default search action
Kshira Sagar Sahoo
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j47]Biswa Ranjan Senapati, Rakesh Ranjan Swain, Pabitra Mohan Khilar, Sourav Kumar Bhoi, Kshira Sagar Sahoo:
Automatic house location identification using location service based VANET. Int. J. Commun. Syst. 37(14) (2024) - [j46]Arati Behera, Kshira Sagar Sahoo, Tapas Kumar Mishra, Monowar H. Bhuyan:
A combination learning framework to uncover cyber attacks in IoT networks. Internet Things 28: 101395 (2024) - [j45]Munesh Singh, Kshira Sagar Sahoo, Amir H. Gandomi:
An Intelligent-IoT-Based Data Analytics for Freshwater Recirculating Aquaculture System. IEEE Internet Things J. 11(3): 4206-4217 (2024) - [j44]Alamgir Sardar, Saiyed Umer, Ranjeet Kumar Rout, Kshira Sagar Sahoo, Amir H. Gandomi:
Enhanced Biometric Template Protection Schemes for Securing Face Recognition in IoT Environment. IEEE Internet Things J. 11(13): 23196-23206 (2024) - [j43]Jitendra Kumar Rout, Kshira Sagar Sahoo, Anmol Dalmia, Sambit Bakshi, Muhammad Bilal, Houbing Song:
Understanding Large-Scale Network Effects in Detecting Review Spammers. IEEE Trans. Comput. Soc. Syst. 11(4): 4994-5004 (2024) - [j42]Vijaypal Singh Rathor, Munesh Singh, Kshira Sagar Sahoo, Saraju P. Mohanty:
GateLock: Input-Dependent Key-Based Locked Gates for SAT Resistant Logic Locking. IEEE Trans. Very Large Scale Integr. Syst. 32(2): 361-371 (2024) - [c16]Buchammagari Avinash Reddy, Kshira Sagar Sahoo, Monowar H. Bhuyan:
Securing P4-SDN Data Plane against Flow Table Modification Attack. NOMS 2024: 1-5 - [i3]Vijaypal Singh Rathor, Munesh Singh, Kshira Sagar Sahoo, Saraju P. Mohanty:
SubLock: Sub-Circuit Replacement based Input Dependent Key-based Logic Locking for Robust IP Protection. CoRR abs/2406.19091 (2024) - [i2]Niranjan Panigrahi, Sourav Kumar Bhoi, Debasis Mohapatra, Rashmi Ranjan Sahoo, Kshira Sagar Sahoo, Anil Mohapatra:
ORS: A novel Olive Ridley Survival inspired Meta-heuristic Optimization Algorithm. CoRR abs/2409.09210 (2024) - [i1]Ankur Mudgal, Abhishek Verma, Munesh Singh, Kshira Sagar Sahoo, Erik Elmroth, Monowar H. Bhuyan:
FloRa: Flow Table Low-Rate Overflow Reconnaissance and Detection in SDN. CoRR abs/2410.19832 (2024) - 2023
- [j41]Tapas Kumar Mishra, Kshira Sagar Sahoo, Muhammad Bilal, Sayed Chhattan Shah, Manas Kumar Mishra:
Adaptive Congestion Control Mechanism to Enhance TCP Performance in Cooperative IoV. IEEE Access 11: 9000-9013 (2023) - [j40]Sasmita Rani Behera, Niranjan Panigrahi, Sourav Kumar Bhoi, Muhammad Bilal, Kshira Sagar Sahoo, Daehan Kwak:
A Distributed Fuzzy Optimal Decision Making Strategy for Task Offloading in Edge Computing Environment. IEEE Access 11: 33189-33204 (2023) - [j39]Prasant Ku. Dash, Lopamudra Hota, Madhumita Panda, N. Z. Jhanjhi, Kshira Sagar Sahoo, Mehedi Masud:
FSE2R: An Improved Collision-Avoidance-based Energy Efficient Route Selection Protocol in USN. Comput. Syst. Sci. Eng. 44(3): 2225-2242 (2023) - [j38]Kuldeep Chouhan, Mukesh Yadav, Ranjeet Kumar Rout, Kshira Sagar Sahoo, N. Z. Jhanjhi, Mehedi Masud, Sultan Aljahdali:
Sentiment Analysis with Tweets Behaviour in Twitter Streaming API. Comput. Syst. Sci. Eng. 45(2): 1113-1128 (2023) - [j37]Sushruta Mishra, Soham Chakraborty, Kshira Sagar Sahoo, Muhammad Bilal:
Cogni-Sec: A secure cognitive enabled distributed reinforcement learning model for medical cyber-physical system. Internet Things 24: 100978 (2023) - [j36]Shreeya Swagatika Sahoo, Sujata Mohanty, Kshira Sagar Sahoo, Mahmoud Daneshmand, Amir H. Gandomi:
A Three-Factor-Based Authentication Scheme of 5G Wireless Sensor Networks for IoT System. IEEE Internet Things J. 10(17): 15087-15099 (2023) - [j35]Rajendra Prasad Nayak, Srinivas Sethi, Sourav Kumar Bhoi, Kshira Sagar Sahoo, Anand Nayyar:
ML-MDS: Machine Learning based Misbehavior Detection System for Cognitive Software-defined Multimedia VANETs (CSDMV) in smart cities. Multim. Tools Appl. 82(3): 3931-3951 (2023) - [j34]Reetu Gupta, Priyesh Kanungo, Nirmal Dagdee, Golla Madhu, Kshira Sagar Sahoo, N. Z. Jhanjhi, Mehedi Masud, Nabil Sharaf Almalki, Mohammed A. Alzain:
Secured and Privacy-Preserving Multi-Authority Access Control System for Cloud-Based Healthcare Data Sharing. Sensors 23(5): 2617 (2023) - [j33]Kalyan Kumar Jena, Sourav Kumar Bhoi, Debasis Mohapatra, Chittaranjan Mallick, Kshira Sagar Sahoo, Anand Nayyar:
A fuzzy rule based machine intelligence model for cherry red spot disease detection of human eyes in IoMT. Wirel. Networks 29(1): 247-265 (2023) - [c15]Kshira Sagar Sahoo, Shivam Krishana, Monowar H. Bhuyan:
Combining Block Bootstrap with Exponential Smoothing for Reinforcing Non-Emergency Urban Service Prediction. IEEE Big Data 2023: 4335-4343 - [c14]Gaurav Kumar, Kshira Sagar Sahoo, Monowar H. Bhuyan:
Towards a Workload Mapping Model for Tuning Backing Services in Cloud Systems. DEXA (1) 2023: 266-280 - [c13]Ryosuke Araki, Kshira Sagar Sahoo, Yuzo Taenaka, Youki Kadobayashi, Erik Elmroth, Monowar H. Bhuyan:
Detecting DDoS Attacks on the Network Edge: An Information-Theoretic Correlation Analysis. TrustCom 2023: 485-494 - 2022
- [j32]Debasis Mohapatra, Sourav Kumar Bhoi, Kalyan Kumar Jena, Kshira Sagar Sahoo, Anand Nayyar, Mohd Asif Shah:
Rank-Label Anonymization for the Privacy-Preserving Publication of a Hypergraph Structure. IEEE Access 10: 118253-118267 (2022) - [j31]Ranjeet Kumar Rout, Sarif Sk. Hassan, Sabha Sheikh, Saiyed Umer, Kshira Sagar Sahoo, Amir H. Gandomi:
Feature-extraction and analysis based on spatial distribution of amino acids for SARS-CoV-2 Protein sequences. Comput. Biol. Medicine 141: 105024 (2022) - [j30]Santosh Kumar Sahu, Durga Prasad Mohapatra, Jitendra Kumar Rout, Kshira Sagar Sahoo, Quoc-Viet Pham, Nhu-Ngoc Dao:
A LSTM-FCNN based multi-class intrusion detection using scalable framework. Comput. Electr. Eng. 99: 107720 (2022) - [j29]Hrudaya Kumar Tripathy, Sushruta Mishra, Shubham Suman, Anand Nayyar, Kshira Sagar Sahoo:
