S. V. Nagaraj
Orcid: 0000-0002-4957-9311
According to our database1,
S. V. Nagaraj
authored at least 26 papers
between 1996 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Review of Programming for the Puzzled: Learn to Program While Solving Puzzles Srini Devadas.
SIGACT News, March, 2023
An intelligent and lightweight intrusion detection mechanism for RPL routing attacks by applying automata model.
Inf. Secur. J. A Glob. Perspect., January, 2023
2021
Multi-hop Energy-Efficient Reliable Cluster-based Sectoring Scheme Using Markov Chain Model to Improve QoS Parameters in a WSN.
Wirel. Pers. Commun., 2021
SIGACT News, 2021
2020
Anomaly-Based Intrusion Detection System in RPL by Applying Stochastic and Evolutionary Game Models over IoT Environment.
Wirel. Pers. Commun., 2020
SIGACT News, 2020
2019
2018
SIGACT News, 2018
SIGACT News, 2018
2017
Review of Handbook of Computational Social Choice Edited by Felix Brandt, Vincent Conitzer, Ulle Endriss, Jérôme Lang, and Ariel D. Procaccia.
SIGACT News, 2017
SIGACT News, 2017
2016
SIGACT News, 2016
2015
SIGACT News, 2015
Review of: A Mathematical Orchard - Problems and Solutions by Mark Krusemeyer, George Gilbert, and Loren Larson.
SIGACT News, 2015
2014
SIGACT News, 2014
2013
Review of history of mathematics: highways and byways by Amy Dahan-Dalmedico and Jeanne Peiffer.
SIGACT News, 2013
2012
Proceedings of the Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India, 2012
2008
2004
Book Review: Managing Gigabytes: Compressing and Indexing documents and images - By Ian H. Witten, Alistair Moffat, and Timothy C. Bell (Second Edition).
SIGMOD Rec., 2004
2001
Proceedings of the 10th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 2001), 2001
1997
Proceedings of the Information Security, First International Workshop, 1997
1996