Manoj Misra

Orcid: 0000-0002-7288-7777

According to our database1, Manoj Misra authored at least 104 papers between 1997 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Email bombing attack detection and mitigation using machine learning.
Int. J. Inf. Sec., August, 2024

HTTP header based phishing attack detection using machine learning.
Trans. Emerg. Telecommun. Technol., January, 2024

2023
Symmetric key-based authentication and key agreement scheme resistant against semi-trusted third party for fog and dew computing.
J. Supercomput., July, 2023

An Enhanced Cross-Network-Slice Authentication Protocol for 5G.
IEEE Trans. Sustain. Comput., 2023

An EAP-Based Mutual Authentication Protocol for WLAN-Connected IoT Devices.
IEEE Trans. Ind. Informatics, 2023

A Secure Blockchain-based Authentication and Key Agreement Protocol for 5G Roaming.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

A Provably Secure and Efficient 5G-AKA Authentication Protocol using Blockchain.
Proceedings of the 20th IEEE Consumer Communications & Networking Conference, 2023

2022
An improved and provably secure symmetric-key based 5G-AKA Protocol.
Comput. Networks, 2022

Forensic Analysis and Detection of Spoofing Based Email Attack Using Memory Forensics and Machine Learning.
Proceedings of the Security and Privacy in Communication Networks, 2022

LEMAP: A Lightweight EAP based Mutual Authentication Protocol for IEEE 802.11 WLAN.
Proceedings of the IEEE International Conference on Communications, 2022

A Provably Secure ECC-based Multi-factor 5G-AKA Authentication Protocol.
Proceedings of the IEEE Global Communications Conference, 2022

2021
Evading DoH via Live Memory Forensics for Phishing Detection and Content Filtering.
Proceedings of the 13th International Conference on COMmunication Systems & NETworkS, 2021

2020
A Novel Machine Learning Methodology for Detecting Phishing Attacks in Real Time.
Proceedings of the Security and Trust Management - 16th International Workshop, 2020

Secure and User Efficient EAP-based Authentication Protocol for IEEE 802.11 Wireless LANs.
Proceedings of the 17th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2020

Identification of Spoofed Emails by applying Email Forensics and Memory Forensics.
Proceedings of the ICCNS 2020: The 10th International Conference on Communication and Network Security, 2020

2018
A (n, n) threshold non-expansible XOR based visual cryptography with unique meaningful shares.
Signal Process., 2018

Just process me, without knowing me: a secure encrypted domain processing based on Shamir secret sharing and POB number system.
Multim. Tools Appl., 2018

Secure authentication scheme to thwart RT MITM, CR MITM and malicious browser extension based phishing attacks.
J. Inf. Secur. Appl., 2018

Parallel progressive sequential pattern (PPSP) mining.
Proceedings of the IEEE 8th Annual Computing and Communication Workshop and Conference, 2018

2017
A secure image sharing scheme based on SVD and Fractional Fourier Transform.
Signal Process. Image Commun., 2017

SmartITS: Smartphone-based identification and tracking using seamless indoor-outdoor localization.
J. Netw. Comput. Appl., 2017

Towards scalable and load-balanced mobile agents-based data aggregation for wireless sensor networks.
Comput. Electr. Eng., 2017

Optimization of Zuker Algorithm on GPUs.
Proceedings of the 18th International Conference on Parallel and Distributed Computing, 2017

Smart pilgrim: A mobile-sensor-cloud based system to safeguard pilgrims through smart environment.
Proceedings of the Tenth International Conference on Contemporary Computing, 2017

An Improved Smartphone-Based Non-Participatory Crowd Monitoring System in Smart Environments.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

Email spoofing detection using volatile memory forensics.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

Detecting Spying and Fraud Browser Extensions: Short Paper.
Proceedings of the 2017 on Multimedia Privacy and Security, 2017

2016
A survey and classification of web phishing detection schemes.
Secur. Commun. Networks, 2016

A phish detector using lightweight search features.
Comput. Secur., 2016

Improving the accuracy of Search Engine based anti-phishing solutions using lightweight features.
Proceedings of the 11th International Conference for Internet Technology and Secured Transactions, 2016

2015
An Energy Efficient Distributed Approach-Based Agent Migration Scheme for Data Aggregation in Wireless Sensor Networks.
J. Inf. Process. Syst., 2015

Smartphone based indoor tracking using magnetic and indoor maps.
Proceedings of the Tenth IEEE International Conference on Intelligent Sensors, 2015

2014
Energy and trust aware mobile agent migration protocol for data aggregation in wireless sensor networks.
J. Netw. Comput. Appl., 2014

Distributed Information Extraction in Wireless Sensor Networks using Multiple Software Agents with Dynamic Itineraries.
KSII Trans. Internet Inf. Syst., 2014

Trust-based Multi-Path Routing for Enhancing Data Security in MANETs.
Int. J. Netw. Secur., 2014

Minimum mutable checkpoint-based coordinated checkpointing protocol for mobile distributed systems.
Int. J. Commun. Networks Distributed Syst., 2014

RaMaN: A dynamic clustering protocol resilient against colluded role-manipulability and node replication attacks.
Proceedings of the International Conference on High Performance Computing & Simulation, 2014

2013
Energy efficient data gathering using prediction-based filtering in wireless sensor networks.
Int. J. Inf. Commun. Technol., 2013

A framework for alignment-free methods to perform similarity analysis of biological sequence.
Proceedings of the Sixth International Conference on Contemporary Computing, 2013

2012
ANN Based Scheme to Predict Number of Zombies in a DDoS Attack.
Int. J. Netw. Secur., 2012

Distributed Denial of Service Prevention Techniques
CoRR, 2012

Dynamic and Auto Responsive Solution for Distributed Denial-of-Service Attacks Detection in ISP Network
CoRR, 2012

An Efficient Analytical Solution to Thwart DDoS Attacks in Public Domain
CoRR, 2012

An ISP Level Solution to Combat DDoS Attacks using Combined Statistical Based Approach
CoRR, 2012

Categorising Context and Using Short Term Contextual Information to Obtain Long Term Context.
Proceedings of the 11th IEEE International Conference on Trust, 2012

An efficient fuzzy controller based technique for network traffic classification to improve QoS.
Proceedings of the 5th International Conference of Security of Information and Networks, 2012

2011
Cooperative Caching in Mobile Ad Hoc Networks.
Int. J. Mob. Comput. Multim. Commun., 2011

Misbehaving nodes detection through opinion based trust evaluation model in MANETs.
Proceedings of the ICWET '11 International Conference & Workshop on Emerging Trends in Technology, Mumbai, Maharashtra, India, February 25, 2011

Performance evaluation of agent and non-agent based data dissemination protocols for wireless sensor networks.
Proceedings of the 17th IEEE International Conference on Networks, 2011

Eliminating misbehaving nodes by opinion based trust evaluation model in MANETs.
Proceedings of the 2011 International Conference on Communication, 2011

A cooperative caching strategy in mobile ad hoc networks based on clusters.
Proceedings of the 2011 International Conference on Communication, 2011

Opinion Based Trust Evaluation Model in MANETs.
Proceedings of the Contemporary Computing - 4th International Conference, 2011

An energy balanced mobile agents based data dissemination protocol for wireless sensor networks.
Proceedings of the 1st International Conference on Wireless Technologies for Humanitarian Relief, 2011

2010
An AODV Based QoS Routing Protocol for Delay Sensitive Applications in Mobile Ad Hoc Networks.
J. Digit. Inf. Manag., 2010

Estimating strength of DDoS attack using various regression models.
Int. J. Multim. Intell. Secur., 2010

Prioritised Predicted Region based Cache Replacement Policy for location dependent data in mobile environment.
Int. J. Ad Hoc Ubiquitous Comput., 2010

A weighted checkpointing protocol for mobile distributed systems.
Int. J. Ad Hoc Ubiquitous Comput., 2010

Data filtering and dynamic sensing for continuous monitoring in wireless sensor networks.
Int. J. Auton. Adapt. Commun. Syst., 2010

Trust based multi-path routing for end to end secure data delivery in manets.
Proceedings of the 3rd International Conference on Security of Information and Networks, 2010

Trust enhanced secure multi-path routing protocol for detecting and mitigating misbehaving nodes.
Proceedings of the ICWET '10 International Conference & Workshop on Emerging Trends in Technology, Mumbai, Maharashtra, India, February 26, 2010

Detection and Mitigation of Attacks by Colluding Misbehaving Nodes in MANET.
Proceedings of the Recent Trends in Network Security and Applications, 2010

Trust based security in MANET routing protocols: a survey.
Proceedings of the 1st Amrita ACM-W Celebration on Women in Computing in India, 2010

Trust Based Multi Path DSR Protocol.
Proceedings of the ARES 2010, 2010

2009
Defending against Distributed Denial of Service Attacks: Issues and Challenges.
Inf. Secur. J. A Glob. Perspect., 2009

Concurrency Control for Multilevel Secure Databases.
Int. J. Netw. Secur., 2009

MSTBBN: M-way Search Tree Based Base Station to Node Communication Protocol for Wireless Sensor Networks.
Proceedings of the First International Conference on Networks and Communications, 2009

2008
A Predicted Region based Cache Replacement Policy for Location Dependent Data in Mobile Environment.
Int. J. Commun. Netw. Syst. Sci., 2008

