default search action
Priyadarsi Nanda
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j38]Sham-ul-Arfeen Laghari, Wenhao Li, Selvakumar Manickam, Priyadarsi Nanda, Ayman Khallel Ibrahim Al-Ani, Shankar Karuppayah:
Securing MQTT Ecosystem: Exploring Vulnerabilities, Mitigations, and Future Trajectories. IEEE Access 12: 139273-139289 (2024) - [j37]Wenhao Li, Selvakumar Manickam, Yung-Wey Chong, Weilan Leng, Priyadarsi Nanda:
A State-of-the-Art Review on Phishing Website Detection Techniques. IEEE Access 12: 187976-188012 (2024) - [j36]Amjad Qashlan, Priyadarsi Nanda, Manoranjan Mohanty:
Differential privacy model for blockchain based smart home architecture. Future Gener. Comput. Syst. 150: 49-63 (2024) - [j35]Han Xu, Priyadarsi Nanda, Jie Liang:
Reciprocal Federated Learning Framework: Balancing incentives for model and data owners. Future Gener. Comput. Syst. 161: 146-161 (2024) - [c68]Abeer Z. Alalmaie, Nazar Waheed, Mohrah Alalyan, Priyadarsi Nanda, Wenjing Jia, Xiangjian He:
Zero Trust for Intrusion Detection System: A Systematic Literature Review. ICAART (3) 2024: 170-177 - 2023
- [j34]Han Xu, Priyadarsi Nanda, Jie Liang, Xiangjian He:
FCH, an incentive framework for data-owner dominated federated learning. J. Inf. Secur. Appl. 76: 103521 (2023) - [j33]Vamshi Sunku Mohan, Sriram Sankaran, Priyadarsi Nanda, Krishnashree Achuthan:
Enabling secure lightweight mobile Narrowband Internet of Things (NB-IoT) applications using blockchain. J. Netw. Comput. Appl. 219: 103723 (2023) - [c67]Abeer Z. Alalmaie, Priyadarsi Nanda, Xiangjian He:
Zero Trust Network Intrusion Detection System (NIDS) using Auto Encoder for Attention-based CNN-BiLSTM. ACSW 2023: 1-9 - [c66]Abeer Z. Alalmaie, Priyadarsi Nanda, Xiangjian He, Mohrah Saad Alayan:
Why Zero Trust Framework Adoption has Emerged During and After Covid-19 Pandemic. AINA (3) 2023: 181-192 - [c65]Nazar Waheed, Fazlullah Khan, Spyridon Mastorakis, Mian Ahmad Jan, Abeer Z. Alalmaie, Priyadarsi Nanda:
Privacy-Enhanced Living: A Local Differential Privacy Approach to Secure Smart Home Data. COINS 2023: 1-6 - [c64]Nazar Waheed, Ateeq Ur Rehman, Anushka Nehra, Mahnoor Farooq, Nargis Tariq, Mian Ahmad Jan, Fazlullah Khan, Abeer Z. Alalmaie, Priyadarsi Nanda:
FedBlockHealth: A Synergistic Approach to Privacy and Security in IoT-Enabled Healthcare Through Federated Learning and Blockchain. GLOBECOM 2023: 3855-3860 - [c63]Han Xu, Priyadarsi Nanda, Jie Liang:
Designing Incentive Mechanisms for Fair Participation in Federated Learning. HPCC/DSS/SmartCity/DependSys 2023: 98-105 - [c62]Adel Atieh, Priyadarsi Nanda, Manoranjan Mohanty:
A Zero-Trust Framework for Industrial Internet of Things. ICNC 2023: 331-335 - [c61]Asad Faraz Khan, Priyadarsi Nanda:
C-Block: A Secure and Robust Framework for Authentication Handover in 5G HetNets based on Edge-enabled SDN/NFV Environments. IWCMC 2023: 1509-1514 - [c60]Abeer Z. Alalmaie, Priyadarsi Nanda, Xiangjian He:
ZT-NIDS: Zero Trust, Network Intrusion Detection System. SECRYPT 2023: 99-110 - [c59]Wenhao Li, Yongqing He, Zhimin Wang, Saleh Mansor Alqahtani, Priyadarsi Nanda:
