Manisha J. Nene

Orcid: 0000-0003-0669-4464

According to our database1, Manisha J. Nene authored at least 26 papers between 2012 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Detection and Mitigation Mechanisms for Covert Channel Attack.
Proceedings of the IEEE International Carnahan Conference on Security Technology, 2023

A Comprehensive Survey on Artificial Intelligence Based Methods and Technologies Used to Detect Nutrition Level (Malnourishment).
Proceedings of the IEEE International Carnahan Conference on Security Technology, 2023

2022
A framework for prototyping Distributed Cyber-Physical Systems with reference nets.
Simul. Model. Pract. Theory, 2022

Qubits based mutual authentication protocol.
Secur. Priv., 2022

Quantum web of trust.
Secur. Priv., 2022

Brevis factor ρ to evaluate data aggregation tree scheduling heuristics in sensor networks.
Int. J. Commun. Syst., 2022

2021
Multihop Trust Evaluation Using Memory Integrity in Wireless Sensor Networks.
IEEE Trans. Inf. Forensics Secur., 2021

Quantum computing: A measurement and analysis review.
Concurr. Comput. Pract. Exp., 2021

2020
Weakly Supervised Learning-based Table Detection.
SN Comput. Sci., 2020

Dual factor third-party biometric-based authentication scheme using quantum one time passwords†.
Secur. Priv., 2020

Two-factor authentication using biometric based quantum operations.
Secur. Priv., 2020

Scheduling data aggregation trees to extend network lifetime in sensor networks.
Int. J. Commun. Syst., 2020

2019
Decision Making in the Battlefield-of-Things.
Wirel. Pers. Commun., 2019

Node-Level Trust Evaluation in Wireless Sensor Networks.
IEEE Trans. Inf. Forensics Secur., 2019

Scheduling of data aggregation trees using Local Heuristics to enhance network lifetime in sensor networks.
Comput. Networks, 2019

Trust Based Security in Battlefield-of-Things.
Proceedings of the 2019 International Conference on Wireless Networks and Mobile Communications, 2019

2018
Internet of Things applied to Asymmetric Operations.
Proceedings of the 2018 International Conference on Advances in Computing, 2018

2017
A Strategic Framework for Searching Mobile Targets Using Mobile Sensors.
Wirel. Pers. Commun., 2017

Erratum to: Modeling and Analysis of Grid-Based Target Searching Problems in a Mobile Sensor Network.
Wirel. Pers. Commun., 2017

Modeling and Analysis of Grid-Based Target Searching Problems in a Mobile Sensor Network.
Wirel. Pers. Commun., 2017

Multi-agent target searching with time constraints using game-theoretic approaches.
Kybernetes, 2017

2015
Hostile Intent Identification by Movement Pattern Analysis: Using Artificial Neural Networks.
CoRR, 2015

2014
Hostile Intent Enumeration using Soft Computing Techniques.
CoRR, 2014

Autonomous formation control and target tracking in distributed Multi-agent System.
Proceedings of the 2014 International Conference on Advances in Computing, 2014

2012
UREA: an algorithm for maximisation of coverage in stochastic deployment of wireless sensor networks.
Int. J. Parallel Emergent Distributed Syst., 2012

D-UREA: Distributed uncovered region exploration algorithm for reorganization of sensor nodes to maximize coverage.
Proceedings of the Tenth Annual IEEE International Conference on Pervasive Computing and Communications, 2012


  Loading...