Neeli R. Prasad

According to our database1, Neeli R. Prasad authored at least 163 papers between 2001 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Digital Privacy in Healthcare: State-of-the-Art and Future Vision.
IEEE Access, 2024

2023
Intelligent LSTM (iLSTM)-Security Model for HetIoT.
Wirel. Pers. Commun., November, 2023

2022
C5: A Step Towards Smart World with Enhanced Holistic Wellbeing.
Wirel. Pers. Commun., 2022

Smart LSTM-based IDS for Heterogeneous IoT (HetIoT).
Proceedings of the 25th International Symposium on Wireless Personal Multimedia Communications, 2022

ROAD Value-based DME detection and OBE enhanced DME mitigation for LDACS.
Proceedings of the 25th International Symposium on Wireless Personal Multimedia Communications, 2022

2021
Guest Editorial Column.
Wirel. Pers. Commun., 2021

Security Threat Analysis of the 5G ESSENCE Platform.
Wirel. Pers. Commun., 2021

Guest Editorial Special Issue on Intent-Based Networking for 5G-Envisioned Internet of Connected Vehicles.
IEEE Trans. Intell. Transp. Syst., 2021

EEHRP: Energy Efficient Hybrid Routing Protocol for Wireless Sensor Networks.
J. Mobile Multimedia, 2021

Ubiquitous Networks: A Need of Future World of Things.
J. ICT Stand., 2021

2020
SDN-enabled Slicing in Disaggregated Multi-domain and Multi-layer 5G Transport Networks.
Proceedings of the 23rd International Symposium on Wireless Personal Multimedia Communications, 2020

Evaluating the cost benefit of real-time optical performance in dynamic optical restoration.
Proceedings of the 16th International Conference on the Design of Reliable Communication Networks, 2020

2019
Energy Efficient Mobility Enhancement in LTE Pico-Macro HetNet Systems.
Wirel. Pers. Commun., 2019

A Survey of Image-Based Indoor Localization using Deep Learning.
Proceedings of the 22nd International Symposium on Wireless Personal Multimedia Communications, 2019

2018
GSHMAC: Green and Secure Hybrid Medium Access Control for Wireless Sensor Network.
Wirel. Pers. Commun., 2018

Random Mobility and Heterogeneity-Aware Hybrid Synchronization for Wireless Sensor Network.
Wirel. Pers. Commun., 2018

Q-MOHRA: QoS Assured Multi-objective Hybrid Routing Algorithm for Heterogeneous WSN.
Wirel. Pers. Commun., 2018

A Novel Sensor Node Deployment using Low Discrepancy Sequences for WSN.
Wirel. Pers. Commun., 2018

An Introductory Editorial: Special Issue on Global Wireless Summit (GWS-2015).
Wirel. Pers. Commun., 2018

Capability-Based Access Control with ECC Key Management for the M2M Local Cloud Platform.
Wirel. Pers. Commun., 2018

2017
GHMAC: Green and Hybrid Medium Access Control for Wireless Sensor Networks.
Wirel. Pers. Commun., 2017

An Introductory Editorial: Special Issue on Global Wireless Summit (GWS-2015).
Wirel. Pers. Commun., 2017

An Evolutionary Mobility Aware Multi-Objective Hybrid Routing Algorithm for Heterogeneous WSNs.
Int. J. Rough Sets Data Anal., 2017

2016
BETaaS: A Platform for Development and Execution of Machine-to-Machine Applications in the Internet of Things.
Wirel. Pers. Commun., 2016

Mobility and Heterogeneity Aware Cluster-Based Data Aggregation for Wireless Sensor Network.
Wirel. Pers. Commun., 2016

A Novel Estimation Framework for Quality of Resilience.
Wirel. Pers. Commun., 2016

Virtualization and Scheduling Methods for 5G Cognitive Radio Based Wireless Networks.
Wirel. Pers. Commun., 2016

End-to-End Reliability and Optimization of Intra and Inter-Domain IMS-based Communication Networks.
J. Cyber Secur. Mobil., 2016

Data collection using miniature aerial vehicles in wireless sensor networks.
IET Wirel. Sens. Syst., 2016

2015
Cost Benefit Analysis of Utilising Mobile Nodes in Wireless Sensor Networks.
Wirel. Pers. Commun., 2015

BETaaS platform - a Things as a Service Environment for future M2M marketplaces.
EAI Endorsed Trans. Cloud Syst., 2015

Bandwidth efficient cluster-based data aggregation for Wireless Sensor Network.
Comput. Electr. Eng., 2015

Hybrid SDN architecture for resource consolidation in MPLS networks.
Proceedings of the 2015 Wireless Telecommunications Symposium, 2015

Statistical functions describing two-hop amplify and forward relay systems under Ricean fading.
Proceedings of the 2015 Wireless Telecommunications Symposium, 2015

Bandwidth Efficient Hybrid Synchronization for Wireless Sensor Network.
Proceedings of the 2015 International Conference on Advances in Computing, 2015

Performance comparison of QoS routing algorithms applicable to large-scale SDN networks.
Proceedings of the IEEE EUROCON 2015, 2015

Performance comparison of LS, LMMSE and Adaptive Averaging Channel Estimation (AACE) for DVB-T2.
Proceedings of the 2015 IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2015

2014
Preface.
Wirel. Pers. Commun., 2014

Mobility Impact on Cluster Based MAC Layer Protocols in Wireless Sensor Networks.
Wirel. Pers. Commun., 2014

BECPA: Bandwidth Efficient Cluster Based Packet Aggregation in Wireless Sensor Network.
Wirel. Pers. Commun., 2014

Two Tier Cluster Based Data Aggregation (TTCDA) for Efficient Bandwidth Utilization in Wireless Sensor Network.
Wirel. Pers. Commun., 2014

CMKMS: Cluster-based mobile key management scheme for wireless sensor network.
Int. J. Pervasive Comput. Commun., 2014

A hybrid algorithm for efficient Wireless Sensor Network time synchronization.
Proceedings of the 4th International Conference on Wireless Communications, 2014

Wildlife conservation and rail track monitoring using wireless sensor networks.
Proceedings of the 4th International Conference on Wireless Communications, 2014

An efficient schedule based data aggregation using node mobility for wireless sensor network.
Proceedings of the 4th International Conference on Wireless Communications, 2014

Threshold Cryptography-based Group Authentication (TCGA) scheme for the Internet of Things (IoT).
Proceedings of the 4th International Conference on Wireless Communications, 2014

MMOHRA: Mobility aware multi-objective hybrid routing algorithm for Wireless Sensor Networks.
Proceedings of the 4th International Conference on Wireless Communications, 2014

Resilience of the IMS system: The resilience effect of inter-domain communications.
Proceedings of the 4th International Conference on Wireless Communications, 2014

A novel buffer management for delayed delivery traffic in future networks.
Proceedings of the 4th International Conference on Wireless Communications, 2014

Secure capability-based access control in the M2M local cloud platform.
Proceedings of the 4th International Conference on Wireless Communications, 2014

BETaaS Platform - A Things as a Service Environment for Future M2M Marketplaces.
Proceedings of the Internet of Things. User-Centric IoT, 2014

Cost/revenue performance in an IMT-Advanced scenario with Spectrum Aggregation over non-contiguous frequency bands.
Proceedings of the 21st International Conference on Telecommunications, 2014

Scheduled Collision Avoidance in wireless sensor network using Zigbee.
Proceedings of the 2014 International Conference on Advances in Computing, 2014

G-MOHRA: Green Multi-Objective Hybrid Routing Algorithm for Wireless Sensor Networks.
Proceedings of the 2014 International Conference on Advances in Computing, 2014

Lightweight robust cryptographic combiner for mobile devices: Crypto roulette.
Proceedings of the 19th IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, 2014

Novel framework for data collection in wireless sensor networks using flying sensors.
Proceedings of the 2014 IEEE International Conference on Advanced Networks and Telecommuncations Systems, 2014

2013
Reliable and Secure Cooperative Communication for Wireless Sensor Networks Making Use of Cooperative Jamming with Physical Layer Security.
Wirel. Pers. Commun., 2013

Energy Efficient Four Level Cooperative Opportunistic Communication for Wireless Personal Area Networks (WPAN).
Wirel. Pers. Commun., 2013

A Joint Allocation, Assignment and Admission Control (AAA) Framework for Next Generation Networks.
Wirel. Pers. Commun., 2013

Guest Editorial: Special Issue on Wireless Personal Multimedia Communications.
Wirel. Pers. Commun., 2013

Maximum Lifetime Routing Problem in Duty-Cycling Sensor Networks.
Wirel. Pers. Commun., 2013

Green Cooperative Web of Trust for Securityin Cognitive Radio Networks.
J. Cyber Secur. Mobil., 2013

Efficient Fine Grained Access Control for RFID Inter-Enterprise System.
J. Cyber Secur. Mobil., 2013

A novel linear programming formulation of maximum lifetime routing problem in wireless sensor networks.
Int. J. Auton. Adapt. Commun. Syst., 2013