Uncovering Flaws in Anti-Phishing Blacklists for Phishing Websites Using Novel Cloaking Techniques. SECRYPT 2023: 813-821 - [c58]Hasina Rahman, Priyadarsi Nanda, Manoranjan Mohanty, Nazim Uddin Sheikh:
Anomaly Detection in Smart Grid Networks Using Power Consumption Data. SECRYPT 2023: 830-837 - [i3]Nazar Waheed, Ateeq Ur Rehman, Anushka Nehra, Mahnoor Farooq, Nargis Tariq, Mian Ahmad Jan, Fazlullah Khan, Abeer Z. Alalmaie, Priyadarsi Nanda:
FedBlockHealth: A Synergistic Approach to Privacy and Security in IoT-Enabled Healthcare through Federated Learning and Blockchain. CoRR abs/2304.07668 (2023) - [i2]Nazar Waheed, Fazlullah Khan, Mian Ahmad Jan, Abeer Z. Alalmaie, Priyadarsi Nanda:
Privacy-Enhanced Living: A Local Differential Privacy Approach to Secure Smart Home Data. CoRR abs/2304.07676 (2023) - 2022
- [c57]Asad Faraz Khan, Priyadarsi Nanda:
Hybrid blockchain-based Authentication Handover and Flow Rule Validation for Secure Software Defined 5G HetNets. IWCMC 2022: 223-230 - [c56]Han Xu, Priyadarsi Nanda, Jie Liang, Xiangjian He:
The Force of Compensation, a Multi-stage Incentive Mechanism Model for Federated Learning. NSS 2022: 357-373 - [c55]Abeer Z. Alalmaie, Priyadarsi Nanda, Xiangjian He:
Zero Trust-NIDS: Extended Multi-View Approach for Network Trace Anonymization and Auto-Encoder CNN for Network Intrusion Detection. TrustCom 2022: 449-456 - [c54]Nazar Waheed, Muhammad Ikram, Saad Sajid Hashmi, Xiangjian He, Priyadarsi Nanda:
An Empirical Assessment of Security and Privacy Risks of Web-Based Chatbots. WISE 2022: 325-339 - [i1]Nazar Waheed, Muhammad Ikram, Saad Sajid Hashmi, Xiangjian He, Priyadarsi Nanda:
An Empirical Assessment of Security and Privacy Risks of Web based-Chatbots. CoRR abs/2205.08252 (2022) - 2021
- [j32]Annie Gilda Roselin, Priyadarsi Nanda, Surya Nepal, Xiangjian He:
Intelligent Anomaly Detection for Large Network Traffic With Optimized Deep Clustering (ODC) Algorithm. IEEE Access 9: 47243-47251 (2021) - [j31]Amjad Qashlan, Priyadarsi Nanda, Xiangjian He, Manoranjan Mohanty:
Privacy-Preserving Mechanism in Smart Home Using Blockchain. IEEE Access 9: 103651-103669 (2021) - [j30]Xiaochen Fan, Chaocan Xiang, Chao Chen, Panlong Yang, Liangyi Gong, Xudong Song, Priyadarsi Nanda, Xiangjian He:
BuildSenSys: Reusing Building Sensing Data for Traffic Prediction With Cross-Domain Learning. IEEE Trans. Mob. Comput. 20(6): 2154-2171 (2021) - [c53]Adel Atieh, Priyadarsi Nanda, Manoranjan Mohanty:
Context-Aware Fog Computing Implementation for Industrial Internet of Things. IWCMC 2021: 598-603 - 2020
- [j29]Shuang Lai, Xiaochen Fan, Qianwen Ye, Zhiyuan Tan, Yuanfang Zhang, Xiangjian He, Priyadarsi Nanda:
FairEdge: A Fairness-Oriented Task Offloading Scheme for Iot Applications in Mobile Cloudlet Networks. IEEE Access 8: 13516-13526 (2020) - [j28]Xiaochen Fan, Chaocan Xiang, Liangyi Gong, Xin He, Yuben Qu, Saeed Amirgholipour, Yue Xi, Priyadarsi Nanda, Xiangjian He:
