Showing results 24 to 43 of 110
< previous
next >
Issue Date | Title | Author(s) |
2019-01-28 | A Comparative Study of Machine Learning Techniques for Credit Card Fraud Detection Based on Time Variance | Rajora, S; Li, DL; Jha, C; Bharill, N; Patel, OP; Joshi, S; Puthal, D; Prasad, M |
2018-11-01 | A Computing Perspective of Quantum Cryptography [Energy and Security] | Nanda, A; Puthal, D; Mohanty, SP; Choppali, U |
2013-01-01 | Cross-layer architecture for congestion control in Vehicular Ad-hoc Networks | Puthal, D; Mir, ZH; Filali, F; Menouar, H |
2018-07-27 | CTOM: Collaborative task offloading mechanism for mobile cloudlet networks | Fan, X; He, X; Puthal, D; Chen, S; Xiang, C; Nanda, P; Rao, X |
2021-07-01 | Cybersecurity Issues in AI | Puthal, D; Mohanty, S |
2017-09-12 | Deadline-constraint services in cloud with heterogeneous servers | Sahoo, S; Mishra, SK; Sahoo, B; Puthal, D; Obaidat, MS |
2022-04-01 | Decision tree based user-centric security solution for critical IoT infrastructure | Puthal, D; Wilson, S; Nanda, A; Liu, M; Swain, S; Sahoo, BPS; Yelamarthi, K; Pillai, P; El-Sayed, H; Prasad, M |
2017-01-01 | Deep Learning Based Face Recognition with Sparse Representation Classification | Cheng, EJ; Prasad, M; Puthal, D; Sharma, N; Prasad, OK; Chin, PH; Lin, CT; Blumenstein, M; Liu, D; Xie, S; Li, Y; Zhao, D; ElAlfy, ESM |
2020-08-01 | Design and evaluation of a novel hierarchical trust assessment approach for vehicular networks | El Sayed, H; Zeadally, S; Puthal, D |
2021-05-01 | Detection of SLA Violation for Big Data Analytics Applications in Cloud | Zeng, X; Garg, S; Barika, M; Bista, S; Puthal, D; Zomaya, AY; Ranjan, R |
2016-12-01 | DLSeF: A dynamic key-length-based efficient real-time security verification model for big data stream | Puthal, D; Nepal, S; Ranjan, R; Chen, J |
2015-12-02 | DPBSV - An efficient and secure scheme for big sensing data stream | Puthal, D; Nepal, S; Ranjan, R; Chen, J |
2017-02-01 | A dynamic prime number based efficient security mechanism for big sensing data streams | Puthal, D; Nepal, S; Ranjan, R; Chen, J |
2018-12-01 | An early detection of low rate DDoS attack to SDN based data center networks using information distance metrics | Sahoo, KS; Puthal, D; Tiwary, M; Rodrigues, JJPC; Sahoo, B; Dash, R |
2017-12-04 | Edge of Things: The Big Picture on the Integration of Edge, IoT and the Cloud in a Distributed Computing Environment | El-Sayed, H; Sankar, S; Prasad, M; Puthal, D; Gupta, A; Mohanty, M; Lin, CT |
2019-12-10 | Editorial to the Special Issue on Recent Advances on Trust, Security and Privacy in Computing and Communications | Nanda, P; Puthal, D; Mohanty, SP |
2018-01-01 | Energy-efficient deployment of edge dataenters for mobile clouds in sustainable iot | Mishra, SK; Puthal, D; Sahoo, B; Sharma, S; Xue, Z; Zomaya, AY |
2018-12-01 | Energy-efficient VM-placement in cloud data center | Mishra, SK; Puthal, D; Sahoo, B; Jayaraman, PP; Jun, S; Zomaya, AY; Ranjan, R |
2020-07-01 | ESMLB: Efficient Switch Migration-Based Load Balancing for Multicontroller SDN in IoT | Sahoo, KS; Puthal, D; Tiwary, M; Usman, M; Sahoo, B; Wen, Z; Sahoo, BPS; Ranjan, R |
2018-07-01 | Everything You Wanted to Know about the Blockchain: Its Promise, Components, Processes, and Problems | Puthal, D; Malik, N; Mohanty, SP; Kougianos, E; Das, G |