Follow
Pradhumna Shrestha
Pradhumna Shrestha
Verified email at huskers.unl.edu
Title
Cited by
Cited by
Year
A support vector machine-based framework for detection of covert timing channels
PL Shrestha, M Hempel, F Rezaei, H Sharif
IEEE Transactions on Dependable and Secure Computing 13 (2), 274-283, 2015
802015
Assurance of energy efficiency and data security for ECG transmission in BASNs
T Ma, PL Shrestha, M Hempel, D Peng, H Sharif, HH Chen
IEEE Transactions on Biomedical Engineering 59 (4), 1041-1048, 2012
692012
A study on energy efficient multi-tier multi-hop wireless sensor networks for freight-train monitoring
P Mahasukhon, H Sharif, M Hempel, T Zhou, T Ma, PL Shrestha
2011 7th International Wireless Communications and Mobile Computing …, 2011
372011
Leveraging statistical feature points for generalized detection of covert timing channels
PL Shrestha, M Hempel, F Rezaei, H Sharif
2014 IEEE Military Communications Conference, 7-11, 2014
252014
Modeling latency and reliability of hybrid technology networking
PL Shrestha, M Hempel, H Sharif, HH Chen
IEEE Sensors Journal 13 (10), 3616-3624, 2013
202013
Achieving robustness and capacity gains in covert timing channels
F Rezaei, M Hempel, PL Shrestha, H Sharif
2014 IEEE International Conference on Communications (ICC), 969-974, 2014
172014
Multi-tier multi-hop routing in large-scale wireless sensor networks for real-time monitoring
P Mahasukhon, H Sharif, M Hempel, T Zhou, T Ma, PL Shrestha
SENSORS, 2010 IEEE, 678-681, 2010
172010
Detecting covert timing channels using non-parametric statistical approaches
F Rezaei, M Hempel, PL Shrestha, SM Rakshit, H Sharif
2015 International Wireless Communications and Mobile Computing Conference …, 2015
162015
Performance analysis for direction of arrival estimating algorithms
PL Shrestha, M Hempel, P Mahasukhon, T Ma, H Sharif
2012 IEEE 75th Vehicular Technology Conference (VTC Spring), 1-5, 2012
152012
An event-based unified system model to characterize and evaluate timing covert channels
PL Shrestha, M Hempel, H Sharif, HH Chen
IEEE Systems Journal 10 (1), 271-280, 2014
142014
A general attack method for steganography removal using pseudo-cfa re-interpolation
PL Shrestha, M Hempel, T Ma, D Peng, H Sharif
2011 International Conference for Internet Technology and Secured …, 2011
112011
Evaluation and verification of automated covert channel modeling using a real network platform
F Rezaei, M Hempel, PL Shrestha, H Sharif
2014 IEEE Military Communications Conference, 12-17, 2014
92014
Towards a unified model for the analysis of timing-based covert channels
PL Shrestha, M Hempel, H Sharif
2014 IEEE International Conference on Communications (ICC), 816-820, 2014
82014
Performance evaluation of hybrid technology networking for real-time monitoring in freight railroad operations
PL Shrestha, M Hempel, S Rakshit, H Sharif, J Punwani, M Stewart
ASME/IEEE Joint Rail Conference 55300, V001T03A007, 2013
82013
Performance modeling of a multi-tier multi-hop hybrid sensor network protocol
PL Shrestha, M Hempel, Y Qian, H Sharif, J Punwani, M Stewart
2013 IEEE Wireless Communications and Networking Conference (WCNC), 2345-2350, 2013
82013
A quality-preserving hidden information removal approach for digital images
F Rezaei, M Hempel, PL Shrestha, T Ma, D Peng, H Sharif
2012 IEEE International Conference on Communications (ICC), 1021-1025, 2012
72012
Low-complexity image coder/decoder with an approaching-entropy quad-tree search code for embedded computing platforms
T Ma, P Shrestha, M Hempel, D Peng, H Sharif
2011 18th IEEE International Conference on Image Processing, 297-300, 2011
72011
Modeling packet rate covert timing channels
PL Shrestha, M Hempel, M Alahmad, H Sharif
2013 9th International Conference on Innovations in Information Technology …, 2013
62013
A novel analytical model and its test bed verification for network covert timing channels
PL Shrestha, M Hempel, F Rezaei, H Sharif
2015 IEEE Conference on Communications and Network Security (CNS), 227-235, 2015
52015
A novel Covert Timing Channel detection approach for online network traffic
F Rezaei, M Hempel, PL Shrestha, SM Rakshit, H Sharif
2015 IEEE Conference on Communications and Network Security (CNS), 737-738, 2015
52015
The system can't perform the operation now. Try again later.
Articles 1–20