Follow
Priyadarsi Nanda
Priyadarsi Nanda
Verified email at uts.edu.au - Homepage
Title
Cited by
Cited by
Year
Building an intrusion detection system using a filter-based feature selection algorithm
MA Ambusaidi, X He, P Nanda, Z Tan
IEEE transactions on computers 65 (10), 2986-2998, 2016
6662016
A system for denial-of-service attack detection based on multivariate correlation analysis
Z Tan, A Jamdagni, X He, P Nanda, RP Liu
IEEE transactions on parallel and distributed systems 25 (2), 447-456, 2013
3712013
Secure and sustainable load balancing of edge data centers in fog computing
D Puthal, MS Obaidat, P Nanda, M Prasad, SP Mohanty, AY Zomaya
IEEE Communications Magazine 56 (5), 60-65, 2018
2532018
Detection of denial-of-service attacks based on computer vision techniques
Z Tan, A Jamdagni, X He, P Nanda, RP Liu, J Hu
IEEE transactions on computers 64 (9), 2519-2533, 2014
1822014
A Sybil attack detection scheme for a forest wildfire monitoring application
MA Jan, P Nanda, X He, RP Liu
Future Generation Computer Systems 80, 613-626, 2018
1502018
A robust authentication scheme for observing resources in the internet of things environment
MA Jan, P Nanda, X He, Z Tan, RP Liu
2014 IEEE 13th International Conference on Trust, Security and Privacy in …, 2014
1502014
Blockchain based secured identity authentication and expeditious revocation framework for vehicular networks
N Malik, P Nanda, A Arora, X He, D Puthal
2018 17th IEEE international conference on trust, security and privacy in …, 2018
1392018
PASCCC: Priority-based application-specific congestion control clustering protocol
MA Jan, P Nanda, X He, RP Liu
Computer networks 74, 92-102, 2014
1332014
A sybil attack detection scheme for a centralized clustering-based hierarchical network
MA Jan, P Nanda, X He, RP Liu
2015 IEEE Trustcom/BigDataSE/ISPA 1, 318-325, 2015
1292015
Repids: A multi tier real-time payload-based intrusion detection system
A Jamdagni, Z Tan, X He, P Nanda, RP Liu
Computer networks 57 (3), 811-824, 2013
1172013
PAWN: a payload‐based mutual authentication scheme for wireless sensor networks
M Jan, P Nanda, M Usman, X He
Concurrency and Computation: Practice and Experience 29 (17), e3986, 2017
1162017
Enhancing big data security with collaborative intrusion detection
Z Tan, UT Nagar, X He, P Nanda, RP Liu, S Wang, J Hu
IEEE cloud computing 1 (3), 27-33, 2014
1162014
Proof-of-authentication for scalable blockchain in resource-constrained distributed systems
D Puthal, SP Mohanty, P Nanda, E Kougianos, G Das
2019 IEEE international conference on consumer electronics (ICCE), 1-5, 2019
1112019
Secure authentication and load balancing of distributed edge datacenters
D Puthal, R Ranjan, A Nanda, P Nanda, PP Jayaraman, AY Zomaya
Journal of Parallel and Distributed Computing 124, 60-69, 2019
812019
Denial-of-service attack detection based on multivariate correlation analysis
Z Tan, A Jamdagni, X He, P Nanda, RP Liu
Neural Information Processing: 18th International Conference, ICONIP 2011 …, 2011
792011
Enhancing lifetime and quality of data in cluster-based hierarchical routing protocol for wireless sensor network
MA Jan, P Nanda, X He, RP Liu
2013 IEEE 10th International Conference on High Performance Computing and …, 2013
752013
Improving cloud network security using the Tree-Rule firewall
X He, T Chomsiri, P Nanda, Z Tan
Future generation computer systems 30, 116-126, 2014
742014
Building security perimeters to protect network systems against cyber threats [future directions]
D Puthal, SP Mohanty, P Nanda, U Choppali
IEEE Consumer Electronics Magazine 6 (4), 24-27, 2017
732017
Energy evaluation model for an improved centralized clustering hierarchical algorithm in WSN
MA Jan, P Nanda, X He
Wired/Wireless Internet Communication: 11th International Conference, WWIC …, 2013
712013
BuildSenSys: Reusing Building Sensing Data for Traffic Prediction With Cross-Domain Learning
X Fan, C Xiang, C Chen, P Yang, L Gong, X Song, P Nanda, X He
IEEE Transactions on Mobile Computing 20 (6), 2154-2171, 2020
642020
The system can't perform the operation now. Try again later.
Articles 1–20