Showing results 19 to 38 of 129
< previous
next >
Issue Date | Title | Author(s) |
2021-12-03 | Data Engineering for Smart Systems Proceedings of SSIC 2021 | Nanda, P |
2015-12-02 | Data mobility management model for active data cubes | Dang, TD; Hoang, D; Nanda, P |
2017 | Data Protection and Mobility Management for Cloud | Dang, D; Hoang, DB; Nanda, P; Kumar, V; Ko, R; Chaisiri, S |
2016-01-01 | Data sharing in secure multimedia wireless sensor networks | Usman, M; Jan, MA; He, X; Nanda, P |
2020-09-03 | Deep learning for intelligent traffic sensing and prediction: recent
advances and future challenges | Nanda, P; Fan, X; He, X |
2011-11-28 | Denial-of-service attack detection based on multivariate correlation analysis | Tan, Z; Jamdagni, A; He, X; Nanda, P; Liu, RP |
2023-12-13 | Designing Incentive Mechanisms for Fair Participation in Federated Learning | Nanda, P; Xu, H; Liang, J |
2015-09-01 | Detection of Denial-of-Service Attacks Based on Computer Vision Techniques | Tan, Z; Jamdagni, A; He, X; Nanda, P; Liu, RP; Hu, J |
2023-08 | Differential privacy model for blockchain based smart home architecture | Qashlan, A; Nanda, P; Mohanty, M |
2019-12-10 | Editorial to the Special Issue on Recent Advances on Trust, Security and Privacy in Computing and Communications | Nanda, P; Puthal, D; Mohanty, SP |
2007-12-01 | Effect of network policies on internet traffic engineering | Nanda, P; Simmonds, AJ |
2019-01-01 | Efficient solution to the millionaires' problem based on asymmetric commutative encryption scheme | Liu, M; Luo, Y; Nanda, P; Yu, S; Zhang, J |
2023-08 | Enabling secure lightweight mobile Narrowband Internet of Things (NB-IoT) applications using blockchain | Mohan, VS; Sankaran, S; Nanda, P; Achuthan, K |
2013-09-09 | Energy evaluation model for an improved centralized clustering hierarchical algorithm in WSN | Jan, MA; Nanda, P; He, X |
2014-01-01 | Enhancing big data security with collaborative intrusion detection | Tan, Z; Nagar, UT; He, X; Nanda, P; Liu, RP; Wang, S; Hu, J |
2014-09-01 | Enhancing Big Data Security with Collaborative Intrusion Detection | Tan, Z; Nagar, U; He, X; Nanda, P; Liu, R |
2014-01-01 | Enhancing lifetime and quality of data in cluster-based hierarchical routing protocol for wireless sensor network | Jan, MA; Nanda, P; He, X; Liu, RP |
2012-01 | Evaluation of billing and charging architecture for the Internet service provisioning | Myint, H; Nanda, P; He, S; Myint, H; Nanda, P; He, X |
2012-12-01 | Evaluation of billing and charging architecture for the Internet service provisioning | Myint, H; Nanda, P; He, X |
2012-12-01 | Evaluation on multivariate correlation analysis based denial-of-service attack detection system | Tan, Z; Jamdagni, A; Nanda, P; He, X; Liu, RP |