Issue Date | Title | Author(s) |
2018-01-01 | Privacy-preserving matrix product based static mutual exclusive roles constraints violation detection in interoperable role-based access control | Liu, M; Luo, Y; Yang, C; Pang, S; Puthal, D; Ren, K; Zhang, X |
2019-11-01 | Stackelberg model based game theory approach for assortment and selling price planning for small scale online retailers | Saberi, Z; Saberi, M; Hussain, O; Chang, E |
2017-01-01 | Rendezvous based routing protocol for wireless sensor networks with mobile sink | Sharma, S; Puthal, D; Jena, SK; Zomaya, AY; Ranjan, R |
2019-06-01 | Proactive management of SLA violations by capturing relevant external events in a Cloud of Things environment | Nawaz, F; Hussain, O; Hussain, FK; Janjua, NK; Saberi, M; Chang, E |
2018-01-01 | An adaptive task allocation technique for green cloud computing | Mishra, SK; Puthal, D; Sahoo, B; Jena, SK; Obaidat, MS |
2019-02-01 | Secure authentication and load balancing of distributed edge datacenters | Puthal, D; Ranjan, R; Nanda, A; Nanda, P; Jayaraman, PP; Zomaya, AY |
2018-12-01 | An early detection of low rate DDoS attack to SDN based data center networks using information distance metrics | Sahoo, KS; Puthal, D; Tiwary, M; Rodrigues, JJPC; Sahoo, B; Dash, R |
2020-01-01 | Privacy-preserving cooperative localization in vehicular edge computing infrastructure | Chandra Shit, R; Sharma, S; Watters, P; Yelamarthi, K; Pradhan, B; Davison, R; Morgan, G; Puthal, D |
2018-09-01 | Response time optimization for cloudlets in Mobile Edge Computing | Tiwary, M; Puthal, D; Sahoo, KS; Sahoo, B; Yang, LT |
2020-08-01 | A research of Monte Carlo optimized neural network for electricity load forecast | Yong, B; Huang, L; Li, F; Shen, J; Wang, X; Zhou, Q |