Deep learning for intelligent traffic sensing and prediction: recent advances and future challenges. CCF Trans. Pervasive Comput. Interact. 2(4): 240-260 (2020) - [j27]Priyadarsi Nanda, Xiangjian He, Laurence T. Yang:
Security, Trust and Privacy in Cyber (STPCyber): Future trends and challenges. Future Gener. Comput. Syst. 109: 446-449 (2020) - [j26]Ashish Nanda, Priyadarsi Nanda, Xiangjian He, Aruna Jamdagni, Deepak Puthal:
A hybrid encryption technique for Secure-GLOR: The adaptive secure routing protocol for dynamic wireless mesh networks. Future Gener. Comput. Syst. 109: 521-530 (2020) - [j25]Muhammad Usman, Mian Ahmad Jan, Xiangjian He, Priyadarsi Nanda:
QASEC: A secured data communication scheme for mobile Ad-hoc networks. Future Gener. Comput. Syst. 109: 604-610 (2020) - [j24]Thawatchai Chomsiri, Xiangjian He, Priyadarsi Nanda, Zhiyuan Tan:
Hybrid Tree-Rule Firewall for High Speed Data Transmission. IEEE Trans. Cloud Comput. 8(4): 1237-1249 (2020) - [j23]Nisha Malik, Priyadarsi Nanda, Xiangjian He, Ren Ping Liu:
Vehicular networks with security and trust management solutions: proposed secured message exchange via blockchain technology. Wirel. Networks 26(6): 4207-4226 (2020) - [c52]Amjad Qashlan, Priyadarsi Nanda, Xiangjian He:
Security and Privacy Implementation in Smart Home: Attributes Based Access Control and Smart Contracts. TrustCom 2020: 951-958
2010 – 2019
- 2019
- [j22]Meng Liu, Yun Luo, Priyadarsi Nanda, Shui Yu, Jianbing Zhang:
Efficient solution to the millionaires' problem based on asymmetric commutative encryption scheme. Comput. Intell. 35(3): 555-576 (2019) - [j21]Annie Gilda Roselin Arockia Baskaran, Priyadarsi Nanda, Surya Nepal, Sean He:
Testbed evaluation of Lightweight Authentication Protocol (LAUP) for 6LoWPAN wireless sensor networks. Concurr. Comput. Pract. Exp. 31(23) (2019) - [j20]Priyadarsi Nanda, Deepak Puthal, Saraju P. Mohanty:
Editorial to the Special Issue on Recent Advances on Trust, Security and Privacy in Computing and Communications. Concurr. Comput. Pract. Exp. 31(23) (2019) - [j19]Yongkai Fan, Xiaodong Lin, Wei Liang, Gang Tan, Priyadarsi Nanda:
A secure privacy preserving deduplication scheme for cloud computing. Future Gener. Comput. Syst. 101: 127-135 (2019) - [j18]Annie Gilda Roselin, Priyadarsi Nanda, Surya Nepal, Xiangjian He, Jarod Wright:
Exploiting the Remote Server Access Support of CoAP Protocol. IEEE Internet Things J. 6(6): 9338-9349 (2019) - [j17]Deepak Puthal, Rajiv Ranjan, Ashish Nanda, Priyadarsi Nanda, Prem Prakash Jayaraman, Albert Y. Zomaya:
Secure authentication and load balancing of distributed edge datacenters. J. Parallel Distributed Comput. 124: 60-69 (2019) - [c51]Ashish Nanda, Priyadarsi Nanda, Mohammad S. Obaidat, Xiangjian He, Deepak Puthal:
A Novel Multi-Path Anonymous Randomized Key Distribution Scheme for Geo Distributed Networks. GLOBECOM 2019: 1-6 - [c50]Deepak Puthal, Saraju P. Mohanty, Priyadarsi Nanda, Elias Kougianos, Gautam Das:
Proof-of-Authentication for Scalable Blockchain in Resource-Constrained Distributed Systems. ICCE 2019: 1-5 - [c49]Nisha Malik, Priyadarsi Nanda, Xiangjian He, Ren Ping Liu:
