Deepak Puthal

According to our database1, Deepak Puthal authored at least 77 papers between 2014 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Big Data Stream Security Classification for IoT Applications.
Proceedings of the Encyclopedia of Big Data Technologies., 2019

Privacy Cube.
Proceedings of the Encyclopedia of Big Data Technologies., 2019

Internet of Autonomous Vehicles Communications Security: Overview, Issues, and Directions.
IEEE Wireless Commun., 2019

PMsec: Physical Unclonable Function-Based Robust and Lightweight Authentication in the Internet of Medical Things.
IEEE Trans. Consumer Electronics, 2019

SEEN: A Selective Encryption Method to Ensure Confidentiality for Big Sensing Data Streams.
IEEE Trans. Big Data, 2019

Intrusion Detection and Prevention in Cloud, Fog, and Internet of Things.
Security and Communication Networks, 2019

Secure authentication and load balancing of distributed edge datacenters.
J. Parallel Distrib. Comput., 2019

Lattice-Modeled Information Flow Control of Big Sensing Data Streams for Smart Health Application.
IEEE Internet of Things Journal, 2019

Analytical Model for Sybil Attack Phases in Internet of Things.
IEEE Internet of Things Journal, 2019

A predictive load balancing technique for software defined networked cloud services.
Computing, 2019

Editorial.
Computational Intelligence, 2019

Fog Computing Security Challenges and Future Directions [Energy and Security].
IEEE Consumer Electronics Magazine, 2019

Unmanned Aerial Vehicles in Consumer Applications: New Applications in Current and Future Smart Environments.
IEEE Consumer Electronics Magazine, 2019

Introduction to the Special Section on Secure and Scalable Fog/Edge Computing.
Computers & Electrical Engineering, 2019

A Traffic-Aware Approach for Enabling Unmanned Aerial Vehicles (UAVs) in Smart City Scenarios.
IEEE Access, 2019

Proof-of-Authentication for Scalable Blockchain in Resource-Constrained Distributed Systems.
Proceedings of the IEEE International Conference on Consumer Electronics, 2019

2018
An adaptive task allocation technique for green cloud computing.
The Journal of Supercomputing, 2018

Sustainable Service Allocation Using a Metaheuristic Technique in a Fog Server for Industrial Applications.
IEEE Trans. Industrial Informatics, 2018

Energy-efficient VM-placement in cloud data center.
SUSCOM, 2018

Accurate Traffic Flow Prediction in Heterogeneous Vehicular Networks in an Intelligent Transport System Using a Supervised Non-Parametric Classifier.
Sensors, 2018

Performance of Cognitive Radio Sensor Networks Using Hybrid Automatic Repeat ReQuest: Stop-and-Wait.
MONET, 2018

On the placement of controllers in software-Defined-WAN using meta-heuristic approach.
Journal of Systems and Software, 2018

Response time optimization for cloudlets in Mobile Edge Computing.
J. Parallel Distrib. Comput., 2018

An early detection of low rate DDoS attack to SDN based data center networks using information distance metrics.
Future Generation Comp. Syst., 2018

Location of Things (LoT): A Review and Taxonomy of Sensors Localization in IoT Infrastructure.
IEEE Communications Surveys and Tutorials, 2018

Adaptive routing protocol for urban vehicular networks to support sellers and buyers on wheels.
Computer Networks, 2018

Secure and Sustainable Load Balancing of Edge Data Centers in Fog Computing.
IEEE Communications Magazine, 2018

Building a Sustainable Internet of Things: Energy-Efficient Routing Using Low-Power Sensors Will Meet the Need.
IEEE Consumer Electronics Magazine, 2018

Secure Computing for the Internet of Things and Network Edges: Protecting Communication in the Worldwide Network of Devices.
IEEE Consumer Electronics Magazine, 2018

The Blockchain as a Decentralized Security Framework [Future Directions].
IEEE Consumer Electronics Magazine, 2018

Everything You Wanted to Know About the Blockchain: Its Promise, Components, Processes, and Problems.
IEEE Consumer Electronics Magazine, 2018

A Computing Perspective of Quantum Cryptography [Energy and Security].
IEEE Consumer Electronics Magazine, 2018

A Novel Collaborative Task Offloading Scheme for Secure and Sustainable Mobile Cloudlet Networks.
IEEE Access, 2018

Energy-Efficient Deployment of Edge Dataenters for Mobile Clouds in Sustainable IoT.
IEEE Access, 2018

IoT-Based Wireless Polysomnography Intelligent System for Sleep Monitoring.
IEEE Access, 2018

Building Scalable Cyber-Physical-Social Networking Infrastructure Using IoT and Low Power Sensors.
IEEE Access, 2018

Towards System Implementation and Data Analysis for Crowdsensing Based Outdoor RSS Maps.
IEEE Access, 2018

Edge of Things: The Big Picture on the Integration of Edge, IoT and the Cloud in a Distributed Computing Environment.
IEEE Access, 2018

Blockchain Based Secured Identity Authentication and Expeditious Revocation Framework for Vehicular Networks.
Proceedings of the 17th IEEE International Conference On Trust, 2018

