Rashmi Sahay

Orcid: 0000-0003-4713-069X

According to our database1, Rashmi Sahay authored at least 13 papers between 2018 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Investigating Vulnerabilities of Information Solicitation Process in RPL-Based IoT Networks.
Proceedings of the Evolution in Computational Intelligence, 2023

2022
A holistic framework for prediction of routing attacks in IoT-LLNs.
J. Supercomput., 2022

Correction: Mitigating the worst parent attack in RPL based internet of things.
Clust. Comput., 2022

Mitigating the worst parent attack in RPL based internet of things.
Clust. Comput., 2022

Comparative Analysis of Machine Learning Models for Customer Segmentation.
Proceedings of the Intelligent Systems Design and Applications - 22nd International Conference on Intelligent Systems Design and Applications (ISDA 2022) Held December 12-14, 2022, 2022

2021
A novel Network Partitioning Attack against Routing Protocol in Internet of Things.
Ad Hoc Networks, 2021

IB-RPL: Embedding Isolation and Blacklisting of Malicious Nodes in RPL for Securing IoT-LLNs.
Proceedings of the IEEE International Conference on Advanced Networks and Telecommunications Systems, 2021

2020
A novel blockchain based framework to secure IoT-LLNs against routing attacks.
Computing, 2020

A Feedforward Neural Network based Model to Predict Sub-optimal Path Attack in IoT-LLNs.
Proceedings of the 20th IEEE/ACM International Symposium on Cluster, 2020

2018
Attack graph - Based vulnerability assessment of rank property in RPL-6LOWPAN in IoT.
Proceedings of the 4th IEEE World Forum on Internet of Things, 2018

Traffic Convergence Detection in IoT LLNs: A Multilayer Perceptron based Mechanism.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2018

Efficient Framework for Detection of Version Number Attack in Internet of Things.
Proceedings of the Intelligent Systems Design and Applications, 2018

Exponential Smoothing based Approach for Detection of Blackhole Attacks in IoT.
Proceedings of the IEEE International Conference on Advanced Networks and Telecommunications Systems, 2018


  Loading...