BibTeX records: Priyadarsi Nanda

download as .bib file

@article{DBLP:journals/fgcs/QashlanNM24,
  author       = {Amjad Qashlan and
                  Priyadarsi Nanda and
                  Manoranjan Mohanty},
  title        = {Differential privacy model for blockchain based smart home architecture},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {150},
  pages        = {49--63},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.future.2023.08.010},
  doi          = {10.1016/J.FUTURE.2023.08.010},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/QashlanNM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/XuNLH23,
  author       = {Han Xu and
                  Priyadarsi Nanda and
                  Jie Liang and
                  Xiangjian He},
  title        = {FCH, an incentive framework for data-owner dominated federated learning},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {76},
  pages        = {103521},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jisa.2023.103521},
  doi          = {10.1016/J.JISA.2023.103521},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/XuNLH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/MohanSNA23,
  author       = {Vamshi Sunku Mohan and
                  Sriram Sankaran and
                  Priyadarsi Nanda and
                  Krishnashree Achuthan},
  title        = {Enabling secure lightweight mobile Narrowband Internet of Things (NB-IoT)
                  applications using blockchain},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {219},
  pages        = {103723},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.jnca.2023.103723},
  doi          = {10.1016/J.JNCA.2023.103723},
  timestamp    = {Sat, 14 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/MohanSNA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsw/AlalmaieNH23,
  author       = {Abeer Z. Alalmaie and
                  Priyadarsi Nanda and
                  Xiangjian He},
  title        = {Zero Trust Network Intrusion Detection System {(NIDS)} using Auto
                  Encoder for Attention-based CNN-BiLSTM},
  booktitle    = {Proceedings of the 2023 Australasian Computer Science Week, {ACSW}
                  2023, Melbourne, VIC, Australia, 30 January 2023- 3 February 2023},
  pages        = {1--9},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3579375.3579376},
  doi          = {10.1145/3579375.3579376},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsw/AlalmaieNH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/AlalmaieNHA23,
  author       = {Abeer Z. Alalmaie and
                  Priyadarsi Nanda and
                  Xiangjian He and
                  Mohrah Saad Alayan},
  editor       = {Leonard Barolli},
  title        = {Why Zero Trust Framework Adoption has Emerged During and After Covid-19
                  Pandemic},
  booktitle    = {Advanced Information Networking and Applications - Proceedings of
                  the 37th International Conference on Advanced Information Networking
                  and Applications (AINA-2023), Juiz de Fora, Brazil, 29-31 March 2023,
                  Volume 3},
  series       = {Lecture Notes in Networks and Systems},
  volume       = {655},
  pages        = {181--192},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-28694-0\_17},
  doi          = {10.1007/978-3-031-28694-0\_17},
  timestamp    = {Thu, 16 Mar 2023 10:36:01 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/AlalmaieNHA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/coins/WaheedKMJAN23,
  author       = {Nazar Waheed and
                  Fazlullah Khan and
                  Spyridon Mastorakis and
                  Mian Ahmad Jan and
                  Abeer Z. Alalmaie and
                  Priyadarsi Nanda},
  title        = {Privacy-Enhanced Living: {A} Local Differential Privacy Approach to
                  Secure Smart Home Data},
  booktitle    = {{IEEE} International Conference on Omni-layer Intelligent Systems,
                  {COINS} 2023, Berlin, Germany, July 23-25, 2023},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/COINS57856.2023.10189261},
  doi          = {10.1109/COINS57856.2023.10189261},
  timestamp    = {Fri, 04 Aug 2023 13:58:10 +0200},
  biburl       = {https://dblp.org/rec/conf/coins/WaheedKMJAN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/WaheedRNFTJKAN23,
  author       = {Nazar Waheed and
                  Ateeq Ur Rehman and
                  Anushka Nehra and
                  Mahnoor Farooq and
                  Nargis Tariq and
                  Mian Ahmad Jan and
                  Fazlullah Khan and
                  Abeer Z. Alalmaie and
                  Priyadarsi Nanda},
  title        = {FedBlockHealth: {A} Synergistic Approach to Privacy and Security in
                  IoT-Enabled Healthcare Through Federated Learning and Blockchain},
  booktitle    = {{IEEE} Global Communications Conference, {GLOBECOM} 2023, Kuala Lumpur,
                  Malaysia, December 4-8, 2023},
  pages        = {3855--3860},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/GLOBECOM54140.2023.10437356},
  doi          = {10.1109/GLOBECOM54140.2023.10437356},
  timestamp    = {Sun, 10 Mar 2024 10:39:12 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/WaheedRNFTJKAN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccnc/AtiehNM23,
  author       = {Adel Atieh and
                  Priyadarsi Nanda and
                  Manoranjan Mohanty},
  title        = {A Zero-Trust Framework for Industrial Internet of Things},
  booktitle    = {International Conference on Computing, Networking and Communications,
                  {ICNC} 2023, Honolulu, HI, USA, February 20-22, 2023},
  pages        = {331--335},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICNC57223.2023.10074295},
  doi          = {10.1109/ICNC57223.2023.10074295},
  timestamp    = {Wed, 29 Mar 2023 17:46:17 +0200},
  biburl       = {https://dblp.org/rec/conf/iccnc/AtiehNM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwcmc/KhanN23,
  author       = {Asad Faraz Khan and
                  Priyadarsi Nanda},
  title        = {C-Block: {A} Secure and Robust Framework for Authentication Handover
                  in 5G HetNets based on Edge-enabled {SDN/NFV} Environments},
  booktitle    = {International Wireless Communications and Mobile Computing, {IWCMC}
                  2023, Marrakesh, Morocco, June 19-23, 2023},
  pages        = {1509--1514},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/IWCMC58020.2023.10183351},
  doi          = {10.1109/IWCMC58020.2023.10183351},
  timestamp    = {Thu, 27 Jul 2023 08:33:40 +0200},
  biburl       = {https://dblp.org/rec/conf/iwcmc/KhanN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/AlalmaieNH23,
  author       = {Abeer Z. Alalmaie and
                  Priyadarsi Nanda and
                  Xiangjian He},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {{ZT-NIDS:} Zero Trust, Network Intrusion Detection System},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {99--110},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012080000003555},
  doi          = {10.5220/0012080000003555},
  timestamp    = {Mon, 31 Jul 2023 15:34:21 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/AlalmaieNH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/LiHWAN23,
  author       = {Wenhao Li and
                  Yongqing He and
                  Zhimin Wang and
                  Saleh Mansor Alqahtani and
                  Priyadarsi Nanda},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Uncovering Flaws in Anti-Phishing Blacklists for Phishing Websites
                  Using Novel Cloaking Techniques},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {813--821},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012135600003555},
  doi          = {10.5220/0012135600003555},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/LiHWAN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/RahmanNMS23,
  author       = {Hasina Rahman and
                  Priyadarsi Nanda and
                  Manoranjan Mohanty and
                  Nazim Uddin Sheikh},
  editor       = {Sabrina De Capitani di Vimercati and
                  Pierangela Samarati},
  title        = {Anomaly Detection in Smart Grid Networks Using Power Consumption Data},
  booktitle    = {Proceedings of the 20th International Conference on Security and Cryptography,
                  {SECRYPT} 2023, Rome, Italy, July 10-12, 2023},
  pages        = {830--837},
  publisher    = {{SCITEPRESS}},
  year         = {2023},
  url          = {https://doi.org/10.5220/0012137600003555},
  doi          = {10.5220/0012137600003555},
  timestamp    = {Mon, 31 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/RahmanNMS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2304-07668,
  author       = {Nazar Waheed and
                  Ateeq Ur Rehman and
                  Anushka Nehra and
                  Mahnoor Farooq and
                  Nargis Tariq and
                  Mian Ahmad Jan and
                  Fazlullah Khan and
                  Abeer Z. Alalmaie and
                  Priyadarsi Nanda},
  title        = {FedBlockHealth: {A} Synergistic Approach to Privacy and Security in
                  IoT-Enabled Healthcare through Federated Learning and Blockchain},
  journal      = {CoRR},
  volume       = {abs/2304.07668},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2304.07668},
  doi          = {10.48550/ARXIV.2304.07668},
  eprinttype    = {arXiv},
  eprint       = {2304.07668},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2304-07668.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2304-07676,
  author       = {Nazar Waheed and
                  Fazlullah Khan and
                  Mian Ahmad Jan and
                  Abeer Z. Alalmaie and
                  Priyadarsi Nanda},