Distributed real time database systems: background and literature review.
Distributed Parallel Databases, 2008

Tuning Data Reporting and Sensing for Continuous Monitoring in Wireless Sensor Networks.
Proceedings of the 2008 IEEE International Performance, 2008

Dual radio based cooperative caching for wireless sensor networks.
Proceedings of the 16th International Conference on Networks, 2008

FVBA: A combined statistical approach for low rate degrading and high bandwidth disruptive DDoS attacks detection in ISP domain.
Proceedings of the 16th International Conference on Networks, 2008

FTEP: A fault tolerant election protocol for multi-level clustering in homogeneous wireless sensor networks.
Proceedings of the 16th International Conference on Networks, 2008

A QoS routing protocol for delay-sensitive applications in mobile ad hoc networks.
Proceedings of the Third International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2008), 2008

2007
Cooperative Caching Strategy in Mobile Ad Hoc Networks Based on Clusters.
Wirel. Pers. Commun., 2007

Exploiting caching in heterogeneous mobile environment.
Wirel. Commun. Mob. Comput., 2007

On the Design of Adaptive and Decentralized Load Balancing Algorithms with Load Estimation for Computational Grid Environments.
IEEE Trans. Parallel Distributed Syst., 2007

Cooperative caching in mobile ad hoc networks based on data utility.
Mob. Inf. Syst., 2007

A Review of Quality of Service (QoS) Route Provisioning in Mobile Ad Hoc Networks.
J. Digit. Inf. Manag., 2007

Energy efficient cache invalidation in a disconnected wireless mobile environment.
Int. J. Ad Hoc Ubiquitous Comput., 2007

Supporting cooperative caching in mobile ad hoc networks using clusters.
Int. J. Ad Hoc Ubiquitous Comput., 2007

A weighted cache replacement policy for location dependent data in mobile environments.
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), 2007

Secure Transaction Management Protocols for MLS/DDBMS.
Proceedings of the Information Systems Security, Third International Conference, 2007

Modeling Hierarchical Mobile Agent Security Protocol Using CP Nets.
Proceedings of the High Performance Computing, 2007

2006
A zone co-operation approach for efficient caching in mobile ad hoc networks.
Int. J. Commun. Syst., 2006

SWIFT-A new real time commit protocol.
Distributed Parallel Databases, 2006

Dependency Sensitive Shadow SWIFT.
Proceedings of the Tenth International Database Engineering and Applications Symposium (IDEAS 2006), 2006

Efficient Cache Replacement in Mobile Environment Using Data Profit.
Proceedings of the 12th International Conference on Parallel and Distributed Systems, 2006

Fairness Strategy for Multilevel Secure Concurrency Control Protocol.
Proceedings of the Information Systems Security, Second International Conference, 2006

A Secure Concurrency Control for MLS/DDBSs.
Proceedings of the First IEEE International Conference on Digital Information Management (ICDIM), 2006

Estimation Based Load Balancing Algorithm for Data-Intensive Heterogeneous Grid Environments.
Proceedings of the High Performance Computing, 2006

Efficient cooperative caching in ad hoc networks.
Proceedings of the First International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2006), 2006

OCP: a distributed real time commit protocol.
Proceedings of the Database Technologies 2006, 2006

2005
Energy Efficient Cache Invalidation in a Mobile Environment.
J. Digit. Inf. Manag., 2005

Strategies for Cache Invalidation of Location Dependent Data in Mobile Environment.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2005

A Memory Efficient Fast Distributed Real Time Commit Protocol.
Proceedings of the Distributed Computing, 2005

Efficient Mobility Management for Cache Invalidation in Wireless Mobile Environment.
Proceedings of the Distributed Computing, 2005

Performance Comparison of Majority Voting with ROWA Replication Method over PlanetLab.
Proceedings of the Distributed Computing, 2005

Performance Evaluation of Secure Concurrency Control Algorithm for Multilevel Secure Distributed Database Systems.
Proceedings of the International Symposium on Information Technology: Coding and Computing (ITCC 2005), 2005

A New Commit Protocol for Distributed Real-Time Database Systems.
Proceedings of the IASTED International Conference on Databases and Applications, 2005

2004
Energy Efficient Cache Invalidation in a Disconnected Mobile Environment.
Proceedings of the Distributed Computing and Internet Technology, 2004

Broadcast Based Cache Invalidation and Prefetching in Mobile Environment.
Proceedings of the High Performance Computing, 2004

2002
Analysis of a Transaction System with Checkpointing, Failures, and Rollback.
Proceedings of the Computer Performance Evaluation, 2002

1999
On the Propagation of Updates in Distributed Replicated Systems.
Perform. Evaluation, 1999

1997
Performance modelling of replication protocols.
PhD thesis, 1997


  Loading...