Krishna Asawa

Orcid: 0000-0002-2968-8510

According to our database1, Krishna Asawa authored at least 39 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Detection and mitigation of link flooding-based DDoS attacks on a software defined network using network function virtualisation.
Int. J. Commun. Networks Distributed Syst., 2024

Mirage: Defense against CrossPath Attacks in Software Defined Networks.
CoRR, 2024

2023
Detecting DDoS Attacks in Software Defined Networks (SDNs) with Random Forests.
Proceedings of the 2023 Fifteenth International Conference on Contemporary Computing, 2023

2022
Distributed learning algorithm with synchronized epochs for dynamic spectrum access in unknown environment using multi-user restless multi-armed bandit.
J. King Saud Univ. Comput. Inf. Sci., 2022

2021
An efficient prefix based labelling scheme for dynamic update of XML documents.
Int. J. Adv. Intell. Paradigms, 2021

Non-goal oriented dialogue agents: state of the art, dataset, and evaluation.
Artif. Intell. Rev., 2021

2020
Decentralized Learning for Opportunistic Spectrum Access: Multiuser Restless Multiarmed Bandit Formulation.
IEEE Syst. J., 2020

Resilient against spoofing in 6LoWPAN networks by temporary-private IPv6 addresses.
Peer-to-Peer Netw. Appl., 2020

Spectral Learning of Semantic Units in a Sentence Pair to Evaluate Semantic Textual Similarity.
Proceedings of the Big Data Analytics - 8th International Conference, 2020

2019
Modeling of emotion elicitation conditions for a cognitive-emotive architecture.
Cogn. Syst. Res., 2019

Performance study of node wakeup rate on the privacy enabled addressing scheme in duty-cycled 6LoWPAN.
Proceedings of the 2019 Twelfth International Conference on Contemporary Computing, 2019

Recent Advances and Challenges in Design of Non-goal-Oriented Dialogue Systems.
Proceedings of the Big Data Analytics - 7th International Conference, 2019

2018
A combined path index for efficient processing of XML queries.
Int. J. Metadata Semant. Ontologies, 2018

CBSL - A Compressed Binary String Labeling Scheme for Dynamic Update of XML documents.
J. Comput. Inf. Technol., 2018

Privacy enabled disjoint and dynamic address auto-configuration protocol for 6Lowpan.
Ad Hoc Networks, 2018

Mitigation and Detection of DDoS Attacks in Software Defined Networks.
Proceedings of the 2018 Eleventh International Conference on Contemporary Computing, 2018

2017
Brain Computer Interface for Micro-controller Driven Robot Based on Emotiv Sensors.
Int. J. Interact. Multim. Artif. Intell., 2017

Modeling and analyses of IP spoofing attack in 6LoWPAN network.
Comput. Secur., 2017

New Path Based Index Structure for Processing CAS Queries over XML Database.
J. Comput. Inf. Technol., 2017

Impact analysis of rank attack with spoofed IP on routing in 6LoWPAN network.
Proceedings of the Tenth International Conference on Contemporary Computing, 2017

Performance evaluation of various data structures in building efficient indexing schemes for XML documents.
Proceedings of the Tenth International Conference on Contemporary Computing, 2017

2016
Programming an expressive autonomous agent.
Expert Syst. Appl., 2016

New Architecture for Dynamic Spectrum Allocation in Cognitive Heterogeneous Network using Self Organizing Map.
CoRR, 2016

2015
EMIA: Emotion Model for Intelligent Agent.
J. Intell. Syst., 2015

Emotional Computer: Design Challenges and Opportunities.
Int. J. Synth. Emot., 2015

Formalization of Event Perception and Event Appraisal Process.
Int. J. Interact. Multim. Artif. Intell., 2015

2014
LPLX-lexicographic-based persistent labelling scheme of XML documents for dynamic update.
Int. J. Web Sci., 2014

Recognition of Emotions using Energy Based Bimodal Information Fusion and Correlation.
Int. J. Interact. Multim. Artif. Intell., 2014

Building a 256-bit hash function on a stronger MD variant.
Central Eur. J. Comput. Sci., 2014

2013
Enhancing the Security Level of SHA-1 by Replacing the MD Paradigm.
J. Comput. Inf. Technol., 2013

Stylometric Analysis for Authorship Attribution on Twitter.
Proceedings of the Big Data Analytics - Second International Conference, 2013

2012
Crypto-Precision: Testing Tool for Hash Function.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2012

Emotion Analysis of the Text Using Fuzzy Affect Typing over Emotions.
Proceedings of the Context-Aware Systems and Applications - First International Conference, 2012

HMM Modeling of User Mood through Recognition of Vocal Emotions.
Proceedings of the Context-Aware Systems and Applications - First International Conference, 2012

Recognition of vocal emotions from acoustic profile.
Proceedings of the 2012 International Conference on Advances in Computing, 2012

Upper body pose recognition and classifier.
Proceedings of the 5th ACM COMPUTE Conference: Intelligent & scalable system technologies, 2012

2010
Close Clustering Based Automated Color Image Annotation
CoRR, 2010

A Secure Hash Function MD-192 With Modified Message Expansion
CoRR, 2010

Adaptive pragmatic analysis of natural language.
Proceedings of the First International Conference on Intelligent Interactive Technologies and Multimedia, 2010


  Loading...