Srinivas Sampalli

Orcid: 0000-0002-8742-5786

According to our database1, Srinivas Sampalli authored at least 100 papers between 1987 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Systematic Review of IoT Security: Research Potential, Challenges, and Future Directions.
ACM Comput. Surv., May, 2024

Big Data Synthesis and Class Imbalance Rectification for Enhanced Forest Fire Classification Modeling.
Proceedings of the 16th International Conference on Agents and Artificial Intelligence, 2024

2023
Persuasive Strategies and Their Implementations in Mobile Interventions for Physical Activity: A Systematic Review.
Int. J. Hum. Comput. Interact., July, 2023

A Framework Using Federated Learning for IoT-Based Forest Fire Prediction.
Proceedings of the IEEE International Conference on Internet of Things and Intelligence Systems, 2023

Long-Term Prediction of Remaining Useful Life for Industrial IoT.
Proceedings of the IEEE Global Communications Conference, 2023

Comparative Analysis of Tabular Generative Adversarial Network (GAN) Models for Generation and Validation of Power Grid Synthetic Datasets.
Proceedings of the 20th IEEE International Conference on Smart Technologies, 2023

Spatio-Temporal Agnostic Deep Learning Modeling of Forest Fire Prediction Using Weather Data.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023

Preliminary Results on Exploring Data Exhaust of Consumer Internet of Things Devices.
Proceedings of the 19th International Conference on Network and Service Management, 2023

A Data Integration Framework with Multi-Source Big Data for Enhanced Forest Fire Prediction.
Proceedings of the IEEE International Conference on Big Data, 2023

Forest Fire Prediction Using Multi-Source Deep Learning.
Proceedings of the Big Data Technologies and Applications, 2023

2022
An Efficient Key Management and Multi-Layered Security Framework for SCADA Systems.
IEEE Trans. Netw. Serv. Manag., 2022

A Quantum-Based Signcryption for Supervisory Control and Data Acquisition (SCADA) Networks.
Symmetry, 2022

Investigating the Avalanche Effect of Various Cryptographically Secure Hash Functions and Hash-Based Applications.
IEEE Access, 2022

IoT Adoption: Classification Based on Customer Purchase Behavior.
Proceedings of the 8th IEEE World Forum on Internet of Things, 2022

Protecting Routing Data in WSNs with use of IOTA Tangle.
Proceedings of the 17th International Conference on Future Networks and Communications / 19th International Conference on Mobile Systems and Pervasive Computing / 12th International Conference on Sustainable Energy Information Technology (FNC/MobiSPC/SEIT 2022), 2022

"From Kilobytes to Kilodaltons": A Novel Algorithm for Medical Image Encryption based on the Central Dogma of Molecular Biology.
Proceedings of the 44th Annual International Conference of the IEEE Engineering in Medicine & Biology Society, 2022

2021
Gradient Boosting Feature Selection With Machine Learning Classifiers for Intrusion Detection on Power Grids.
IEEE Trans. Netw. Serv. Manag., 2021

Intrusion Detection in SCADA Based Power Grids: Recursive Feature Elimination Model With Majority Vote Ensemble Algorithm.
IEEE Trans. Netw. Sci. Eng., 2021

A framework to lower the risk of medication prescribing and dispensing errors: A usability study of an NFC-based mobile application.
Int. J. Medical Informatics, 2021

IEEE Access Special Section Editorial: Blockchain Technology: Principles and Applications.
IEEE Access, 2021

2020
Trends in Persuasive Technologies for Physical Activity and Sedentary Behavior: A Systematic Review.
Frontiers Artif. Intell., 2020

Mobile Phone-Based Persuasive Technology for Physical Activity and Sedentary Behavior: A Systematic Review.
Frontiers Comput. Sci., 2020

SCADA (Supervisory Control and Data Acquisition) systems: Vulnerability assessment and security recommendations.
Comput. Secur., 2020

How Effective is Personalization in Persuasive Interventions for Reducing Sedentary Behavior and Promoting Physical Activity: A Systematic Review.
Proceedings of the 15th International Conference on Persuasive Technology, Adjunct Proceedings (PERSUASIVE 2020), Aalborg, Denmark, April 20th, 2020

Design and Implementation of Raspberry House: An IoT Security Framework.
Proceedings of the IEEE International Conference on Internet of Things and Intelligence System, 2020

2019
DDoS Detection System: Using a Set of Classification Algorithms Controlled by Fuzzy Logic System in Apache Spark.
IEEE Trans. Netw. Serv. Manag., 2019

BraillePassword: accessible web authentication technique on touchscreen devices.
J. Ambient Intell. Humaniz. Comput., 2019

A machine learning based intrusion detection scheme for data fusion in mobile clouds involving heterogeneous client networks.
Inf. Fusion, 2019

A Survey of Security in SCADA Networks: Current Issues and Future Challenges.
IEEE Access, 2019