Smart COVID-shield: an IoT driven reliable and automated prototype model for COVID-19 symptoms tracking. Computing 104(6): 1233-1254 (2022) - [j28]Anisha Kumari, Ranjan Kumar Behera, Kshira Sagar Sahoo, Anand Nayyar, Ashish Kumar Luhach, Satya Prakash Sahoo:
Supervised link prediction using structured-based feature extraction in social network. Concurr. Comput. Pract. Exp. 34(13) (2022) - [j27]Kshira Sagar Sahoo, Mayank Tiwari, Ashish Kr. Luhach, Anand Nayyar, Kim-Kwang Raymond Choo, Muhammad Bilal:
Demand-Supply-Based Economic Model for Resource Provisioning in Industrial IoT Traffic. IEEE Internet Things J. 9(13): 10529-10538 (2022) - [j26]Bata Krishna Tripathy, Kshira Sagar Sahoo, Ashish Kr. Luhach, N. Z. Jhanjhi, Swagat Kumar Jena:
A virtual execution platform for OpenFlow controller using NFV. J. King Saud Univ. Comput. Inf. Sci. 34(3): 964-971 (2022) - [j25]Prasenjit Maity, Sandeep Saxena, Shashank Srivastava, Kshira Sagar Sahoo, Ashok Kumar Pradhan, Neeraj Kumar:
An Effective Probabilistic Technique for DDoS Detection in OpenFlow Controller. IEEE Syst. J. 16(1): 1345-1354 (2022) - [j24]Benazir Neha, Sanjaya Kumar Panda, Pradip Kumar Sahu, Kshira Sagar Sahoo, Amir H. Gandomi:
A Systematic Review on Osmotic Computing. ACM Trans. Internet Things 3(2): 9:1-9:30 (2022) - [c12]Munesh Singh, Vijaypal Singh Rathor, Kshira Sagar Sahoo, Amir H. Gandomi:
Cooperative Geometric Scheme for Passive Localization of Target in an Indoor Environment. SSCI 2022: 238-245 - 2021
- [j23]Santosh Kumar Sahu, Durga Prasad Mohapatra, Jitendra Kumar Rout, Kshira Sagar Sahoo, Ashish Kumar Luhach:
An Ensemble-Based Scalable Approach for Intrusion Detection Using Big Data Framework. Big Data 9(4): 303-321 (2021) - [j22]Ashutosh Bhoi, Rajendra Prasad Nayak, Sourav Kumar Bhoi, Srinivas Sethi, Sanjaya Kumar Panda, Kshira Sagar Sahoo, Anand Nayyar:
IoT-IIRS: Internet of Things based intelligent-irrigation recommendation system using machine learning approach for efficient water usage. PeerJ Comput. Sci. 7: e578 (2021) - [j21]Somula Ramasubbareddy, Sasikala Ramasamy, Kshira Sagar Sahoo, R. Lakshmana Kumar, Quoc-Viet Pham, Nhu-Ngoc Dao:
CAVMS: Application-Aware Cloudlet Adaption and VM Selection Framework for Multicloudlet Environment. IEEE Syst. J. 15(4): 5098-5106 (2021) - [j20]Suchismita Rout, Kshira Sagar Sahoo, Sudhansu Shekhar Patra, Bibhudatta Sahoo, Deepak Puthal:
Energy Efficiency in Software Defined Networking: A Survey. SN Comput. Sci. 2(4): 308 (2021) - [j19]Sohan Kumar Pande, Sanjaya Kumar Panda, Satyabrata Das, Mamoun Alazab, Kshira Sagar Sahoo, Ashish Kumar Luhach, Anand Nayyar:
A Smart Cloud Service Management Algorithm for Vehicular Clouds. IEEE Trans. Intell. Transp. Syst. 22(8): 5329-5340 (2021) - [j18]S. Nithya, M. Sangeetha, K. N. Apinaya Prethi, Kshira Sagar Sahoo, Sanjaya Kumar Panda, Amir H. Gandomi:
Correction to "SDCF: A Software-Defined Cyber Foraging Framework for Cloudlet Environment". IEEE Trans. Netw. Serv. Manag. 18(2): 2450 (2021) - [c11]Mayank Tiwary, Pritish Mishra, Shashank Jain, Kshira Sagar Sahoo:
AutoDBaaS: Autonomous Database as a Service for managing relational database services. EDBT 2021: 600-610 - 2020
