Sumita Mishra

Orcid: 0000-0002-7093-631X

According to our database1, Sumita Mishra authored at least 41 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Integration of Blockchain in VANET Using gRPC for Privacy Preservation of Vehicles.
SN Comput. Sci., January, 2024

2023
Prediction of Student's Performance With Learning Coefficients Using Regression Based Machine Learning Models.
IEEE Access, 2023

SM-DIV: A Smart Metering Distributed privacy framework with Integrity Verification.
Proceedings of the IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2023

A distributed approach to privacy-preservation and integrity assurance of smart metering data.
Proceedings of the 14th ACM International Conference on Future Energy Systems, 2023

Enhancing Computing Curricular Outcomes and Student Accomplishments Through Collegiate Competitions.
Proceedings of the ACM Conference on Global Computing Education Vol 1, 2023

2022
Internet of Healthcare Things (IoHT): Towards a Digital Chain of Custody.
Proceedings of the 10th IEEE International Conference on Healthcare Informatics, 2022

2021
Interactive Range Queries for Healthcare Data under Differential Privacy.
Proceedings of the 9th IEEE International Conference on Healthcare Informatics, 2021

Divide & Conquer: A Privacy Safeguarding Framework for the Smart Grid.
Proceedings of the ICC 2021, 2021

Targeted Discreditation Attack against Trust Management in Connected Vehicles.
Proceedings of the ICC 2021, 2021

2020
A cyber-resilient privacy framework for the smart grid with dynamic billing capabilities.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

A distributed privacy preserving framework for the Smart Grid.
Proceedings of the IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2020

2019
Deep 3D Convolutional Neural Network for Automated Lung Cancer Diagnosis.
CoRR, 2019

Quantifying the Costs of Data Breaches.
Proceedings of the Critical Infrastructure Protection XIII, 2019

2018
Automated Detection of Acute Leukemia using K-mean Clustering Algorithm.
CoRR, 2018

Protecting Infrastructure Data via Enhanced Access Control, Blockchain and Differential Privacy.
Proceedings of the Critical Infrastructure Protection XII, 2018

2017
Gamifying Course Modules for Entry Level Students.
Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education, 2017

Precision Sugarcane Monitoring Using SVM Classifier.
Proceedings of the 5th International Conference on Information Technology and Quantitative Management, 2017

CyberCSP: Integrating cybersecurity into the computer science principles course.
Proceedings of the 2017 IEEE Frontiers in Education Conference, 2017

2016
An anonymized authentication framework for smart metering data privacy.
Proceedings of the 2016 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2016

A Multidisciplinary Predictive Model for Managing Critical Infrastructure Disruptions.
Proceedings of the Critical Infrastructure Protection X, 2016

Using Access Control to Mitigate Insider Threats to Healthcare Systems.
Proceedings of the 2016 IEEE International Conference on Healthcare Informatics, 2016

A modular approach to teaching critical infrastructure protection concepts to engineering, technology and computing students.
Proceedings of the 2016 IEEE Frontiers in Education Conference, 2016

2015
Regional response to large-scale emergency events: Building on historical data.
Int. J. Crit. Infrastructure Prot., 2015

A New Covert Channel over Cellular Voice Channel in Smartphones.
CoRR, 2015

2014
Load Balancing Optimization in LTE/LTE-A Cellular Networks: A Review.
CoRR, 2014

2013
Overview of Optical Interconnect Technology
CoRR, 2013

A curricular framework for critical infrastructure protection education for engineering, technology and computing majors.
Proceedings of the IEEE Frontiers in Education Conference, 2013

2012
A survey of identity and handoff management approaches for the future Internet.
Comput. Commun., 2012

Game-based forensics course for first year students.
Proceedings of the ACM Special Interest Group for Information Technology Education Conference, 2012

A novel user-centric handoff cost framework applied to the Virtual Mobility Domains and IPv6-based mobility protocols.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

2011
Improving Reliability of Jamming Attack Detection in Ad hoc Networks.
Int. J. Commun. Networks Inf. Secur., 2011

A Novel comprehensive method for real time Video Motion Detection Surveillance
CoRR, 2011

Simulation and Optimization of MQW based optical modulator for on chip optical interconnect
CoRR, 2011

2010
An underwater sensor allocation scheme for a range dependent environment.
Comput. Networks, 2010

On the effects of deployment imprecision on underwater sensor connectivity.
Proceedings of the Workshop on Underwater Networks, 2010

Security Attacks And Defenses In Sensor Networks.
Proceedings of the 2010 International Conference on Security & Management, 2010

2009
Teaching high-assurance internet protocol encryption (haipe) using opnet modeler simulation tool.
Proceedings of the 10th Conference on Information Technology Education, 2009

2005
Analysis of a hybrid key management solution for ad hoc networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005

A cross-layer based intrusion detection approach for wireless ad hoc networks.
Proceedings of the IEEE 2nd International Conference on Mobile Adhoc and Sensor Systems, 2005

Security for Energy Constrained RFID System.
Proceedings of the Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID 2005), 2005

2003
A robust header compression technique for wireless Ad hoc networks.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2003


  Loading...