Design, Implementation and Performance Measurement of Raspberry Gate in the IoT Field.
Proceedings of the 2019 4th International Conference on Cloud Computing and Internet of Things, 2019

2018
Energy-Balancing Unequal Clustering Approach to Reduce the Blind Spot Problem in Wireless Sensor Networks (WSNs).
Sensors, 2018

DDoS Attack Detection System: Utilizing Classification Algorithms with Apache Spark.
Proceedings of the 9th IFIP International Conference on New Technologies, 2018

Customized communication between healthcare members during the medication administration stage.
Proceedings of the 20th International Conference on Human-Computer Interaction with Mobile Devices and Services, 2018

High-Precision Indoor Localization Based on RFID and Stepscan Floor Tiles.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

KD1: A Sampling-Based Clustering Scheme for Large Data Sets.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

AMLT: A Mutual Authentication Scheme for Mobile Cloud Computing.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

A System to Lower the Risk of Dispensing Medication Errors at Pharmacies Using NFC.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

Defining the Functional Requirements for the NFC-Based Medication Administration and Clinical Communication System.
Proceedings of the IEEE International Conference on Healthcare Informatics, 2018

DDoS Detection System: Utilizing Gradient Boosting Algorithm and Apache Spark.
Proceedings of the 2018 IEEE Canadian Conference on Electrical & Computer Engineering, 2018

2017
Improved Singeltapbraille: Developing a Single Tap Text Entry Method Based on Grade 1 and 2 Braille Encoding.
J. Ubiquitous Syst. Pervasive Networks, 2017

Metamorphic Framework for Key Management and Authentication in Resource-Constrained Wireless Networks.
Int. J. Netw. Secur., 2017

HiveSec: security in resource-constrained wireless networks inspired by beehives and bee swarms.
Int. J. Inf. Sec., 2017

Framework to monitor pregnant women with a high risk of premature labour using sensor networks.
Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017

Improving Database Security in Cloud Computing by Fragmentation of Data.
Proceedings of the International Conference on Computer and Applications, 2017

BrailleTap: Developing a Calculator Based on Braille Using Tap Gestures.
Proceedings of the Universal Access in Human-Computer Interaction. Designing Novel Interactions, 2017

BrailleEnter: A Touch Screen Braille Text Entry Method for the Blind.
Proceedings of the 8th International Conference on Ambient Systems, 2017

2016
MDA: message digest-based authentication for mobile cloud computing.
J. Cloud Comput., 2016

Group Rekeying Scheme for Dynamic Peer Group Security in Collaborative Networks.
Int. J. Netw. Secur., 2016

SingleTapBraille: Developing a Text Entry Method Based on Braille Patterns Using a Single Tap.
Proceedings of the 11th International Conference on Future Networks and Communications (FNC 2016) / The 13th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2016) / Affiliated Workshops, 2016

Privacy-Enhancing of User's Behaviour Toward Privacy Settings in Social Networking Sites.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

Understanding Nurses' Perception Regarding the Use of NFC Application During Medication Administration.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016

An Evaluation of SingleTapBraille Keyboard: A Text Entry Method that Utilizes Braille Patterns on Touchscreen Devices.
Proceedings of the 18th International ACM SIGACCESS Conference on Computers and Accessibility, 2016

2015
An Efficient Pairwise and Group Key Management Protocol for Wireless Sensor Network.
Wirel. Pers. Commun., 2015

Butterfly Encryption Scheme for Resource-Constrained Wireless Networks.
Sensors, 2015

A Context-Adaptive Security Framework for Mobile Cloud Computing.
Proceedings of the 11th International Conference on Mobile Ad-hoc and Sensor Networks, 2015

HIDE: Hybrid Symmetric Key Algorithm for Integrity Check, Dynamic Key Generation and Encryption.
Proceedings of the ICISSP 2015, 2015

Lightweight protocol for anonymity and mutual authentication in RFID systems.
Proceedings of the 12th Annual IEEE Consumer Communications and Networking Conference, 2015

2014
RFID encryption scheme featuring pseudorandom numbers and Butterfly seed generation.
Proceedings of the 22nd International Conference on Software, 2014

SCARS: Simplified cryptographic algorithm for RFID systems.
Proceedings of the IEEE RFID Technology and Applications Conference, 2014

HiveSign: dynamic message signatures for resource-constrained wireless networks.
Proceedings of the Q2SWinet'14, 2014

HILL: A Hybrid Indoor Localization Scheme.
Proceedings of the 10th International Conference on Mobile Ad-hoc and Sensor Networks, 2014

A light-weight authentication scheme based on message digest and location for mobile cloud computing.
Proceedings of the IEEE 33rd International Performance Computing and Communications Conference, 2014

A Proposed RFID Authentication Protocol based on Two Stages of Authentication.
Proceedings of the 5th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN-2014)/ The 4th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH 2014)/ Affiliated Workshops, 2014

NFC-based Framework for Checking the Five Rights of Medication Administration.
Proceedings of the 5th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN-2014)/ The 4th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH 2014)/ Affiliated Workshops, 2014

2013
Message digest as authentication entity for mobile cloud computing.
Proceedings of the IEEE 32nd International Performance Computing and Communications Conference, 2013

Deployment of multiple base-stations in clustering protocols of wireless sensor networks (WSNs).
Proceedings of the International Conference on Advances in Computing, 2013

2012
A security suite for wireless body area networks
CoRR, 2012

A Hybrid Key Management Protocol for Wireless Sensor Networks.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Tag-server mutual authentication scheme based on gene transfer and genetic mutation.
Proceedings of the 2012 IEEE Symposium on Computational Intelligence for Security and Defence Applications, 2012

A mobile role-based access control system using identity-based encryption with zero knowledge proof.
Proceedings of the 2012 IEEE Symposium on Computational Intelligence for Security and Defence Applications, 2012

2011
Lightweight matrix-based authentication protocol for RFID.
Proceedings of the 19th International Conference on Software, 2011

2010
Management frame attacks in WiMAX networks: Analysis and prevention.
Proceedings of the 7th International Conference on Wireless and Optical Communications Networks, 2010

Client-based intrusion prevention system for 802.11 wireless LANs.
Proceedings of the IEEE 6th International Conference on Wireless and Mobile Computing, 2010

Test Suite for Vulnerability Analysis of RFID Systems.
Proceedings of the 2010 International Conference on Wireless Networks, 2010

A High Performance Contributory Group Key Management Scheme for Resource-Limited Networks.
Proceedings of the 2010 International Conference on Wireless Networks, 2010

An Intelligent RFID System for Consumer Businesses.
Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications, 2010

Detection and Prevention of Routing Intrusions in Mobile Ad Hoc Networks.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

2009
Prevention of management frame attacks on 802.11 WLANs.
Int. J. Wirel. Mob. Comput., 2009

Anomaly Detection Scheme for Routing Intrusions on Mobile Ad Hoc Networks.
Proceedings of the 2009 International Conference on Wireless Networks, 2009

2008
Improved Security Mechanism for Mobile IPv6.
Int. J. Netw. Secur., 2008

Further Improvements of Fast Encryption Algoirthm for Multimedia.
Int. J. Netw. Secur., 2008

A Hybrid Group Key Management Protocol for Reliable and Authenticated Rekeying.
Int. J. Netw. Secur., 2008

2007
Wise Guard - MAC Address Spoofing Detection System for Wireless LANs.
Proceedings of the SECRYPT 2007, 2007

Detection of Spoofed MAC Addresses in 802.11 Wireless Networks.
Proceedings of the E-business and Telecommunications - 4th International Conference, 2007

Cell Mobility Based Admission Control for Wireless Networks with Link Adaptation.
Proceedings of IEEE International Conference on Communications, 2007

Weight functions for shortest path routing of periodically scheduled burst flows.
Proceedings of the Fourth International Conference on Broadband Communications, 2007

2006
QoS-guaranteed wireless packet scheduling for mixed services in HSDPA.
Proceedings of the 9th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2006

2005
An efficient group key establishment in location-aided mobile ad hoc networks.
Proceedings of the 2nd ACM International Workshop on Performance Evaluation of Wireless Ad Hoc, 2005

AAA Architecture for Mobile IP in Overlay Networks.
Proceedings of the 30th Annual IEEE Conference on Local Computer Networks (LCN 2005), 2005

Distributed Online LSP Merging Algorithms for MPLS-TE.
Proceedings of the Quality of Service - IWQoS 2005: 13th International Workshop, 2005

Cluster-Head Election Using Fuzzy Logic for Wireless Sensor Networks.
Proceedings of the Third Annual Conference on Communication Networks and Services Research (CNSR 2005), 2005

2004
A Hierarchical Micro-Mobility Management Model with QoS Capability.
Int. J. Wirel. Opt. Commun., 2004

Backward connection preemption in multiclass QoS-aware networks.
Proceedings of the Quality of Service, 2004

A Load Balancing Hierarchical Model for Micro-mobility Management.
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 2004), 2004

2000
Group Management Strategies for Secure Multicasting on Active Virtual Private Networks.
Proceedings of the Proceedings 27th Conference on Local Computer Networks, 2000

New Mechanisms for Extending PLAN Functionality in Active Networks.
Proceedings of the Active Networks, Second International Working Conference, 2000

1996
A Novel Routing Algorithm for k-Ary n-Cube Interconnection Networks.
Int. J. High Speed Comput., 1996

1992
Design and Analysis of a Generalized Architecture for Reconfigurable m-ary Tree Structures.
IEEE Trans. Computers, 1992

1990
A Reconfigurable Tree Architecture with Multistage Interconnection Network.
IEEE Trans. Computers, 1990

1987
A centrally controlled shuffle network for reconfigurable and fault-tolerant architecture.
SIGARCH Comput. Archit. News, 1987


  Loading...