H-GCF: A Hybrid Green Conflict Free scheduling algorithm for mobile Wireless Sensor Networks.
Proceedings of the 16th International Symposium on Wireless Personal Multimedia Communications, 2013

Coverage improvement in clustered wireless sensor networks by relocating mobile nodes based on waypoints.
Proceedings of the 16th International Symposium on Wireless Personal Multimedia Communications, 2013

Review on the benefits of converged next generation network architecture.
Proceedings of the 16th International Symposium on Wireless Personal Multimedia Communications, 2013

Game theoretic modelling of WSN jamming attack and detection mechanism.
Proceedings of the 16th International Symposium on Wireless Personal Multimedia Communications, 2013

Efficient and scalable location and mobility management of EPCglobal RFID system.
Proceedings of the 16th International Symposium on Wireless Personal Multimedia Communications, 2013

End-to-end availability analysis of IMS-based networks: Simplex and redundant systems.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

Interference analysis in a LTE-A HetNet scenario: Coordination vs. uncoordination.
Proceedings of the 3rd International Conference on Wireless Communications, 2013

MHBCDA: Mobility and heterogeneity aware bandwidth efficient Cluster based Data Aggregation for Wireless Sensor Network.
Proceedings of the 3rd International Conference on Wireless Communications, 2013

A fuzzy approach to trust based access control in internet of things.
Proceedings of the 3rd International Conference on Wireless Communications, 2013

MOHRA: Multi Objective Hybrid Routing Algorithm for Wireless Sensor Network.
Proceedings of the 3rd International Conference on Wireless Communications, 2013

IMS intra- and inter domain end-to-end resilience analysis.
Proceedings of the 3rd International Conference on Wireless Communications, 2013

Cell load balancing in heterogeneous scenarios: A 3GPP LTE case study.
Proceedings of the 3rd International Conference on Wireless Communications, 2013

Futuristic backhaul networks: Transport protocols perspective.
Proceedings of the 3rd International Conference on Wireless Communications, 2013

Jamming attack: Behavioral modelling and analysis.
Proceedings of the 3rd International Conference on Wireless Communications, 2013

Countermeasure for intelligent cluster-head jamming attack in wireless sensor network.
Proceedings of the 2013 International Conference on Privacy and Security in Mobile Systems, 2013

BHCDA: Bandwidth efficient heterogeneity aware cluster based data aggregation for Wireless Sensor Network.
Proceedings of the International Conference on Advances in Computing, 2013

The evolution of M2M into IoT.
Proceedings of the First International Black Sea Conference on Communications and Networking, 2013

An Intrusion Detection game in access control system for the M2M local cloud platform.
Proceedings of the 19th Asia-Pacific Conference on Communications, 2013

2012
Middleware Architecture for Next Generation Heterogeneous Networks.
Wirel. Pers. Commun., 2012

Adaptive Counting Rule for Cooperative Spectrum Sensing Under Correlated Environments.
Wirel. Pers. Commun., 2012

Guest Editorial: Special Issue on Opportunities, Goals and Challenges in Next Generation ICT-Based Systems.
Wirel. Pers. Commun., 2012

Vulnerabilities of Decentralized Additive Reputation Systems Regarding the Privacy of Individual Votes.
Wirel. Pers. Commun., 2012

Application Oriented Multi Criteria Optimization in WSNs Using on AHP.
Wirel. Pers. Commun., 2012

Low Access Delay Anti-Collision Algorithm for Readers in Passive RFID Systems.
Wirel. Pers. Commun., 2012

Guest Editorial: Special Issue on Wireless Personal Multimedia Communications.
Wirel. Pers. Commun., 2012

Cooperative Wireless Communications and Physical Layer Security: State-of-the-Art.
J. Cyber Secur. Mobil., 2012

Activity Modelling and Comparative Evaluation of WSN MAC Security Attacks.
J. Cyber Secur. Mobil., 2012

Behavioural Modelling of WSN MAC Layer Security Attacks: A Sequential UML Approach.
J. Cyber Secur. Mobil., 2012

Identity Authentication and Capability Based Access Control (IACAC) for the Internet of Things.
J. Cyber Secur. Mobil., 2012

Cooperative jamming for physical layer security in Wireless Sensor Networks.
Proceedings of the 15th International Symposium on Wireless Personal Multimedia Communications, 2012

M-GCF: Multicolor-Green Conflict Free scheduling algorithm for WSN.
Proceedings of the 15th International Symposium on Wireless Personal Multimedia Communications, 2012

An alternative implementation of a cyclostationary detector.
Proceedings of the 15th International Symposium on Wireless Personal Multimedia Communications, 2012

Identity establishment and capability based access control (IECAC) scheme for Internet of Things.
Proceedings of the 15th International Symposium on Wireless Personal Multimedia Communications, 2012

Resilience in IMS: End-to-end reliability analysis via Markov Reward Models.
Proceedings of the 15th International Symposium on Wireless Personal Multimedia Communications, 2012

Capability-based access control delegation model on the federated IoT network.
Proceedings of the 15th International Symposium on Wireless Personal Multimedia Communications, 2012

Secure & trusted communication in emergency situations.
Proceedings of the 35th IEEE Sarnoff Symposium 2012, Newark, NJ, USA, May 21-22, 2012, 2012

Efficient admission control for next generation cellular networks.
Proceedings of IEEE International Conference on Communications, 2012

GCF: Green Conflict Free TDMA scheduling for wireless sensor network.
Proceedings of IEEE International Conference on Communications, 2012

Spatial diversity aware data fusion for cooperative spectrum sensing.
Proceedings of the 20th European Signal Processing Conference, 2012

Two Tier Cluster based Data Aggregation (TTCDA) in Wireless Sensor Network.
Proceedings of the IEEE International Conference on Advanced Networks and Telecommuncations Systems, 2012

Identity driven capability based access control (ICAC) scheme for the Internet of Things.
Proceedings of the IEEE International Conference on Advanced Networks and Telecommuncations Systems, 2012

2011
Guest Editorial: Special Issue Wireless Personal Multimedia Communications.
Wirel. Pers. Commun., 2011

Integrated Common Radio Resource Management with Spectrum Aggregation Over Non-Contiguous Frequency Bands.
Wirel. Pers. Commun., 2011

5G Based on Cognitive Radio.
Wirel. Pers. Commun., 2011

People-centric sensing in assistive healthcare: Privacy challenges and directions.
Secur. Commun. Networks, 2011

APDL: A reference XML schema for process-centered definition of RFID solutions.
J. Syst. Softw., 2011

Technology-enabled social learning: a review.
Int. J. Knowl. Learn., 2011

Mitigate DoS and DDoS Attack in Mobile Ad Hoc Networks.
Int. J. Digit. Crime Forensics, 2011

Spectrum and service pricing for 802.22 networks.
Proceedings of the 14th International Symposium on Wireless Personal Multimedia Communications, 2011

Hybrid mechanisms: Towards an efficient wireless sensor network medium access control.
Proceedings of the 14th International Symposium on Wireless Personal Multimedia Communications, 2011

Energy detection and eigenvalue based detection: An experimental study using GNU radio.
Proceedings of the 14th International Symposium on Wireless Personal Multimedia Communications, 2011

Generating Business Events in an RFID network.
Proceedings of the 2011 IEEE International Conference on RFID-Technologies and Applications, 2011

Adaptive flexible spectrum usage algorithms in heterogeneous cell deployment.
Proceedings of the IEEE 22nd International Symposium on Personal, 2011

Privacy-preserving scheme for mobile ad hoc networks.
Proceedings of the 16th IEEE Symposium on Computers and Communications, 2011

A QoS aware reinforcement learning algorithm for macro-femto interference in dynamic environments.
Proceedings of the 3rd International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 2011

Identity Theft Detection Based on Neural Network Non-Linearity Identification in OFDM System.
Proceedings of IEEE International Conference on Communications, 2011

An Architectural Blueprint for a Real-World Internet.
Proceedings of the Future Internet, 2011

2010
A Framework for Planning a Unified Wired and Wireless ICT Infrastructure.
Wirel. Pers. Commun., 2010

Editorial: Special Issue on Wireless Personal Communications 2006 Conference.
Wirel. Pers. Commun., 2010

Towards adaptive security for convergent wireless sensor networks in beyond 3G environments.
Wirel. Commun. Mob. Comput., 2010

Routing for cognitive radio networks consisting of opportunistic links.
Wirel. Commun. Mob. Comput., 2010

Trusted cognitive radio networking.
Wirel. Commun. Mob. Comput., 2010

Arbitrary Code Injection through Self-propagating Worms in Von Neumann Architecture Devices.
Comput. J., 2010

Decentralized Cooperative Spectrum Sensing for Ad-Hoc Disaster Relief Network Clusters.
Proceedings of the 71st IEEE Vehicular Technology Conference, 2010

RFID Added Value Sensing Capabilities: European Advances in Integrated RFID-WSN Middleware.
Proceedings of the Seventh Annual IEEE Communications Society Conference on Sensor, 2010

Centralized Cooperative Spectrum Sensing for Ad-Hoc Disaster Relief Network Clusters.
Proceedings of IEEE International Conference on Communications, 2010