  title        = {Privacy-Enhanced Living: {A} Local Differential Privacy Approach to
                  Secure Smart Home Data},
  journal      = {CoRR},
  volume       = {abs/2304.07676},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2304.07676},
  doi          = {10.48550/ARXIV.2304.07676},
  eprinttype    = {arXiv},
  eprint       = {2304.07676},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2304-07676.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwcmc/KhanN22,
  author       = {Asad Faraz Khan and
                  Priyadarsi Nanda},
  title        = {Hybrid blockchain-based Authentication Handover and Flow Rule Validation
                  for Secure Software Defined 5G HetNets},
  booktitle    = {2022 International Wireless Communications and Mobile Computing, {IWCMC}
                  2022, Dubrovnik, Croatia, May 30 - June 3, 2022},
  pages        = {223--230},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/IWCMC55113.2022.9824274},
  doi          = {10.1109/IWCMC55113.2022.9824274},
  timestamp    = {Mon, 28 Aug 2023 21:17:32 +0200},
  biburl       = {https://dblp.org/rec/conf/iwcmc/KhanN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/XuNLH22,
  author       = {Han Xu and
                  Priyadarsi Nanda and
                  Jie Liang and
                  Xiangjian He},
  editor       = {Xingliang Yuan and
                  Guangdong Bai and
                  Cristina Alcaraz and
                  Suryadipta Majumdar},
  title        = {The Force of Compensation, a Multi-stage Incentive Mechanism Model
                  for Federated Learning},
  booktitle    = {Network and System Security - 16th International Conference, {NSS}
                  2022, Denarau Island, Fiji, December 9-12, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13787},
  pages        = {357--373},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-23020-2\_20},
  doi          = {10.1007/978-3-031-23020-2\_20},
  timestamp    = {Wed, 27 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/XuNLH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AlalmaieNH22,
  author       = {Abeer Z. Alalmaie and
                  Priyadarsi Nanda and
                  Xiangjian He},
  title        = {Zero Trust-NIDS: Extended Multi-View Approach for Network Trace Anonymization
                  and Auto-Encoder {CNN} for Network Intrusion Detection},
  booktitle    = {{IEEE} International Conference on Trust, Security and Privacy in
                  Computing and Communications, TrustCom 2022, Wuhan, China, December
                  9-11, 2022},
  pages        = {449--456},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00069},
  doi          = {10.1109/TRUSTCOM56396.2022.00069},
  timestamp    = {Mon, 27 Mar 2023 16:44:39 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/AlalmaieNH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wise/WaheedIHHN22,
  author       = {Nazar Waheed and
                  Muhammad Ikram and
                  Saad Sajid Hashmi and
                  Xiangjian He and
                  Priyadarsi Nanda},
  editor       = {Richard Chbeir and
                  Zi Helen Huang and
                  Fabrizio Silvestri and
                  Yannis Manolopoulos and
                  Yanchun Zhang},
  title        = {An Empirical Assessment of Security and Privacy Risks of Web-Based
                  Chatbots},
  booktitle    = {Web Information Systems Engineering - {WISE} 2022 - 23rd International
                  Conference, Biarritz, France, November 1-3, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13724},
  pages        = {325--339},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-20891-1\_23},
  doi          = {10.1007/978-3-031-20891-1\_23},
  timestamp    = {Mon, 21 Nov 2022 16:58:44 +0100},
  biburl       = {https://dblp.org/rec/conf/wise/WaheedIHHN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2205-08252,
  author       = {Nazar Waheed and
                  Muhammad Ikram and
                  Saad Sajid Hashmi and
                  Xiangjian He and
                  Priyadarsi Nanda},
  title        = {An Empirical Assessment of Security and Privacy Risks of Web based-Chatbots},
  journal      = {CoRR},
  volume       = {abs/2205.08252},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2205.08252},
  doi          = {10.48550/ARXIV.2205.08252},
  eprinttype    = {arXiv},
  eprint       = {2205.08252},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2205-08252.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/RoselinNNH21,
  author       = {Annie Gilda Roselin and
                  Priyadarsi Nanda and
                  Surya Nepal and
                  Xiangjian He},
  title        = {Intelligent Anomaly Detection for Large Network Traffic With Optimized
                  Deep Clustering {(ODC)} Algorithm},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {47243--47251},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3068172},
