Building an intrusion detection system using a filter-based feature selection algorithm MA Ambusaidi, X He, P Nanda, Z Tan IEEE transactions on computers 65 (10), 2986-2998, 2016 | 684 | 2016 |
A system for denial-of-service attack detection based on multivariate correlation analysis Z Tan, A Jamdagni, X He, P Nanda, RP Liu IEEE transactions on parallel and distributed systems 25 (2), 447-456, 2013 | 382 | 2013 |
Secure and sustainable load balancing of edge data centers in fog computing D Puthal, MS Obaidat, P Nanda, M Prasad, SP Mohanty, AY Zomaya IEEE Communications Magazine 56 (5), 60-65, 2018 | 257 | 2018 |
Detection of denial-of-service attacks based on computer vision techniques Z Tan, A Jamdagni, X He, P Nanda, RP Liu, J Hu IEEE transactions on computers 64 (9), 2519-2533, 2014 | 191 | 2014 |
A robust authentication scheme for observing resources in the internet of things environment MA Jan, P Nanda, X He, Z Tan, RP Liu 2014 IEEE 13th International Conference on Trust, Security and Privacy in …, 2014 | 154 | 2014 |
A Sybil attack detection scheme for a forest wildfire monitoring application MA Jan, P Nanda, X He, RP Liu Future Generation Computer Systems 80, 613-626, 2018 | 149 | 2018 |
Blockchain based secured identity authentication and expeditious revocation framework for vehicular networks N Malik, P Nanda, A Arora, X He, D Puthal 2018 17th IEEE international conference on trust, security and privacy in …, 2018 | 144 | 2018 |
PASCCC: Priority-based application-specific congestion control clustering protocol MA Jan, P Nanda, X He, RP Liu Computer networks 74, 92-102, 2014 | 133 | 2014 |
A sybil attack detection scheme for a centralized clustering-based hierarchical network MA Jan, P Nanda, X He, RP Liu 2015 IEEE Trustcom/BigDataSE/ISPA 1, 318-325, 2015 | 127 | 2015 |
Proof-of-authentication for scalable blockchain in resource-constrained distributed systems D Puthal, SP Mohanty, P Nanda, E Kougianos, G Das 2019 IEEE International Conference on Consumer Electronics (ICCE), 1-5, 2019 | 119 | 2019 |
Repids: A multi tier real-time payload-based intrusion detection system A Jamdagni, Z Tan, X He, P Nanda, RP Liu Computer networks 57 (3), 811-824, 2013 | 117 | 2013 |
Enhancing big data security with collaborative intrusion detection Z Tan, UT Nagar, X He, P Nanda, RP Liu, S Wang, J Hu IEEE cloud computing 1 (3), 27-33, 2014 | 116 | 2014 |
PAWN: a payload‐based mutual authentication scheme for wireless sensor networks M Jan, P Nanda, M Usman, X He Concurrency and Computation: Practice and Experience 29 (17), e3986, 2017 | 113 | 2017 |
Secure authentication and load balancing of distributed edge datacenters D Puthal, R Ranjan, A Nanda, P Nanda, PP Jayaraman, AY Zomaya Journal of Parallel and Distributed Computing 124, 60-69, 2019 | 86 | 2019 |
Denial-of-service attack detection based on multivariate correlation analysis Z Tan, A Jamdagni, X He, P Nanda, RP Liu Neural Information Processing: 18th International Conference, ICONIP 2011 …, 2011 | 81 | 2011 |
Building security perimeters to protect network systems against cyber threats [future directions] D Puthal, SP Mohanty, P Nanda, U Choppali IEEE Consumer Electronics Magazine 6 (4), 24-27, 2017 | 78 | 2017 |
Enhancing lifetime and quality of data in cluster-based hierarchical routing protocol for wireless sensor network MA Jan, P Nanda, X He, RP Liu 2013 IEEE 10th International Conference on High Performance Computing and …, 2013 | 77 | 2013 |
Improving cloud network security using the Tree-Rule firewall X He, T Chomsiri, P Nanda, Z Tan Future generation computer systems 30, 116-126, 2014 | 74 | 2014 |
Energy evaluation model for an improved centralized clustering hierarchical algorithm in WSN MA Jan, P Nanda, X He Wired/Wireless Internet Communication: 11th International Conference, WWIC …, 2013 | 72 | 2013 |
BuildSenSys: Reusing Building Sensing Data for Traffic Prediction With Cross-Domain Learning X Fan, C Xiang, C Chen, P Yang, L Gong, X Song, P Nanda, X He IEEE Transactions on Mobile Computing 20 (6), 2154-2171, 2020 | 68 | 2020 |