Issue Date | Title | Author(s) |
2017-09-12 | Deadline-constraint services in cloud with heterogeneous servers | Sahoo, S; Mishra, SK; Sahoo, B; Puthal, D; Obaidat, MS |
2018-07-27 | CTOM: Collaborative task offloading mechanism for mobile cloudlet networks | Fan, X; He, X; Puthal, D; Chen, S; Xiang, C; Nanda, P; Rao, X |
2019-02-01 | Analytical Model for Sybil Attack Phases in Internet of Things | Mishra, AK; Tripathy, AK; Puthal, D; Yang, LT |
2018-12-01 | An early detection of low rate DDoS attack to SDN based data center networks using information distance metrics | Sahoo, KS; Puthal, D; Tiwary, M; Rodrigues, JJPC; Sahoo, B; Dash, R |
2018-01-01 | Graph-Based Symmetric Crypto-System for Data Confidentiality | Mishra, AK; Obaidat, MS; Puthal, D; Tripathy, AK; Choo, KKR |
2018-07-31 | An Overview of Security Challenges in Vehicular Ad-Hoc Networks | Malik, N; Puthal, D; Nanda, P |
2018-08-17 | A fingerprinting technique for identification of wireless devices | Dalai, AK; Jena, A; Sharma, S; Mohapatra, A; Sahoo, B; Obaidat, MS; Sadoun, B; Puthal, D |
2018-01-02 | A Novel Hybrid Authentication Model for Geo Location Oriented Routing in Dynamic Wireless Mesh Networks | Nanda, A; Nanda, P; He, X; Puthal, D; Jamdagni, A |
2017-04-04 | Private matching and set intersection computation in multi-agent and industrial control systems | Rasheed, A; Kenneth, A; Mahapatra, R; Puthal, D |
2020-01-01 | Privacy-preserving cooperative localization in vehicular edge computing infrastructure | Chandra Shit, R; Sharma, S; Watters, P; Yelamarthi, K; Pradhan, B; Davison, R; Morgan, G; Puthal, D |