Pradhumna Shrestha

According to our database1, Pradhumna Shrestha authored at least 27 papers between 2011 and 2016.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2016
A Support Vector Machine-Based Framework for Detection of Covert Timing Channels.
IEEE Trans. Dependable Secur. Comput., 2016

An Event-Based Unified System Model to Characterize and Evaluate Timing Covert Channels.
IEEE Syst. J., 2016

2015
A classification tree-based system for multi-sensor train approach detection.
Proceedings of the 2015 IEEE Wireless Communications and Networking Conference, 2015

Detecting covert timing channels using non-parametric statistical approaches.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2015

A novel analytical model and its test bed verification for network covert timing channels.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

A novel Covert Timing Channel detection approach for online network traffic.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2014
Analysis of Energy Usage in Adaptive Sensor Networks.
Proceedings of the IEEE 79th Vehicular Technology Conference, 2014

Leveraging Statistical Feature Points for Generalized Detection of Covert Timing Channels.
Proceedings of the 2014 IEEE Military Communications Conference, 2014

Evaluation and Verification of Automated Covert Channel Modeling Using a Real Network Platform.
Proceedings of the 2014 IEEE Military Communications Conference, 2014

Performance analysis of adaptive clustering in Hybrid Technology Networking.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2014

Towards a unified model for the analysis of timing-based covert channels.
Proceedings of the IEEE International Conference on Communications, 2014

Achieving robustness and capacity gains in covert timing channels.
Proceedings of the IEEE International Conference on Communications, 2014

2013
Performance modeling of a multi-tier multi-hop hybrid sensor network protocol.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

Adaptive Threshold Displacement algorithm for removing hidden information from digital images.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

2012
Assurance of Energy Efficiency and Data Security for ECG Transmission in BASNs.
IEEE Trans. Biomed. Eng., 2012

A Performance Comparison of Mobile WiMAX Spectrums: 2.5 GHz vs. 3.65 GHz.
Proceedings of the 75th IEEE Vehicular Technology Conference, 2012

Performance Analysis for Direction of Arrival Estimating Algorithms.
Proceedings of the 75th IEEE Vehicular Technology Conference, 2012

Watermark removal using pseudorandom desynchronization by selective pixel elimination.
Proceedings of IEEE International Conference on Communications, 2012

A quality-preserving hidden information removal approach for digital images.
Proceedings of IEEE International Conference on Communications, 2012

Quantitative performance analysis of 3.65 GHz mobile WiMAX.
Proceedings of the 2012 IEEE Consumer Communications and Networking Conference (CCNC), 2012

2011
Quantitative analysis of propagation characteristics for Mobile WiMAX.
Proceedings of the 2011 Wireless Telecommunications Symposium, 2011

Priority Preemption for Real-Time Application QoS Guarantees in Cooperative Vehicular Networks.
Proceedings of the 73rd IEEE Vehicular Technology Conference, 2011

A cross-layer parallel handover optimization scheme for WiMAX networks.
Proceedings of the MILCOM 2011, 2011

A study on energy efficient multi-tier multi-hop wireless sensor networks for freight-train monitoring.
Proceedings of the 7th International Wireless Communications and Mobile Computing Conference, 2011

A new energy-efficient pre-diagnosing ECG transmission technique for BASN.
Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies, 2011

A general attack method for steganography removal using Pseudo-CFA re-interpolation.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011

Low-complexity image coder/decoder with an approaching-entropy quad-tree search code for embedded computing platforms.
Proceedings of the 18th IEEE International Conference on Image Processing, 2011


  Loading...