Priyadarsi Nanda
Orcid: 0000-0002-5748-155X
According to our database1,
Priyadarsi Nanda
authored at least 106 papers
between 2000 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Future Gener. Comput. Syst., January, 2024
Reciprocal Federated Learning Framework: Balancing incentives for model and data owners.
Future Gener. Comput. Syst., 2024
Securing MQTT Ecosystem: Exploring Vulnerabilities, Mitigations, and Future Trajectories.
IEEE Access, 2024
Proceedings of the 16th International Conference on Agents and Artificial Intelligence, 2024
2023
Enabling secure lightweight mobile Narrowband Internet of Things (NB-IoT) applications using blockchain.
J. Netw. Comput. Appl., October, 2023
J. Inf. Secur. Appl., August, 2023
Privacy-Enhanced Living: A Local Differential Privacy Approach to Secure Smart Home Data.
CoRR, 2023
Proceedings of the 20th International Conference on Security and Cryptography, 2023
Uncovering Flaws in Anti-Phishing Blacklists for Phishing Websites Using Novel Cloaking Techniques.
Proceedings of the 20th International Conference on Security and Cryptography, 2023
Proceedings of the 20th International Conference on Security and Cryptography, 2023
C-Block: A Secure and Robust Framework for Authentication Handover in 5G HetNets based on Edge-enabled SDN/NFV Environments.
Proceedings of the International Wireless Communications and Mobile Computing, 2023
Proceedings of the International Conference on Computing, Networking and Communications, 2023
Proceedings of the IEEE International Conference on High Performance Computing & Communications, 2023
FedBlockHealth: A Synergistic Approach to Privacy and Security in IoT-Enabled Healthcare Through Federated Learning and Blockchain.
Proceedings of the IEEE Global Communications Conference, 2023
Privacy-Enhanced Living: A Local Differential Privacy Approach to Secure Smart Home Data.
Proceedings of the IEEE International Conference on Omni-layer Intelligent Systems, 2023
Proceedings of the Advanced Information Networking and Applications, 2023
Zero Trust Network Intrusion Detection System (NIDS) using Auto Encoder for Attention-based CNN-BiLSTM.
Proceedings of the 2023 Australasian Computer Science Week, 2023
2022
Proceedings of the Web Information Systems Engineering - WISE 2022, 2022
Zero Trust-NIDS: Extended Multi-View Approach for Network Trace Anonymization and Auto-Encoder CNN for Network Intrusion Detection.
Proceedings of the IEEE International Conference on Trust, 2022
The Force of Compensation, a Multi-stage Incentive Mechanism Model for Federated Learning.
Proceedings of the Network and System Security - 16th International Conference, 2022
Hybrid blockchain-based Authentication Handover and Flow Rule Validation for Secure Software Defined 5G HetNets.
Proceedings of the 2022 International Wireless Communications and Mobile Computing, 2022
2021
BuildSenSys: Reusing Building Sensing Data for Traffic Prediction With Cross-Domain Learning.
IEEE Trans. Mob. Comput., 2021
Intelligent Anomaly Detection for Large Network Traffic With Optimized Deep Clustering (ODC) Algorithm.
IEEE Access, 2021
Proceedings of the 17th International Wireless Communications and Mobile Computing, 2021
2020
Vehicular networks with security and trust management solutions: proposed secured message exchange via blockchain technology.
Wirel. Networks, 2020
IEEE Trans. Cloud Comput., 2020
Future Gener. Comput. Syst., 2020
A hybrid encryption technique for Secure-GLOR: The adaptive secure routing protocol for dynamic wireless mesh networks.
Future Gener. Comput. Syst., 2020
Future Gener. Comput. Syst., 2020
Deep learning for intelligent traffic sensing and prediction: recent advances and future challenges.
CCF Trans. Pervasive Comput. Interact., 2020
FairEdge: A Fairness-Oriented Task Offloading Scheme for Iot Applications in Mobile Cloudlet Networks.
IEEE Access, 2020
Security and Privacy Implementation in Smart Home: Attributes Based Access Control and Smart Contracts.
Proceedings of the 19th IEEE International Conference on Trust, 2020
2019
J. Parallel Distributed Comput., 2019
IEEE Internet Things J., 2019
Future Gener. Comput. Syst., 2019
Editorial to the Special Issue on Recent Advances on Trust, Security and Privacy in Computing and Communications.
Concurr. Comput. Pract. Exp., 2019
Testbed evaluation of Lightweight Authentication Protocol (LAUP) for 6LoWPAN wireless sensor networks.
Concurr. Comput. Pract. Exp., 2019
Efficient solution to the millionaires' problem based on asymmetric commutative encryption scheme.
Comput. Intell., 2019
Proceedings of the 18th IEEE International Conference On Trust, 2019
Proof-of-Authentication for Scalable Blockchain in Resource-Constrained Distributed Systems.
Proceedings of the IEEE International Conference on Consumer Electronics, 2019
A Novel Multi-Path Anonymous Randomized Key Distribution Scheme for Geo Distributed Networks.
Proceedings of the 2019 IEEE Global Communications Conference, 2019
2018
Future Gener. Comput. Syst., 2018
IEEE Commun. Mag., 2018
A Novel Collaborative Task Offloading Scheme for Secure and Sustainable Mobile Cloudlet Networks.
IEEE Access, 2018
Towards System Implementation and Data Analysis for Crowdsensing Based Outdoor RSS Maps.
IEEE Access, 2018
Blockchain Based Secured Identity Authentication and Expeditious Revocation Framework for Vehicular Networks.
Proceedings of the 17th IEEE International Conference On Trust, 2018
Asymmetric Commutative Encryption Scheme Based Efficient Solution to the Millionaires' Problem.
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the Network and System Security - 12th International Conference, 2018
Proceedings of the 2018 IEEE International Conference on Communications, 2018
A Novel Hybrid Authentication Model for Geo Location Oriented Routing in Dynamic Wireless Mesh Networks.
Proceedings of the 51st Hawaii International Conference on System Sciences, 2018
2017
Concurr. Comput. Pract. Exp., 2017
Building Security Perimeters to Protect Network Systems Against Cyber Threats [Future Directions].
IEEE Consumer Electron. Mag., 2017
Online Social Network Information Forensics: A Survey on Use of Various Tools and Determining How Cautious Facebook Users are?
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Sequential and Unsupervised Document Authorial Clustering Based on Hidden Markov Model.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
A framework for data security in cloud using collaborative intrusion detection scheme.
Proceedings of the 10th International Conference on Security of Information and Networks, 2017
Proceedings of the 2017 International Conference on Information Technology, 2017
2016
Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm.
IEEE Trans. Computers, 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
A Novel Hash-Based File Clustering Scheme for Efficient Distributing, Storing, and Retrieving of Large Scale Health Records.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
An Improvement of Tree-Rule Firewall for a Large Network: Supporting Large Rule Size and Low Delay.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the Information Systems Security - 12th International Conference, 2016
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016
2015
IEEE Trans. Computers, 2015
A Sybil Attack Detection Scheme for a Centralized Clustering-Based Hierarchical Network.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
Proceedings of the 8th International Conference on Security of Information and Networks, 2015
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
Proceedings of the Fourth European Workshop on Software Defined Networks, 2015
2014
A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis.
IEEE Trans. Parallel Distributed Syst., 2014
Int. J. Internet Protoc. Technol., 2014
Future Gener. Comput. Syst., 2014
Comput. Networks, 2014
IEEE Cloud Comput., 2014
A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment.
Proceedings of the 13th IEEE International Conference on Trust, 2014
Proceedings of the 13th IEEE International Conference on Trust, 2014
Proceedings of the 13th IEEE International Conference on Trust, 2014
2013
Int. J. Sens. Networks, 2013
Comput. Networks, 2013
Energy Evaluation Model for an Improved Centralized Clustering Hierarchical Algorithm in WSN.
Proceedings of the Wired/Wireless Internet Communication - 11th International Conference, 2013
Proceedings of the 2013 9th International Wireless Communications and Mobile Computing Conference, 2013
Enhancing Lifetime and Quality of Data in Cluster-Based Hierarchical Routing Protocol for Wireless Sensor Network.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013
2012
Triangle-Area-Based Multivariate Correlation Analysis for Effective Denial-of-Service Attack Detection.
Proceedings of the 11th IEEE International Conference on Trust, 2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
Evaluation on multivariate correlation analysis based denial-of-service attack detection system.
Proceedings of the First International Conference on Security of Internet of Things, 2012
Tele-monitoring techniques to support recovery at home for survivors of a critical illness.
Proceedings of the IEEE International Symposium on Signal Processing and Information Technology, 2012
Evaluation of billing and charging architecture for the Internet service provisioning.
Proceedings of the International Symposium on Communications and Information Technologies, 2012
Proceedings of the Internet and Distributed Computing Systems, 2012
2011
Proceedings of the 12th ACIS International Conference on Software Engineering, 2011
Proceedings of the Neural Information Processing - 18th International Conference, 2011
Multivariate Correlation Analysis Technique Based on Euclidean Distance Map for Network Traffic Characterization.
Proceedings of the Information and Communications Security - 13th International Conference, 2011
2010
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, 2010
Proceedings of the Information and Communications Security - 12th International Conference, 2010
2009
A Scalable Architecture Supporting QoS Guarantees Using Traffic Engineering and Policy Based Routing in the Internet.
Int. J. Commun. Netw. Syst. Sci., 2009
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2009
Proceedings of the Fourth International Conference on Frontier of Computer Science and Technology, 2009
2008
Proceedings of the International Conference on Computer Science and Software Engineering, 2008
2007
Proceedings of the First International Conference on the Digital Society (ICDS 2007), 2007
2006
Policy Based QoS Support using BGP Routing.
Proceedings of the 2006 International Conference on Communications in Computing, 2006
2003
Policy Based Architecture for QoS over Differentiated Services Network.
Proceedings of the International Conference on Internet Computing, 2003
2002
Resource Management in Differentiated Services Networks.
Proceedings of the Converged Networking: Data and Real-time Communications over IP, 2002
2000
Proceedings of the Proceedings 27th Conference on Local Computer Networks, 2000