Browsing byAuthorNanda, P

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 46 to 65 of 129< previous   next >
Issue DateTitleAuthor(s)
2022-01-01Hybrid blockchain-based Authentication Handover and Flow Rule Validation for Secure Software Defined 5G HetNetsKhan, AF; Nanda, P
2018-01-01A hybrid encryption technique for Secure-GLOR: The adaptive secure routing protocol for dynamic wireless mesh networksNanda, A; Nanda, P; He, X; Jamdagni, A; Puthal, D
2020Hybrid Tree-rule Firewall for High Speed Data TransmissionChomsiri, T; He, XS; Nanda, P; Tan, Z
2016-01-01An improvement of tree-rule firewall for a large network: Supporting large rule size and low delayChomsiri, T; He, X; Nanda, P; Tan, Z
2014-01-01Improving cloud network security using the Tree-Rule firewallHe, X; Chomsiri, T; Nanda, P; Tan, Z
2011-11-21An integrated model supporting billing and QOS in the InternetMyint, H; Nanda, P
2021-01-01Intelligent anomaly detection for large network traffic with Optimized Deep Clustering (ODC) algorithmRoselin, AG; Nanda, P; Nepal, S; He, X
2014-01-01Intrusion detection method based on nonlinear correlation measureAmbusaidi, MA; Tan, Z; He, X; Nanda, P; Lu, LF; Jamdagni, A
2017-09-07An intrusion detection system based on polynomial feature correlation analysisLi, Q; Tan, Z; Jamdagni, A; Nanda, P; He, X; Han, W
2009-12-01Intrusion detection using geometrical structureJamdagni, A; Tan, Z; Nanda, P; He, X; Liu, R
2010-08-06Intrusion detection using GSAD model for HTTP traffic on web servicesJamdagni, A; Tan, Z; Nanda, P; He, X; Liu, RP
2017-09-07Lightweight Authentication Protocol (LAUP) for 6LoWPAN wireless sensor networksRoselin, AG; Nanda, P; Nepal, S
2011-01Mahalanobis Distance Map Approach for Anomaly Detection of Web-Based AttacksJamdagni, A; Tan, T; Nanda, P; He, S; Liu, R
2010-12-01Mahalanobis Distance Map approach for Anomaly Detection of web-based attacksJamdagni, A; Tan, Z; Nanda, P; He, X; Liu, RP
2002-01Measuring Quality of Service in A Differentiated Services Domain With LinuxNanda, P; Simmonds, AJ; Lee, S; Iyer, S; Naik, S
2017-09-07Message from the IEEE TrustCom 2017 Program ChairsNanda, P; Xiang, Y; Mu, Y
2011-11-17Multivariate correlation analysis technique based on Euclidean distance map for network traffic characterizationTan, Z; Jamdagni, A; He, X; Nanda, P; Liu, RP
2010-12-01Network intrusion detection based on LDA for payload feature selectionTan, Z; Jamdagni, A; He, X; Nanda, P
2020-01-01Network Packet Breach Detection Using Cognitive TechniquesNanda, P; Arain, A; Nagar, U
2012-01A Nonlinear Correlation Measure for Intrusion DetectionAmbu Saidi, MA; Lu, L; Tan, T; He, S; Jamdagni, A; Nanda, P; Ambusaidi, M; Lu, LF; He, X; Tan, Z; Jamdagni, A; Nanda, P