-
1
-
-
84983385301
-
Everything you wanted to know about smart cities
-
July
-
S. P. Mohanty, U. Choppali, and E. Kougianos, "Everything you wanted to know about smart cities," IEEE Consum. Electron. Mag., vol. 6, no. 3, pp. 60-70, July 2016.
-
(2016)
IEEE Consum. Electron. Mag.
, vol.6
, Issue.3
, pp. 60-70
-
-
Mohanty, S.P.1
Choppali, U.2
Kougianos, E.3
-
2
-
-
84964682662
-
Wireless sensor network simulation frameworks: A tutorial review
-
Apr.
-
M. L. Rajaram, E. Kougianos, S. P. Mohanty, and U. Choppali, "Wireless sensor network simulation frameworks: A tutorial review," IEEE Consum. Electron. Mag., vol. 6, no. 2, pp. 63-69, Apr. 2016.
-
(2016)
IEEE Consum. Electron. Mag.
, vol.6
, Issue.2
, pp. 63-69
-
-
Rajaram, M.L.1
Kougianos, E.2
Mohanty, S.P.3
Choppali, U.4
-
3
-
-
85031094841
-
Rendezvous based routing protocol for wireless sensor networks with mobile sink
-
S. Sharma, D. Puthal, S. Jena, A. Zomaya, and R. Ranjan, "Rendezvous based routing protocol for wireless sensor networks with mobile sink," J. Supercomputing, vol. 73, no. 3, pp. 1168-1188, 2017.
-
(2017)
J. Supercomputing
, vol.73
, Issue.3
, pp. 1168-1188
-
-
Sharma, S.1
Puthal, D.2
Jena, S.3
Zomaya, A.4
Ranjan, R.5
-
4
-
-
84911865485
-
Secure communication for the Internet of things-A comparison of link-layer security and IPsec for 6LoWPAN
-
S. Raza, S. Duquennoy, J. Höglund, U. Roedig, and T. Voigt, "Secure communication for the Internet of things-A comparison of link-layer security and IPsec for 6LoWPAN," Security Commun. Networks, vol. 7, no. 12, pp. 2654-2668, 2014.
-
(2014)
Security Commun. Networks
, vol.7
, Issue.12
, pp. 2654-2668
-
-
Raza, S.1
Duquennoy, S.2
Höglund, J.3
Roedig, U.4
Voigt, T.5
-
5
-
-
84874116437
-
-
Cloud Security Alliance (CSA). [Online]. Available: https://cloudsecurityalliance.org/group/software-defined-perimeter
-
Cloud Security Alliance (CSA)
-
-
-
7
-
-
85008884270
-
DLSeF: A dynamic key-length-based efficient real-time security verification model for big data stream
-
D. Puthal, S. Nepal, R. Ranjan, and J. Chen, "DLSeF: A dynamic key-length-based efficient real-time security verification model for big data stream," ACM Trans. Embedded Comput. Syst., vol. 16, no. 2, p. 51, 2017.
-
(2017)
ACM Trans. Embedded Comput. Syst.
, vol.16
, Issue.2
, pp. 51
-
-
Puthal, D.1
Nepal, S.2
Ranjan, R.3
Chen, J.4
-
8
-
-
85092001362
-
SEEN: A selective encryption method to ensure confidentiality for big sensing data streams
-
D. Puthal, X. Wu, S. Nepal, R. Ranjan, and J. Chen, "SEEN: A selective encryption method to ensure confidentiality for big sensing data streams," IEEE Trans. Big Data, 2017. doi: 10.1109/TBDATA.2017.2702172.
-
(2017)
IEEE Trans. Big Data
-
-
Puthal, D.1
Wu, X.2
Nepal, S.3
Ranjan, R.4
Chen, J.5
-
9
-
-
85032289155
-
SecureGLOR: An adaptive secure routing protocol for dynamic wireless mesh network
-
A. Nanda, P. Nanda, X. He, A. Jamdagni, and D. Puthal, "SecureGLOR: An adaptive secure routing protocol for dynamic wireless mesh network," in Proc. 16th IEEE Int. Conf. Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-17), 2017.
-
(2017)
Proc. 16th IEEE Int. Conf. Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-17)
-
-
Nanda, A.1
Nanda, P.2
He, X.3
Jamdagni, A.4
Puthal, D.5
-
10
-
-
84978224275
-
Threats to networking cloud and edge datacenters in the Internet of things
-
D. Puthal, S. Nepal, R. Ranjan, and J. Chen, "Threats to networking cloud and edge datacenters in the Internet of things," IEEE Cloud Comput., vol. 3, no. 3, pp. 64-71, 2016.
-
(2016)
IEEE Cloud Comput.
, vol.3
, Issue.3
, pp. 64-71
-
-
Puthal, D.1
Nepal, S.2
Ranjan, R.3
Chen, J.4
-
11
-
-
85008193408
-
Internet of Things (IoT): Smart and secure service delivery
-
E. Bertino, K.-K. R. Choo, D. Georgakopolous, and S. Nepal, "Internet of Things (IoT): Smart and secure service delivery," ACM Trans. Internet Technol., vol. 16, no. 4, p. 22, 2016.
-
(2016)
ACM Trans. Internet Technol.
, vol.16
, Issue.4
, pp. 22
-
-
Bertino, E.1
Choo, K.-K.R.2
Georgakopolous, D.3
Nepal, S.4
-
12
-
-
84991278236
-
-
National Institute of Standards and Technology, NIST RFI 130208119-3119-01, submitted, 4 Aug
-
National Institute of Standards and Technology, "Developing a framework to improve critical infrastructure cybersecurity," NIST RFI 130208119-3119-01, submitted 4 Aug. 2013.
-
(2013)
Developing A Framework to Improve Critical Infrastructure Cybersecurity
-
-
-
13
-
-
85031090685
-
-
Jericho Forum., May. 15
-
Jericho Forum. (2017, May 15). De-perimeterization. [Online]. Available: https://collabo ration.opengroup.org/jericho/presentations .htm
-
(2017)
De-perimeterization
-
-
-
14
-
-
85031091706
-
-
Vidder, Software Defined Perimeter 2016. [Online]. Available: www.vidder.com/why-vid der/software-defined-perimeter.html
-
(2016)
Vidder, Software Defined Perimeter
-
-
|