Identity Management Framework towards Internet of Things (IoT): Roadmap and Key Challenges.
Proceedings of the Recent Trends in Network Security and Applications, 2010

Proposed Security Model and Threat Taxonomy for the Internet of Things (IoT).
Proceedings of the Recent Trends in Network Security and Applications, 2010

Receiver Sensitivity in Opportunistic Cooperative Internet of Things (IoT) - (Invited Paper).
Proceedings of the Ad Hoc Networks - Second International Conference, 2010

2009
Establishing Trust Through Anonymous and Private Information Exchange Over Personal Networks.
Wirel. Pers. Commun., 2009

Robust Cooperative Spectrum Sensing for Disaster Relief Networks in Correlated Environments
CoRR, 2009

Context-aware trust and privacy application for mobile identification system.
Proceedings of the 2009 IEEE Wireless Communications and Networking Conference, 2009

Secure Physical Layer using Dynamic Permutations in Cognitive OFDMA Systems.
Proceedings of the 69th IEEE Vehicular Technology Conference, 2009

Auction Based Spectrum Management of Cognitive Radio Networks.
Proceedings of the 69th IEEE Vehicular Technology Conference, 2009

A Threat Analysis Methodology for Security Evaluation and Enhancement Planning.
Proceedings of the Third International Conference on Emerging Security Information, 2009

Providing Strong Security and High Privacy in Low-Cost RFID Networks.
Proceedings of the Security and Privacy in Mobile Information and Communication Systems, 2009

Self-propagating worms in wireless sensor networks.
Proceedings of the 5th international student workshop on Emerging networking experiments and technologies, 2009

2008
Convergence Transforms Digital Home: Techno-Economic Impact.
Wirel. Pers. Commun., 2008

CRUISE research activities toward ubiquitous intelligent sensing environments.
IEEE Wirel. Commun., 2008

A Novel Dimension of Cooperation in 4G.
IEEE Technol. Soc. Mag., 2008

A New Security Architecture for Personal Networks and Its Performance Evaluation.
IEICE Trans. Commun., 2008

Secure personal network.
Proceedings of the IEEE 19th International Symposium on Personal, 2008

Cognitive radio network architecture: part II - trusted network layer structure.
Proceedings of the 2nd International Conference on Ubiquitous Information Management and Communication, 2008

Cognitive radio network architecture: part I - general structure.
Proceedings of the 2nd International Conference on Ubiquitous Information Management and Communication, 2008

Lightweight, Distributed Access Control for Wireless Sensor Networks Supporting Mobility.
Proceedings of IEEE International Conference on Communications, 2008

2007
Adaptive Security Architecture based on EC-MQV Algorithm in Personal Network (PN).
Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2007), 2007

Privacy Protection Mechanisms for Hybrid Hierarchical Wireless Sensor Networks.
Proceedings of the 4th IEEE International Symposium on Wireless Communication Systems, 2007

Threat Model Framework and Methodology for Personal Networks (PNs).
Proceedings of the Second International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2007), 2007

2006
Security Framework for Wireless Sensor Networks.
Wirel. Pers. Commun., 2006

Context-aware privacy protection with profile management.
Proceedings of the 4th international workshop on Wireless mobile applications and services on WLAN hotspots, 2006

Creating Ubiquitous Intelligent Sensing Environments (CRUISE).
Proceedings of the WINSYS 2006, 2006

A Leakage-Resilient and Forward-Secure Authenticated Key Exchange Protocol for Private Personal Area Networks.
Proceedings of the IEEE 17th International Symposium on Personal, 2006

Ubiquitous Access Control and Policy Management in Personal Networks.
Proceedings of the 3rd Annual International ICST Conference on Mobile and Ubiquitous Systems: Computing, 2006

A Novel Decentralized Hierarchical Access Control Scheme for the Medical Scenario.
Proceedings of the 3rd Annual International ICST Conference on Mobile and Ubiquitous Systems: Computing, 2006

A New Security Architecture for Personal Networks.
Proceedings of the Global Telecommunications Conference, 2006. GLOBECOM '06, San Francisco, CA, USA, 27 November, 2006

2004
Foolproof Security Measures and Challenges Within.
Wirel. Pers. Commun., 2004

Adaptive Security for Low Data Rate Networks.
Wirel. Pers. Commun., 2004

Light-Weight AAA Infrastructure for Mobility Support Across Heterogeneous Networks.
Wirel. Pers. Commun., 2004

2001
Performance Evaluation, System Design and Network Deployment of IEEE 802.11.
Wirel. Pers. Commun., 2001


  Loading...