Alekha Kumar Mishra

Orcid: 0000-0002-5461-7845

According to our database1, Alekha Kumar Mishra authored at least 20 papers between 2011 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
An Experimental Comparison and Impact Analysis of Various RPL-Based IoT Security Threats Using Contiki Simulator.
Proceedings of the 16th International Conference on COMmunication Systems & NETworkS, 2024

2023
Data Sampling In Federated Learning: Principles, Features And Taxonomy.
IEEE Commun. Stand. Mag., December, 2023

Hybrid Mode of Operation Schemes for P2P Communication to Analyze End-Point Individual Behaviour in IoT.
ACM Trans. Sens. Networks, May, 2023

A Secure RPL Rank Computation and Distribution Mechanism for Preventing Sinkhole Attack in IoT-based Systems.
Proceedings of the IEEE INFOCOM 2023, 2023

A 2-Colorable DODAG Structured Hybrid Mode of Operations Architecture for RPL Protocol to Reduce Communication Overhead.
Proceedings of the Internet of Things. Advances in Information and Communication Technology, 2023

2022
Hybrid Mode of Operations for RPL in IoT: A Systematic Survey.
IEEE Trans. Netw. Serv. Manag., 2022

A Novel Logo Identification Technique for Logo-Based Phishing Detection in Cyber-Physical Systems.
Future Internet, 2022

2020
A sinkhole prevention mechanism for RPL in IoT.
Int. J. Comput. Sci. Eng., 2020

Performance-based Comparative Analysis of Open Source Vulnerability Testing Tools for Web Database Applications.
Proceedings of the 11th International Conference on Computing, 2020

2019
Analytical Model for Sybil Attack Phases in Internet of Things.
IEEE Internet Things J., 2019

Comparison of Nikto and Uniscan for measuring URL vulnerability.
Proceedings of the 10th International Conference on Computing, 2019

2018
A Chain Topology for Efficient Monitoring of Food Grain Storage using Smart Sensors.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

Performance Comparison and Analysis of Slowloris, GoldenEye and Xerxes DDoS Attack Tools.
Proceedings of the 2018 International Conference on Advances in Computing, 2018

Graph-Based Symmetric Crypto-System for Data Confidentiality.
Proceedings of the IEEE Global Communications Conference, 2018

2017
A Replica Detection Scheme Based on the Deviation in Distance Traveled Sliding Window for Wireless Sensor Networks.
Wirel. Commun. Mob. Comput., 2017

2016
A comparative analysis of node replica detection schemes in wireless sensor networks.
J. Netw. Comput. Appl., 2016

2015
Residual energy-based replica detection scheme for mobile wireless sensor networks.
Secur. Commun. Networks, 2015

2014
Node coloring based replica detection technique in wireless sensor networks.
Wirel. Networks, 2014

2013
A Zone-Based Node Replica Detection Scheme for Wireless Sensor Networks.
Wirel. Pers. Commun., 2013

2011
A Key Renewal Model for Wireless Sensor Network Under Node Capture Attack.
Proceedings of the 4th International Conference on Emerging Trends in Engineering and Technology, 2011


  Loading...