Deepika Kukreja

According to our database1, Deepika Kukreja authored at least 13 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
RLET: a lightweight model for ubiquitous multi-class intrusion detection in sustainable and secured smart environment.
Int. J. Inf. Sec., February, 2024

2023
ACCO: adaptive congestion control protocol for opportunistic networks.
Int. J. Wirel. Mob. Comput., 2023

2022
Blockchain-enabled access control to prevent cyber attacks in IoT: Systematic literature review.
Frontiers Big Data, 2022

2020
Security vs. Flexibility: Striking a Balance in the Pandemic Era.
Proceedings of the 14th IEEE International Conference on Advanced Networks and Telecommunications Systems, 2020

2019
Establishing Reliability for Efficient Routing in Opportunistic Networks.
Scalable Comput. Pract. Exp., 2019

Supernode routing: a grid-based message passing scheme for sparse opportunistic networks.
J. Ambient Intell. Humaniz. Comput., 2019

GASER: genetic algorithm-based secure and energy aware routing protocol for sparse mobile ad hoc networks.
Int. J. Adv. Intell. Paradigms, 2019

Securing ad hoc networks using energy efficient and distributed trust-based intrusion detection system.
Int. J. Adv. Intell. Paradigms, 2019

2018
Power aware malicious nodes detection for securing MANETs against packet forwarding misbehavior attack.
J. Ambient Intell. Humaniz. Comput., 2018

Poisson's probability-based Q-Routing techniques for message forwarding in opportunistic networks.
Int. J. Commun. Syst., 2018

2014
Power Aware and Secure Dynamic Source Routing Protocol in Mobile Ad Hoc Networks.
Proceedings of the Security in Computing and Communications, 2014

Enhancing the Security of Dynamic Source Routing Protocol Using Energy Aware and Distributed Trust Mechanism in MANETs.
Proceedings of the Intelligent Distributed Computing, 2014

2012
Analytical models for trust based routing protocols in wireless ad hoc networks.
ACM SIGSOFT Softw. Eng. Notes, 2012


  Loading...