Priyadarsi Nanda

According to our database1, Priyadarsi Nanda
  • authored at least 54 papers between 2000 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
A Sybil attack detection scheme for a forest wildfire monitoring application.
Future Generation Comp. Syst., 2018

2017
PAWN: a payload-based mutual authentication scheme for wireless sensor networks.
Concurrency and Computation: Practice and Experience, 2017

Building Security Perimeters to Protect Network Systems Against Cyber Threats [Future Directions].
IEEE Consumer Electronics Magazine, 2017

Online Social Network Information Forensics: A Survey on Use of Various Tools and Determining How Cautious Facebook Users are?
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Lightweight Authentication Protocol (LAUP) for 6LoWPAN Wireless Sensor Networks.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Secure-GLOR: An Adaptive Secure Routing Protocol for Dynamic Wireless Mesh Networks.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

An Intrusion Detection System Based on Polynomial Feature Correlation Analysis.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Sequential and Unsupervised Document Authorial Clustering Based on Hidden Markov Model.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

2016
Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm.
IEEE Trans. Computers, 2016

Data Sharing in Secure Multimedia Wireless Sensor Networks.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

A Novel Hash-Based File Clustering Scheme for Efficient Distributing, Storing, and Retrieving of Large Scale Health Records.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

An Improvement of Tree-Rule Firewall for a Large Network: Supporting Large Rule Size and Low Delay.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

A Secure Routing Scheme for Wireless Mesh Networks.
Proceedings of the Information Systems Security - 12th International Conference, 2016

Geo-Location Oriented Routing Protocol for Smart Dynamic Mesh Network.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

2015
Detection of Denial-of-Service Attacks Based on Computer Vision Techniques.
IEEE Trans. Computers, 2015

A Sybil Attack Detection Scheme for a Centralized Clustering-Based Hierarchical Network.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Data Mobility Management Model for Active Data Cubes.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Unsupervised Feature Selection Method for Intrusion Detection System.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

sandFOX: secure sandboxed and isolated environment for firefox browser.
Proceedings of the 8th International Conference on Security of Information and Networks, 2015

Resource Utilization Based Dynamic Pricing Approach on Cloud Computing Application.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

SYMPHONY - A Controller Architecture for Hybrid Software Defined Networks.
Proceedings of the Fourth European Workshop on Software Defined Networks, 2015

2014
A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis.
IEEE Trans. Parallel Distrib. Syst., 2014

Intrusion detection method based on nonlinear correlation measure.
IJIPT, 2014

Improving cloud network security using the Tree-Rule firewall.
Future Generation Comp. Syst., 2014

PASCCC: Priority-based application-specific congestion control clustering protocol.
Computer Networks, 2014

Enhancing Big Data Security with Collaborative Intrusion Detection.
IEEE Cloud Computing, 2014

A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment.
Proceedings of the 13th IEEE International Conference on Trust, 2014

A Stateful Mechanism for the Tree-Rule Firewall.
Proceedings of the 13th IEEE International Conference on Trust, 2014

A Novel Feature Selection Approach for Intrusion Detection Data Classification.
Proceedings of the 13th IEEE International Conference on Trust, 2014

2013
TCTM: an evaluation framework for architecture design on wireless sensor networks.
IJSNet, 2013

RePIDS: A multi tier Real-time Payload-based Intrusion Detection System.
Computer Networks, 2013

Energy Evaluation Model for an Improved Centralized Clustering Hierarchical Algorithm in WSN.
Proceedings of the Wired/Wireless Internet Communication - 11th International Conference, 2013

Routing scheme for a Wireless Sensor Network real-time locating system.
Proceedings of the 2013 9th International Wireless Communications and Mobile Computing Conference, 2013

Enhancing Lifetime and Quality of Data in Cluster-Based Hierarchical Routing Protocol for Wireless Sensor Network.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

2012
Triangle-Area-Based Multivariate Correlation Analysis for Effective Denial-of-Service Attack Detection.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Border Gateway Protocol Anomaly Detection Using Failure Quality Control Method.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Evaluation on multivariate correlation analysis based denial-of-service attack detection system.
Proceedings of the First International Conference on Security of Internet of Things, 2012

Tele-monitoring techniques to support recovery at home for survivors of a critical illness.
Proceedings of the IEEE International Symposium on Signal Processing and Information Technology, 2012

Evaluation of billing and charging architecture for the Internet service provisioning.
Proceedings of the International Symposium on Communications and Information Technologies, 2012

Limitation of Listed-Rule Firewall and the Design of Tree-Rule Firewall.
Proceedings of the Internet and Distributed Computing Systems, 2012

2011
An Integrated Model Supporting Billing and QOS in the Internet.
Proceedings of the 12th ACIS International Conference on Software Engineering, 2011

Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis.
Proceedings of the Neural Information Processing - 18th International Conference, 2011

Multivariate Correlation Analysis Technique Based on Euclidean Distance Map for Network Traffic Characterization.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

2010
Intrusion detection using GSAD model for HTTP traffic on web services.
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, 2010

A Two-Tier System for Web Attack Detection Using Linear Discriminant Method.
Proceedings of the Information and Communications Security - 12th International Conference, 2010

2009
A Scalable Architecture Supporting QoS Guarantees Using Traffic Engineering and Policy Based Routing in the Internet.
IJCNS, 2009

Web Service Locating Unit in RFID-Centric Anti-counterfeit System.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2009

Intrusion Detection Using Geometrical Structure.
Proceedings of the Fourth International Conference on Frontier of Computer Science and Technology, 2009

2008
Supporting QoS Guarantees Using Traffic Engineering and Policy Based Routing.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

2007
Quality of Service in Telemedicine.
Proceedings of the First International Conference on the Digital Society (ICDS 2007), 2007

2006
Policy Based QoS Support using BGP Routing.
Proceedings of the 2006 International Conference on Communications in Computing, 2006

2003
Policy Based Architecture for QoS over Differentiated Services Network.
Proceedings of the International Conference on Internet Computing, 2003

2002
Resource Management in Differentiated Services Networks.
Proceedings of the Converged Networking: Data and Real-time Communications over IP, 2002

2000
Intra-domain Bandwidth Management in Differentiated Services Network.
Proceedings of the Proceedings 27th Conference on Local Computer Networks, 2000


  Loading...