Priyadarsi Nanda

Orcid: 0000-0002-5748-155X

According to our database1, Priyadarsi Nanda authored at least 106 papers between 2000 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Differential privacy model for blockchain based smart home architecture.
Future Gener. Comput. Syst., January, 2024

Reciprocal Federated Learning Framework: Balancing incentives for model and data owners.
Future Gener. Comput. Syst., 2024

Securing MQTT Ecosystem: Exploring Vulnerabilities, Mitigations, and Future Trajectories.
IEEE Access, 2024

Zero Trust for Intrusion Detection System: A Systematic Literature Review.
Proceedings of the 16th International Conference on Agents and Artificial Intelligence, 2024

2023
Enabling secure lightweight mobile Narrowband Internet of Things (NB-IoT) applications using blockchain.
J. Netw. Comput. Appl., October, 2023

FCH, an incentive framework for data-owner dominated federated learning.
J. Inf. Secur. Appl., August, 2023

Privacy-Enhanced Living: A Local Differential Privacy Approach to Secure Smart Home Data.
CoRR, 2023

Anomaly Detection in Smart Grid Networks Using Power Consumption Data.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

Uncovering Flaws in Anti-Phishing Blacklists for Phishing Websites Using Novel Cloaking Techniques.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

ZT-NIDS: Zero Trust, Network Intrusion Detection System.
Proceedings of the 20th International Conference on Security and Cryptography, 2023

C-Block: A Secure and Robust Framework for Authentication Handover in 5G HetNets based on Edge-enabled SDN/NFV Environments.
Proceedings of the International Wireless Communications and Mobile Computing, 2023

A Zero-Trust Framework for Industrial Internet of Things.
Proceedings of the International Conference on Computing, Networking and Communications, 2023

Designing Incentive Mechanisms for Fair Participation in Federated Learning.
Proceedings of the IEEE International Conference on High Performance Computing & Communications, 2023

FedBlockHealth: A Synergistic Approach to Privacy and Security in IoT-Enabled Healthcare Through Federated Learning and Blockchain.
Proceedings of the IEEE Global Communications Conference, 2023

Privacy-Enhanced Living: A Local Differential Privacy Approach to Secure Smart Home Data.
Proceedings of the IEEE International Conference on Omni-layer Intelligent Systems, 2023

Why Zero Trust Framework Adoption has Emerged During and After Covid-19 Pandemic.
Proceedings of the Advanced Information Networking and Applications, 2023

Zero Trust Network Intrusion Detection System (NIDS) using Auto Encoder for Attention-based CNN-BiLSTM.
Proceedings of the 2023 Australasian Computer Science Week, 2023

2022
An Empirical Assessment of Security and Privacy Risks of Web-Based Chatbots.
Proceedings of the Web Information Systems Engineering - WISE 2022, 2022

Zero Trust-NIDS: Extended Multi-View Approach for Network Trace Anonymization and Auto-Encoder CNN for Network Intrusion Detection.
Proceedings of the IEEE International Conference on Trust, 2022

The Force of Compensation, a Multi-stage Incentive Mechanism Model for Federated Learning.
Proceedings of the Network and System Security - 16th International Conference, 2022

Hybrid blockchain-based Authentication Handover and Flow Rule Validation for Secure Software Defined 5G HetNets.
Proceedings of the 2022 International Wireless Communications and Mobile Computing, 2022

2021
BuildSenSys: Reusing Building Sensing Data for Traffic Prediction With Cross-Domain Learning.
IEEE Trans. Mob. Comput., 2021

Intelligent Anomaly Detection for Large Network Traffic With Optimized Deep Clustering (ODC) Algorithm.
IEEE Access, 2021

Privacy-Preserving Mechanism in Smart Home Using Blockchain.
IEEE Access, 2021

Context-Aware Fog Computing Implementation for Industrial Internet of Things.
Proceedings of the 17th International Wireless Communications and Mobile Computing, 2021

2020
Vehicular networks with security and trust management solutions: proposed secured message exchange via blockchain technology.
Wirel. Networks, 2020

Hybrid Tree-Rule Firewall for High Speed Data Transmission.
IEEE Trans. Cloud Comput., 2020

QASEC: A secured data communication scheme for mobile Ad-hoc networks.
Future Gener. Comput. Syst., 2020

A hybrid encryption technique for Secure-GLOR: The adaptive secure routing protocol for dynamic wireless mesh networks.
Future Gener. Comput. Syst., 2020

Security, Trust and Privacy in Cyber (STPCyber): Future trends and challenges.
Future Gener. Comput. Syst., 2020

