Srinivas Sampalli
Orcid: 0000-0002-8742-5786
According to our database1,
Srinivas Sampalli
authored at least 106 papers
between 1987 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
A Systematic Review of IoT Security: Research Potential, Challenges, and Future Directions.
ACM Comput. Surv., May, 2024
IEEE Trans. Dependable Secur. Comput., 2024
Securing industrial control systems: Developing a SCADA/IoT test bench and evaluating lightweight cipher performance on hardware simulator.
Int. J. Crit. Infrastructure Prot., 2024
Using IOTA Tangle and Machine Learning for a Defensive Model-Based Approach Against Replication Attacks on Wireless Sensor Networks.
IEEE Access, 2024
IEEE Access, 2024
Big Data Synthesis and Class Imbalance Rectification for Enhanced Forest Fire Classification Modeling.
Proceedings of the 16th International Conference on Agents and Artificial Intelligence, 2024
A Federated Learning Framework Based on Spatio-Temporal Agnostic Subsampling (STAS) for Forest Fire Prediction.
Proceedings of the 48th IEEE Annual Computers, Software, and Applications Conference, 2024
IoT-Enabled Pediatric Pain Care Leveraging Majority Vote-Based Transfer Learning Models.
Proceedings of the 7th Conference on Cloud and Internet of Things, 2024
2023
Persuasive Strategies and Their Implementations in Mobile Interventions for Physical Activity: A Systematic Review.
Int. J. Hum. Comput. Interact., July, 2023
Proceedings of the IEEE International Conference on Internet of Things and Intelligence Systems, 2023
Proceedings of the IEEE Global Communications Conference, 2023
Comparative Analysis of Tabular Generative Adversarial Network (GAN) Models for Generation and Validation of Power Grid Synthetic Datasets.
Proceedings of the 20th IEEE International Conference on Smart Technologies, 2023
Spatio-Temporal Agnostic Deep Learning Modeling of Forest Fire Prediction Using Weather Data.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023
Preliminary Results on Exploring Data Exhaust of Consumer Internet of Things Devices.
Proceedings of the 19th International Conference on Network and Service Management, 2023
A Data Integration Framework with Multi-Source Big Data for Enhanced Forest Fire Prediction.
Proceedings of the IEEE International Conference on Big Data, 2023
Proceedings of the Big Data Technologies and Applications, 2023
2022
IEEE Trans. Netw. Serv. Manag., 2022
A Quantum-Based Signcryption for Supervisory Control and Data Acquisition (SCADA) Networks.
Symmetry, 2022
Investigating the Avalanche Effect of Various Cryptographically Secure Hash Functions and Hash-Based Applications.
IEEE Access, 2022
Proceedings of the 8th IEEE World Forum on Internet of Things, 2022
Proceedings of the 17th International Conference on Future Networks and Communications / 19th International Conference on Mobile Systems and Pervasive Computing / 12th International Conference on Sustainable Energy Information Technology (FNC/MobiSPC/SEIT 2022), 2022
"From Kilobytes to Kilodaltons": A Novel Algorithm for Medical Image Encryption based on the Central Dogma of Molecular Biology.
Proceedings of the 44th Annual International Conference of the IEEE Engineering in Medicine & Biology Society, 2022
2021
Gradient Boosting Feature Selection With Machine Learning Classifiers for Intrusion Detection on Power Grids.
IEEE Trans. Netw. Serv. Manag., 2021
Intrusion Detection in SCADA Based Power Grids: Recursive Feature Elimination Model With Majority Vote Ensemble Algorithm.
IEEE Trans. Netw. Sci. Eng., 2021
A framework to lower the risk of medication prescribing and dispensing errors: A usability study of an NFC-based mobile application.
Int. J. Medical Informatics, 2021
IEEE Access Special Section Editorial: Blockchain Technology: Principles and Applications.
IEEE Access, 2021
2020
Trends in Persuasive Technologies for Physical Activity and Sedentary Behavior: A Systematic Review.
Frontiers Artif. Intell., 2020
Mobile Phone-Based Persuasive Technology for Physical Activity and Sedentary Behavior: A Systematic Review.
Frontiers Comput. Sci., 2020
SCADA (Supervisory Control and Data Acquisition) systems: Vulnerability assessment and security recommendations.
Comput. Secur., 2020
How Effective is Personalization in Persuasive Interventions for Reducing Sedentary Behavior and Promoting Physical Activity: A Systematic Review.
Proceedings of the 15th International Conference on Persuasive Technology, Adjunct Proceedings (PERSUASIVE 2020), Aalborg, Denmark, April 20th, 2020
Proceedings of the IEEE International Conference on Internet of Things and Intelligence System, 2020
2019
DDoS Detection System: Using a Set of Classification Algorithms Controlled by Fuzzy Logic System in Apache Spark.
IEEE Trans. Netw. Serv. Manag., 2019
J. Ambient Intell. Humaniz. Comput., 2019
A machine learning based intrusion detection scheme for data fusion in mobile clouds involving heterogeneous client networks.
Inf. Fusion, 2019
IEEE Access, 2019
Design, Implementation and Performance Measurement of Raspberry Gate in the IoT Field.
Proceedings of the 2019 4th International Conference on Cloud Computing and Internet of Things, 2019
2018
Energy-Balancing Unequal Clustering Approach to Reduce the Blind Spot Problem in Wireless Sensor Networks (WSNs).
Sensors, 2018
Proceedings of the 9th IFIP International Conference on New Technologies, 2018
Customized communication between healthcare members during the medication administration stage.
Proceedings of the 20th International Conference on Human-Computer Interaction with Mobile Devices and Services, 2018
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018
Defining the Functional Requirements for the NFC-Based Medication Administration and Clinical Communication System.
Proceedings of the IEEE International Conference on Healthcare Informatics, 2018
Proceedings of the 2018 IEEE Canadian Conference on Electrical & Computer Engineering, 2018
2017
Improved Singeltapbraille: Developing a Single Tap Text Entry Method Based on Grade 1 and 2 Braille Encoding.
J. Ubiquitous Syst. Pervasive Networks, 2017
Metamorphic Framework for Key Management and Authentication in Resource-Constrained Wireless Networks.
Int. J. Netw. Secur., 2017
HiveSec: security in resource-constrained wireless networks inspired by beehives and bee swarms.
Int. J. Inf. Sec., 2017
Framework to monitor pregnant women with a high risk of premature labour using sensor networks.
Proceedings of the 2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 2017
Proceedings of the International Conference on Computer and Applications, 2017
Proceedings of the Universal Access in Human-Computer Interaction. Designing Novel Interactions, 2017
Proceedings of the 8th International Conference on Ambient Systems, 2017
2016
J. Cloud Comput., 2016
Int. J. Netw. Secur., 2016
SingleTapBraille: Developing a Text Entry Method Based on Braille Patterns Using a Single Tap.
Proceedings of the 11th International Conference on Future Networks and Communications (FNC 2016) / The 13th International Conference on Mobile Systems and Pervasive Computing (MobiSPC 2016) / Affiliated Workshops, 2016
Privacy-Enhancing of User's Behaviour Toward Privacy Settings in Social Networking Sites.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016
Understanding Nurses' Perception Regarding the Use of NFC Application During Medication Administration.
Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 2016
An Evaluation of SingleTapBraille Keyboard: A Text Entry Method that Utilizes Braille Patterns on Touchscreen Devices.
Proceedings of the 18th International ACM SIGACCESS Conference on Computers and Accessibility, 2016
2015
Wirel. Pers. Commun., 2015
Sensors, 2015
Proceedings of the 11th International Conference on Mobile Ad-hoc and Sensor Networks, 2015
HIDE: Hybrid Symmetric Key Algorithm for Integrity Check, Dynamic Key Generation and Encryption.
