Browsing by Author Puthal, D

Showing results 1 to 20 of 68  next >
Issue DateTitleAuthor(s)
1-Apr-2019Lattice-modeled information flow control of big sensing data streams for smart health applicationPuthal, D
12-Mar-2019A predictive load balancing technique for software defined networked cloud servicesYang, CT; Chen, ST; Liu, JC; Su, YW; Puthal, D; Ranjan, R
1-Feb-2019Analytical Model for Sybil Attack Phases in Internet of ThingsMishra, AK; Tripathy, AK; Puthal, D; Yang, LT
1-Feb-2019Secure authentication and load balancing of distributed edge datacentersPuthal, D; Ranjan, R; Nanda, A; Nanda, P; Jayaraman, PP; Zomaya, AY
28-Jan-2019A Comparative Study of Machine Learning Techniques for Credit Card Fraud Detection Based on Time VarianceRajora, S; Li, DL; Jha, C; Bharill, N; Patel, OP; Joshi, S; Puthal, D; Prasad, M
8-Jan-2019Building Scalable Mobile Edge Computing by Enhancing Quality of ServicesTiwary, M; Sharma, S; Mishra, P; El-Sayed, H; Prasad, M; Puthal, D
1-Jan-2019Proof of Authentication: IoT-Friendly BlockchainsPuthal, D; Mohanty, SP
1-Dec-2018Energy-efficient VM-placement in cloud data centerMishra, SK; Puthal, D; Sahoo, B; Jayaraman, PP; Jun, S; Zomaya, AY; Ranjan, R
1-Dec-2018An early detection of low rate DDoS attack to SDN based data center networks using information distance metricsSahoo, KS; Puthal, D; Tiwary, M; Rodrigues, JJPC; Sahoo, B; Dash, R
1-Nov-2018Secure Computing for the Internet of Things and Network Edges Protecting communication in the worldwide network of devicesPuthal, D; Zhang, X
1-Nov-2018A Computing Perspective of Quantum Cryptography [Energy and Security]Nanda, A; Puthal, D; Mohanty, SP; Choppali, U
1-Nov-2018On the placement of controllers in software-Defined-WAN using meta-heuristic approachSahoo, KS; Puthal, D; Obaidat, MS; Sarkar, A; Mishra, SK; Sahoo, B
1-Oct-2018Sustainable Service Allocation Using a Metaheuristic Technique in a Fog Server for Industrial ApplicationsMishra, SK; Puthal, D; Rodrigues, JJPC; Sahoo, B; Dutkiewicz, E
5-Sep-2018Blockchain Based Secured Identity Authentication and Expeditious Revocation Framework for Vehicular NetworksMalik, N; Nanda, P; Arora, A; He, X; Puthal, D
4-Sep-2018Adaptive routing protocol for urban vehicular networks to support sellers and buyers on wheelsBhoi, SK; Puthal, D; Khilar, PM; Rodrigues, JJPC; Panda, SK; Yang, LT
1-Sep-2018Response time optimization for cloudlets in Mobile Edge ComputingTiwary, M; Puthal, D; Sahoo, KS; Sahoo, B; Yang, LT
28-Aug-2018Towards System Implementation and Data Analysis for Crowdsensing Based Outdoor RSS MapsFan, X; He, X; Xiang, C; Puthal, D; Gong, L; Nanda, P; Fang, G
17-Aug-2018First score auction for pricing-based resource selection in vehicular cloudMishra, S; Mishra, SK; Sahoo, B; Obaidat, MS; Puthal, D
17-Aug-2018A fingerprinting technique for identification of wireless devicesDalai, AK; Jena, A; Sharma, S; Mohapatra, A; Sahoo, B; Obaidat, MS; Sadoun, B; Puthal, D
13-Aug-2018A novel collaborative task offloading scheme for secure and sustainable mobile cloudlet networksYang, N; Fan, X; Puthal, D; He, X; Nanda, P; Guo, S