Building an intrusion detection system using a filter-based feature selection algorithm MA Ambusaidi, X He, P Nanda, Z Tan IEEE transactions on computers 65 (10), 2986-2998, 2016 | 704 | 2016 |
A system for denial-of-service attack detection based on multivariate correlation analysis Z Tan, A Jamdagni, X He, P Nanda, RP Liu IEEE transactions on parallel and distributed systems 25 (2), 447-456, 2013 | 390 | 2013 |
Secure and sustainable load balancing of edge data centers in fog computing D Puthal, MS Obaidat, P Nanda, M Prasad, SP Mohanty, AY Zomaya IEEE Communications Magazine 56 (5), 60-65, 2018 | 268 | 2018 |
Detection of denial-of-service attacks based on computer vision techniques Z Tan, A Jamdagni, X He, P Nanda, RP Liu, J Hu IEEE transactions on computers 64 (9), 2519-2533, 2014 | 197 | 2014 |
A robust authentication scheme for observing resources in the internet of things environment MA Jan, P Nanda, X He, Z Tan, RP Liu 2014 IEEE 13th International Conference on Trust, Security and Privacy in …, 2014 | 156 | 2014 |
A Sybil attack detection scheme for a forest wildfire monitoring application MA Jan, P Nanda, X He, RP Liu Future Generation Computer Systems 80, 613-626, 2018 | 152 | 2018 |
Blockchain based secured identity authentication and expeditious revocation framework for vehicular networks N Malik, P Nanda, A Arora, X He, D Puthal 2018 17th IEEE international conference on trust, security and privacy in …, 2018 | 149 | 2018 |
PASCCC: Priority-based application-specific congestion control clustering protocol MA Jan, P Nanda, X He, RP Liu Computer networks 74, 92-102, 2014 | 135 | 2014 |
A sybil attack detection scheme for a centralized clustering-based hierarchical network MA Jan, P Nanda, X He, RP Liu 2015 IEEE Trustcom/BigDataSE/ISPA 1, 318-325, 2015 | 131 | 2015 |
Proof-of-authentication for scalable blockchain in resource-constrained distributed systems D Puthal, SP Mohanty, P Nanda, E Kougianos, G Das 2019 IEEE International Conference on Consumer Electronics (ICCE), 1-5, 2019 | 121 | 2019 |
Enhancing big data security with collaborative intrusion detection Z Tan, UT Nagar, X He, P Nanda, RP Liu, S Wang, J Hu IEEE cloud computing 1 (3), 27-33, 2014 | 117 | 2014 |
Repids: A multi tier real-time payload-based intrusion detection system A Jamdagni, Z Tan, X He, P Nanda, RP Liu Computer networks 57 (3), 811-824, 2013 | 117 | 2013 |
PAWN: a payload‐based mutual authentication scheme for wireless sensor networks M Jan, P Nanda, M Usman, X He Concurrency and Computation: Practice and Experience 29 (17), e3986, 2017 | 114 | 2017 |
Secure authentication and load balancing of distributed edge datacenters D Puthal, R Ranjan, A Nanda, P Nanda, PP Jayaraman, AY Zomaya Journal of Parallel and Distributed Computing 124, 60-69, 2019 | 89 | 2019 |
Denial-of-service attack detection based on multivariate correlation analysis Z Tan, A Jamdagni, X He, P Nanda, RP Liu Neural Information Processing: 18th International Conference, ICONIP 2011 …, 2011 | 82 | 2011 |
Building security perimeters to protect network systems against cyber threats [future directions] D Puthal, SP Mohanty, P Nanda, U Choppali IEEE Consumer Electronics Magazine 6 (4), 24-27, 2017 | 79 | 2017 |
Enhancing lifetime and quality of data in cluster-based hierarchical routing protocol for wireless sensor network MA Jan, P Nanda, X He, RP Liu 2013 IEEE 10th International Conference on High Performance Computing and …, 2013 | 78 | 2013 |
Improving cloud network security using the Tree-Rule firewall X He, T Chomsiri, P Nanda, Z Tan Future generation computer systems 30, 116-126, 2014 | 74 | 2014 |
Energy evaluation model for an improved centralized clustering hierarchical algorithm in WSN MA Jan, P Nanda, X He Wired/Wireless Internet Communication: 11th International Conference, WWIC …, 2013 | 73 | 2013 |
Privacy-preserving mechanism in smart home using blockchain A Qashlan, P Nanda, X He, M Mohanty IEEE Access 9, 103651-103669, 2021 | 71 | 2021 |