Manoj Misra
Orcid: 0000-0002-7288-7777
  According to our database1,
  Manoj Misra
  authored at least 109 papers
  between 1997 and 2025.
  
  
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
  2025
    IEEE Trans. Dependable Secur. Comput., 2025
    
  
    J. Comput. Inf. Syst., 2025
    
  
    Comput. Electr. Eng., 2025
    
  
DBFFL - Defending Against Dynamic Poisoning Attacks in Federated Learning in 5G and Beyond Systems.
    
  
    Proceedings of the IEEE International Conference on Communications, 2025
    
  
  2024
    Int. J. Inf. Sec., August, 2024
    
  
    Trans. Emerg. Telecommun. Technol., January, 2024
    
  
    Proceedings of the International Wireless Communications and Mobile Computing, 2024
    
  
  2023
Symmetric key-based authentication and key agreement scheme resistant against semi-trusted third party for fog and dew computing.
    
  
    J. Supercomput., July, 2023
    
  
    IEEE Trans. Sustain. Comput., 2023
    
  
    IEEE Trans. Ind. Informatics, 2023
    
  
    Proceedings of the 22nd IEEE International Conference on Trust, 2023
    
  
    Proceedings of the 20th IEEE Consumer Communications & Networking Conference, 2023
    
  
  2022
    Comput. Networks, 2022
    
  
Forensic Analysis and Detection of Spoofing Based Email Attack Using Memory Forensics and Machine Learning.
    
  
    Proceedings of the Security and Privacy in Communication Networks, 2022
    
  
    Proceedings of the IEEE International Conference on Communications, 2022
    
  
    Proceedings of the IEEE Global Communications Conference, 2022
    
  
  2021
    Proceedings of the 13th International Conference on COMmunication Systems & NETworkS, 2021
    
  
  2020
    Proceedings of the Security and Trust Management - 16th International Workshop, 2020
    
  
Secure and User Efficient EAP-based Authentication Protocol for IEEE 802.11 Wireless LANs.
    
  
    Proceedings of the 17th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2020
    
  
    Proceedings of the ICCNS 2020: The 10th International Conference on Communication and Network Security, 2020
    
  
  2018
A (n, n) threshold non-expansible XOR based visual cryptography with unique meaningful shares.
    
  
    Signal Process., 2018
    
  
Just process me, without knowing me: a secure encrypted domain processing based on Shamir secret sharing and POB number system.
    
  
    Multim. Tools Appl., 2018
    
  
Secure authentication scheme to thwart RT MITM, CR MITM and malicious browser extension based phishing attacks.
    
  
    J. Inf. Secur. Appl., 2018
    
  
    Proceedings of the IEEE 8th Annual Computing and Communication Workshop and Conference, 2018
    
  
  2017
    Signal Process. Image Commun., 2017
    
  
SmartITS: Smartphone-based identification and tracking using seamless indoor-outdoor localization.
    
  
    J. Netw. Comput. Appl., 2017
    
  
Towards scalable and load-balanced mobile agents-based data aggregation for wireless sensor networks.
    
  
    Comput. Electr. Eng., 2017
    
  
    Proceedings of the 18th International Conference on Parallel and Distributed Computing, 2017
    
  
Smart pilgrim: A mobile-sensor-cloud based system to safeguard pilgrims through smart environment.
    
  
    Proceedings of the Tenth International Conference on Contemporary Computing, 2017
    
  
An Improved Smartphone-Based Non-Participatory Crowd Monitoring System in Smart Environments.
    
  
    Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017
    
  
    Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017
    
  
    Proceedings of the 2017 on Multimedia Privacy and Security, 2017
    
  
  2016
    Secur. Commun. Networks, 2016
    
  
Improving the accuracy of Search Engine based anti-phishing solutions using lightweight features.
    
  
    Proceedings of the 11th International Conference for Internet Technology and Secured Transactions, 2016
    
  
  2015
An Energy Efficient Distributed Approach-Based Agent Migration Scheme for Data Aggregation in Wireless Sensor Networks.
    
  
    J. Inf. Process. Syst., 2015
    
  
    Proceedings of the Tenth IEEE International Conference on Intelligent Sensors, 2015
    
  
  2014
Energy and trust aware mobile agent migration protocol for data aggregation in wireless sensor networks.
    
  
    J. Netw. Comput. Appl., 2014
    
  
Distributed Information Extraction in Wireless Sensor Networks using Multiple Software Agents with Dynamic Itineraries.
    
  
    KSII Trans. Internet Inf. Syst., 2014
    
  
    Int. J. Netw. Secur., 2014
    
  
Minimum mutable checkpoint-based coordinated checkpointing protocol for mobile distributed systems.
    
  
    Int. J. Commun. Networks Distributed Syst., 2014
    
  
RaMaN: A dynamic clustering protocol resilient against colluded role-manipulability and node replication attacks.
    
  
    Proceedings of the International Conference on High Performance Computing & Simulation, 2014
    
  
  2013
Energy efficient data gathering using prediction-based filtering in wireless sensor networks.
    
  
    Int. J. Inf. Commun. Technol., 2013
    
  
A framework for alignment-free methods to perform similarity analysis of biological sequence.
    
  
    Proceedings of the Sixth International Conference on Contemporary Computing, 2013
    
  
  2012
    Int. J. Netw. Secur., 2012
    
  
Dynamic and Auto Responsive Solution for Distributed Denial-of-Service Attacks Detection in ISP Network
    
  
    CoRR, 2012
    
  
An ISP Level Solution to Combat DDoS Attacks using Combined Statistical Based Approach
    
  
    CoRR, 2012
    
  
Categorising Context and Using Short Term Contextual Information to Obtain Long Term Context.
    
  
    Proceedings of the 11th IEEE International Conference on Trust, 2012
    
  
An efficient fuzzy controller based technique for network traffic classification to improve QoS.
    
  
    Proceedings of the 5th International Conference of Security of Information and Networks, 2012
    
  
  2011
    Int. J. Mob. Comput. Multim. Commun., 2011
    
  
    Proceedings of the ICWET '11 International Conference & Workshop on Emerging Trends in Technology, Mumbai, Maharashtra, India, February 25, 2011
    
  
Performance evaluation of agent and non-agent based data dissemination protocols for wireless sensor networks.
    
  
    Proceedings of the 17th IEEE International Conference on Networks, 2011
    
  
    Proceedings of the 2011 International Conference on Communication, 2011
    
  
    Proceedings of the 2011 International Conference on Communication, 2011
    
  
    Proceedings of the Contemporary Computing - 4th International Conference, 2011
    
  
An energy balanced mobile agents based data dissemination protocol for wireless sensor networks.
    
  
    Proceedings of the 1st International Conference on Wireless Technologies for Humanitarian Relief, 2011
    
  
  2010
An AODV Based QoS Routing Protocol for Delay Sensitive Applications in Mobile Ad Hoc Networks.
  
    J. Digit. Inf. Manag., 2010
    
  
    Int. J. Multim. Intell. Secur., 2010
    
  
Prioritised Predicted Region based Cache Replacement Policy for location dependent data in mobile environment.
    
  
    Int. J. Ad Hoc Ubiquitous Comput., 2010
    
  
    Int. J. Ad Hoc Ubiquitous Comput., 2010
    
  
Data filtering and dynamic sensing for continuous monitoring in wireless sensor networks.
    
  
    Int. J. Auton. Adapt. Commun. Syst., 2010
    
  
    Proceedings of the 3rd International Conference on Security of Information and Networks, 2010
    
  
Trust enhanced secure multi-path routing protocol for detecting and mitigating misbehaving nodes.
    
  
    Proceedings of the ICWET '10 International Conference & Workshop on Emerging Trends in Technology, Mumbai, Maharashtra, India, February 26, 2010
    
  
    Proceedings of the Recent Trends in Network Security and Applications, 2010
    
  
    Proceedings of the 1st Amrita ACM-W Celebration on Women in Computing in India, 2010
    
  
  2009
    Inf. Secur. J. A Glob. Perspect., 2009
    
  
MSTBBN: M-way Search Tree Based Base Station to Node Communication Protocol for Wireless Sensor Networks.
    
  
    Proceedings of the First International Conference on Networks and Communications, 2009
    
  
  2008
A Predicted Region based Cache Replacement Policy for Location Dependent Data in Mobile Environment.
    
  
    Int. J. Commun. Netw. Syst. Sci., 2008
    
  
    Distributed Parallel Databases, 2008
    
  
Tuning Data Reporting and Sensing for Continuous Monitoring in Wireless Sensor Networks.
    
  
    Proceedings of the 2008 IEEE International Performance, 2008
    
  
    Proceedings of the 16th International Conference on Networks, 2008
    
  
FVBA: A combined statistical approach for low rate degrading and high bandwidth disruptive DDoS attacks detection in ISP domain.
    
  
    Proceedings of the 16th International Conference on Networks, 2008
    
  
FTEP: A fault tolerant election protocol for multi-level clustering in homogeneous wireless sensor networks.
    
  
    Proceedings of the 16th International Conference on Networks, 2008
    
  
    Proceedings of the Third International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2008), 2008
    
  
  2007
    Wirel. Pers. Commun., 2007
    
  
    Wirel. Commun. Mob. Comput., 2007
    
  
On the Design of Adaptive and Decentralized Load Balancing Algorithms with Load Estimation for Computational Grid Environments.
    
  
    IEEE Trans. Parallel Distributed Syst., 2007
    
  
    Mob. Inf. Syst., 2007
    
  
A Review of Quality of Service (QoS) Route Provisioning in Mobile Ad Hoc Networks.
  
    J. Digit. Inf. Manag., 2007
    
  
    Int. J. Ad Hoc Ubiquitous Comput., 2007
    
  
    Int. J. Ad Hoc Ubiquitous Comput., 2007
    
  
A weighted cache replacement policy for location dependent data in mobile environments.
    
  
    Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), 2007
    
  
    Proceedings of the Information Systems Security, Third International Conference, 2007
    
  
    Proceedings of the High Performance Computing, 2007
    
  
  2006
    Int. J. Commun. Syst., 2006
    
  
    Proceedings of the Tenth International Database Engineering and Applications Symposium (IDEAS 2006), 2006
    
  
    Proceedings of the 12th International Conference on Parallel and Distributed Systems, 2006
    
  
    Proceedings of the Information Systems Security, Second International Conference, 2006
    
  
    Proceedings of the First IEEE International Conference on Digital Information Management (ICDIM), 2006
    
  
Estimation Based Load Balancing Algorithm for Data-Intensive Heterogeneous Grid Environments.
    
  
    Proceedings of the High Performance Computing, 2006
    
  
    Proceedings of the First International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2006), 2006
    
  
    Proceedings of the Database Technologies 2006, 2006
    
  
  2005
    J. Digit. Inf. Manag., 2005
    
  
Strategies for Cache Invalidation of Location Dependent Data in Mobile Environment.
  
    Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2005
    
  
    Proceedings of the Distributed Computing, 2005
    
  
    Proceedings of the Distributed Computing, 2005
    
  
Performance Comparison of Majority Voting with ROWA Replication Method over PlanetLab.
    
  
    Proceedings of the Distributed Computing, 2005
    
  
Performance Evaluation of Secure Concurrency Control Algorithm for Multilevel Secure Distributed Database Systems.
    
  
    Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005
    
  
A New Commit Protocol for Distributed Real-Time Database Systems.
  
    Proceedings of the IASTED International Conference on Databases and Applications, 2005
    
  
  2004
    Proceedings of the Distributed Computing and Internet Technology, 2004
    
  
    Proceedings of the High Performance Computing, 2004
    
  
  2002
    Proceedings of the Computer Performance Evaluation, 2002
    
  
  1999
    Perform. Evaluation, 1999
    
  
  1997