Browsing byAuthorNanda, P

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 1 to 20 of 102  next >
Issue DateTitleAuthor(s)
2011-12-01Analysis of BGP security vulnerabilitiesMujtaba, M; Nanda, P
2011-01Analysis of the BGP Security VulnerabilitiesMujtaba, M; Nanda, P; Williams, DT; Valli, PC
2018-09-05Asymmetric Commutative Encryption Scheme Based Efficient Solution to the Millionaires' ProblemLiu, M; Nanda, P; Zhang, X; Yang, C; Yu, S; Li, J
2020-01-01Automated Ethereum Smart Contract for Block Chain Based Smart Home SecurityQashlan, A; Nanda, P; He, X
2018-09-05Blockchain Based Secured Identity Authentication and Expeditious Revocation Framework for Vehicular NetworksMalik, N; Nanda, P; Arora, A; He, X; Puthal, D
2012-11-05Border gateway protocol anomaly detection using failure quality control methodMujtaba, M; Nanda, P; He, X
2016-10-01Building an intrusion detection system using a filter-based feature selection algorithmAmbusaidi, MA; He, X; Nanda, P; Tan, Z
2011-09-21Building Content Distribution Network: A solution to achieve qos on internetYang, Y; Nanda, P
2017-10-01Building Security Perimeters to Protect Network Systems Against Cyber Threats [Future Directions]Puthal, D; Mohanty, SP; Nanda, P; Choppali, U
2020-03-01BuildSenSys: Reusing Building Sensing Data for Traffic Prediction with Cross-domain LearningNanda, P; Fan, X; He, X
2011-10-31Credibility problems and tradeoff between realistic and abstraction in WANET and WSN SimulationYu, D; Nanda, P; Braun, R
2018-07-27CTOM: Collaborative task offloading mechanism for mobile cloudlet networksFan, X; He, X; Puthal, D; Chen, S; Xiang, C; Nanda, P; Rao, X
2015-12-02Data mobility management model for active data cubesDang, TD; Hoang, D; Nanda, P
2017Data Protection and Mobility Management for CloudDang, D; Hoang, DB; Nanda, P; Kumar, V; Ko, R; Chaisiri, S
2016-01-01Data sharing in secure multimedia wireless sensor networksUsman, M; Jan, MA; He, X; Nanda, P
2011-11-28Denial-of-service attack detection based on multivariate correlation analysisTan, Z; Jamdagni, A; He, X; Nanda, P; Liu, RP
2015-09-01Detection of Denial-of-Service Attacks Based on Computer Vision TechniquesTan, Z; Jamdagni, A; He, X; Nanda, P; Liu, RP; Hu, J
2019-12-10Editorial to the Special Issue on Recent Advances on Trust, Security and Privacy in Computing and CommunicationsNanda, P; Puthal, D; Mohanty, SP
2007-12-01Effect of network policies on internet traffic engineeringNanda, P; Simmonds, AJ
2019-01-01Efficient solution to the millionaires' problem based on asymmetric commutative encryption schemeLiu, M; Luo, Y; Nanda, P; Yu, S; Zhang, J