Trust and Reputation in Vehicular Networks: A Smart Contract-Based Approach. TrustCom/BigDataSE 2019: 34-41 - 2018
- [j16]Ning Yang, Xiaochen Fan, Deepak Puthal, Xiangjian He, Priyadarsi Nanda, Shiping Guo:
A Novel Collaborative Task Offloading Scheme for Secure and Sustainable Mobile Cloudlet Networks. IEEE Access 6: 44175-44189 (2018) - [j15]Xiaochen Fan, Xiangjian He, Chaocan Xiang, Deepak Puthal, Liangyi Gong, Priyadarsi Nanda, Gengfa Fang:
Towards System Implementation and Data Analysis for Crowdsensing Based Outdoor RSS Maps. IEEE Access 6: 47535-47545 (2018) - [j14]Deepak Puthal, Mohammad S. Obaidat, Priyadarsi Nanda, Mukesh Prasad, Saraju P. Mohanty, Albert Y. Zomaya:
Secure and Sustainable Load Balancing of Edge Data Centers in Fog Computing. IEEE Commun. Mag. 56(5): 60-65 (2018) - [j13]Mian Ahmad Jan, Priyadarsi Nanda, Xiangjian He, Ren Ping Liu:
A Sybil attack detection scheme for a forest wildfire monitoring application. Future Gener. Comput. Syst. 80: 613-626 (2018) - [c48]Ashish Nanda, Priyadarsi Nanda, Xiangjian He, Aruna Jamdagni, Deepak Puthal:
A Novel Hybrid Authentication Model for Geo Location Oriented Routing in Dynamic Wireless Mesh Networks. HICSS 2018: 1-10 - [c47]Xiaochen Fan, Xiangjian He, Deepak Puthal, Shiping Chen, Chaocan Xiang, Priyadarsi Nanda, Xunpeng Rao:
CTOM: Collaborative Task Offloading Mechanism for Mobile Cloudlet Networks. ICC 2018: 1-6 - [c46]Amber Umair, Priyadarsi Nanda, Xiangjian He, Kim-Kwang Raymond Choo:
User Relationship Classification of Facebook Messenger Mobile Data using WEKA. NSS 2018: 337-348 - [c45]Nisha Malik, Priyadarsi Nanda, Arushi Arora, Xiangjian He, Deepak Puthal:
Blockchain Based Secured Identity Authentication and Expeditious Revocation Framework for Vehicular Networks. TrustCom/BigDataSE 2018: 674-679 - [c44]Meng Liu, Priyadarsi Nanda, Xuyun Zhang, Chi Yang, Shui Yu, Jianxin Li:
Asymmetric Commutative Encryption Scheme Based Efficient Solution to the Millionaires' Problem. TrustCom/BigDataSE 2018: 990-995 - 2017
- [j12]Deepak Puthal, Saraju P. Mohanty, Priyadarsi Nanda, Uma Choppali:
Building Security Perimeters to Protect Network Systems Against Cyber Threats [Future Directions]. IEEE Consumer Electron. Mag. 6(4): 24-27 (2017) - [j11]Mian Ahmad Jan, Priyadarsi Nanda, Muhammad Usman, Xiangjian He:
PAWN: a payload-based mutual authentication scheme for wireless sensor networks. Concurr. Comput. Pract. Exp. 29(17) (2017) - [c43]Nisha Malik, Deepak Puthal, Priyadarsi Nanda:
An Overview of Security Challenges in Vehicular Ad-Hoc Networks. ICIT 2017: 208-213 - [c42]Upasana T. Nagar, Priyadarsi Nanda, Xiangjian He, Zhiyuan Thomas Tan:
A framework for data security in cloud using collaborative intrusion detection scheme. SIN 2017: 188-193 - [c41]Ashish Nanda, Priyadarsi Nanda, Xiangjian He, Aruna Jamdagni, Deepak Puthal:
Secure-GLOR: An Adaptive Secure Routing Protocol for Dynamic Wireless Mesh Networks. TrustCom/BigDataSE/ICESS 2017: 269-276 - [c40]Annie Gilda Roselin, Priyadarsi Nanda, Surya Nepal:
Lightweight Authentication Protocol (LAUP) for 6LoWPAN Wireless Sensor Networks. TrustCom/BigDataSE/ICESS 2017: 371-378 - [c39]Khaled Aldebei, Helia Farhood, Wenjing Jia, Priyadarsi Nanda, Xiangjian He:
Sequential and Unsupervised Document Authorial Clustering Based on Hidden Markov Model. TrustCom/BigDataSE/ICESS 2017: 379-385 - [c38]Qingru Li, Zhiyuan Tan, Aruna Jamdagni, Priyadarsi Nanda, Xiangjian He, Wei Han:
An Intrusion Detection System Based on Polynomial Feature Correlation Analysis. TrustCom/BigDataSE/ICESS 2017: 978-983 - [c37]Amber Umair, Priyadarsi Nanda, Xiangjian He:
Online Social Network Information Forensics: A Survey on Use of Various Tools and Determining How Cautious Facebook Users are? TrustCom/BigDataSE/ICESS 2017: 1139-1144 - 2016
- [j10]Mohammed A. Ambusaidi, Xiangjian He, Priyadarsi Nanda, Zhiyuan Tan:
Building an Intrusion Detection System Using a Filter-Based Feature Selection Algorithm. IEEE Trans. Computers 65(10): 2986-2998 (2016) - [c36]Ashish Nanda, Priyadarsi Nanda, Xiangjian He:
Geo-Location Oriented Routing Protocol for Smart Dynamic Mesh Network. HPCC/SmartCity/DSS 2016: 891-898 - [c35]Ashish Nanda, Priyadarsi Nanda, Xiangjian He, Aruna Jamdagni:
A Secure Routing Scheme for Wireless Mesh Networks. ICISS 2016: 393-408 - [c34]Thawatchai Chomsiri, Xiangjian He, Priyadarsi Nanda, Zhiyuan Tan:
An Improvement of Tree-Rule Firewall for a Large Network: Supporting Large Rule Size and Low Delay. Trustcom/BigDataSE/ISPA 2016: 178-184 - [c33]Muhammad Usman, Mian Ahmad Jan, Xiangjian He, Priyadarsi Nanda:
Data Sharing in Secure Multimedia Wireless Sensor Networks. Trustcom/BigDataSE/ISPA 2016: 590-597 - [c32]Thanh Dat Dang, Doan B. Hoang, Priyadarsi Nanda:
A Novel Hash-Based File Clustering Scheme for Efficient Distributing, Storing, and Retrieving of Large Scale Health Records. Trustcom/BigDataSE/ISPA 2016: 1485-1491 - 2015
- [j9]Zhiyuan Tan, Aruna Jamdagni, Xiangjian He, Priyadarsi Nanda, Ren Ping Liu, Jiankun Hu:
Detection of Denial-of-Service Attacks Based on Computer Vision Techniques. IEEE Trans. Computers 64(9): 2519-2533 (2015) - [c31]Vijaya Durga Chemalamarri, Priyadarsi Nanda, Karla Felix Navarro:
SYMPHONY - A Controller Architecture for Hybrid Software Defined Networks. EWSDN 2015: 55-60 - [c30]Adrian Johannes, Priyadarsi Nanda, Xiangjian He:
Resource Utilization Based Dynamic Pricing Approach on Cloud Computing Application. ICA3PP (Workshops and Symposiums) 2015: 669-677 - [c29]Anil Saini, Manoj Singh Gaur, Vijay Laxmi, Priyadarsi Nanda:
sandFOX: secure sandboxed and isolated environment for firefox browser. SIN 2015: 20-27 - [c28]Mohammed A. Ambusaidi, Xiangjian He, Priyadarsi Nanda:
Unsupervised Feature Selection Method for Intrusion Detection System. TrustCom/BigDataSE/ISPA (1) 2015: 295-301 - [c27]Mian Ahmad Jan, Priyadarsi Nanda, Xiangjian He, Ren Ping Liu:
A Sybil Attack Detection Scheme for a Centralized Clustering-Based Hierarchical Network. TrustCom/BigDataSE/ISPA (1) 2015: 318-325 - [c26]Thanh Dat Dang, Doan B. Hoang, Priyadarsi Nanda:
Data Mobility Management Model for Active Data Cubes. TrustCom/BigDataSE/ISPA (1) 2015: 750-757 - 2014
- [j8]Zhiyuan Tan, Upasana T. Nagar, Xiangjian He, Priyadarsi Nanda, Ren Ping Liu, Song Wang, Jiankun Hu:
Enhancing Big Data Security with Collaborative Intrusion Detection. IEEE Cloud Comput. 1(3): 27-33 (2014) - [j7]Mian Ahmad Jan, Priyadarsi Nanda, Xiangjian He, Ren Ping Liu:
PASCCC: Priority-based application-specific congestion control clustering protocol. Comput. Networks 74: 92-102 (2014) - [j6]Xiangjian He, Thawatchai Chomsiri, Priyadarsi Nanda, Zhiyuan Tan:
Improving cloud network security using the Tree-Rule firewall. Future Gener. Comput. Syst. 30: 116-126 (2014) - [j5]Mohammed A. Ambusaidi, Zhiyuan Tan, Xiangjian He, Priyadarsi Nanda, Liang Fu Lu, Aruna Jamdagni:
Intrusion detection method based on nonlinear correlation measure. Int. J. Internet Protoc. Technol. 8(2/3): 77-86 (2014) - [j4]Zhiyuan Tan, Aruna Jamdagni, Xiangjian He, Priyadarsi Nanda, Ren Ping Liu:
A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis. IEEE Trans. Parallel Distributed Syst. 25(2): 447-456 (2014) - [c25]Mohammed A. Ambusaidi, Xiangjian He, Zhiyuan Tan, Priyadarsi Nanda, Liang Fu Lu, Upasana T. Nagar:
A Novel Feature Selection Approach for Intrusion Detection Data Classification. TrustCom 2014: 82-89 - [c24]Thawatchai Chomsiri, Xiangjian He, Priyadarsi Nanda, Zhiyuan Tan:
A Stateful Mechanism for the Tree-Rule Firewall. TrustCom 2014: 122-129 - [c23]Mian Ahmad Jan, Priyadarsi Nanda, Xiangjian He, Zhiyuan Tan, Ren Ping Liu:
A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment. TrustCom 2014: 205-211 - 2013
- [j3]Aruna Jamdagni, Zhiyuan Tan, Xiangjian He, Priyadarsi Nanda, Ren Ping Liu:
RePIDS: A multi tier Real-time Payload-based Intrusion Detection System. Comput. Networks 57(3): 811-824 (2013) - [j2]Dong Yu, Priyadarsi Nanda, Longbing Cao, Xiangjian He:
TCTM: an evaluation framework for architecture design on wireless sensor networks. Int. J. Sens. Networks 14(3): 168-177 (2013) - [c22]Mian Ahmad Jan, Priyadarsi Nanda, Xiangjian He, Ren Ping Liu:
Enhancing Lifetime and Quality of Data in Cluster-Based Hierarchical Routing Protocol for Wireless Sensor Network. HPCC/EUC 2013: 1400-1407 - [c21]Hugo Cruz-Sanchez, Laurent Ciarletta, Yeqiong Song, Priyadarsi Nanda:
Routing scheme for a Wireless Sensor Network real-time locating system. IWCMC 2013: 159-164 - [c20]Mian Ahmad Jan, Priyadarsi Nanda, Xiangjian He:
Energy Evaluation Model for an Improved Centralized Clustering Hierarchical Algorithm in WSN. WWIC 2013: 154-167 - 2012
- [c19]Thawatchai Chomsiri, Xiangjian He, Priyadarsi Nanda:
Limitation of Listed-Rule Firewall and the Design of Tree-Rule Firewall. IDCS 2012: 275-287 - [c18]Hla Myint, Priyadarsi Nanda, Xiangjian He:
Evaluation of billing and charging architecture for the Internet service provisioning. ISCIT 2012: 895-900 - [c17]Doan B. Hoang, Doug Elliott, Sharon McKinley, Priyadarsi Nanda, Jurgen Schulte, Duc Nguyen:
Tele-monitoring techniques to support recovery at home for survivors of a critical illness. ISSPIT 2012: 101-106 - [c16]Zhiyuan Tan, Aruna Jamdagni, Priyadarsi Nanda, Xiangjian He, Ren Ping Liu:
Evaluation on multivariate correlation analysis based denial-of-service attack detection system. SECURIT 2012: 160-164 - [c15]Zhiyuan Tan, Aruna Jamdagni, Xiangjian He, Priyadarsi Nanda, Ren Ping Liu:
Triangle-Area-Based Multivariate Correlation Analysis for Effective Denial-of-Service Attack Detection. TrustCom 2012: 33-40 - [c14]Muhammad Mujtaba, Priyadarsi Nanda, Xiangjian He:
Border Gateway Protocol Anomaly Detection Using Failure Quality Control Method. TrustCom 2012: 1239-1244 - 2011
- [c13]Zhiyuan Tan, Aruna Jamdagni, Xiangjian He, Priyadarsi Nanda, Ren Ping Liu:
Multivariate Correlation Analysis Technique Based on Euclidean Distance Map for Network Traffic Characterization. ICICS 2011: 388-398 - [c12]Zhiyuan Tan, Aruna Jamdagni, Xiangjian He, Priyadarsi Nanda, Ren Ping Liu:
Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis. ICONIP (3) 2011: 756-765 - [c11]Hla Myint, Priyadarsi Nanda:
An Integrated Model Supporting Billing and QOS in the Internet. SNPD 2011: 38-44 - 2010
- [c10]Zhiyuan Tan, Aruna Jamdagni, Xiangjian He, Priyadarsi Nanda, Ren Ping Liu, Wenjing Jia, Wei-Chang Yeh:
A Two-Tier System for Web Attack Detection Using Linear Discriminant Method. ICICS 2010: 459-471 - [c9]Aruna Jamdagni, Zhiyuan Tan, Priyadarsi Nanda, Xiangjian He, Ren Ping Liu:
Intrusion detection using GSAD model for HTTP traffic on web services. IWCMC 2010: 1193-1197
2000 – 2009
- 2009
- [j1]Priyadarsi Nanda, Andrew Simmonds:
A Scalable Architecture Supporting QoS Guarantees Using Traffic Engineering and Policy Based Routing in the Internet. Int. J. Commun. Netw. Syst. Sci. 2(7): 583-591 (2009) - [c8]Aruna Jamdagni, Zhiyuan Tan, Priyadarsi Nanda, Xiangjian He, Ren Liu:
Intrusion Detection Using Geometrical Structure. FCST 2009: 327-333 - [c7]Zhiyuan Tan, Xiangjian He, Priyadarsi Nanda:
Web Service Locating Unit in RFID-Centric Anti-counterfeit System. ISPA 2009: 389-393 - 2008
- [c6]Priyadarsi Nanda:
Supporting QoS Guarantees Using Traffic Engineering and Policy Based Routing. CSSE (3) 2008: 137-142 - 2007
- [c5]Priyadarsi Nanda, Rohan C. Fernandes:
Quality of Service in Telemedicine. ICDS 2007: 2 - 2006
- [c4]Priyadarsi Nanda, Andrew James Simmonds:
Policy Based QoS Support using BGP Routing. Communications in Computing 2006: 63-69 - 2003
- [c3]Priyadarsi Nanda, Andrew James Simmonds:
Policy Based Architecture for QoS over Differentiated Services Network. International Conference on Internet Computing 2003: 866-872 - 2002
- [c2]Andrew James Simmonds, Priyadarsi Nanda:
Resource Management in Differentiated Services Networks. INTERWORKING 2002: 313-323 - 2000
- [c1]Sanjay K. Jha, Mahbub Hassan, Priyadarsi Nanda, Nadeem Ahmed:
Intra-domain Bandwidth Management in Differentiated Services Network. LCN 2000: 326-327
Coauthor Index
aka: Sean He
aka: Zhiyuan Thomas Tan
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:14 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint