default search action
Pradeepkumar Bhale
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j4]Pradeepkumar Bhale, Santosh Biswas, Sukumar Nandi:
A hybrid IDS for detection and mitigation of sinkhole attack in 6LoWPAN networks. Int. J. Inf. Sec. 23(2): 915-934 (2024) - 2023
- [j3]Dipojjwal Ray, Pradeepkumar Bhale, Santosh Biswas, Pinaki Mitra, Sukumar Nandi:
A Novel Energy-Efficient Scheme for RPL Attacker Identification in IoT Networks Using Discrete Event Modeling. IEEE Access 11: 77267-77291 (2023) - [j2]Pradeepkumar Bhale, Debanjan Roy Chowdhury, Santosh Biswas, Sukumar Nandi:
OPTIMIST: Lightweight and Transparent IDS With Optimum Placement Strategy to Mitigate Mixed-Rate DDoS Attacks in IoT Networks. IEEE Internet Things J. 10(10): 8357-8370 (2023) - [j1]Pradeepkumar Bhale, Santosh Biswas, Sukumar Nandi:
Effective injection of adversarial botnet attacks in IoT ecosystem using evolutionary computing. Internet Technol. Lett. 6(4) (2023) - 2021
- [c10]Pradeepkumar Bhale, Santosh Biswas, Sukumar Nandi:
LIENE: Lifetime Enhancement for 6LoWPAN Network Using Clustering Approach Use Case: Smart Agriculture. I4CS 2021: 59-75 - [c9]Pradeepkumar Bhale, Santosh Biswas, Sukumar Nandi:
ML for IEEE 802.15. 4e/TSCH: Energy Efficient Approach to Detect DDoS Attack Using Machine Learning. IWCMC 2021: 1477-1482 - [c8]Dipojjwal Ray, Pradeepkumar Bhale, Santosh Biswas, Sukumar Nandi, Pinaki Mitra:
DAISS: Design of an Attacker Identification Scheme in CoAP Request/Response Spoofing. TENCON 2021: 941-946 - 2020
- [c7]Dipojjwal Ray, Pradeepkumar Bhale, Santosh Biswas, Sukumar Nandi, Pinaki Mitra:
ArsPAN: Attacker Revelation Scheme using Discrete Event System in 6LoWPAN based Buffer Reservation Attack. IEEE ANTS 2020: 1-6 - [c6]Sukanta Dey, Pradeepkumar Bhale, Sukumar Nandi:
ReFIT: Reliability Challenges and Failure Rate Mitigation Techniques for IoT Systems. I4CS 2020: 123-142 - [c5]Pradeepkumar Bhale, Sukanta Dey, Santosh Biswas, Sukumar Nandi:
Energy Efficient Approach to Detect Sinkhole Attack Using Roving IDS in 6LoWPAN Network. I4CS 2020: 187-207 - [c4]Pradeepkumar Bhale, Satya Prakash, Santosh Biswas, Sukumar Nandi:
BRAIN: Buffer Reservation Attack PreventIoN Using Legitimacy Score in 6LoWPAN Network. I4CS 2020: 208-223
2010 – 2019
- 2019
- [c3]Pradeepkumar Bhale, Santosh Biswas, Sukumar Nandi:
LORD: LOw Rate DDoS Attack Detection and Mitigation Using Lightweight Distributed Packet Inspection Agent in IoT Ecosystem. ANTS 2019: 1-6 - 2018
- [c2]Pranav Kumar Singh, Subhrendu Chattopadhyay, Pradeepkumar Bhale, Sukumar Nandi:
Fast and Secure Handoffs for V2I Communication in Smart City Wi-Fi Deployment. ICDCIT 2018: 189-204 - 2017
- [c1]Pradeepkumar Bhale, Kangkan Talukdar, Bikramjit Choudhury, Pranav Kumar Singh:
Predicting external rogue access point in IEEE 802.11 b/g WLAN using RF signal strength. ICACCI 2017: 1981-1986
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-08 21:45 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint