Jaidhar C. D.

According to our database1, Jaidhar C. D. authored at least 22 papers between 2012 and 2019.

Collaborative distances:
  • Dijkstra number2 of six.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Enhanced mobility aware routing protocol for Low Power and Lossy Networks.
Wireless Networks, 2019

Experimental analysis of Android malware detection based on combinations of permissions and API-calls.
J. Computer Virology and Hacking Techniques, 2019

Windows malware detection system based on LSVC recommended hybrid features.
J. Computer Virology and Hacking Techniques, 2019

Fuzzy optimised routing metric with mobility support for RPL.
IET Communications, 2019

2018
A Performance Evaluation of Location Prediction Position-Based Routing Using Real GPS Traces for VANET.
Wireless Personal Communications, 2018

Automated multi-level malware detection system based on reconstructed semantic view of executables using machine learning techniques at VMM.
Future Generation Comp. Syst., 2018

Mobility Aware Routing Protocol Based on DIO Message for Low Power and Lossy Networks.
Proceedings of the Intelligent Systems Design and Applications, 2018

A Single Program Multiple Data Algorithm for Feature Selection.
Proceedings of the Intelligent Systems Design and Applications, 2018

On Human Identification Using Running Patterns: A Straightforward Approach.
Proceedings of the Intelligent Systems Design and Applications, 2018

2017
Location prediction algorithm for a nonlinear vehicular movement in VANET using extended Kalman filter.
Wireless Networks, 2017

Leveraging virtual machine introspection with memory forensics to detect and characterize unknown malware using machine learning techniques at hypervisor.
Digital Investigation, 2017

PPRP: Predicted Position Based Routing Protocol Using Kalman Filter for Vehicular Ad-hoc Network.
Proceedings of the 18th International Conference on Distributed Computing and Networking, 2017

Secure data migration between cloud storage systems.
Proceedings of the 2017 International Conference on Advances in Computing, 2017

2016
VMI Based Automated Real-Time Malware Detector for Virtualized Cloud Environment.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2016

2015
EDAGF: Estimation & Direction Aware Greedy Forwarding for Urban Scenario in Vehicular Ad-Hoc Network.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

An Applicability of AODV and OLSR Protocols on IEEE 802.11p for City Road in VANET.
Proceedings of the Internet of Things, Smart Spaces, and Next Generation Networks and Systems, 2015

Execution Time Measurement of Virtual Machine Volatile Artifacts Analyzers.
Proceedings of the 21st IEEE International Conference on Parallel and Distributed Systems, 2015

2013
Robust Smart Card Authentication Scheme for Multi-server Architecture.
Wireless Personal Communications, 2013

Enhanced Time-Bound Ticket-Based Mutual Authentication Scheme for Cloud Computing.
Informatica (Slovenia), 2013

Mechanism for Preventing Registration Flooding Attack in SIP.
Proceedings of the Intelligent Computing, 2013

2012
Secure Key Exchange Scheme for IPTV Broadcasting.
Informatica (Slovenia), 2012

Security Vulnerabilities of User Authentication Scheme Using Smart Card.
Proceedings of the Data and Applications Security and Privacy XXVI, 2012


  Loading...