Browsing byAuthorPuthal, D

Jump to a point in the index:
Showing results 1 to 20 of 78  next >
Issue DateTitleAuthor(s)
2019-12-10Editorial to the Special Issue on Recent Advances on Trust, Security and Privacy in Computing and CommunicationsNanda, P; Puthal, D; Mohanty, SP
2019-12-09A Novel Multi-Path Anonymous Randomized Key Distribution Scheme for Geo Distributed NetworksNanda, A; Nanda, P; Obaidat, M; He, X; Puthal, D
2019-10-01Ubiquitous Localization (UbiLoc): A Survey and Taxonomy on Device Free Localization for Smart WorldShit, RC; Sharma, S; Puthal, D; James, P; Pradhan, B; Moorsel, AV; Zomaya, AY; Ranjan, R
2019-05-01Fog Computing Security Challenges and Future Directions [Energy and Security]Puthal, D; Mohanty, SP; Bhavake, SA; Morgan, G; Ranjan, R
2019-05-01Unmanned Aerial Vehicles in Consumer Applications: New Applications in Current and Future Smart EnvironmentsKumar, N; Puthal, D; Theocharides, T; Mohanty, SP
2019-04-01Lattice-modeled information flow control of big sensing data streams for smart health applicationPuthal, D
2019-03-20S2R: Service trading based response time optimization in mobile edge computingMishra, P; Tiwary, M; Yang, LT; Puthal, D
2019-03-12A predictive load balancing technique for software defined networked cloud servicesYang, CT; Chen, ST; Liu, JC; Su, YW; Puthal, D; Ranjan, R
2019-03-06Proof-of-Authentication for Scalable Blockchain in Resource-Constrained Distributed SystemsPuthal, D; Mohanty, SP; Nanda, P; Kougianos, E; Das, G
2019-02-01Secure authentication and load balancing of distributed edge datacentersPuthal, D; Ranjan, R; Nanda, A; Nanda, P; Jayaraman, PP; Zomaya, AY
2019-02-01Analytical Model for Sybil Attack Phases in Internet of ThingsMishra, AK; Tripathy, AK; Puthal, D; Yang, LT
2019-01-28A Comparative Study of Machine Learning Techniques for Credit Card Fraud Detection Based on Time VarianceRajora, S; Li, DL; Jha, C; Bharill, N; Patel, OP; Joshi, S; Puthal, D; Prasad, M
2019-01-08Building Scalable Mobile Edge Computing by Enhancing Quality of ServicesTiwary, M; Sharma, S; Mishra, P; El-Sayed, H; Prasad, M; Puthal, D
2019-01-01Adaptive Task Offloading Auction for Industrial CPS in Mobile Edge ComputingLuo, S; Wen, Y; Xu, W; Puthal, D
2019-01-01Proof of Authentication: IoT-Friendly BlockchainsPuthal, D; Mohanty, SP
2018-12-01An early detection of low rate DDoS attack to SDN based data center networks using information distance metricsSahoo, KS; Puthal, D; Tiwary, M; Rodrigues, JJPC; Sahoo, B; Dash, R
2018-12-01Energy-efficient VM-placement in cloud data centerMishra, SK; Puthal, D; Sahoo, B; Jayaraman, PP; Jun, S; Zomaya, AY; Ranjan, R
2018-11-01Secure Computing for the Internet of Things and Network Edges Protecting communication in the worldwide network of devicesPuthal, D; Zhang, X
2018-11-01On the placement of controllers in software-Defined-WAN using meta-heuristic approachSahoo, KS; Puthal, D; Obaidat, MS; Sarkar, A; Mishra, SK; Sahoo, B
2018-11-01A Computing Perspective of Quantum Cryptography [Energy and Security]Nanda, A; Puthal, D; Mohanty, SP; Choppali, U