Proceedings of the ICISSP 2015, 2015
Proceedings of the 12th Annual IEEE Consumer Communications and Networking Conference, 2015
2014
Proceedings of the 22nd International Conference on Software, 2014
Proceedings of the IEEE RFID Technology and Applications Conference, 2014
Proceedings of the Q2SWinet'14, 2014
Proceedings of the 10th International Conference on Mobile Ad-hoc and Sensor Networks, 2014
A light-weight authentication scheme based on message digest and location for mobile cloud computing.
Proceedings of the IEEE 33rd International Performance Computing and Communications Conference, 2014
Proceedings of the 5th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN-2014)/ The 4th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH 2014)/ Affiliated Workshops, 2014
Proceedings of the 5th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN-2014)/ The 4th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH 2014)/ Affiliated Workshops, 2014
2013
Proceedings of the IEEE 32nd International Performance Computing and Communications Conference, 2013
Deployment of multiple base-stations in clustering protocols of wireless sensor networks (WSNs).
Proceedings of the International Conference on Advances in Computing, 2013
2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
Proceedings of the 2012 IEEE Symposium on Computational Intelligence for Security and Defence Applications, 2012
A mobile role-based access control system using identity-based encryption with zero knowledge proof.
Proceedings of the 2012 IEEE Symposium on Computational Intelligence for Security and Defence Applications, 2012
2011
Proceedings of the 19th International Conference on Software, 2011
2010
Proceedings of the 7th International Conference on Wireless and Optical Communications Networks, 2010
Proceedings of the IEEE 6th International Conference on Wireless and Mobile Computing, 2010
Test Suite for Vulnerability Analysis of RFID Systems.
Proceedings of the 2010 International Conference on Wireless Networks, 2010
A High Performance Contributory Group Key Management Scheme for Resource-Limited Networks.
Proceedings of the 2010 International Conference on Wireless Networks, 2010
Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications, 2010
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010
2009
Int. J. Wirel. Mob. Comput., 2009
Anomaly Detection Scheme for Routing Intrusions on Mobile Ad Hoc Networks.
Proceedings of the 2009 International Conference on Wireless Networks, 2009
2008
Int. J. Netw. Secur., 2008
Int. J. Netw. Secur., 2008
2007
Wise Guard - MAC Address Spoofing Detection System for Wireless LANs.
Proceedings of the SECRYPT 2007, 2007
Proceedings of the E-business and Telecommunications - 4th International Conference, 2007
Proceedings of IEEE International Conference on Communications, 2007
Proceedings of the Fourth International Conference on Broadband Communications, 2007
2006
Proceedings of the 9th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2006
2005
Proceedings of the 2nd ACM International Workshop on Performance Evaluation of Wireless Ad Hoc, 2005
Proceedings of the 30th Annual IEEE Conference on Local Computer Networks (LCN 2005), 2005
Proceedings of the Quality of Service - IWQoS 2005: 13th International Workshop, 2005
Proceedings of the Third Annual Conference on Communication Networks and Services Research (CNSR 2005), 2005
2004
Int. J. Wirel. Opt. Commun., 2004
Proceedings of the Quality of Service, 2004
Proceedings of the International Conference On Computer Communications and Networks (ICCCN 2004), 2004
2000
Group Management Strategies for Secure Multicasting on Active Virtual Private Networks.
Proceedings of the Proceedings 27th Conference on Local Computer Networks, 2000
Proceedings of the Active Networks, Second International Working Conference, 2000
1996
Int. J. High Speed Comput., 1996
1992
Design and Analysis of a Generalized Architecture for Reconfigurable m-ary Tree Structures.
IEEE Trans. Computers, 1992
1990
IEEE Trans. Computers, 1990
1987
A centrally controlled shuffle network for reconfigurable and fault-tolerant architecture.
SIGARCH Comput. Archit. News, 1987