Showing results 35 to 54 of 129
< previous
next >
Issue Date | Title | Author(s) |
2014-01-01 | Enhancing lifetime and quality of data in cluster-based hierarchical routing protocol for wireless sensor network | Jan, MA; Nanda, P; He, X; Liu, RP |
2012-01 | Evaluation of billing and charging architecture for the Internet service provisioning | Myint, H; Nanda, P; He, S; Myint, H; Nanda, P; He, X |
2012-12-01 | Evaluation of billing and charging architecture for the Internet service provisioning | Myint, H; Nanda, P; He, X |
2012-12-01 | Evaluation on multivariate correlation analysis based denial-of-service attack detection system | Tan, Z; Jamdagni, A; Nanda, P; He, X; Liu, RP |
2019-12-01 | Exploiting the Remote Server Access Support of CoAP Protocol | Roselin, AG; Nanda, P; Nepal, S; He, X; Wright, J |
2020-01-01 | FairEdge: A Fairness-Oriented Task Offloading Scheme for Iot Applications in Mobile Cloudlet Networks | Lai, S; Fan, X; Ye, Q; Tan, Z; Zhang, Y; He, X; Nanda, P |
2023-08 | FCH, an incentive framework for data-owner dominated federated learning | Xu, H; Nanda, P; Liang, J; He, X |
2023-12-04 | FedBlockHealth: A Synergistic Approach to Privacy and Security in IoT-Enabled Healthcare through Federated Learning and Blockchain | Nanda, P; Waheed, N |
2009-01 | A Frame Work for Geometrical Structure Anomaly Detection Model | Jamdagni, A; Tan, T; Liu, R; Nanda, P; He, S; Zelinsky, A; Bird, T |
2017-10-13 | A Framework for Data Security in Cloud using Collaborative Intrusion Detection Scheme | Nagar, U; He, X; Nanda, P; Tan, Z |
2017-01-20 | Geo-location oriented routing protocol for smart dynamic mesh network | Nanda, A; Nanda, P; He, X |
2022-01-01 | Hybrid blockchain-based Authentication Handover and Flow Rule Validation for Secure Software Defined 5G HetNets | Khan, AF; Nanda, P |
2018-01-01 | A hybrid encryption technique for Secure-GLOR: The adaptive secure routing protocol for dynamic wireless mesh networks | Nanda, A; Nanda, P; He, X; Jamdagni, A; Puthal, D |
2020 | Hybrid Tree-rule Firewall for High Speed Data Transmission | Chomsiri, T; He, XS; Nanda, P; Tan, Z |
2016-01-01 | An improvement of tree-rule firewall for a large network: Supporting large rule size and low delay | Chomsiri, T; He, X; Nanda, P; Tan, Z |
2014-01-01 | Improving cloud network security using the Tree-Rule firewall | He, X; Chomsiri, T; Nanda, P; Tan, Z |
2011-11-21 | An integrated model supporting billing and QOS in the Internet | Myint, H; Nanda, P |
2021-01-01 | Intelligent anomaly detection for large network traffic with Optimized Deep Clustering (ODC) algorithm | Roselin, AG; Nanda, P; Nepal, S; He, X |
2014-01-01 | Intrusion detection method based on nonlinear correlation measure | Ambusaidi, MA; Tan, Z; He, X; Nanda, P; Lu, LF; Jamdagni, A |
2017-09-07 | An intrusion detection system based on polynomial feature correlation analysis | Li, Q; Tan, Z; Jamdagni, A; Nanda, P; He, X; Han, W |