Deep learning for intelligent traffic sensing and prediction: recent advances and future challenges.
CCF Trans. Pervasive Comput. Interact., 2020

FairEdge: A Fairness-Oriented Task Offloading Scheme for Iot Applications in Mobile Cloudlet Networks.
IEEE Access, 2020

Security and Privacy Implementation in Smart Home: Attributes Based Access Control and Smart Contracts.
Proceedings of the 19th IEEE International Conference on Trust, 2020

2019
Secure authentication and load balancing of distributed edge datacenters.
J. Parallel Distributed Comput., 2019

Exploiting the Remote Server Access Support of CoAP Protocol.
IEEE Internet Things J., 2019

A secure privacy preserving deduplication scheme for cloud computing.
Future Gener. Comput. Syst., 2019

Editorial to the Special Issue on Recent Advances on Trust, Security and Privacy in Computing and Communications.
Concurr. Comput. Pract. Exp., 2019

Testbed evaluation of Lightweight Authentication Protocol (LAUP) for 6LoWPAN wireless sensor networks.
Concurr. Comput. Pract. Exp., 2019

Efficient solution to the millionaires' problem based on asymmetric commutative encryption scheme.
Comput. Intell., 2019

Trust and Reputation in Vehicular Networks: A Smart Contract-Based Approach.
Proceedings of the 18th IEEE International Conference On Trust, 2019

Proof-of-Authentication for Scalable Blockchain in Resource-Constrained Distributed Systems.
Proceedings of the IEEE International Conference on Consumer Electronics, 2019

A Novel Multi-Path Anonymous Randomized Key Distribution Scheme for Geo Distributed Networks.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

2018
A Sybil attack detection scheme for a forest wildfire monitoring application.
Future Gener. Comput. Syst., 2018

Secure and Sustainable Load Balancing of Edge Data Centers in Fog Computing.
IEEE Commun. Mag., 2018

A Novel Collaborative Task Offloading Scheme for Secure and Sustainable Mobile Cloudlet Networks.
IEEE Access, 2018

Towards System Implementation and Data Analysis for Crowdsensing Based Outdoor RSS Maps.
IEEE Access, 2018

Blockchain Based Secured Identity Authentication and Expeditious Revocation Framework for Vehicular Networks.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Asymmetric Commutative Encryption Scheme Based Efficient Solution to the Millionaires' Problem.
Proceedings of the 17th IEEE International Conference On Trust, 2018

User Relationship Classification of Facebook Messenger Mobile Data using WEKA.
Proceedings of the Network and System Security - 12th International Conference, 2018

CTOM: Collaborative Task Offloading Mechanism for Mobile Cloudlet Networks.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

A Novel Hybrid Authentication Model for Geo Location Oriented Routing in Dynamic Wireless Mesh Networks.
Proceedings of the 51st Hawaii International Conference on System Sciences, 2018

2017
PAWN: a payload-based mutual authentication scheme for wireless sensor networks.
Concurr. Comput. Pract. Exp., 2017

Building Security Perimeters to Protect Network Systems Against Cyber Threats [Future Directions].
IEEE Consumer Electron. Mag., 2017

Online Social Network Information Forensics: A Survey on Use of Various Tools and Determining How Cautious Facebook Users are?
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Lightweight Authentication Protocol (LAUP) for 6LoWPAN Wireless Sensor Networks.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Secure-GLOR: An Adaptive Secure Routing Protocol for Dynamic Wireless Mesh Networks.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

An Intrusion Detection System Based on Polynomial Feature Correlation Analysis.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Sequential and Unsupervised Document Authorial Clustering Based on Hidden Markov Model.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

A framework for data security in cloud using collaborative intrusion detection scheme.
Proceedings of the 10th International Conference on Security of Information and Networks, 2017

An Overview of Security Challenges in Vehicular Ad-Hoc Networks.
Proceedings of the 2017 International Conference on Information Technology, 2017

2016
Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm.
IEEE Trans. Computers, 2016

Data Sharing in Secure Multimedia Wireless Sensor Networks.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

A Novel Hash-Based File Clustering Scheme for Efficient Distributing, Storing, and Retrieving of Large Scale Health Records.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

An Improvement of Tree-Rule Firewall for a Large Network: Supporting Large Rule Size and Low Delay.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

A Secure Routing Scheme for Wireless Mesh Networks.
Proceedings of the Information Systems Security - 12th International Conference, 2016

Geo-Location Oriented Routing Protocol for Smart Dynamic Mesh Network.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

2015
Detection of Denial-of-Service Attacks Based on Computer Vision Techniques.
IEEE Trans. Computers, 2015

A Sybil Attack Detection Scheme for a Centralized Clustering-Based Hierarchical Network.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Data Mobility Management Model for Active Data Cubes.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Unsupervised Feature Selection Method for Intrusion Detection System.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

sandFOX: secure sandboxed and isolated environment for firefox browser.
Proceedings of the 8th International Conference on Security of Information and Networks, 2015

Resource Utilization Based Dynamic Pricing Approach on Cloud Computing Application.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

SYMPHONY - A Controller Architecture for Hybrid Software Defined Networks.
Proceedings of the Fourth European Workshop on Software Defined Networks, 2015

2014
A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis.
IEEE Trans. Parallel Distributed Syst., 2014

Intrusion detection method based on nonlinear correlation measure.
Int. J. Internet Protoc. Technol., 2014

Improving cloud network security using the Tree-Rule firewall.
Future Gener. Comput. Syst., 2014

PASCCC: Priority-based application-specific congestion control clustering protocol.
Comput. Networks, 2014

Enhancing Big Data Security with Collaborative Intrusion Detection.
IEEE Cloud Comput., 2014

A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment.
Proceedings of the 13th IEEE International Conference on Trust, 2014

A Stateful Mechanism for the Tree-Rule Firewall.
Proceedings of the 13th IEEE International Conference on Trust, 2014

A Novel Feature Selection Approach for Intrusion Detection Data Classification.
Proceedings of the 13th IEEE International Conference on Trust, 2014

2013
TCTM: an evaluation framework for architecture design on wireless sensor networks.
Int. J. Sens. Networks, 2013

RePIDS: A multi tier Real-time Payload-based Intrusion Detection System.
Comput. Networks, 2013

Energy Evaluation Model for an Improved Centralized Clustering Hierarchical Algorithm in WSN.
Proceedings of the Wired/Wireless Internet Communication - 11th International Conference, 2013

Routing scheme for a Wireless Sensor Network real-time locating system.
Proceedings of the 2013 9th International Wireless Communications and Mobile Computing Conference, 2013

Enhancing Lifetime and Quality of Data in Cluster-Based Hierarchical Routing Protocol for Wireless Sensor Network.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

2012
Triangle-Area-Based Multivariate Correlation Analysis for Effective Denial-of-Service Attack Detection.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Border Gateway Protocol Anomaly Detection Using Failure Quality Control Method.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Evaluation on multivariate correlation analysis based denial-of-service attack detection system.
Proceedings of the First International Conference on Security of Internet of Things, 2012

Tele-monitoring techniques to support recovery at home for survivors of a critical illness.
Proceedings of the IEEE International Symposium on Signal Processing and Information Technology, 2012

Evaluation of billing and charging architecture for the Internet service provisioning.
Proceedings of the International Symposium on Communications and Information Technologies, 2012

Limitation of Listed-Rule Firewall and the Design of Tree-Rule Firewall.
Proceedings of the Internet and Distributed Computing Systems, 2012

2011
An Integrated Model Supporting Billing and QOS in the Internet.
Proceedings of the 12th ACIS International Conference on Software Engineering, 2011

Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis.
Proceedings of the Neural Information Processing - 18th International Conference, 2011

Multivariate Correlation Analysis Technique Based on Euclidean Distance Map for Network Traffic Characterization.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

2010
Intrusion detection using GSAD model for HTTP traffic on web services.
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, 2010

A Two-Tier System for Web Attack Detection Using Linear Discriminant Method.
Proceedings of the Information and Communications Security - 12th International Conference, 2010

2009
A Scalable Architecture Supporting QoS Guarantees Using Traffic Engineering and Policy Based Routing in the Internet.
Int. J. Commun. Netw. Syst. Sci., 2009

Web Service Locating Unit in RFID-Centric Anti-counterfeit System.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2009

Intrusion Detection Using Geometrical Structure.
Proceedings of the Fourth International Conference on Frontier of Computer Science and Technology, 2009

2008
Supporting QoS Guarantees Using Traffic Engineering and Policy Based Routing.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

2007
Quality of Service in Telemedicine.
Proceedings of the First International Conference on the Digital Society (ICDS 2007), 2007

2006
Policy Based QoS Support using BGP Routing.
Proceedings of the 2006 International Conference on Communications in Computing, 2006

2003
Policy Based Architecture for QoS over Differentiated Services Network.
Proceedings of the International Conference on Internet Computing, 2003

2002
Resource Management in Differentiated Services Networks.
Proceedings of the Converged Networking: Data and Real-time Communications over IP, 2002

2000
Intra-domain Bandwidth Management in Differentiated Services Network.
Proceedings of the Proceedings 27th Conference on Local Computer Networks, 2000


  Loading...