Showing results 1 to 20 of 129
next >
Issue Date | Title | Author(s) |
2021-01-01 | A novel e-government framework using blockchain | Assiri, H; Nanda, P; Mohanty, M |
2023-01-01 | A Zero-Trust Framework for Industrial Internet of Things | Atieh, A; Nanda, P; Mohanty, M |
2022-01-01 | An Empirical Assessment of Security and Privacy Risks of Web-Based Chatbots | Waheed, N; Ikram, M; Hashmi, SS; He, X; Nanda, P |
2011-12-01 | Analysis of BGP security vulnerabilities | Mujtaba, M; Nanda, P |
2011-01 | Analysis of the BGP Security Vulnerabilities | Mujtaba, M; Nanda, P; Williams, DT; Valli, PC |
2023-07-10 | Anomaly Detection in Smart Grid Networks Using Power Consumption Data | Nanda, P; Rahman, H; Mohanty, M |
2018-09-05 | Asymmetric Commutative Encryption Scheme Based Efficient Solution to the Millionaires' Problem | Liu, M; Nanda, P; Zhang, X; Yang, C; Yu, S; Li, J |
2020-01-01 | Automated Ethereum Smart Contract for Block Chain Based Smart Home Security | Qashlan, A; Nanda, P; He, X |
2018-09-05 | Blockchain Based Secured Identity Authentication and Expeditious Revocation Framework for Vehicular Networks | Malik, N; Nanda, P; Arora, A; He, X; Puthal, D |
2012-11-05 | Border gateway protocol anomaly detection using failure quality control method | Mujtaba, M; Nanda, P; He, X |
2016-10-01 | Building an intrusion detection system using a filter-based feature selection algorithm | Ambusaidi, MA; He, X; Nanda, P; Tan, Z |
2011-09-21 | Building Content Distribution Network: A solution to achieve qos on internet | Yang, Y; Nanda, P |
2017-10-01 | Building Security Perimeters to Protect Network Systems Against Cyber Threats [Future Directions] | Puthal, D; Mohanty, SP; Nanda, P; Choppali, U |
2020-03-01 | BuildSenSys: Reusing Building Sensing Data for Traffic Prediction with Cross-domain Learning | Nanda, P; Fan, X; He, X |
2023-06-19 | C-Block: A Secure and Robust Framework for Authentication Handover in 5G HetNets based on Edge-enabled SDN/NFV Environments | Nanda, P; Khan, AF |
2021-06-28 | Context-aware Fog Computing Implementation for Industrial Internet of Things | Nanda, P; Atieh, A; Mohanty, M |
2011-10-31 | Credibility problems and tradeoff between realistic and abstraction in WANET and WSN Simulation | Yu, D; Nanda, P; Braun, R |
2018-07-27 | CTOM: Collaborative task offloading mechanism for mobile cloudlet networks | Fan, X; He, X; Puthal, D; Chen, S; Xiang, C; Nanda, P; Rao, X |
2021-12-03 | Data Engineering for Smart Systems Proceedings of SSIC 2021 | Nanda, P |
2015-12-02 | Data mobility management model for active data cubes | Dang, TD; Hoang, D; Nanda, P |