Parikshit Mahalle

Orcid: 0000-0001-5474-6826

According to our database1, Parikshit Mahalle authored at least 37 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
The hybrid framework of ensemble technique in machine learning for phishing detection.
Int. J. Inf. Comput. Secur., 2023

2022
Multi-objective Optimization with FEC Polar Code for Bandwidth Efficient Mobile Network Using Response Surface Methodology.
Wirel. Pers. Commun., 2022

Research perspective on energy-efficient protocols in IoT: emerging development of green IoT.
Int. J. Pervasive Comput. Commun., 2022

2021
Preface: Special Section: Special Issue on Next Generation Acoustic Signal Processing (Articles 1-9).
Int. J. Speech Technol., 2021

A proposed approach for Digital Identity management using Self Sovereign Identity.
Int. J. Next Gener. Comput., 2021

Word Sense Disambiguation for Large Documents Using Neural Network Model.
Proceedings of the 12th International Conference on Computing Communication and Networking Technologies, 2021

2020
Context-Aware Pervasive Systems and Applications
Intelligent Systems Reference Library 169, Springer, ISBN: 978-981-32-9951-1, 2020

Forecasting Models for Coronavirus Disease (COVID-19): A Survey of the State-of-the-Art.
SN Comput. Sci., 2020

Revisited COVID-19 Mortality and Recovery Rates: Are we Missing Recovery Time Period?
J. Medical Syst., 2020

Density-Based Clustering Method for Trends Analysis Using Evolving Data Stream.
Int. J. Synth. Emot., 2020

Statistical Study of Machine Learning Algorithms Using Parametric and Non-Parametric Tests: A Comparative Analysis and Recommendations.
Int. J. Ambient Comput. Intell., 2020

2018
Trust-Based Access Control in Multi-role Environment of Online Social Networks.
Wirel. Pers. Commun., 2018

A Novel Key Management Scheme for Next Generation Internet: An Attack Resistant and Scalable Approach.
Int. J. Inf. Syst. Model. Des., 2018

Data Stream Clustering Techniques, Applications, and Models: Comparative Analysis and Discussion.
Big Data Cogn. Comput., 2018

2017
Long-Term and Short-Term Traffic Forecasting Using Holt-Winters Method: A Comparability Approach with Comparable Data in Multiple Seasons.
Int. J. Synth. Emot., 2017

Intelligent Wildlife Tracking Using Ubiquitous Technological Suite.
Int. J. Synth. Emot., 2017

Mathematical Representation of Quality of Service (QoS) Parameters for Internet of Things (IoT).
Int. J. Rough Sets Data Anal., 2017

Lightweight Key Management for Adaptive Addressing in Next Generation Internet.
Int. J. Ambient Comput. Intell., 2017

A packet priority intimation-based data transmission for congestion free traffic management in wireless sensor networks.
Comput. Electr. Eng., 2017

2016
Fuzzy-based fault-tolerant low-energy adaptive clustering hierarchy routing protocol for wireless sensor network.
Int. J. Wirel. Mob. Comput., 2016

Trust Management Model based on Fuzzy Approach for Ubiquitous Computing.
Int. J. Ambient Comput. Intell., 2016

2015
Communication Protocol and Queuing Theory-based Modelling for the Internet of Things.
J. ICT Stand., 2015

Confidentiality in Online Social Networks; ATrust-based Approach.
J. Cyber Secur. Mobil., 2015

Collaborative Mutual Identity Establishment (CMIE) for the future internet.
Int. J. Pervasive Comput. Commun., 2015

2014
Proposed Identity and Access Management in Future Internet (IAMFI): A Behavioral Modeling Approach.
J. ICT Stand., 2014

Threshold Cryptography-based Group Authentication (TCGA) scheme for the Internet of Things (IoT).
Proceedings of the 4th International Conference on Wireless Communications, 2014

2013
Efficient and scalable location and mobility management of EPCglobal RFID system.
Proceedings of the 16th International Symposium on Wireless Personal Multimedia Communications, 2013

Group authentication using paillier threshold cryptography.
Proceedings of the Tenth International Conference on Wireless and Optical Communications Networks, 2013

A fuzzy approach to trust based access control in internet of things.
Proceedings of the 3rd International Conference on Wireless Communications, 2013

Proposed Threshold Based Certificate Revocation in Mobile Ad Hoc Networks.
Proceedings of the Intelligent Computing, 2013

2012
Identity Authentication and Capability Based Access Control (IACAC) for the Internet of Things.
J. Cyber Secur. Mobil., 2012

Identity establishment and capability based access control (IECAC) scheme for Internet of Things.
Proceedings of the 15th International Symposium on Wireless Personal Multimedia Communications, 2012

Capability-based access control delegation model on the federated IoT network.
Proceedings of the 15th International Symposium on Wireless Personal Multimedia Communications, 2012

Identity driven capability based access control (ICAC) scheme for the Internet of Things.
Proceedings of the IEEE International Conference on Advanced Networks and Telecommuncations Systems, 2012

2010
Identity Management Framework towards Internet of Things (IoT): Roadmap and Key Challenges.
Proceedings of the Recent Trends in Network Security and Applications, 2010

Security for Contactless Smart Cards Using Cryptography.
Proceedings of the Recent Trends in Network Security and Applications, 2010

Proposed Security Model and Threat Taxonomy for the Internet of Things (IoT).
Proceedings of the Recent Trends in Network Security and Applications, 2010


  Loading...