A Comparative Study of Machine Learning Techniques for Credit Card Fraud Detection Based on Time Variance.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2018

S2R: Service Trading Based Response Time Optimization in Mobile Edge Computing.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018

Introducing Network Multi-Tenancy for Cloud-Based Enterprise Resource Planning: An IoT Application.
Proceedings of the 27th IEEE International Symposium on Industrial Electronics, 2018

A fast and self-adaptive on-line learning detection system.
Proceedings of the INNS Conference on Big Data and Deep Learning 2018, 2018

Building Scalable Mobile Edge Computing by Enhancing Quality of Services.
Proceedings of the 2018 International Conference on Innovations in Information Technology (IIT), 2018

A Chain Topology for Efficient Monitoring of Food Grain Storage using Smart Sensors.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

CTOM: Collaborative Task Offloading Mechanism for Mobile Cloudlet Networks.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

A Novel Hybrid Authentication Model for Geo Location Oriented Routing in Dynamic Wireless Mesh Networks.
Proceedings of the 51st Hawaii International Conference on System Sciences, 2018

Graph-Based Symmetric Crypto-System for Data Confidentiality.
Proceedings of the IEEE Global Communications Conference, 2018

Software Defined Network Based Fault Detection in Industrial Wireless Sensor Networks.
Proceedings of the IEEE Global Communications Conference, 2018

First Score Auction for Pricing-Based Resource Selection in Vehicular Cloud.
Proceedings of the 2018 International Conference on Computer, 2018

A Fingerprinting Technique for Identification of Wireless Devices.
Proceedings of the 2018 International Conference on Computer, 2018

Probabilistic RSS Fingerprinting for Localization in Smart Platforms.
Proceedings of the International Conference on Information Technology, 2018

VM Selection using DVFS Technique to Minimize Energy Consumption in Cloud System.
Proceedings of the International Conference on Information Technology, 2018

Stock market analysis using social networks.
Proceedings of the Australasian Computer Science Week Multiconference, 2018

2017
Erratum to: Rendezvous based routing protocol for wireless sensor networks with mobile sink.
The Journal of Supercomputing, 2017

Rendezvous based routing protocol for wireless sensor networks with mobile sink.
The Journal of Supercomputing, 2017

DLSeF: A Dynamic Key-Length-Based Efficient Real-Time Security Verification Model for Big Data Stream.
ACM Trans. Embedded Comput. Syst., 2017

A dynamic prime number based efficient security mechanism for big sensing data streams.
J. Comput. Syst. Sci., 2017

Big-Sensing-Data Curation for the Cloud is Coming: A Promise of Scalable Cloud-Data-Center Mitigation for Next-Generation IoT and Wireless Sensor Networks.
IEEE Consumer Electronics Magazine, 2017

Building Security Perimeters to Protect Network Systems Against Cyber Threats [Future Directions].
IEEE Consumer Electronics Magazine, 2017

MSGR: A Mode-Switched Grid-Based Sustainable Routing Protocol for Wireless Sensor Networks.
IEEE Access, 2017

Secure-GLOR: An Adaptive Secure Routing Protocol for Dynamic Wireless Mesh Networks.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Privacy-Preserving Detection of Statically Mutually Exclusive Roles Constraints Violation in Interoperable Role-Based Access Control.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Fast Deformable Model for Pedestrian Detection with Haar-like features.
Proceedings of the 2017 IEEE Symposium Series on Computational Intelligence, 2017

IoT and Big Data: An Architecture with Data Flow and Security Issues.
Proceedings of the Cloud Infrastructures, Services, and IoT Systems for Smart Cities, 2017

Deep Learning Based Face Recognition with Sparse Representation Classification.
Proceedings of the Neural Information Processing - 24th International Conference, 2017

Metaheuristic Solutions for Solving Controller Placement Problem in SDN-based WAN Architecture.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

A Synchronized Shared Key Generation Method for Maintaining End-to-End Security of Big Data Streams.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

Private matching and set intersection computation in multi-agent and industrial control systems.
Proceedings of the 12th Annual Conference on Cyber and Information Security Research, 2017

Deadline-constraint services in cloud with heterogeneous servers.
Proceedings of the International Conference on Computer, 2017

Time efficient dynamic threshold-based load balancing technique for Cloud Computing.
Proceedings of the International Conference on Computer, 2017

2016
Threats to Networking Cloud and Edge Datacenters in the Internet of Things.
IEEE Cloud Computing, 2016

A Secure Big Data Stream Analytics Framework for Disaster Management on the Cloud.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

2015
A Dynamic Key Length Based Approach for Real-Time Security Verification of Big Sensing Data Stream.
Proceedings of the Web Information Systems Engineering - WISE 2015, 2015

DPBSV - An Efficient and Secure Scheme for Big Sensing Data Stream.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Efficient Algorithms for Social Network Coverage and Reach.
Proceedings of the 2015 IEEE International Congress on Big Data, New York City, NY, USA, June 27, 2015

2014
ADCS: An adaptive data collection scheme in vehicular networks using 3G/LTE.
Proceedings of the International Conference on Connected Vehicles and Expo, 2014


  Loading...