Vidyasagar M. Potdar

Orcid: 0000-0002-7292-5462

Affiliations:
  • Curtin University, School of Information Systems, Perth, Australia


According to our database1, Vidyasagar M. Potdar authored at least 98 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Securing AI-based healthcare systems using blockchain technology: A state-of-the-art systematic literature review and future research directions.
Trans. Emerg. Telecommun. Technol., January, 2024

2023
Virtual Reality at a Prehistoric Museum: Exploring the Influence of System Quality and Personality on User Intentions.
ACM Journal on Computing and Cultural Heritage, June, 2023

Industry 4.0 Adoption in Food Supply Chain to Improve Visibility and Operational Efficiency - A Content Analysis.
IEEE Access, 2023

Blockchain Adoption in Food Supply Chains: A Systematic Literature Review on Enablers, Benefits, and Barriers.
IEEE Access, 2023

2022
Immersive technologies for tourism: a systematic review.
J. Inf. Technol. Tour., 2022

Performance evaluation of IoT networks: A product density approach.
Comput. Commun., 2022

2021
Frameworks for developing an Agro-Prosumer Community Group platform.
PeerJ Comput. Sci., 2021

Survey of Interoperability in Electronic Health Records Management and Proposed Blockchain Based Framework: MyBlockEHR.
IEEE Access, 2021

Efficient Automated Processing of the Unstructured Documents Using Artificial Intelligence: A Systematic Literature Review and Future Directions.
IEEE Access, 2021

2020
Guest Editorial: Blockchain and AI Enabled 5G Mobile Edge Computing.
IEEE Trans. Ind. Informatics, 2020

Information Processing view of Electricity Demand Response Systems: A Comparative Study Between India and Australia.
Pac. Asia J. Assoc. Inf. Syst., 2020

2019
Cubic reward penalty structure for power distribution companies.
Int. J. Syst. Assur. Eng. Manag., 2019

On framework development for the dynamic prosumer coalition in a smart grid and its evaluation by analytic tools.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 23rd International Conference KES-2019, 2019

Key Factors Affecting Blockchain Adoption in Organizations.
Proceedings of the Big Data and Security - First International Conference, 2019

The Impact of Organizational Culture on the Internal Controls Components of Accounting Information Systems in the City of Beirut, Lebanon.
Proceedings of the Big Data and Security - First International Conference, 2019

Impact of Nepotism on the Human Resources Component of ERP Systems Implementation in Lebanon.
Proceedings of the Big Data and Security - First International Conference, 2019

Human Factors Affecting XBRL Adoption Success in Lebanese Small to Medium-Sized Enterprises.
Proceedings of the Big Data and Security - First International Conference, 2019

How Blockchain can help in Supply Chain Sustainability.
Proceedings of the Australasian Conference on Information Systems, 2019

2018
A process model for identifying online customer engagement patterns on Facebook brand pages.
Inf. Technol. People, 2018

State-of-the-Art Ontology Annotation for Personalised Teaching and Learning and Prospects for Smart Learning Recommender Based on Multiple Intelligence and Fuzzy Ontology.
Int. J. Fuzzy Syst., 2018

A decision support algorithm for assessing the engagement of a demand response program in the industrial sector of the smart grid.
Comput. Ind. Eng., 2018

Blockchain Technology for Supply Chain Traceability, Transparency and Data Provenance.
Proceedings of the 2018 International Conference on Blockchain Technology and Application, 2018

A Decision Support System for Selecting Sustainable Materials in Construction Projects.
Proceedings of the 32nd International Conference on Advanced Information Networking and Applications Workshops, 2018

2017
A Study of the Parameters Impacting Sustainability in Information Technology Organizations.
Int. J. Knowl. Based Organ., 2017

Innovative Business Models for E-Learning Entrepreneurs.
Int. J. E Serv. Mob. Appl., 2017

2016
Organisations' Responsibilities towards Corporate Sustinability: A Content Analysis of Literature.
Int. J. Strateg. Inf. Technol. Appl., 2016

A survey of Western Australian Software Businesses an exlporative web content analysis.
Proceedings of the 14th IEEE International Conference on Software Engineering Research, 2016

Waste management strategies for Software Development companies: An explorative text analysis of business sustainability reports.
Proceedings of the 14th IEEE International Conference on Software Engineering Research, 2016

Business sustainability frameworks a survey.
Proceedings of the 14th IEEE International Conference on Software Engineering Research, 2016

2015
Formation of virtual community groups to manage prosumers in smart grids.
Int. J. Grid Util. Comput., 2015

Green Business Practices for Software Development Companies: An Explorative Text Analysis of Business Sustainability Reports.
Int. J. Enterp. Inf. Syst., 2015

Prosumer recruitment framework for prosumer community groups in smart-grid.
Comput. Syst. Sci. Eng., 2015

Secure Transmission in Wireless Sensor Networks Data Using Linear Kolmogorov Watermarking Technique.
CoRR, 2015

2014
A Methodology to Find Influential Prosumers in Prosumer Community Groups.
IEEE Trans. Ind. Informatics, 2014

Goal-Oriented Prosumer Community Groups for the Smart Grid.
IEEE Technol. Soc. Mag., 2014

2013
Wireless Sensor Network transport protocol: A critical review.
J. Netw. Comput. Appl., 2013

Prosumer recruitment framework for prosumer community groups in smart-grid.
Comput. Syst. Sci. Eng., 2013

RFID mutual authentication protocols for tags and readers with and without a server.
Comput. Syst. Sci. Eng., 2013

Track D: Cyber-security ecosystem.
Proceedings of the 7th IEEE International Conference on Digital Ecosystems and Technologies, 2013

2012
Spam 2.0 State of the Art.
Int. J. Digit. Crime Forensics, 2012

Watermarking Technique for Wireless Sensor Networks: A State of the Art.
Proceedings of the Eighth International Conference on Semantics, Knowledge and Grids, 2012

Watermarking technique for copyright protection of wireless sensor network data using LFSR and Kolmogorov complexity.
Proceedings of the 10th International Conference on Advances in Mobile Computing & Multimedia, 2012

Analysis of energy behaviour profiles of prosumers.
Proceedings of the IEEE 10th International Conference on Industrial Informatics, 2012

A Framework for Application of Tree-Structured Data Mining to Process Log Analysis.
Proceedings of the Intelligent Data Engineering and Automated Learning - IDEAL 2012, 2012

Spamming for Science: Active Measurement in Web 2.0 Abuse Research.
Proceedings of the Financial Cryptography and Data Security, 2012

Prosumer management in socio-technical smart grid.
Proceedings of the CUBE International IT Conference & Exhibition, 2012

Spam 2.0.
Proceedings of the CUBE International IT Conference & Exhibition, 2012

The changing nature of Spam 2.0.
Proceedings of the CUBE International IT Conference & Exhibition, 2012

How much money do spammers make from your website?
Proceedings of the CUBE International IT Conference & Exhibition, 2012

Watermarking technique for wireless multimedia sensor networks: a state of the art.
Proceedings of the CUBE International IT Conference & Exhibition, 2012

Handling the Quality of Service for the data dissemination in Wireless Sensor Networks.
Proceedings of the CUBE International IT Conference & Exhibition, 2012

HENRI: high efficiency negotiation-based robust interface for multi-party multi-issue negotiation over the internet.
Proceedings of the CUBE International IT Conference & Exhibition, 2012

Emotion detection state of the art.
Proceedings of the CUBE International IT Conference & Exhibition, 2012

2011
Characterisation of web spambots using self organising maps.
Comput. Syst. Sci. Eng., 2011

Storage cost of spam 2.0 in a web discussion forum.
Proceedings of the 8th Annual Collaboration, 2011

Automatically Measuring the Quality of User Generated Content in Forums.
Proceedings of the AI 2011: Advances in Artificial Intelligence, 2011

Identifying prosumer's energy sharing behaviours for forming optimal prosumer-communities.
Proceedings of the 2011 International Conference on Cloud and Service Computing, 2011

2010
ERCTP: End-to-End Reliable and Congestion Aware Transport Layer Protocol for Heterogeneous WSN.
Scalable Comput. Pract. Exp., 2010

Dependency of Transport Functions on IEEE802.11 and IEEE802.15.4 MAC/PHY Layer Protocols for WSN: A Step towards Cross-layer Design.
Int. J. Bus. Data Commun. Netw., 2010

LCART: Lightweight Congestion Aware Reliable Transport Protocol for WSN Targeting Heterogeneous Traffic.
Aust. J. Intell. Inf. Process. Syst., 2010

Semi-automatic Information Extraction from Discussion Boards with Applications for Anti-Spam Technology.
Proceedings of the Computational Science and Its Applications, 2010

Factors Involved in Estimating Cost of Email Spam.
Proceedings of the Computational Science and Its Applications, 2010

Spam 2.0: The Problem Ahead.
Proceedings of the Computational Science and Its Applications, 2010

Behaviour-Based Web Spambot Detection by Utilising Action Time and Action Frequency.
Proceedings of the Computational Science and Its Applications, 2010

Wireless Sensor Networks: Challenges Ahead.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010

Wireless Sensor Network Transport Protocol - A State of the Art.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010

State of the Art: Carbon Emission Accountability Modeling.
Proceedings of the Fifth International Conference on Broadband and Wireless Computing, 2010

Torpid Mode: Hybrid of Sleep and Idle Mode as Power Saving Mechanism for IEEE 802.16j.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010

Prioritizing Information for Achieving QoS Control in WSN.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

Priority Enabled Transport Layer Protocol for Wireless Sensor Network.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010

Adaptive Channel Coding and Modulation Scheme Selection for Achieving High Throughput in Wireless Networks.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010

Key Parameters in Identifying Cost of Spam 2.0.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

A Middleware for Mobile and Ubiquitous Learning Ecosystems Based on a Reconfigurable Plug-and-Play Architecture: Application to Mashups.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2010

Web Spambot Detection Based on Web Navigation Behaviour.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

2009
Latent Semantic Analysis - The Dynamics of Semantics Web Services Discovery.
Proceedings of the Advances in Web Semantics I, 2009

Web of Things as a Framework for Ubiquitous Intelligence and Computing.
Proceedings of the Ubiquitous Intelligence and Computing, 6th International Conference, 2009

HoneySpam 2.0: Profiling Web Spambot Behaviour.
Proceedings of the Principles of Practice in Multi-Agent Systems, 2009

Real-Time Public Group Collaboration using IP Multicast Label Filters.
Proceedings of the NBiS 2009, 2009

Processing of Low Level Signals in Mixed Signal Environment - A Hardware Design for Better Performance.
Proceedings of the NBiS 2009, 2009

Performance evaluation of different transport layer protocols on the IEEE 802.11 and IEEE 802.15.4 MAC/PHY layers for WSN.
Proceedings of the MoMM'2009, 2009

Wireless multimedia sensor network technology: A survey.
Proceedings of the 7th IEEE International Conference on Industrial Informatics, 2009

Toward spam 2.0: An evaluation of Web 2.0 anti-spam methods.
Proceedings of the 7th IEEE International Conference on Industrial Informatics, 2009

Content Quality Assessment Related Frameworks for Social Media.
Proceedings of the Computational Science and Its Applications, 2009

Applications of Wireless Sensor Networks in Pharmaceutical Industry.
Proceedings of the 23rd International Conference on Advanced Information Networking and Applications, 2009

Wireless Sensor Networks: A Survey.
Proceedings of the 23rd International Conference on Advanced Information Networking and Applications, 2009

2008
Evaluation of spam detection and prevention frameworks for email and image spam: a state of art.
Proceedings of the iiWAS'2008, 2008

Modeling Input Validation in UML.
Proceedings of the 19th Australian Software Engineering Conference (ASWEC 2008), 2008

A Survey of RFID Authentication Protocols.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

A Critical Analysis of RFID Security Protocols.
Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, 2008

2007
Privacy-Preserving Transactions Protocol Using Mobile Agents with Mutual Authentication.
Int. J. Inf. Secur. Priv., 2007

Mutual Authentication Protocol for RFID Tags Based on Synchronized Secret Information with Monitor.
Proceedings of the Computational Science and Its Applications, 2007

A Survey of Revenue Models for Current Generation Social Software's Systems.
Proceedings of the Computational Science and Its Applications, 2007

2006
A framework of authentication and authorization for e-health services.
Proceedings of the 3rd ACM Workshop On Secure Web Services, 2006

Open Source Software Development (OSSD) Based On Software Engineering.
Proceedings of the Open Source Systems, 2006

Subjective and Objective Watermark Detection Using a Novel Approach - Barcode Watermarking.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

2005
e-Forensics steganography system for secret information retrieval.
Adv. Eng. Informatics, 2005

Tamper Detection for Ubiquitous RFID-Enabled Supply Chain.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

2004
Open Source vs. Closed Source.
Proceedings of the ICEIS 2004, 2004


  Loading...