Browsing by Author Nanda, P

0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Showing results 39 to 58 of 97< previous   next >
Issue DateTitleAuthor(s)
7-Sep-2017Lightweight Authentication Protocol (LAUP) for 6LoWPAN wireless sensor networksRoselin, AG; Nanda, P; Nepal, S
1-Dec-2010Mahalanobis Distance Map approach for Anomaly Detection of web-based attacksJamdagni, A; Tan, Z; Nanda, P; He, X; Liu, RP
Jan-2011Mahalanobis Distance Map Approach for Anomaly Detection of Web-Based AttacksJamdagni, A; Tan, T; Nanda, P; He, S; Liu, R
Jan-2002Measuring Quality of Service in A Differentiated Services Domain With LinuxNanda, P; Simmonds, AJ; Lee, S; Iyer, S; Naik, S
17-Nov-2011Multivariate correlation analysis technique based on Euclidean distance map for network traffic characterizationTan, Z; Jamdagni, A; He, X; Nanda, P; Liu, RP
1-Dec-2010Network intrusion detection based on LDA for payload feature selectionTan, Z; Jamdagni, A; He, X; Nanda, P
18-Jan-2019Network Packet Breach Detection using Cognitive TechniquesNanda, P; arain, A; Nagar, U
Jan-2012A Nonlinear Correlation Measure for Intrusion DetectionAmbu Saidi, MA; Lu, L; Tan, T; He, S; Jamdagni, A; Nanda, P; Ambusaidi, M; Lu, LF; He, X; Tan, Z; Jamdagni, A; Nanda, P
13-Aug-2018A novel collaborative task offloading scheme for secure and sustainable mobile cloudlet networksYang, N; Fan, X; Puthal, D; He, X; Nanda, P; Guo, S
15-Jan-2015A novel feature selection approach for intrusion detection data classificationAmbusaidi, MA; He, X; Tan, Z; Nanda, P; Lu, LF; Nagar, UT
23-Aug-2016A novel Hash-Based File Clustering scheme for efficient distributing, storing and retrieving of large scale Health RecordsDang, TD; Hoang, D; Nanda, P
1-Jan-2016A novel hash-based file clustering scheme for efficient distributing, storing, and retrieving of large scale health recordsDang, TD; Hoang, D; Nanda, P
2-Jan-2018A Novel Hybrid Authentication Model for Geo Location Oriented Routing in Dynamic Wireless Mesh NetworksNanda, A; Nanda, P; He, X; Puthal, D; Jamdagni, A
7-Sep-2017Online social network information forensics: A survey on use of various tools and determining how cautious facebook users are?Umair, A; Nanda, P; He, X
7-Sep-2017Online social network information forensics: A survey on use of various tools and determining how cautious facebook users are?Umair, A; Nanda, P; He, X
31-Jul-2018An Overview of Security Challenges in Vehicular Ad-Hoc NetworksMalik, N; Puthal, D; Nanda, P
9-Dec-2014PASCCC: Priority-based application-specific congestion control clustering protocolJan, MA; Nanda, P; He, X; Liu, RP
Jan-2010Pattern Recognition Approach for Anomaly Detection of Web-based AttacksJamdagni, A; Tan, T; Liu, R; Nanda, P; He, S; Trevor Bird
10-Sep-2017PAWN: a payload-based mutual authentication scheme for wireless sensor networksJan, M; Nanda, P; Usman, M; He, X
1-Dec-2012Performance uncertainty impact on WSNs design evaluationYu, D; Nanda, P; He, X