Meenakshi Tripathi

Orcid: 0000-0002-6559-5151

According to our database1, Meenakshi Tripathi authored at least 39 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Detecting Sybil Attacks in VANET: Exploring Feature Diversity and Deep Learning Algorithms with Insights into Sybil Node Associations.
J. Netw. Syst. Manag., July, 2024

Observer Design for Nonlinear Descriptor Systems: A Survey on System Nonlinearities.
Circuits Syst. Signal Process., May, 2024

An integrated deep learning model for Ethereum smart contract vulnerability detection.
Int. J. Inf. Sec., February, 2024

Cooperative approach for data-centric and node-centric misbehavior detection in VANET.
Veh. Commun., 2024

Intelligent defense strategies: Comprehensive attack detection in VANET with deep reinforcement learning.
Pervasive Mob. Comput., 2024

Privacy-Preserving Federated Learning for Intrusion Detection in IoT Environments: A Survey.
IEEE Access, 2024

2023
Efficient Privacy-Preserving Authentication using Blockchain for VANET.
Proceedings of the 15th International Conference on COMmunication Systems & NETworkS, 2023

A Post-Quantum End-to-End Encryption Protocol.
Proceedings of the IEEE International Conference on Advanced Networks and Telecommunications Systems, 2023

2022
A secure and lightweight anonymous mutual authentication scheme for wearable devices in Medical Internet of Things.
J. Inf. Secur. Appl., 2022

Gas Fee Reduction by Detecting Loop Fusible Patterns in Ethereum Smart Contract.
Proceedings of the IEEE International Conference on Advanced Networks and Telecommunications Systems, 2022

2021
Security of SDN-based vehicular ad hoc networks: State-of-the-art and challenges.
Veh. Commun., 2021

Leveraging LSTM-RNN combined with SVM for Network Intrusion Detection.
Proceedings of the DSMLAI '21: International Conference on Data Science, Machine Learning and Artificial Intelligence, Windhoek Namibia, August 9, 2021

"X-Phish: Days of Future Past"‡: Adaptive & Privacy Preserving Phishing Detection.
Proceedings of the IEEE Conference on Communications and Network Security, 2021

2020
TRACK: An algorithm for fault-tolerant, dynamic and scalable 2D mesh network-on-chip routing reconfiguration.
Integr., 2020

<i>Vulvet</i>: Vetting of Vulnerabilities in Android Apps to Thwart Exploitation.
DTRAP, 2020

EspyDroid+: Precise reflection analysis of android apps.
Comput. Secur., 2020

A provably secure and efficient anonymous mutual authentication and key agreement protocol for wearable devices in WBAN.
Comput. Commun., 2020

Chapter Three - Effectiveness of state-of-the-art dynamic analysis techniques in identifying diverse Android malware and future enhancements.
Adv. Comput., 2020

A Novel Framework for Misbehavior Detection in SDN-based VANET.
Proceedings of the 14th IEEE International Conference on Advanced Networks and Telecommunications Systems, 2020

2019
S2DIO: an extended scalable 2D mesh network-on-chip routing reconfiguration for efficient bypass of link failures.
J. Supercomput., 2019

TILAK: A token-based prevention approach for topology discovery threats in SDN.
Int. J. Commun. Syst., 2019

SLDP: A secure and lightweight link discovery protocol for software defined networking.
Comput. Networks, 2019

A lightweight anonymous user authentication and key establishment scheme for wearable devices.
Comput. Networks, 2019

2018
SAFETY: Early Detection and Mitigation of TCP SYN Flood Utilizing Entropy in SDN.
IEEE Trans. Netw. Serv. Manag., 2018

Human Face Detection Enabled Smart Stick for Visually Impaired People.
Proceedings of the Data Science and Big Data Analytics, 2018

Poster: A lightweight Mutually Authenticated Key-Agreement scheme for Wireless Body Area Networks in Internet of Things Environment.
Proceedings of the 24th Annual International Conference on Mobile Computing and Networking, 2018

Embedded Assistive Stick for Visually Impaired Persons.
Proceedings of the 9th International Conference on Computing, 2018

2017
Balanced energy routing protocol for clustered wireless sensor network.
Int. J. Inf. Commun. Technol., 2017

Multi-constraints link stable multicast routing protocol in MANETs.
Ad Hoc Networks, 2017

Performance-Enhanced d^2 -LBDR for 2D Mesh Network-on-Chip.
Proceedings of the VLSI Design and Test - 21st International Symposium, 2017

'Global view' in SDN: existing implementation, vulnerabilities & threats.
Proceedings of the 10th International Conference on Security of Information and Networks, 2017

Unraveling Reflection Induced Sensitive Leaks in Android Apps.
Proceedings of the Risks and Security of Internet and Systems, 2017

Multiple distance sensors based smart stick for visually impaired people.
Proceedings of the IEEE 7th Annual Computing and Communication Workshop and Conference, 2017

FICUR: Employing SDN programmability to secure ARP.
Proceedings of the IEEE 7th Annual Computing and Communication Workshop and Conference, 2017

Detection of Information Leaks via Reflection in Android Apps.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

sPECTRA: A precise framEwork for analyzing CrypTographic vulneRabilities in Android apps.
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017

2015
A robust dynamic analysis system preventing SandBox detection by Android malware.
Proceedings of the 8th International Conference on Security of Information and Networks, 2015

2013
Energy Efficient Clustered Routing for Wireless Sensor Network.
Proceedings of the IEEE 9th International Conference on Mobile Ad-hoc and Sensor Networks, 2013

Comparing the Impact of Black Hole and Gray Hole Attack on LEACH in WSN.
Proceedings of the 4th International Conference on Ambient Systems, 2013


  Loading...