- [j17]Kshira Sagar Sahoo, Bata Krishna Tripathy, Kshirasagar Naik, Somula Ramasubbareddy, Balamurugan Balusamy, Manju Khari, Daniel Burgos:
An Evolutionary SVM Model for DDOS Attack Detection in Software Defined Networks. IEEE Access 8: 132502-132513 (2020) - [j16]Sambit Kumar Mishra, Sonali Mishra, Ahmed Alsayat, N. Z. Jhanjhi, Mamoona Humayun, Kshira Sagar Sahoo, Ashish Kumar Luhach:
Energy-Aware Task Allocation for Multi-Cloud Networks. IEEE Access 8: 178825-178834 (2020) - [j15]Kshira Sagar Sahoo, Mayank Tiwary, Bibhudatta Sahoo, Brojo Kishore Mishra, Somula Ramasubbareddy, Ashish Kumar Luhach:
RTSM: Response time optimisation during switch migration in software-defined wide area network. IET Wirel. Sens. Syst. 10(3): 105-111 (2020) - [j14]Kshira Sagar Sahoo, Somula Ramasubbareddy, Balamurugan Balusamy, B. Vikram Deep:
Analysing control plane scalability issue of software defined wide area network using simulated annealing technique. Int. J. Grid Util. Comput. 11(6): 827-837 (2020) - [j13]Kshira Sagar Sahoo, Deepak Puthal, Mayank Tiwary, Muhammad Usman, Bibhudatta Sahoo, Zhenyu Wen, Biswa P. S. Sahoo, Rajiv Ranjan:
ESMLB: Efficient Switch Migration-Based Load Balancing for Multicontroller SDN in IoT. IEEE Internet Things J. 7(7): 5852-5860 (2020) - [j12]Kshira Sagar Sahoo, Pritish Mishra, Mayank Tiwary, Somula Ramasubbareddy, Balamurugan Balusamy, Amir H. Gandomi:
Improving End-Users Utility in Software-Defined Wide Area Network Systems. IEEE Trans. Netw. Serv. Manag. 17(2): 696-707 (2020) - [j11]S. Nithya, M. Sangeetha, K. N. Apinaya Prethi, Kshira Sagar Sahoo, Sanjaya Kumar Panda, Amir H. Gandomi:
SDCF: A Software-Defined Cyber Foraging Framework for Cloudlet Environment. IEEE Trans. Netw. Serv. Manag. 17(4): 2423-2435 (2020) - [j10]Kshira Sagar Sahoo, Deepak Puthal:
SDN-Assisted DDoS Defense Framework for the Internet of Multimedia Things. ACM Trans. Multim. Comput. Commun. Appl. 16(3s): 98:1-98:18 (2020) - [c10]Vaishali Ravindranath, Sasikala Ramasamy, Ramasubbareddy Somula, Kshira Sagar Sahoo, Amir H. Gandomi:
Swarm Intelligence Based Feature Selection for Intrusion and Detection System in Cloud Infrastructure. CEC 2020: 1-6 - [c9]Sampa Sahoo, Kshira Sagar Sahoo, Bibhudatta Sahoo, Amir H. Gandomi:
An Auction based Edge Resource Allocation Mechanism for IoT-enabled Smart Cities. SSCI 2020: 1280-1286
2010 – 2019
- 2019
- [j9]Kshira Sagar Sahoo, Bibhudatta Sahoo:
CAMD: a switch migration based load balancing framework for software defined networks. IET Networks 8(4): 264-271 (2019) - [j8]Kshira Sagar Sahoo, Sanjaya Kumar Panda, Sampa Sahoo, Bibhudatta Sahoo, Ratnakar Dash:
Toward secure software-defined networks against distributed denial of service attack. J. Supercomput. 75(8): 4829-4874 (2019) - 2018
- [j7]Kshira Sagar Sahoo, Deepak Puthal, Mayank Tiwary, Joel J. P. C. Rodrigues, Bibhudatta Sahoo, Ratnakar Dash:
An early detection of low rate DDoS attack to SDN based data center networks using information distance metrics. Future Gener. Comput. Syst. 89: 685-697 (2018) - [j6]Kshira Sagar Sahoo, Mayank Tiwary, Bibhudatta Sahoo, Ratnakar Dash, Kshirasagar Naik:
DSSDN: Demand-supply based load balancing in Software-Defined Wide-Area Networks. Int. J. Netw. Manag. 28(4) (2018) - [j5]Mayank Tiwary, Deepak Puthal, Kshira Sagar Sahoo, Bibhudatta Sahoo, Laurence T. Yang:
Response time optimization for cloudlets in Mobile Edge Computing. J. Parallel Distributed Comput. 119: 81-91 (2018) - [j4]Kshira Sagar Sahoo, Deepak Puthal, Mohammad S. Obaidat, Anamay Sarkar, Sambit Kumar Mishra, Bibhudatta Sahoo:
On the placement of controllers in software-Defined-WAN using meta-heuristic approach. J. Syst. Softw. 145: 180-194 (2018) - [c8]Kshira Sagar Sahoo, Amaan Iqbal, Prasenjit Maiti, Bibhudatta Sahoo:
A Machine Learning Approach for Predicting DDoS Traffic in Software Defined Networks. ICIT 2018: 199-203 - [c7]Prasenjit Maiti, Kshira Sagar Sahoo, Bibhudatta Sahoo, Ashok Kumar Turuk:
Smart Gateway Based Multi-Tier Service-Oriented Fog Computing Architecture for Achieving Ultra-Low Latency. ICIT 2018: 278-283 - [c6]Kshira Sagar Sahoo, Mayank Tiwary, Bibhudatta Sahoo:
Detection of high rate DDoS attack from flash events using information metrics in software defined networks. COMSNETS 2018: 421-424 - [c5]Mayank Tiwary, Sunil Kumar, Pankaj Kumar Agrawal, Deepak Puthal, Joel J. P. C. Rodrigues, Kshira Sagar Sahoo, Bibhudatta Sahoo:
Introducing Network Multi-Tenancy for Cloud-Based Enterprise Resource Planning: An IoT Application. ISIE 2018: 1263-1269 - [c4]Kshira Sagar Sahoo, Mayank Tiwary, Sampa Sahoo, Rohit Nambiar, Bibhudatta Sahoo, Ratnakar Dash:
Poster: A Learning Automata-based DDoS Attack Defense Mechanism in Software Defined Networks. MobiCom 2018: 795-797 - 2017
- [j3]Mayank Tiwary, Kshira Sagar Sahoo, Bibhudatta Sahoo, Rachita Misra:
CPS: a dynamic and distributed pricing policy in cyber foraging systems for fixed state cloudlets. Computing 99(5): 447-463 (2017) - [j2]Kshira Sagar Sahoo, Mayank Tiwary, Bibhudatta Sahoo:
A load prediction model for SDN controllers. Int. J. Auton. Comput. 2(4): 384-400 (2017) - [j1]Kshira Sagar Sahoo, Bibhudatta Sahoo, Ratnakar Dash, Brojo Kishore Mishra:
Improving Resiliency in SDN using Routing Tree Algorithms. Int. J. Knowl. Discov. Bioinform. 7(1): 42-57 (2017) - [c3]Sampa Sahoo, Maneesha Nidhi, Kshira Sagar Sahoo, Bibhudatta Sahoo, Ashok Kumar Turuk:
Video delivery services in media cloud with abandonment: An analytical approach. ANTS 2017: 1-6 - [c2]Kshira Sagar Sahoo, Anamay Sarkar, Sambit Kumar Mishra, Bibhudatta Sahoo, Deepak Puthal, Mohammad S. Obaidat, Balqies Sadoun:
Metaheuristic Solutions for Solving Controller Placement Problem in SDN-based WAN Architecture. DCNET 2017: 15-23 - 2016
- [c1]Kshira Sagar Sahoo, Bibhudatta Sahoo, Ratnakar Dash, Mayank Tiwary:
Solving Multi-controller Placement Problem in Software Defined Network. ICIT 2016: 188-192
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 21:42 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint