Browsing byAuthorPuthal, D

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 24 to 43 of 110< previous   next >
Issue DateTitleAuthor(s)
2019-01-28A Comparative Study of Machine Learning Techniques for Credit Card Fraud Detection Based on Time VarianceRajora, S; Li, DL; Jha, C; Bharill, N; Patel, OP; Joshi, S; Puthal, D; Prasad, M
2018-11-01A Computing Perspective of Quantum Cryptography [Energy and Security]Nanda, A; Puthal, D; Mohanty, SP; Choppali, U
2013-01-01Cross-layer architecture for congestion control in Vehicular Ad-hoc NetworksPuthal, D; Mir, ZH; Filali, F; Menouar, H
2018-07-27CTOM: Collaborative task offloading mechanism for mobile cloudlet networksFan, X; He, X; Puthal, D; Chen, S; Xiang, C; Nanda, P; Rao, X
2021-07-01Cybersecurity Issues in AIPuthal, D; Mohanty, S
2017-09-12Deadline-constraint services in cloud with heterogeneous serversSahoo, S; Mishra, SK; Sahoo, B; Puthal, D; Obaidat, MS
2022-04-01Decision tree based user-centric security solution for critical IoT infrastructurePuthal, D; Wilson, S; Nanda, A; Liu, M; Swain, S; Sahoo, BPS; Yelamarthi, K; Pillai, P; El-Sayed, H; Prasad, M
2017-01-01Deep Learning Based Face Recognition with Sparse Representation ClassificationCheng, EJ; Prasad, M; Puthal, D; Sharma, N; Prasad, OK; Chin, PH; Lin, CT; Blumenstein, M; Liu, D; Xie, S; Li, Y; Zhao, D; ElAlfy, ESM
2020-08-01Design and evaluation of a novel hierarchical trust assessment approach for vehicular networksEl Sayed, H; Zeadally, S; Puthal, D
2021-05-01Detection of SLA Violation for Big Data Analytics Applications in CloudZeng, X; Garg, S; Barika, M; Bista, S; Puthal, D; Zomaya, AY; Ranjan, R
2016-12-01DLSeF: A dynamic key-length-based efficient real-time security verification model for big data streamPuthal, D; Nepal, S; Ranjan, R; Chen, J
2015-12-02DPBSV - An efficient and secure scheme for big sensing data streamPuthal, D; Nepal, S; Ranjan, R; Chen, J
2017-02-01A dynamic prime number based efficient security mechanism for big sensing data streamsPuthal, D; Nepal, S; Ranjan, R; Chen, J
2018-12-01An early detection of low rate DDoS attack to SDN based data center networks using information distance metricsSahoo, KS; Puthal, D; Tiwary, M; Rodrigues, JJPC; Sahoo, B; Dash, R
2017-12-04Edge of Things: The Big Picture on the Integration of Edge, IoT and the Cloud in a Distributed Computing EnvironmentEl-Sayed, H; Sankar, S; Prasad, M; Puthal, D; Gupta, A; Mohanty, M; Lin, CT
2019-12-10Editorial to the Special Issue on Recent Advances on Trust, Security and Privacy in Computing and CommunicationsNanda, P; Puthal, D; Mohanty, SP
2018-01-01Energy-efficient deployment of edge dataenters for mobile clouds in sustainable iotMishra, SK; Puthal, D; Sahoo, B; Sharma, S; Xue, Z; Zomaya, AY
2018-12-01Energy-efficient VM-placement in cloud data centerMishra, SK; Puthal, D; Sahoo, B; Jayaraman, PP; Jun, S; Zomaya, AY; Ranjan, R
2020-07-01ESMLB: Efficient Switch Migration-Based Load Balancing for Multicontroller SDN in IoTSahoo, KS; Puthal, D; Tiwary, M; Usman, M; Sahoo, B; Wen, Z; Sahoo, BPS; Ranjan, R
2018-07-01Everything You Wanted to Know about the Blockchain: Its Promise, Components, Processes, and ProblemsPuthal, D; Malik, N; Mohanty, SP; Kougianos, E; Das, G