Rahul Saha

Orcid: 0000-0003-3921-9512

According to our database1, Rahul Saha authored at least 54 papers between 2011 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
GREPHRO: Nature-inspired optimization duo for Internet-of-Things.
Internet Things, April, 2024

PREVIR: Fortifying Vehicular Networks Against Denial of Service Attacks.
IEEE Access, 2024

2023
BENIGREEN: Blockchain-Based Energy-Efficient Privacy-Preserving Scheme for Green IoT.
IEEE Internet Things J., September, 2023

PIGNUS: A Deep Learning model for IDS in industrial internet-of-things.
Comput. Secur., September, 2023

COUNT: Blockchain framework for resource accountability in e-healthcare.
Comput. Commun., September, 2023

A Blockchain Framework in Post-Quantum Decentralization.
IEEE Trans. Serv. Comput., 2023

Adaptive Intrusion Detection in Edge Computing Using Cerebellar Model Articulation Controller and Spline Fit.
IEEE Trans. Serv. Comput., 2023

Improved aquila optimization-based parameter evaluation framework and meta-heuristic algorithm in radio-over-fiber SpatialMux multi-input multi-output long-term evolution system.
Int. J. Commun. Syst., 2023

LLMSTEP: LLM proofstep suggestions in Lean.
CoRR, 2023

A New Approach Towards Autoformalization.
CoRR, 2023

Enhancement of Security in GFDM Using Ebola-Optimized Joint Secure Compressive Sensing Encryption and Symbol Scrambling Model.
Proceedings of the 3rd International Conference on Artificial Intelligence and Computer Vision, 2023

2022
DHACS: Smart Contract-Based Decentralized Hybrid Access Control for Industrial Internet-of-Things.
IEEE Trans. Ind. Informatics, 2022

A detailed survey of denial of service for IoT and multimedia systems: Past, present and futuristic development.
Multim. Tools Appl., 2022

A survey and taxonomy of consensus protocols for blockchains.
J. Syst. Archit., 2022

A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions.
J. Netw. Comput. Appl., 2022

A survey on security challenges and solutions in the IOTA.
J. Netw. Comput. Appl., 2022

Internet of Things Framework for Oxygen Saturation Monitoring in COVID-19 Environment.
IEEE Internet Things J., 2022

Blockchain-Based Data Storage With Privacy and Authentication in Internet of Things.
IEEE Internet Things J., 2022

Machine and deep learning amalgamation for feature extraction in Industrial Internet-of-Things.
Comput. Electr. Eng., 2022

DeBot: A deep learning-based model for bot detection in industrial internet-of-things.
Comput. Electr. Eng., 2022

Machine and Deep Learning Solutions for Intrusion Detection and Prevention in IoTs: A Survey.
IEEE Access, 2022

Stopping Floods with Buckets: Attack and Countermeasure for IOTA Autopeering.
Proceedings of the IEEE International Symposium on Measurements & Networking, 2022

PoSC: Combined Score for Consensus in Intemet-of-Things Applications.
Proceedings of the Fourth International Conference on Blockchain Computing and Applications, 2022

Analog and Digital RoF Spatial Mux MIMO-LTE System based A2 (arithmetic Aquila) optimization model for 5G network.
Proceedings of the Algorithms, Computing and Mathematics Conference 2022 (ACM 2022), Hybrid Event, Chennai, India, August 29, 2022

2021
The Blockchain Solution for the Security of Internet of Energy and Electric Vehicle Interface.
IEEE Trans. Veh. Technol., 2021

Adaptive classifier-based intrusion detection system using logistic regression and Euclidean distance on network probe vectors in resource constrained networks.
Int. J. Inf. Comput. Secur., 2021

Internet-of-Forensic (IoF): A blockchain based digital forensics framework for IoT applications.
Future Gener. Comput. Syst., 2021

A secure localization scheme based on trust assessment for WSNs using blockchain technology.
Future Gener. Comput. Syst., 2021

LiSP-XK: Extended Light-Weight Signcryption for IoT in Resource-Constrained Environments.
IEEE Access, 2021

A Taxonomy of Security Issues in Industrial Internet-of-Things: Scoping Review for Existing Solutions, Future Implications, and Research Challenges.
IEEE Access, 2021

Knocking on Tangle's Doors: Security Analysis of IOTA Ports.
Proceedings of the 2021 IEEE International Conference on Blockchain, 2021

Towards An Enhanced Reputation System for IOTA's Coordicide.
Proceedings of the Third International Conference on Blockchain Computing and Applications, 2021

2020
A Privacy-Preserving Secure Framework for Electric Vehicles in IoT Using Matching Market and Signcryption.
IEEE Trans. Veh. Technol., 2020

A Lattice Signcrypted Secured Localization in Wireless Sensor Networks.
IEEE Syst. J., 2020

A Lightweight Signcryption Method for Perception Layer in Internet-of-Things.
J. Inf. Secur. Appl., 2020

A Novel Framework for Fog Computing: Lattice-Based Secured Framework for Cloud Interface.
IEEE Internet Things J., 2020

Decentralized Accessibility of e-commerce Products through Blockchain Technology.
CoRR, 2020

A Privacy Preserving Distributed Ledger Framework for Global Human Resource Record Management: The Blockchain Aspect.
IEEE Access, 2020

CASCF: Certificateless Aggregated SignCryption Framework for Internet-of-Things Infrastructure.
IEEE Access, 2020

2019
Improved Location Estimation in Wireless Sensor Networks Using a Vector-Based Swarm Optimized Connected Dominating Set.
Sensors, 2019

Energy Efficient Range-Free Localization Algorithm for Wireless Sensor Networks.
Sensors, 2019

Proof-of-Work Consensus Approach in Blockchain Technology for Cloud and Fog Computing Using Maximization-Factorization Statistics.
IEEE Internet Things J., 2019

Privacy Ensured ${e}$ -Healthcare for Fog-Enhanced IoT Based Applications.
IEEE Access, 2019

MRC4: A Modified RC4 Algorithm Using Symmetric Random Function Generator for Improved Cryptographic Features.
IEEE Access, 2019

A Novel Trust Evaluation Process for Secure Localization Using a Decentralized Blockchain in Wireless Sensor Networks.
IEEE Access, 2019

2018
RK-AES: An Improved Version of AES Using a New Key Generation Process with Random Keys.
Secur. Commun. Networks, 2018

Optimized Packet Filtering Honeypot with Snooping Agents in Intrusion Detection System for WLAN.
Int. J. Inf. Secur. Priv., 2018

An improved DV-Hop localization with minimum connected dominating set for mobile nodes in wireless sensor networks.
Int. J. Distributed Sens. Networks, 2018

Multidimensional Security Provision for Secure Communication in Vehicular Ad Hoc Networks Using Hierarchical Structure and End-to-End Authentication.
IEEE Access, 2018

2017
A Secure Localization Approach Using Mutual Authentication and Insider Node Validation in Wireless Sensor Networks.
Mob. Inf. Syst., 2017

Securing range free localization against wormhole attack using distance estimation and maximum likelihood estimation in Wireless Sensor Networks.
J. Netw. Comput. Appl., 2017

2015
Probabilistic Relation between Triadic Closure and the Balance of Social Networks in Presence of Influence.
Int. J. Cyber Behav. Psychol. Learn., 2015

2011
Identifying Reference Objects by Hierarchical Clustering in Java Environment
CoRR, 2011

CLAPTCHA- A Novel Captcha.
Proceedings of the Security Technology, 2011


  Loading...