default search action
Deepak Puthal
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j112]Khouloud Eledlebi, Ahmed Adel Alzubaidi, Ernesto Damiani, Víctor Mateu, Yousof Al-Hammadi, Deepak Puthal, Chan Yeob Yeun:
Comparative study of novel packet loss analysis and recovery capability between hybrid TLI-µTESLA and other variant TESLA protocols. Ad Hoc Networks 163: 103579 (2024) - [j111]Zhi-hui Zhan, Jianxin Li, Xuyun Zhang, Deepak Puthal:
Guest Editorial: Special issue on trustworthy machine learning for behavioural and social computing. CAAI Trans. Intell. Technol. 9(3): 541-543 (2024) - [j110]Deepak Puthal, Bidyadhar Subudhi, Thanos Stouraitis:
Security and Privacy-Aware Emerging Computing. IEEE Consumer Electron. Mag. 13(1): 10-11 (2024) - [j109]Ahmad Musamih, Ahmed Dirir, Ibrar Yaqoob, Khaled Salah, Raja Jayaraman, Deepak Puthal:
NFTs in Smart Cities: Vision, Applications, and Challenges. IEEE Consumer Electron. Mag. 13(2): 9-23 (2024) - [j108]Deepak Puthal, Chan Yeob Yeun, Ernesto Damiani, Amit Kumar Mishra, Kumar Yelamarthi, Biswajeet Pradhan:
Blockchain Data Structures and Integrated Adaptive Learning: Features and Futures. IEEE Consumer Electron. Mag. 13(2): 72-80 (2024) - [j107]Hyeran Mun, Kyusuk Han, Ernesto Damiani, Tae-Yeon Kim, Hyun Ku Yeun, Deepak Puthal, Chan Yeob Yeun:
Privacy enhanced data aggregation based on federated learning in Internet of Vehicles (IoV). Comput. Commun. 223: 15-25 (2024) - [j106]Joy Dutta, Deepak Puthal:
PoAh 2.0: AI-empowered dynamic authentication based adaptive blockchain consensus for IoMT-edge workflow. Future Gener. Comput. Syst. 161: 655-672 (2024) - [j105]Deepak Puthal, Amit Kumar Mishra, Sambit Kumar Mishra:
Special issue on collaborative edge computing for secure and scalable Internet of Things. Softw. Pract. Exp. 54(7): 1215-1216 (2024) - [j104]James Mahlaba, Amit Kumar Mishra, Deepak Puthal, Pradip Kumar Sharma:
Blockchain-Based Sensitive Document Storage to Mitigate Corruptions. IEEE Trans. Engineering Management 71: 12635-12647 (2024) - [j103]Nur Zincir-Heywood, Robert Birke, Elias Bou-Harb, Takeru Inoue, Neeraj Kumar, Hanan Lutfiyya, Deepak Puthal, Abdallah Shami, Natalia Stakhanova:
Guest Editorial: Special section on Networks, Systems, and Services Operations and Management Through Intelligence. IEEE Trans. Netw. Serv. Manag. 21(3): 2608-2612 (2024) - [c72]Velankani Joise Divya G. C, Sambit Kumar Mishra, Deepak Puthal:
Enhancing Traffic Flow Through Advanced ACO Mechanism. INFOCOM (Workshops) 2024: 1-6 - [e2]Deepak Puthal, Saraju P. Mohanty, Baek-Young Choi:
Internet of Things. Advances in Information and Communication Technology - 6th IFIP International Cross-Domain Conference, IFIPIoT 2023, Denton, TX, USA, November 2-3, 2023, Proceedings, Part I. IFIP Advances in Information and Communication Technology 683, Springer 2024, ISBN 978-3-031-45877-4 [contents] - [e1]Deepak Puthal, Saraju P. Mohanty, Baek-Young Choi:
Internet of Things. Advances in Information and Communication Technology - 6th IFIP International Cross-Domain Conference, IFIPIoT 2023, Denton, TX, USA, November 2-3, 2023, Proceedings, Part II. IFIP Advances in Information and Communication Technology 684, Springer 2024, ISBN 978-3-031-45881-1 [contents] - 2023
- [j102]Basudeb Bera, Ankush Mitra, Ashok Kumar Das, Deepak Puthal, YoungHo Park:
Private Blockchain-Based AI-Envisioned Home Monitoring Framework in IoMT-Enabled COVID-19 Environment. IEEE Consumer Electron. Mag. 12(3): 62-71 (2023) - [j101]Ahmad Musamih, Khaled Salah, Raja Jayaraman, Ibrar Yaqoob, Deepak Puthal, Samer Ellahham:
NFTs in Healthcare: Vision, Opportunities, and Challenges. IEEE Consumer Electron. Mag. 12(4): 21-32 (2023) - [j100]Xuyun Zhang, Deepak Puthal, Chi Yang:
Special issue on privacy, security, and trust in computational intelligence. Comput. Intell. 39(1): 2-3 (2023) - [j99]Alekha Kumar Mishra, Deepak Puthal:
Data Sampling In Federated Learning: Principles, Features And Taxonomy. IEEE Commun. Stand. Mag. 7(4): 28-33 (2023) - [j98]Anand K. Bapatla, Deepak Puthal, Saraju P. Mohanty, Venkata P. Yanambaka, Elias Kougianos:
EasyChain: an IoT-friendly blockchain for robust and energy-efficient authentication. Frontiers Blockchain 6 (2023) - [j97]Anand K. Bapatla, Saraju P. Mohanty, Elias Kougianos, Deepak Puthal, Anusha Bapatla:
PharmaChain: A blockchain to ensure counterfeit-free pharmaceutical supply chain. IET Networks 12(2): 53-76 (2023) - [j96]Qianwen Ye, Xiaochen Fan, Hongxia Bie, Deepak Puthal, Tao Wu, Xudong Song, Gengfa Fang:
SE-Loc: Security-Enhanced Indoor Localization With Semi-Supervised Deep Learning. IEEE Trans. Netw. Sci. Eng. 10(5): 2964-2977 (2023) - [j95]Nur Zincir-Heywood, Robert Birke, Elias Bou-Harb, Giuliano Casale, Khalil El-Khatib, Takeru Inoue, Neeraj Kumar, Hanan Lutfiyya, Deepak Puthal, Abdallah Shami, Natalia Stakhanova, Farhana H. Zulkernine:
Guest Editorial: Special Section on Machine Learning and Artificial Intelligence for Managing Networks, Systems, and Services - Part II. IEEE Trans. Netw. Serv. Manag. 20(2): 882-889 (2023) - [j94]Alekha Kumar Mishra, Osho Singh, Abhay Kumar, Deepak Puthal, Pradip Kumar Sharma, Biswajeet Pradhan:
Hybrid Mode of Operation Schemes for P2P Communication to Analyze End-Point Individual Behaviour in IoT. ACM Trans. Sens. Networks 19(2): 31:1-31:23 (2023) - [c71]A. S. M. Sanwar Hosen, Pradip Kumar Sharma, Deepak Puthal, In-Ho Ra, Gi Hwan Cho:
SECBlock-IIoT: A Secure Blockchain-enabled Edge Computing Framework for Industrial Internet of Things. ASSS@AsiaCCS 2023: 1:1-1:14 - [c70]Sambit Kumar Mishra, Chandan Cherukuri, Pavuluri Venkata Dheeraj, Deepak Puthal:
A Hybrid Encryption Approach using DNA-Based Shift Protected Algorithm and AES for Edge-Cloud System Security. OCIT 2023: 781-786 - [c69]Sultan Almansoori, Mohamed Alzaabi, Mohammed Alrayssi, Deepak Puthal, Joy Dutta, Aamna Al Shehhi:
Machine Learning-based Adaptive Access Control Mechanism for Private Blockchain Storage. COMPSAC 2023: 1243-1248 - [c68]Sambit Kumar Mishra, Mohana Lasya Sanisetty, Apsareena Zulekha Shaik, Sai Likitha Thotakura, Sai Likhita Aluru, Deepak Puthal:
LiDAR-based Building Damage Detection in Edge-Cloud Continuum. DASC/PiCom/CBDCom/CyberSciTech 2023: 252-257 - [c67]Saeed Alqubaisi, Deepak Puthal, Joy Dutta, Ernesto Damiani:
Privacy-aware Adaptive Collaborative Learning Approach for Distributed Edge Networks. DSAA 2023: 1-10 - [c66]Joy Dutta, Deepak Puthal:
Human-Centered Explainable AI at the Edge for eHealth. EDGE 2023: 227-232 - [c65]Joy Dutta, Deepak Puthal, Chan Yeob Yeun:
Next Generation Healthcare with Explainable AI: IoMT-Edge-Cloud Based Advanced eHealth. GLOBECOM 2023: 7327-7332 - [c64]Seema G. Aarella, Saraju P. Mohanty, Elias Kougianos, Deepak Puthal:
Fortified-Edge: Secure PUF Certificate Authentication Mechanism for Edge Data Centers in Collaborative Edge Computing. ACM Great Lakes Symposium on VLSI 2023: 249-254 - [c63]Deepak Puthal, Saraju P. Mohanty, Chan Yeob Yeun, Ernesto Damiani, Biswajeet Pradhan:
Pervasive AI for Secure and Scalable IoT- Edge-Cloud Continuum: A Big Picture. HPCC/DSS/SmartCity/DependSys 2023: 566-573 - [c62]Joy Dutta, Debojit Chakraborty, Sarbani Roy, Deepak Puthal:
JUHDM: IoT-Based Honk Detection and Novel Driver Profiling For Smart City. HPCC/DSS/SmartCity/DependSys 2023: 964-971 - [c61]Alekha Kumar Mishra, Sadhvi Khatik, Deepak Puthal:
A 2-Colorable DODAG Structured Hybrid Mode of Operations Architecture for RPL Protocol to Reduce Communication Overhead. IFIPIoT (2) 2023: 212-224 - [c60]Darwish Al Neyadi, Deepak Puthal, Joy Dutta, Ernesto Damiani:
Role-Based Access Control in Private Blockchain for IoT Integrated Smart Contract. IFIPIoT (2) 2023: 227-245 - [c59]Alekha Kumar Mishra, Deepak Puthal, Asis Kumar Tripathy:
A Secure RPL Rank Computation and Distribution Mechanism for Preventing Sinkhole Attack in IoT-based Systems. INFOCOM Workshops 2023: 1-6 - [c58]Seema G. Aarella, Saraju P. Mohanty, Elias Kougianos, Deepak Puthal:
Fortified-Edge 2.0: Machine Learning based Monitoring and Authentication of PUF-Integrated Secure Edge Data Center. ISVLSI 2023: 1-6 - [c57]Joy Dutta, Deepak Puthal:
IoMT Synthetic Cardiac Arrest Dataset for eHealth with AI-based Validation. ISVLSI 2023: 1-6 - [c56]Deepak Puthal, Saraju P. Mohanty, Amit Kumar Mishra, Chan Yeob Yeun, Ernesto Damiani:
Revolutionizing Cyber Security: Exploring the Synergy of Machine Learning and Logical Reasoning for Cyber Threats and Mitigation. ISVLSI 2023: 1-6 - 2022
- [j93]Jogeswar Tripathy, Rasmita Dash, Binod Kumar Pattanayak, Sambit Kumar Mishra, Tapas Kumar Mishra, Deepak Puthal:
Combination of Reduction Detection Using TOPSIS for Gene Expression Data Analysis. Big Data Cogn. Comput. 6(1): 24 (2022) - [j92]Deepak Puthal, Stanly Wilson, Ashish Nanda, Ming Liu, Srinibas Swain, Biswa P. S. Sahoo, Kumar Yelamarthi, Prashant Pillai, Hesham El-Sayed, Mukesh Prasad:
Decision tree based user-centric security solution for critical IoT infrastructure. Comput. Electr. Eng. 99: 107754 (2022) - [j91]Mainak Adhikari, Ambigavathi Munusamy, Abhishek Hazra, Varun G. Menon, Vijay Anavangot, Deepak Puthal:
Security in Edge-Centric Intelligent Internet of Vehicles: Issues and Remedies. IEEE Consumer Electron. Mag. 11(6): 24-31 (2022) - [j90]Rathin Chandra Shit, Suraj Sharma, Paul A. Watters, Kumar Yelamarthi, Biswajeet Pradhan, Richard Davison, Graham Morgan, Deepak Puthal:
Privacy-preserving cooperative localization in vehicular edge computing infrastructure. Concurr. Comput. Pract. Exp. 34(14) (2022) - [j89]Srinibas Swain, Deepak Puthal, Elisa Bertino:
CryptoCliqIn: Graph-Theoretic Cryptography Using Clique Injection. IEEE Intell. Syst. 37(5): 59-65 (2022) - [j88]Padmalochan Panda, Alekha Kumar Mishra, Deepak Puthal:
A Novel Logo Identification Technique for Logo-Based Phishing Detection in Cyber-Physical Systems. Future Internet 14(8): 241 (2022) - [j87]Ashish Virendra Chandak, Niranjan Kumar Ray, Deepak Puthal:
QSFN: QoS-aware fog node provisioning in fog computing. Int. J. Comput. Appl. Technol. 69(1): 36-46 (2022) - [j86]Biswa P. S. Sahoo, Deepak Puthal, Pradip Kumar Sharma:
Toward Advanced UAV Communications: Properties, Research Challenges, and Future Potential. IEEE Internet Things Mag. 5(1): 154-159 (2022) - [j85]Kim-Kwang Raymond Choo, Deepak Puthal, Charles Zhechao Liu, Chonggang Wang:
Introducing the Special Topic on "Mitigating Cyber Threats and Defense in Data Intensive Smart Cities". Inf. Syst. Frontiers 24(5): 1393-1394 (2022) - [j84]Kalyan Kumar Jena, Sourav Kumar Bhoi, Mukesh Prasad, Deepak Puthal:
A fuzzy rule-based efficient hospital bed management approach for coronavirus disease-19 infected patients. Neural Comput. Appl. 34(14): 11361-11382 (2022) - [j83]Abdullah Bin Sawad, Bhuva Narayan, Ahlam Alnefaie, Ashwaq Maqbool, Indra Mckie, Jemma Smith, Berkan Yuksel, Deepak Puthal, Mukesh Prasad, Ahmet Baki Kocaballi:
A Systematic Review on Healthcare Artificial Intelligent Conversational Agents for Chronic Conditions. Sensors 22(7): 2625 (2022) - [j82]Madhusmita Sahu, Rasmita Dash, Sambit Kumar Mishra, Deepak Puthal:
A Smart Logistic Classification Method for Remote Sensed Image Land Cover Data. SN Comput. Sci. 3(6): 477 (2022) - [j81]Guanfeng Liu, An Liu, Qing Li, Huanhuan Chen, Deepak Puthal:
Guest Editorial Special Issue on Computational Intelligence in Big Graph Data Management. IEEE Trans. Emerg. Top. Comput. Intell. 6(5): 1027-1029 (2022) - [j80]Rajendra Prasad Nayak, Srinivas Sethi, Sourav Kumar Bhoi, Debasis Mohapatra, Rashmi Ranjan Sahoo, Pradip Kumar Sharma, Deepak Puthal:
TFMD-SDVN: a trust framework for misbehavior detection in the edge of software-defined vehicular network. J. Supercomput. 78(6): 7948-7981 (2022) - [j79]Alekha Kumar Mishra, Osho Singh, Abhay Kumar, Deepak Puthal:
Hybrid Mode of Operations for RPL in IoT: A Systematic Survey. IEEE Trans. Netw. Serv. Manag. 19(3): 3574-3586 (2022) - [j78]Nur Zincir-Heywood, Robert Birke, Elias Bou-Harb, Giuliano Casale, Khalil El-Khatib, Takeru Inoue, Neeraj Kumar, Hanan Lutfiyya, Deepak Puthal, Abdallah Shami, Natalia Stakhanova, Farhana H. Zulkernine:
Guest Editorial: Special Issue on Machine Learning and Artificial Intelligence for Managing Networks, Systems, and Services - Part I. IEEE Trans. Netw. Serv. Manag. 19(4): 3988-3994 (2022) - [c55]Joy Dutta, Deepak Puthal, Ernesto Damiani:
AI-based Block Identification and Classification in the Blockchain Integrated IoT. OCIT 2022: 415-421 - [c54]Anand Kumar Bapatla, Saraju P. Mohanty, Elias Kougianos, Deepak Puthal:
PharmaChain 3.0: Blockchain Integrated Efficient QR Code Mechanism for Pharmaceutical Supply Chain. OCIT 2022: 625-630 - [c53]Pradip Kumar Sharma, Prosanta Gope, Deepak Puthal:
Blockchain and Federated Learning-enabled Distributed Secure and Privacy-preserving Computing Architecture for IoT Network. EuroS&P Workshops 2022: 1-9 - [c52]Anand Kumar Bapatla, Saraju P. Mohanty, Elias Kougianos, Deepak Puthal:
PharmaChain 2.0: A Blockchain Framework for Secure Remote Monitoring of Drug Environmental Parameters in Pharmaceutical Cold Supply Chain. iSES 2022: 185-190 - [c51]Seema G. Aarella, Saraju P. Mohanty, Elias Kougianos, Deepak Puthal:
PUF-based Authentication Scheme for Edge Data Centers in Collaborative Edge Computing. iSES 2022: 433-438 - [c50]Deepak Puthal, Ernesto Damiani, Saraju P. Mohanty:
Secure and Scalable Collaborative Edge Computing using Decision Tree. ISVLSI 2022: 247-252 - [i9]Tianming Zheng, Ming Liu, Deepak Puthal, Ping Yi, Yue Wu, Xiangjian He:
Smart Grid: Cyber Attacks, Critical Defense Approaches, and Digital Twin. CoRR abs/2205.11783 (2022) - 2021
- [j77]Deepak Puthal, Saraju P. Mohanty, Elias Kougianos, Gautam Das:
When Do We Need the Blockchain? IEEE Consumer Electron. Mag. 10(2): 53-56 (2021) - [j76]Deepak Puthal, Saraju P. Mohanty, Stanly Wilson, Uma Choppali:
Collaborative Edge Computing for Smart Villages [Energy and Security]. IEEE Consumer Electron. Mag. 10(3): 68-71 (2021) - [j75]Deepak Puthal, Saraju P. Mohanty:
Cybersecurity Issues in AI. IEEE Consumer Electron. Mag. 10(4): 33-35 (2021) - [j74]Deepak Puthal, Srinibas Swain, Saraju P. Mohanty:
Toward Next-Generation Robust Cryptosystems. IEEE Consumer Electron. Mag. 10(5): 58-60 (2021) - [j73]Deepak Puthal, Amit Kumar Mishra, Suraj Sharma:
AI-Driven Security Solutions for the Internet of Everything. IEEE Consumer Electron. Mag. 10(5): 70-71 (2021) - [j72]Biswa P. S. Sahoo, Saraju P. Mohanty, Deepak Puthal, Prashant Pillai:
Personal Internet of Things (PIoT): What Is It Exactly? IEEE Consumer Electron. Mag. 10(6): 58-60 (2021) - [j71]Niranjan Kumar Ray, Deepak Puthal, Dhruva Ghai:
Federated Learning. IEEE Consumer Electron. Mag. 10(6): 106-107 (2021) - [j70]Bin Qian, Jie Su, Zhenyu Wen, Devki Nandan Jha, Yinhao Li, Yu Guan, Deepak Puthal, Philip James, Renyu Yang, Albert Y. Zomaya, Omer F. Rana, Lizhe Wang, Maciej Koutny, Rajiv Ranjan:
Orchestrating the Development Lifecycle of Machine Learning-based IoT Applications: A Taxonomy and Survey. ACM Comput. Surv. 53(4): 82:1-82:47 (2021) - [j69]Sudip Maitra, Venkata P. Yanambaka, Deepak Puthal, Ahmed Abdelgawad, Kumar Yelamarthi:
Integration of Internet of Things and blockchain toward portability and low-energy consumption. Trans. Emerg. Telecommun. Technol. 32(6) (2021) - [j68]Suchismita Rout, Kshira Sagar Sahoo, Sudhansu Shekhar Patra, Bibhudatta Sahoo, Deepak Puthal:
Energy Efficiency in Software Defined Networking: A Survey. SN Comput. Sci. 2(4): 308 (2021) - [j67]Xuezhi Zeng, Saurabh Garg, Mutaz Barika, Sanat Kumar Bista, Deepak Puthal, Albert Y. Zomaya, Rajiv Ranjan:
Detection of SLA Violation for Big Data Analytics Applications in Cloud. IEEE Trans. Computers 70(5): 746-758 (2021) - [j66]Zhenyu Wen, Saurabh Garg, Gagangeet Singh Aujla, Khaled Alwasel, Deepak Puthal, Schahram Dustdar, Albert Y. Zomaya, Rajiv Ranjan:
Running Industrial Workflow Applications in a Software-Defined Multicloud Environment Using Green Energy Aware Scheduling Algorithm. IEEE Trans. Ind. Informatics 17(8): 5645-5656 (2021) - [j65]Rathin Chandra Shit, Suraj Sharma, Kumar Yelamarthi, Deepak Puthal:
AI-Enabled Fingerprinting and Crowdsource-Based Vehicle Localization for Resilient and Safe Transportation Systems. IEEE Trans. Intell. Transp. Syst. 22(7): 4660-4669 (2021) - [j64]Soheila Ghane, Alireza Jolfaei, Lars Kulik, Kotagiri Ramamohanarao, Deepak Puthal:
Preserving Privacy in the Internet of Connected Vehicles. IEEE Trans. Intell. Transp. Syst. 22(8): 5018-5027 (2021) - [j63]Hanan Lutfiyya, Robert Birke, Giuliano Casale, Amogh Dhamdhere, Jinho Hwang, Takeru Inoue, Neeraj Kumar, Deepak Puthal, Nur Zincir-Heywood:
Guest Editorial: Special Section on Embracing Artificial Intelligence for Network and Service Management. IEEE Trans. Netw. Serv. Manag. 18(4): 3936-3941 (2021) - [j62]Amiya Kumar Sahu, Suraj Sharma, Deepak Puthal:
Lightweight Multi-party Authentication and Key Agreement Protocol in IoT-based E-Healthcare Service. ACM Trans. Multim. Comput. Commun. Appl. 17(2s): 64:1-64:20 (2021) - [c49]Xuyun Zhang, Deepak Puthal, Chi Yang, Guanfeng Liu, Kim-Kwang Raymond Choo, Hongzhi Yin:
International Workshop on Privacy, Security and Trust in Computational Intelligence (PSTCI2021). CIKM 2021: 4886-4887 - [c48]Shreya Pare, Mukesh Prasad, Deepak Puthal, Deepak Gupta, Anand Malik, Amit Saxena:
Multilevel Color Image Segmentation using Modified Fuzzy Entropy and Cuckoo Search Algorithm. FUZZ-IEEE 2021: 1-7 - [c47]Ashish Virendra Chandak, Niranjan Kumar Ray, Deepak Puthal:
Performance Analysis of Classifier Techniques at the Edge Node. iSES 2021: 432-437 - [i8]Biswa P. S. Sahoo, Deepak Puthal, Saraju P. Mohanty, Prashant Pillai:
Personal Internet of Things (PIoT): What is it Exactly? CoRR abs/2105.12714 (2021) - 2020
- [j61]Saraju P. Mohanty, Venkata P. Yanambaka, Elias Kougianos, Deepak Puthal:
PUFchain: A Hardware-Assisted Blockchain for Sustainable Simultaneous Device and Data Security in the Internet of Everything (IoE). IEEE Consumer Electron. Mag. 9(2): 8-16 (2020) - [j60]Meng Liu, Yun Luo, Chi Yang, Shaoning Pang, Deepak Puthal, Kaijun Ren, Xuyun Zhang:
Privacy-preserving matrix product based static mutual exclusive roles constraints violation detection in interoperable role-based access control. Future Gener. Comput. Syst. 109: 457-468 (2020) - [j59]Ashish Nanda, Priyadarsi Nanda, Xiangjian He, Aruna Jamdagni, Deepak Puthal:
A hybrid encryption technique for Secure-GLOR: The adaptive secure routing protocol for dynamic wireless mesh networks. Future Gener. Comput. Syst. 109: 521-530 (2020) - [j58]Neha Bharill, Aruna Tiwari, Aayushi Malviya, Om Prakash Patel, Akahansh Gupta, Deepak Puthal, Amit Saxena, Mukesh Prasad:
Fuzzy knowledge based performance analysis on big data. Neurocomputing 389: 218-228 (2020) - [j57]Muhammad Usman, Mian Ahmad Jan, Deepak Puthal:
PAAL: A Framework Based on Authentication, Aggregation, and Local Differential Privacy for Internet of Multimedia Things. IEEE Internet Things J. 7(4): 2501-2508 (2020) - [j56]Kshira Sagar Sahoo, Deepak Puthal, Mayank Tiwary, Muhammad Usman, Bibhudatta Sahoo, Zhenyu Wen, Biswa P. S. Sahoo, Rajiv Ranjan:
ESMLB: Efficient Switch Migration-Based Load Balancing for Multicontroller SDN in IoT. IEEE Internet Things J. 7(7): 5852-5860 (2020) - [j55]Mohammed Al-Khafajiy, Thar Baker, Muhammad Asim, Zehua Guo, Rajiv Ranjan, Antonella Longo, Deepak Puthal, Mark Taylor:
COMITMENT: A Fog Computing Trust Management Approach. J. Parallel Distributed Comput. 137: 1-16 (2020) - [j54]Khaled Alwasel, Devki Nandan Jha, Eduardo Hernández, Deepak Puthal, Mutaz Barika, Blesson Varghese, Saurabh Kumar Garg, Philip James, Albert Y. Zomaya, Graham Morgan, Rajiv Ranjan:
IoTSim-SDWAN: A simulation framework for interconnecting distributed datacenters over Software-Defined Wide Area Network (SD-WAN). J. Parallel Distributed Comput. 143: 17-35 (2020) - [j53]Devki Nandan Jha, Khaled Alwasel, Areeb Alshoshan, Xianghua Huang, Ranesh Kumar Naha, Sudheer Kumar Battula, Saurabh Garg, Deepak Puthal, Philip James, Albert Y. Zomaya, Schahram Dustdar, Rajiv Ranjan:
IoTSim-Edge: A simulation framework for modeling the behavior of Internet of Things and edge computing environments. Softw. Pract. Exp. 50(6): 844-867 (2020) - [j52]Deepak Puthal, Laurence T. Yang, Schahram Dustdar, Zhenyu Wen, Jun Song, Aad van Moorsel, Rajiv Ranjan:
A User-centric Security Solution for Internet of Things and Edge Convergence. ACM Trans. Cyber Phys. Syst. 4(3): 32:1-32:19 (2020) - [j51]A. S. M. Sanwar Hosen, Saurabh Singh, Pradip Kumar Sharma, Md. Sazzadur Rahman, In-Ho Ra, Gi Hwan Cho, Deepak Puthal:
A QoS-Aware Data Collection Protocol for LLNs in Fog-Enabled Internet of Things. IEEE Trans. Netw. Serv. Manag. 17(1): 430-444 (2020) - [j50]Kshira Sagar Sahoo, Deepak Puthal:
SDN-Assisted DDoS Defense Framework for the Internet of Multimedia Things. ACM Trans. Multim. Comput. Commun. Appl. 16(3s): 98:1-98:18 (2020) - [j49]Hesham El-Sayed, Sherali Zeadally, Deepak Puthal:
Design and evaluation of a novel hierarchical trust assessment approach for vehicular networks. Veh. Commun. 24: 100227 (2020) - [j48]Pritish Mishra, Ananya Biswal, Sahil Garg, Rongxing Lu, Mayank Tiwary, Deepak Puthal:
Software Defined Internet of Things Security: Properties, State of the Art, and Future Research. IEEE Wirel. Commun. 27(3): 10-16 (2020) - [c46]Jin Ho Go, Tony Jan, Manoranjan Mohanty, Om Prakash Patel, Deepak Puthal, Mukesh Prasad:
Visualization Approach for Malware Classification with ResNeXt. CEC 2020: 1-7 - [c45]Pritish Mishra, Mayank Tiwary, Ahmad Alsharidah, Deepak Puthal:
Software Defined Wide-Area Networks Control Plane Scaling using Bayesian Game Model. ICC Workshops 2020: 1-6 - [c44]Rathin Chandra Shit, Suraj Sharma, Mohammad S. Obaidat, Deepak Puthal:
Adaptive Software Defined Node Deployment for Green Internet of Things. ICC 2020: 1-6 - [c43]Ahmad Alkhodair, Saraju P. Mohanty, Elias Kougianos, Deepak Puthal:
McPoRA: A Multi-chain Proof of Rapid Authentication for Post-Blockchain Based Security in Large Scale Complex Cyber-Physical Systems. ISVLSI 2020: 446-451 - [c42]Sudip Maitra, Venkata P. Yanambaka, Ahmed Abdelgawad, Deepak Puthal, Kumar Yelamarthi:
Proof-of-Authentication Consensus Algorithm: Blockchain-based IoT Implementation. WF-IoT 2020: 1-2 - [c41]Mayank Tiwary, Pritish Mishra, Shashank Jain, Deepak Puthal:
Data Aware Web-Assembly Function Placement. WWW (Companion Volume) 2020: 4-5 - [i7]Deepak Puthal, Saraju P. Mohanty, Venkata P. Yanambaka, Elias Kougianos:
PoAh: A Novel Consensus Algorithm for Fast Scalable Private Blockchain for Large-scale IoT Frameworks. CoRR abs/2001.07297 (2020)
2010 – 2019
- 2019
- [j47]Hesham El-Sayed, Moumena Chaqfeh, Sherali Zeadally, Deepak Puthal:
A Traffic-Aware Approach for Enabling Unmanned Aerial Vehicles (UAVs) in Smart City Scenarios. IEEE Access 7: 86297-86305 (2019) - [j46]Shuyun Luo, Yuzhou Wen, Weiqiang Xu, Deepak Puthal:
Adaptive Task Offloading Auction for Industrial CPS in Mobile Edge Computing. IEEE Access 7: 169055-169065 (2019) - [j45]Deepak Puthal, Suraj Sharma:
Introduction to the Special Section on Secure and Scalable Fog/Edge Computing. Comput. Electr. Eng. 77: 420-422 (2019) - [j44]Neeraj Kumar, Deepak Puthal, Theocharis Theocharides, Saraju P. Mohanty:
Unmanned Aerial Vehicles in Consumer Applications: New Applications in Current and Future Smart Environments. IEEE Consumer Electron. Mag. 8(3): 66-67 (2019) - [j43]Deepak Puthal, Saraju P. Mohanty, Sanjivani Ashok Bhavake, Graham Morgan, Rajiv Ranjan:
Fog Computing Security Challenges and Future Directions [Energy and Security]. IEEE Consumer Electron. Mag. 8(3): 92-96 (2019) - [j42]Shaoning Pang, Xuyun Zhang, Kazushi Ikeda, Deepak Puthal, Jianxin Li, Abdolhossein Sarrafzadeh:
Editorial. Comput. Intell. 35(3): 474-475 (2019) - [j41]Chao-Tung Yang, Shuo-Tsung Chen, Jung-Chun Liu, Yi-Wei Su, Deepak Puthal, Rajiv Ranjan:
A predictive load balancing technique for software defined networked cloud services. Computing 101(3): 211-235 (2019) - [j40]Rathin Chandra Shit, Suraj Sharma, Deepak Puthal, Philip James, Biswajeet Pradhan, Aad van Moorsel, Albert Y. Zomaya, Rajiv Ranjan:
Ubiquitous Localization (UbiLoc): A Survey and Taxonomy on Device Free Localization for Smart World. IEEE Commun. Surv. Tutorials 21(4): 3532-3564 (2019) - [j39]Priyadarsi Nanda, Deepak Puthal, Saraju P. Mohanty:
Editorial to the Special Issue on Recent Advances on Trust, Security and Privacy in Computing and Communications. Concurr. Comput. Pract. Exp. 31(23) (2019) - [j38]Alekha Kumar Mishra, Asis Kumar Tripathy, Deepak Puthal, Laurence T. Yang:
Analytical Model for Sybil Attack Phases in Internet of Things. IEEE Internet Things J. 6(1): 379-387 (2019) - [j37]Deepak Puthal:
Lattice-Modeled Information Flow Control of Big Sensing Data Streams for Smart Health Application. IEEE Internet Things J. 6(2): 1312-1320 (2019) - [j36]Deepak Puthal, Rajiv Ranjan, Ashish Nanda, Priyadarsi Nanda, Prem Prakash Jayaraman, Albert Y. Zomaya:
Secure authentication and load balancing of distributed edge datacenters. J. Parallel Distributed Comput. 124: 60-69 (2019) - [j35]Xuyun Zhang, Yuan Yuan, Zhili Zhou, Shancang Li, Lianyong Qi, Deepak Puthal:
Intrusion Detection and Prevention in Cloud, Fog, and Internet of Things. Secur. Commun. Networks 2019: 4529757:1-4529757:4 (2019) - [j34]Deepak Puthal, Xindong Wu, Surya Nepal, Rajiv Ranjan, Jinjun Chen:
SEEN: A Selective Encryption Method to Ensure Confidentiality for Big Sensing Data Streams. IEEE Trans. Big Data 5(3): 379-392 (2019) - [j33]Venkata P. Yanambaka, Saraju P. Mohanty, Elias Kougianos, Deepak Puthal:
PMsec: Physical Unclonable Function-Based Robust and Lightweight Authentication in the Internet of Medical Things. IEEE Trans. Consumer Electron. 65(3): 388-397 (2019) - [j32]Ashish Nanda, Deepak Puthal, Joel J. P. C. Rodrigues, Sergei A. Kozlov:
Internet of Autonomous Vehicles Communications Security: Overview, Issues, and Directions. IEEE Wirel. Commun. 26(4): 60-65 (2019) - [j31]Pritish Mishra, Deepak Puthal, Mayank Tiwary, Saraju P. Mohanty:
Software Defined IoT Systems: Properties, State of the Art, and Future Research. IEEE Wirel. Commun. 26(6): 64-71 (2019) - [c40]Nipun Balan Thekkummal, Devki Nandan Jha, Deepak Puthal, Philip James, Rajiv Ranjan:
Coordinated Data Flow Control in IoT Networks. ALGOCLOUD 2019: 25-41 - [c39]Ashish Nanda, Priyadarsi Nanda, Mohammad S. Obaidat, Xiangjian He, Deepak Puthal:
A Novel Multi-Path Anonymous Randomized Key Distribution Scheme for Geo Distributed Networks. GLOBECOM 2019: 1-6 - [c38]Deepak Puthal, Saraju P. Mohanty, Priyadarsi Nanda, Elias Kougianos, Gautam Das:
Proof-of-Authentication for Scalable Blockchain in Resource-Constrained Distributed Systems. ICCE 2019: 1-5 - [c37]Venkata P. Yanambaka, Saraju P. Mohanty, Elias Kougianos, Deepak Puthal, Laavanya Rachakonda:
PMsec: PUF-Based Energy-Efficient Authentication of Devices in the Internet of Medical Things (IoMT). iSES 2019: 320-321 - [c36]Saraju P. Mohanty, Venkata P. Yanambaka, Elias Kougianos, Deepak Puthal:
PUFchain: Hardware-Assisted Scalable Blockchain. iSES 2019: 324-325 - [r2]Jhalak Hota, Deepak Puthal, Abhay Kumar Samal:
Privacy Cube. Encyclopedia of Big Data Technologies 2019 - [r1]Deepak Puthal, Rajiv Ranjan, Jinjun Chen:
Big Data Stream Security Classification for IoT Applications. Encyclopedia of Big Data Technologies 2019 - [i6]Saraju P. Mohanty, Venkata P. Yanambaka, Elias Kougianos, Deepak Puthal:
PUFchain: Hardware-Assisted Blockchain for Sustainable Simultaneous Device and Data Security in the Internet of Everything (IoE). CoRR abs/1909.06496 (2019) - [i5]Devki Nandan Jha, Khaled Alwasel, Areeb Alshoshan, Xianghua Huang, Ranesh Kumar Naha, Sudheer Kumar Battula, Saurabh Kumar Garg, Deepak Puthal, Philip James, Albert Y. Zomaya, Schahram Dustdar, Rajiv Ranjan:
IoTSim-Edge: A Simulation Framework for Modeling the Behaviour of IoT and Edge Computing Environments. CoRR abs/1910.03026 (2019) - [i4]Bin Qian, Jie Su, Zhenyu Wen, Devki Nandan Jha, Yinhao Li, Yu Guan, Deepak Puthal, Philip James, Renyu Yang, Albert Y. Zomaya, Omer F. Rana, Lizhe Wang, Rajiv Ranjan:
Orchestrating Development Lifecycle of Machine Learning Based IoT Applications: A Survey. CoRR abs/1910.05433 (2019) - 2018
- [j30]Chin-Teng Lin, Mukesh Prasad, Chia-Hsin Chung, Deepak Puthal, Hesham El-Sayed, Sharmi Sankar, Yu-Kai Wang, Jagendra Singh, Arun Kumar Sangaiah:
IoT-Based Wireless Polysomnography Intelligent System for Sleep Monitoring. IEEE Access 6: 405-414 (2018) - [j29]Hesham El-Sayed, Sharmi Sankar, Mukesh Prasad, Deepak Puthal, Akshansh Gupta, Manoranjan Mohanty, Chin-Teng Lin:
Edge of Things: The Big Picture on the Integration of Edge, IoT and the Cloud in a Distributed Computing Environment. IEEE Access 6: 1706-1717 (2018) - [j28]Rakesh Kumar Lenka, Amiya Kumar Rath, Zhiyuan Tan, Suraj Sharma, Deepak Puthal, N. V. R. Simha, Mukesh Prasad, Rohit Raja, Shankar Sharan Tripathi:
Building Scalable Cyber-Physical-Social Networking Infrastructure Using IoT and Low Power Sensors. IEEE Access 6: 30162-30173 (2018) - [j27]Ning Yang, Xiaochen Fan, Deepak Puthal, Xiangjian He, Priyadarsi Nanda, Shiping Guo:
A Novel Collaborative Task Offloading Scheme for Secure and Sustainable Mobile Cloudlet Networks. IEEE Access 6: 44175-44189 (2018) - [j26]Xiaochen Fan, Xiangjian He, Chaocan Xiang, Deepak Puthal, Liangyi Gong, Priyadarsi Nanda, Gengfa Fang:
Towards System Implementation and Data Analysis for Crowdsensing Based Outdoor RSS Maps. IEEE Access 6: 47535-47545 (2018) - [j25]Sambit Kumar Mishra, Deepak Puthal, Bibhudatta Sahoo, Suraj Sharma, Zhi Xue, Albert Y. Zomaya:
Energy-Efficient Deployment of Edge Dataenters for Mobile Clouds in Sustainable IoT. IEEE Access 6: 56587-56597 (2018) - [j24]Deepak Puthal, Nisha Malik, Saraju P. Mohanty, Elias Kougianos, Chi Yang:
The Blockchain as a Decentralized Security Framework [Future Directions]. IEEE Consumer Electron. Mag. 7(2): 18-21 (2018) - [j23]Swati Sucharita Roy, Deepak Puthal, Suraj Sharma, Saraju P. Mohanty, Albert Y. Zomaya:
Building a Sustainable Internet of Things: Energy-Efficient Routing Using Low-Power Sensors Will Meet the Need. IEEE Consumer Electron. Mag. 7(2): 42-49 (2018) - [j22]Deepak Puthal, Nisha Malik, Saraju P. Mohanty, Elias Kougianos, Gautam Das:
Everything You Wanted to Know About the Blockchain: Its Promise, Components, Processes, and Problems. IEEE Consumer Electron. Mag. 7(4): 6-14 (2018) - [j21]Deepak Puthal, Xuyun Zhang:
Secure Computing for the Internet of Things and Network Edges: Protecting Communication in the Worldwide Network of Devices. IEEE Consumer Electron. Mag. 7(6): 29-30 (2018) - [j20]Ashish Nanda, Deepak Puthal, Saraju P. Mohanty, Uma Choppali:
A Computing Perspective of Quantum Cryptography [Energy and Security]. IEEE Consumer Electron. Mag. 7(6): 57-59 (2018) - [j19]Deepak Puthal, Mohammad S. Obaidat, Priyadarsi Nanda, Mukesh Prasad, Saraju P. Mohanty, Albert Y. Zomaya:
Secure and Sustainable Load Balancing of Edge Data Centers in Fog Computing. IEEE Commun. Mag. 56(5): 60-65 (2018) - [j18]Sourav Kumar Bhoi, Deepak Puthal, Pabitra Mohan Khilar, Joel J. P. C. Rodrigues, Sanjaya Kumar Panda, Laurence T. Yang:
Adaptive routing protocol for urban vehicular networks to support sellers and buyers on wheels. Comput. Networks 142: 168-178 (2018) - [j17]Rathin Chandra Shit, Suraj Sharma, Deepak Puthal, Albert Y. Zomaya:
Location of Things (LoT): A Review and Taxonomy of Sensors Localization in IoT Infrastructure. IEEE Commun. Surv. Tutorials 20(3): 2028-2061 (2018) - [j16]Kshira Sagar Sahoo, Deepak Puthal, Mayank Tiwary, Joel J. P. C. Rodrigues, Bibhudatta Sahoo, Ratnakar Dash:
An early detection of low rate DDoS attack to SDN based data center networks using information distance metrics. Future Gener. Comput. Syst. 89: 685-697 (2018) - [j15]Mayank Tiwary, Deepak Puthal, Kshira Sagar Sahoo, Bibhudatta Sahoo, Laurence T. Yang:
Response time optimization for cloudlets in Mobile Edge Computing. J. Parallel Distributed Comput. 119: 81-91 (2018) - [j14]Kshira Sagar Sahoo, Deepak Puthal, Mohammad S. Obaidat, Anamay Sarkar, Sambit Kumar Mishra, Bibhudatta Sahoo:
On the placement of controllers in software-Defined-WAN using meta-heuristic approach. J. Syst. Softw. 145: 180-194 (2018) - [j13]Fazlullah Khan, Ateeq Ur Rehman, Muhammad Usman, Zhiyuan Tan, Deepak Puthal:
Performance of Cognitive Radio Sensor Networks Using Hybrid Automatic Repeat ReQuest: Stop-and-Wait. Mob. Networks Appl. 23(3): 479-488 (2018) - [j12]Hesham El-Sayed, Sharmi Sankar, Yousef-Awwad Daraghmi, Prayag Tiwari, Ekarat Rattagan, Manoranjan Mohanty, Deepak Puthal, Mukesh Prasad:
Accurate Traffic Flow Prediction in Heterogeneous Vehicular Networks in an Intelligent Transport System Using a Supervised Non-Parametric Classifier. Sensors 18(6): 1696 (2018) - [j11]Sambit Kumar Mishra, Deepak Puthal, Bibhudatta Sahoo, Prem Prakash Jayaraman, Jun Song, Albert Y. Zomaya, Rajiv Ranjan:
Energy-efficient VM-placement in cloud data center. Sustain. Comput. Informatics Syst. 20: 48-55 (2018) - [j10]Sambit Kumar Mishra, Deepak Puthal, Joel J. P. C. Rodrigues, Bibhu Datta Sahoo, Eryk Dutkiewicz:
Sustainable Service Allocation Using a Metaheuristic Technique in a Fog Server for Industrial Applications. IEEE Trans. Ind. Informatics 14(10): 4497-4506 (2018) - [j9]Sambit Kumar Mishra, Deepak Puthal, Bibhudatta Sahoo, Sanjay Kumar Jena, Mohammad S. Obaidat:
An adaptive task allocation technique for green cloud computing. J. Supercomput. 74(1): 370-385 (2018) - [c35]Man Li, Chi Yang, Jin Zhang, Deepak Puthal, Yun Luo, Jianxin Li:
Stock market analysis using social networks. ACSW 2018: 19:1-19:10 - [c34]Rathin Chandra Shit, Suraj Sharma, Deepak Puthal, Shankar Sharan Tripathi:
Probabilistic RSS Fingerprinting for Localization in Smart Platforms. ICIT 2018: 254-259 - [c33]Sambit Kumar Mishra, Sonali Mishra, Mohit Kumar, Bibhudatta Sahoo, Deepak Puthal, Santosh Kumar Bharti:
VM Selection using DVFS Technique to Minimize Energy Consumption in Cloud System. ICIT 2018: 284-289 - [c32]Asish Kumar Dalai, Akashmika Jena, Suraj Sharma, Akankhya Mohapatra, Bibhudatta Sahoo, Mohammad S. Obaidat, Balqies Sadoun, Deepak Puthal:
A Fingerprinting Technique for Identification of Wireless Devices. CITS 2018: 1-5 - [c31]Seemran Mishra, Sambit Kumar Mishra, Bibhudatta Sahoo, Mohammad S. Obaidat, Deepak Puthal:
First Score Auction for Pricing-Based Resource Selection in Vehicular Cloud. CITS 2018: 1-5 - [c30]Sourav Kumar Bhoi, Mohammad S. Obaidat, Deepak Puthal, Munesh Singh, Kuei-Fang Hsiao:
Software Defined Network Based Fault Detection in Industrial Wireless Sensor Networks. GLOBECOM 2018: 1-6 - [c29]Alekha Kumar Mishra, Mohammad S. Obaidat, Deepak Puthal, Asis Kumar Tripathy, Kim-Kwang Raymond Choo:
Graph-Based Symmetric Crypto-System for Data Confidentiality. GLOBECOM 2018: 1-6 - [c28]Ashish Nanda, Priyadarsi Nanda, Xiangjian He, Aruna Jamdagni, Deepak Puthal:
A Novel Hybrid Authentication Model for Geo Location Oriented Routing in Dynamic Wireless Mesh Networks. HICSS 2018: 1-10 - [c27]Xiaochen Fan, Xiangjian He, Deepak Puthal, Shiping Chen, Chaocan Xiang, Priyadarsi Nanda, Xunpeng Rao:
CTOM: Collaborative Task Offloading Mechanism for Mobile Cloudlet Networks. ICC 2018: 1-6 - [c26]Alekha Kumar Mishra, Asis Kumar Tripathy, Mohammad S. Obaidat, Zhiyuan Tan, Mukesh Prasad, Balqies Sadoun, Deepak Puthal:
A Chain Topology for Efficient Monitoring of Food Grain Storage using Smart Sensors. ICETE (1) 2018: 255-264 - [c25]Mayank Tiwary, Shanya Sharma, Pritish Mishra, Hesham El-Sayed, Mukesh Prasad, Deepak Puthal:
Building Scalable Mobile Edge Computing by Enhancing Quality of Services. IIT 2018: 141-146 - [c24]Mukesh Prasad, Ding-Rong Zheng, Domingo Mery, Deepak Puthal, Suresh Sundaram, Chin-Teng Lin:
A fast and self-adaptive on-line learning detection system. INNS Conference on Big Data 2018: 13-22 - [c23]Mayank Tiwary, Sunil Kumar, Pankaj Kumar Agrawal, Deepak Puthal, Joel J. P. C. Rodrigues, Kshira Sagar Sahoo, Bibhudatta Sahoo:
Introducing Network Multi-Tenancy for Cloud-Based Enterprise Resource Planning: An IoT Application. ISIE 2018: 1263-1269 - [c22]Pritish Mishra, Mayank Tiwary, Laurence T. Yang, Deepak Puthal:
S2R: Service Trading Based Response Time Optimization in Mobile Edge Computing. ISPA/IUCC/BDCloud/SocialCom/SustainCom 2018: 684-691 - [c21]Shantanu Rajora, Dong-Lin Li, Chandan Jha, Neha Bharill, Om Prakash Patel, Sudhanshu Joshi, Deepak Puthal, Mukesh Prasad:
A Comparative Study of Machine Learning Techniques for Credit Card Fraud Detection Based on Time Variance. SSCI 2018: 1958-1963 - [c20]Nisha Malik, Priyadarsi Nanda, Arushi Arora, Xiangjian He, Deepak Puthal:
Blockchain Based Secured Identity Authentication and Expeditious Revocation Framework for Vehicular Networks. TrustCom/BigDataSE 2018: 674-679 - [i3]Raj Gaire, Chigulapalli Sriharsha, Deepak Puthal, Hendra Wijaya, Jongkil Kim, Prateeksha Keshari, Rajiv Ranjan, Rajkumar Buyya, Ratan K. Ghosh, R. K. Shyamasundar, Surya Nepal:
Internet of Things (IoT) and Cloud Computing Enabled Disaster Management. CoRR abs/1806.07530 (2018) - 2017
- [b1]Deepak Puthal:
Towards efficient and lightweight security architecture for big sensing data streams. University of Technology Sydney, Australia, 2017 - [j8]Suraj Sharma, Deepak Puthal, Sabah Tazeen, Mukesh Prasad, Albert Y. Zomaya:
MSGR: A Mode-Switched Grid-Based Sustainable Routing Protocol for Wireless Sensor Networks. IEEE Access 5: 19864-19875 (2017) - [j7]Deepak Puthal, Saraju P. Mohanty, Priyadarsi Nanda, Uma Choppali:
Building Security Perimeters to Protect Network Systems Against Cyber Threats [Future Directions]. IEEE Consumer Electron. Mag. 6(4): 24-27 (2017) - [j6]Chi Yang, Deepak Puthal, Saraju P. Mohanty, Elias Kougianos:
Big-Sensing-Data Curation for the Cloud is Coming: A Promise of Scalable Cloud-Data-Center Mitigation for Next-Generation IoT and Wireless Sensor Networks. IEEE Consumer Electron. Mag. 6(4): 48-56 (2017) - [j5]Deepak Puthal, Surya Nepal, Rajiv Ranjan, Jinjun Chen:
A dynamic prime number based efficient security mechanism for big sensing data streams. J. Comput. Syst. Sci. 83(1): 22-42 (2017) - [j4]Deepak Puthal, Surya Nepal, Rajiv Ranjan, Jinjun Chen:
DLSeF: A Dynamic Key-Length-Based Efficient Real-Time Security Verification Model for Big Data Stream. ACM Trans. Embed. Comput. Syst. 16(2): 51:1-51:24 (2017) - [j3]Suraj Sharma, Deepak Puthal, Sanjay Kumar Jena, Albert Y. Zomaya, Rajiv Ranjan:
Rendezvous based routing protocol for wireless sensor networks with mobile sink. J. Supercomput. 73(3): 1168-1188 (2017) - [j2]Suraj Sharma, Deepak Puthal, Sanjay Kumar Jena, Albert Y. Zomaya, Rajiv Ranjan:
Erratum to: Rendezvous based routing protocol for wireless sensor networks with mobile sink. J. Supercomput. 73(3): 1189-1191 (2017) - [c19]Nisha Malik, Deepak Puthal, Priyadarsi Nanda:
An Overview of Security Challenges in Vehicular Ad-Hoc Networks. ICIT 2017: 208-213 - [c18]Amiya Kumar Sahu, Suraj Sharma, Deepak Puthal, Abhishek Pandey, Rathin Chandra Shit:
Secure Authentication Protocol for IoT Architecture. ICIT 2017: 220-224 - [c17]Rathin Chandra Shit, Suraj Sharma, Deepak Puthal, Abhishek Panday:
Self Deployment Based on Circle Packing Algorithm for Movement Assisted Wireless Sensor Networks. ICIT 2017: 240-245 - [c16]Sampa Sahoo, Sambit Kumar Mishra, Bibhudatta Sahoo, Deepak Puthal, Mohammad S. Obaidat:
Deadline-constraint services in cloud with heterogeneous servers. CITS 2017: 20-24 - [c15]Sambit Kumar Mishra, Md Akram Khan, Bibhudatta Sahoo, Deepak Puthal, Mohammad S. Obaidat, Kuei-Fang Hsiao:
Time efficient dynamic threshold-based load balancing technique for Cloud Computing. CITS 2017: 161-165 - [c14]Amar A. Rasheed, A. Kenneth, Rabi N. Mahapatra, Deepak Puthal:
Private matching and set intersection computation in multi-agent and industrial control systems. CISRC 2017: 14:1-14:6 - [c13]Deepak Puthal, Surya Nepal, Rajiv Ranjan, Jinjun Chen:
A Synchronized Shared Key Generation Method for Maintaining End-to-End Security of Big Data Streams. HICSS 2017: 1-10 - [c12]Kshira Sagar Sahoo, Anamay Sarkar, Sambit Kumar Mishra, Bibhudatta Sahoo, Deepak Puthal, Mohammad S. Obaidat, Balqies Sadoun:
Metaheuristic Solutions for Solving Controller Placement Problem in SDN-based WAN Architecture. DCNET 2017: 15-23 - [c11]Eric-Juwei Cheng, Mukesh Prasad, Deepak Puthal, Nabin Sharma, Om Kumar Prasad, Po-Hao Chin, Chin-Teng Lin, Michael Blumenstein:
Deep Learning Based Face Recognition with Sparse Representation Classification. ICONIP (3) 2017: 665-674 - [c10]Deepak Puthal, Rajiv Ranjan, Surya Nepal, Jinjun Chen:
IoT and Big Data: An Architecture with Data Flow and Security Issues. IISSC/CN4IoT 2017: 243-252 - [c9]Kuang-Pen Chou, Mukesh Prasad, Deepak Puthal, Ping-Hung Chen, Dinesh Kumar Vishwakarma, Suresh Sundaram, Chin-Teng Lin, Wen-Chieh Lin:
Fast Deformable Model for Pedestrian Detection with Haar-like features. SSCI 2017: 1-8 - [c8]Ashish Nanda, Priyadarsi Nanda, Xiangjian He, Aruna Jamdagni, Deepak Puthal:
Secure-GLOR: An Adaptive Secure Routing Protocol for Dynamic Wireless Mesh Networks. TrustCom/BigDataSE/ICESS 2017: 269-276 - [c7]Meng Liu, Xuyun Zhang, Chi Yang, Shaoning Pang, Deepak Puthal, Kaijun Ren:
Privacy-Preserving Detection of Statically Mutually Exclusive Roles Constraints Violation in Interoperable Role-Based Access Control. TrustCom/BigDataSE/ICESS 2017: 502-509 - 2016
- [j1]Deepak Puthal, Surya Nepal, Rajiv Ranjan, Jinjun Chen:
Threats to Networking Cloud and Edge Datacenters in the Internet of Things. IEEE Cloud Comput. 3(3): 64-71 (2016) - [c6]Deepak Puthal, Surya Nepal, Rajiv Ranjan, Jinjun Chen:
A Secure Big Data Stream Analytics Framework for Disaster Management on the Cloud. HPCC/SmartCity/DSS 2016: 1218-1225 - 2015
- [c5]Deepak Puthal, Surya Nepal, Cécile Paris, Rajiv Ranjan, Jinjun Chen:
Efficient Algorithms for Social Network Coverage and Reach. BigData Congress 2015: 467-474 - [c4]Deepak Puthal, Surya Nepal, Rajiv Ranjan, Jinjun Chen:
DPBSV - An Efficient and Secure Scheme for Big Sensing Data Stream. TrustCom/BigDataSE/ISPA (1) 2015: 246-253 - [c3]Deepak Puthal, Surya Nepal, Rajiv Ranjan, Jinjun Chen:
A Dynamic Key Length Based Approach for Real-Time Security Verification of Big Sensing Data Stream. WISE (2) 2015: 93-108 - 2014
- [c2]Wassim Drira, Deepak Puthal, Fethi Filali:
ADCS: An adaptive data collection scheme in vehicular networks using 3G/LTE. ICCVE 2014: 753-758 - [i2]B. P. S. Sahoo, Deepak Puthal:
DRUG: An Energy-Efficient Data-Centric Routing Protocol for Wireless Sensor Network. CoRR abs/1404.4685 (2014) - 2013
- [c1]Deepak Puthal, Zeeshan Hameed Mir, Fethi Filali, Hamid Menouar:
Cross-layer architecture for congestion control in Vehicular Ad-hoc Networks. ICCVE 2013: 887-892 - [i1]Deepak Puthal:
A Near Optimal Approximation Algorithm for Vertex-Cover Problem. CoRR abs/1309.4953 (2013)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint