40 results on '"Mohapatra, Amar Kumar"'
Search Results
2. MA_BiRAE - Malware analysis and detection technique using adversarial learning and deep learning
3. Digital Twin in the Aviation Industry and the Role of Machine Learning: A Review
4. VSMAS2HN: Verifiably Secure Mutual Authentication Scheme for Smart Healthcare Network
5. Secure XML Parsing Pattern for Prevention of XML Attacks
6. BPADTA: Blockchain-based privacy-preserving authentication scheme for digital twin empowered aerospace industry
7. PSECAS: A physical unclonable function based secure authentication scheme for Internet of Drones
8. Digital Twin in the Aviation Industry and the Role of Machine Learning: A Review
9. Secure XML Parsing Pattern for Prevention of XML Attacks
10. Device Level Authentication Protocol for Wireless Body Area Networks
11. A survey on security and authentication in wireless body area networks
12. Efficient Authentication Protocol for Heterogeneous Wireless Networks
13. SAMAKA: Secure and Anonymous Mutual Authentication and Key Agreement Scheme for Wireless Body Area Networks
14. A Recurrent Feature Iterative Network For Suspect Identification using Convolutional and Long Short Term Memory Approach ⋆
15. SEEMAKA: Secured Energy-Efficient Mutual Authentication and Key Agreement Scheme for Wireless Body Area Networks
16. Energy Efficient Model for Recovery from Multiple Nodes Failure in Wireless Sensor Networks
17. Dissecting wireless body area networks routing protocols: Classification, comparative analysis, and research challenges
18. Dissecting wireless body area networks routing protocols: Classification, comparative analysis, and research challenges.
19. Fuzzy-Based Firefly and ACO Algorithm for Densely Deployed WSN
20. A novel SVM and LOF-based outlier detection routing algorithm for improving the stability period and overall network lifetime of WSN
21. A Generalized Formula to Determine Pythagorean Triples
22. An Approach for Verification of Secure Access Control Using Security Pattern
23. GeneMiner: A Classification Approach for Detection of XSS Attacks on Web Services
24. SDBMND: Secure Density-Based Unsupervised Learning Method with Malicious Node Detection to Improve the Network Lifespan in Densely Deployed WSN
25. A Formal Approach for Implementing Security Constraints in Security Patterns
26. SALMAKA: Secured, Anonymity Preserving and Lightweight Mutual Authentication and Key Agreement Scheme for WBAN
27. RC-DBSCAN: redundancy controlled DBSCAN algorithm for densely deployed wireless sensor network to prolong the network lifespan
28. RC-DBSCAN: redundancy controlled DBSCAN algorithm for densely deployed wireless sensor network to prolong the network lifespan
29. DecaDroid Classification and Characterization of Malicious Behaviour in Android Applications
30. A novel lightweight authentication protocol for body area networks based on elliptic-curve cryptography
31. An energy efficient and load balanced sink mobility for wireless sensor networks
32. An energy efficient and load balanced sink mobility for wireless sensor networks
33. Security Analysis of Wireless Authentication Protocols
34. Towards a taxonomy of cyber threats against target applications
35. Authentication protocols for wireless body area network with key management approach
36. A survey and classification of XML based attacks on web applications.
37. Mitigation of Blackhole attack in MANET
38. An Optimal Lightweight Cryptographic Approach for WSN and its Energy Consumption Analysis.
39. Wired equivalent privacy reinvestigated
40. Secured biometric template
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.