
IEEE Access, 2018

IoT-Based Wireless Polysomnography Intelligent System for Sleep Monitoring.
IEEE Access, 2018

Building Scalable Cyber-Physical-Social Networking Infrastructure Using IoT and Low Power Sensors.
IEEE Access, 2018

Towards System Implementation and Data Analysis for Crowdsensing Based Outdoor RSS Maps.
IEEE Access, 2018

Edge of Things: The Big Picture on the Integration of Edge, IoT and the Cloud in a Distributed Computing Environment.
IEEE Access, 2018

Blockchain Based Secured Identity Authentication and Expeditious Revocation Framework for Vehicular Networks.
Proceedings of the 17th IEEE International Conference On Trust, 2018

A Comparative Study of Machine Learning Techniques for Credit Card Fraud Detection Based on Time Variance.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2018

S2R: Service Trading Based Response Time Optimization in Mobile Edge Computing.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018

Introducing Network Multi-Tenancy for Cloud-Based Enterprise Resource Planning: An IoT Application.
Proceedings of the 27th IEEE International Symposium on Industrial Electronics, 2018

A fast and self-adaptive on-line learning detection system.
Proceedings of the INNS Conference on Big Data and Deep Learning 2018, 2018

Building Scalable Mobile Edge Computing by Enhancing Quality of Services.
Proceedings of the 2018 International Conference on Innovations in Information Technology (IIT), 2018

A Chain Topology for Efficient Monitoring of Food Grain Storage using Smart Sensors.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

CTOM: Collaborative Task Offloading Mechanism for Mobile Cloudlet Networks.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

A Novel Hybrid Authentication Model for Geo Location Oriented Routing in Dynamic Wireless Mesh Networks.
Proceedings of the 51st Hawaii International Conference on System Sciences, 2018

Graph-Based Symmetric Crypto-System for Data Confidentiality.
Proceedings of the IEEE Global Communications Conference, 2018

Software Defined Network Based Fault Detection in Industrial Wireless Sensor Networks.
Proceedings of the IEEE Global Communications Conference, 2018

First Score Auction for Pricing-Based Resource Selection in Vehicular Cloud.
Proceedings of the 2018 International Conference on Computer, 2018

A Fingerprinting Technique for Identification of Wireless Devices.
Proceedings of the 2018 International Conference on Computer, 2018

Probabilistic RSS Fingerprinting for Localization in Smart Platforms.
Proceedings of the International Conference on Information Technology, 2018

VM Selection using DVFS Technique to Minimize Energy Consumption in Cloud System.
Proceedings of the International Conference on Information Technology, 2018

Stock market analysis using social networks.
Proceedings of the Australasian Computer Science Week Multiconference, 2018

2017
Towards efficient and lightweight security architecture for big sensing data streams
PhD thesis, 2017

Erratum to: Rendezvous based routing protocol for wireless sensor networks with mobile sink.
J. Supercomput., 2017

Rendezvous based routing protocol for wireless sensor networks with mobile sink.
J. Supercomput., 2017

DLSeF: A Dynamic Key-Length-Based Efficient Real-Time Security Verification Model for Big Data Stream.
ACM Trans. Embed. Comput. Syst., 2017

A dynamic prime number based efficient security mechanism for big sensing data streams.
J. Comput. Syst. Sci., 2017

Big-Sensing-Data Curation for the Cloud is Coming: A Promise of Scalable Cloud-Data-Center Mitigation for Next-Generation IoT and Wireless Sensor Networks.
IEEE Consumer Electron. Mag., 2017

Building Security Perimeters to Protect Network Systems Against Cyber Threats [Future Directions].
IEEE Consumer Electron. Mag., 2017

MSGR: A Mode-Switched Grid-Based Sustainable Routing Protocol for Wireless Sensor Networks.
IEEE Access, 2017

Secure-GLOR: An Adaptive Secure Routing Protocol for Dynamic Wireless Mesh Networks.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Privacy-Preserving Detection of Statically Mutually Exclusive Roles Constraints Violation in Interoperable Role-Based Access Control.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Fast Deformable Model for Pedestrian Detection with Haar-like features.
Proceedings of the 2017 IEEE Symposium Series on Computational Intelligence, 2017

IoT and Big Data: An Architecture with Data Flow and Security Issues.
Proceedings of the Cloud Infrastructures, Services, and IoT Systems for Smart Cities, 2017

Deep Learning Based Face Recognition with Sparse Representation Classification.
Proceedings of the Neural Information Processing - 24th International Conference, 2017

Metaheuristic Solutions for Solving Controller Placement Problem in SDN-based WAN Architecture.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

A Synchronized Shared Key Generation Method for Maintaining End-to-End Security of Big Data Streams.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

Private matching and set intersection computation in multi-agent and industrial control systems.
Proceedings of the 12th Annual Conference on Cyber and Information Security Research, 2017

Deadline-constraint services in cloud with heterogeneous servers.
Proceedings of the International Conference on Computer, 2017

Time efficient dynamic threshold-based load balancing technique for Cloud Computing.
Proceedings of the International Conference on Computer, 2017

Self Deployment Based on Circle Packing Algorithm for Movement Assisted Wireless Sensor Networks.
Proceedings of the 2017 International Conference on Information Technology, 2017

Secure Authentication Protocol for IoT Architecture.
Proceedings of the 2017 International Conference on Information Technology, 2017

An Overview of Security Challenges in Vehicular Ad-Hoc Networks.
Proceedings of the 2017 International Conference on Information Technology, 2017

2016
Threats to Networking Cloud and Edge Datacenters in the Internet of Things.
IEEE Cloud Comput., 2016

A Secure Big Data Stream Analytics Framework for Disaster Management on the Cloud.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

2015
A Dynamic Key Length Based Approach for Real-Time Security Verification of Big Sensing Data Stream.
Proceedings of the Web Information Systems Engineering - WISE 2015, 2015

DPBSV - An Efficient and Secure Scheme for Big Sensing Data Stream.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Efficient Algorithms for Social Network Coverage and Reach.
Proceedings of the 2015 IEEE International Congress on Big Data, New York City, NY, USA, June 27, 2015

2014
DRUG: An Energy-Efficient Data-Centric Routing Protocol for Wireless Sensor Network.
CoRR, 2014

ADCS: An adaptive data collection scheme in vehicular networks using 3G/LTE.
Proceedings of the International Conference on Connected Vehicles and Expo, 2014

2013
A Near Optimal Approximation Algorithm for Vertex-Cover Problem.
CoRR, 2013

Cross-layer architecture for congestion control in Vehicular Ad-hoc Networks.
Proceedings of the International Conference on Connected Vehicles and Expo, 2013


  Loading...