Showing results 46 to 65 of 129
< previous
next >
Issue Date | Title | Author(s) |
2022-01-01 | Hybrid blockchain-based Authentication Handover and Flow Rule Validation for Secure Software Defined 5G HetNets | Khan, AF; Nanda, P |
2018-01-01 | A hybrid encryption technique for Secure-GLOR: The adaptive secure routing protocol for dynamic wireless mesh networks | Nanda, A; Nanda, P; He, X; Jamdagni, A; Puthal, D |
2020 | Hybrid Tree-rule Firewall for High Speed Data Transmission | Chomsiri, T; He, XS; Nanda, P; Tan, Z |
2016-01-01 | An improvement of tree-rule firewall for a large network: Supporting large rule size and low delay | Chomsiri, T; He, X; Nanda, P; Tan, Z |
2014-01-01 | Improving cloud network security using the Tree-Rule firewall | He, X; Chomsiri, T; Nanda, P; Tan, Z |
2011-11-21 | An integrated model supporting billing and QOS in the Internet | Myint, H; Nanda, P |
2021-01-01 | Intelligent anomaly detection for large network traffic with Optimized Deep Clustering (ODC) algorithm | Roselin, AG; Nanda, P; Nepal, S; He, X |
2014-01-01 | Intrusion detection method based on nonlinear correlation measure | Ambusaidi, MA; Tan, Z; He, X; Nanda, P; Lu, LF; Jamdagni, A |
2017-09-07 | An intrusion detection system based on polynomial feature correlation analysis | Li, Q; Tan, Z; Jamdagni, A; Nanda, P; He, X; Han, W |
2009-12-01 | Intrusion detection using geometrical structure | Jamdagni, A; Tan, Z; Nanda, P; He, X; Liu, R |
2010-08-06 | Intrusion detection using GSAD model for HTTP traffic on web services | Jamdagni, A; Tan, Z; Nanda, P; He, X; Liu, RP |
2017-09-07 | Lightweight Authentication Protocol (LAUP) for 6LoWPAN wireless sensor networks | Roselin, AG; Nanda, P; Nepal, S |
2011-01 | Mahalanobis Distance Map Approach for Anomaly Detection of Web-Based Attacks | Jamdagni, A; Tan, T; Nanda, P; He, S; Liu, R |
2010-12-01 | Mahalanobis Distance Map approach for Anomaly Detection of web-based attacks | Jamdagni, A; Tan, Z; Nanda, P; He, X; Liu, RP |
2002-01 | Measuring Quality of Service in A Differentiated Services Domain With Linux | Nanda, P; Simmonds, AJ; Lee, S; Iyer, S; Naik, S |
2017-09-07 | Message from the IEEE TrustCom 2017 Program Chairs | Nanda, P; Xiang, Y; Mu, Y |
2011-11-17 | Multivariate correlation analysis technique based on Euclidean distance map for network traffic characterization | Tan, Z; Jamdagni, A; He, X; Nanda, P; Liu, RP |
2010-12-01 | Network intrusion detection based on LDA for payload feature selection | Tan, Z; Jamdagni, A; He, X; Nanda, P |
2020-01-01 | Network Packet Breach Detection Using Cognitive Techniques | Nanda, P; Arain, A; Nagar, U |
2012-01 | A Nonlinear Correlation Measure for Intrusion Detection | Ambu Saidi, MA; Lu, L; Tan, T; He, S; Jamdagni, A; Nanda, P; Ambusaidi, M; Lu, LF; He, X; Tan, Z; Jamdagni, A; Nanda, P |