Udai Pratap Rao
Orcid: 0000-0002-2372-4138
According to our database1,
Udai Pratap Rao
authored at least 46 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
BACP-IeFC: designing blockchain-based access control protocol in IoT-enabled fog computing environment.
Clust. Comput., December, 2024
Ab-HIDS: An anomaly-based host intrusion detection system using frequency of N-gram system call features and ensemble learning for containerized environment.
Concurr. Comput. Pract. Exp., October, 2024
Mh-abe: multi-authority and hierarchical attribute based encryption scheme for secure electronic health record sharing.
Clust. Comput., August, 2024
DL-HIDS: deep learning-based host intrusion detection system using system calls-to-image for containerized cloud environment.
J. Supercomput., June, 2024
A novel hybrid framework for Cloud Intrusion Detection System using system call sequence analysis.
Clust. Comput., June, 2024
Peer Peer Netw. Appl., March, 2024
Exploring security and trust mechanisms in online social networks: An extensive review.
Comput. Secur., 2024
2023
Performance Evaluation of RPL Protocol Under Decreased and Increased Rank Attacks: A Focus on Smart Home Use-Case.
SN Comput. Sci., July, 2023
Attribute based access control (ABAC) scheme with a fully flexible delegation mechanism for IoT healthcare.
Peer Peer Netw. Appl., May, 2023
Concurr. Comput. Pract. Exp., January, 2023
J. Supercomput., 2023
A transformative shift toward blockchain-based IoT environments: Consensus, smart contracts, and future directions.
Secur. Priv., 2023
Int. J. Cloud Comput., 2023
Assessment of Routing Attacks and Mitigation Techniques with RPL Control Messages: A Survey.
ACM Comput. Surv., 2023
2022
Design and evaluation of a novel White-box encryption scheme for resource-constrained IoT devices.
J. Supercomput., 2022
A novel defense mechanism to protect users from profile cloning attack on Online Social Networks (OSNs).
Peer-to-Peer Netw. Appl., 2022
EMBOF-RPL: Improved RPL for early detection and isolation of rank attack in RPL-based internet of things.
Peer-to-Peer Netw. Appl., 2022
Improved <i>l</i>-diversity: Scalable anonymization approach for Privacy Preserving Big Data Publishing.
J. King Saud Univ. Comput. Inf. Sci., 2022
Multi-Objective Energy-Efficient Virtual Machine Consolidation Using Dynamic Double Threshold-Enhanced Search and Rescue-Based Optimization.
Int. J. Softw. Sci. Comput. Intell., 2022
Multi-Objective Adaptive Manta-Ray Foraging Optimization for Workflow Scheduling with Selected Virtual Machines Using Time-Series-Based Prediction.
Int. J. Softw. Sci. Comput. Intell., 2022
An IoT Inventory Before Deployment: A Survey on IoT Protocols, Communication Technologies, Vulnerabilities, Attacks, and Future Research Directions.
Comput. Secur., 2022
A novel trust prediction approach for online social networks based on multifaceted feature similarity.
Clust. Comput., 2022
User behavior-based and graph-based hybrid approach for detection of Sybil Attack in online social networks.
Comput. Electr. Eng., 2022
Proceedings of the IEEE International Conference on Advanced Networks and Telecommunications Systems, 2022
2021
A novel decentralized security architecture against sybil attack in RPL-based IoT networks: a focus on smart home use case.
J. Supercomput., 2021
Privacy Preserving Association Rule Mining on Distributed Healthcare Data: COVID-19 and Breast Cancer Case Study.
SN Comput. Sci., 2021
Improving healthcare services using source anonymous scheme with privacy preserving distributed healthcare data collection and mining.
Computing, 2021
2020
Preserving location privacy using three layer RDV masking in geocoded published discrete point data.
World Wide Web, 2020
Proceedings of the ICDCN 2020: 21st International Conference on Distributed Computing and Networking, 2020
2019
VIC-PRO: Vicinity Protection by Concealing Location Coordinates Using Geometrical Transformations in Location Based Services.
Wirel. Pers. Commun., 2019
J. Intell. Fuzzy Syst., 2019
Scalable l-Diversity: An Extension to Scalable k-Anonymity for Privacy Preserving Big Data Publishing.
Int. J. Inf. Technol. Web Eng., 2019
Proceedings of the 2nd International Conference on Wireless Intelligent and Distributed Environment for Communication, 2019
A Scalable ($\alpha, k$)-Anonymization Approach using MapReduce for Privacy Preserving Big Data Publishing.
Proceedings of the 10th International Conference on Computing, 2019
2018
Privacy Preserving Approach for Association Rule Mining in Horizontally Partitioned Data using MFI and Shamir's Secret Sharing.
Proceedings of the 13th IEEE International Conference on Industrial and Information Systems, 2018
2017
An Exploration to Location Based Service and Its Privacy Preserving Techniques: A Survey.
Wirel. Pers. Commun., 2017
J. Commun. Networks, 2017
Int. J. Netw. Secur., 2017
Privacy preserving big data publishing: a scalable <i>k</i>-anonymization approach using MapReduce.
IET Softw., 2017
2016
Proceedings of the International Conference on Mobile Software Engineering and Systems, 2016
2014
2013
Incorporation of Application Specific Information for Recovery in Database from Malicious Transactions.
Inf. Secur. J. A Glob. Perspect., 2013
2010
An Efficient Approach for Preventing Disclosure of Sensitive Association Rules in Databases.
Proceedings of the 2010 International Conference on Information & Knowledge Engineering, 2010
Proceedings of the Information Processing and Management, 2010