  doi          = {10.1109/ACCESS.2021.3068172},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/RoselinNNH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/QashlanNHM21,
  author       = {Amjad Qashlan and
                  Priyadarsi Nanda and
                  Xiangjian He and
                  Manoranjan Mohanty},
  title        = {Privacy-Preserving Mechanism in Smart Home Using Blockchain},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {103651--103669},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3098795},
  doi          = {10.1109/ACCESS.2021.3098795},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/QashlanNHM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/FanXCYGSNH21,
  author       = {Xiaochen Fan and
                  Chaocan Xiang and
                  Chao Chen and
                  Panlong Yang and
                  Liangyi Gong and
                  Xudong Song and
                  Priyadarsi Nanda and
                  Xiangjian He},
  title        = {BuildSenSys: Reusing Building Sensing Data for Traffic Prediction
                  With Cross-Domain Learning},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {20},
  number       = {6},
  pages        = {2154--2171},
  year         = {2021},
  url          = {https://doi.org/10.1109/TMC.2020.2976936},
  doi          = {10.1109/TMC.2020.2976936},
  timestamp    = {Sun, 16 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmc/FanXCYGSNH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwcmc/AtiehNM21,
  author       = {Adel Atieh and
                  Priyadarsi Nanda and
                  Manoranjan Mohanty},
  title        = {Context-Aware Fog Computing Implementation for Industrial Internet
                  of Things},
  booktitle    = {17th International Wireless Communications and Mobile Computing, {IWCMC}
                  2021, Harbin City, China, June 28 - July 2, 2021},
  pages        = {598--603},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/IWCMC51323.2021.9498618},
  doi          = {10.1109/IWCMC51323.2021.9498618},
  timestamp    = {Fri, 13 Aug 2021 16:13:45 +0200},
  biburl       = {https://dblp.org/rec/conf/iwcmc/AtiehNM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/LaiFYTZHN20,
  author       = {Shuang Lai and
                  Xiaochen Fan and
                  Qianwen Ye and
                  Zhiyuan Tan and
                  Yuanfang Zhang and
                  Xiangjian He and
                  Priyadarsi Nanda},
  title        = {FairEdge: {A} Fairness-Oriented Task Offloading Scheme for Iot Applications
                  in Mobile Cloudlet Networks},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {13516--13526},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.2965562},
  doi          = {10.1109/ACCESS.2020.2965562},
  timestamp    = {Fri, 07 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/LaiFYTZHN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ccftpci/FanXGHQAXNH20,
  author       = {Xiaochen Fan and
                  Chaocan Xiang and
                  Liangyi Gong and
                  Xin He and
                  Yuben Qu and
                  Saeed Amirgholipour and
                  Yue Xi and
                  Priyadarsi Nanda and
                  Xiangjian He},
  title        = {Deep learning for intelligent traffic sensing and prediction: recent
                  advances and future challenges},
  journal      = {{CCF} Trans. Pervasive Comput. Interact.},
  volume       = {2},
  number       = {4},
  pages        = {240--260},
  year         = {2020},
  url          = {https://doi.org/10.1007/s42486-020-00039-x},
  doi          = {10.1007/S42486-020-00039-X},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ccftpci/FanXGHQAXNH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/NandaHY20,
  author       = {Priyadarsi Nanda and
                  Xiangjian He and
                  Laurence T. Yang},
  title        = {Security, Trust and Privacy in Cyber (STPCyber): Future trends and
                  challenges},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {109},
  pages        = {446--449},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.future.2020.02.010},
  doi          = {10.1016/J.FUTURE.2020.02.010},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/NandaHY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/NandaNHJP20,
  author       = {Ashish Nanda and
                  Priyadarsi Nanda and
                  Xiangjian He and
                  Aruna Jamdagni and
                  Deepak Puthal},
  title        = {A hybrid encryption technique for Secure-GLOR: The adaptive secure
                  routing protocol for dynamic wireless mesh networks},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {109},
  pages        = {521--530},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.future.2018.05.065},
  doi          = {10.1016/J.FUTURE.2018.05.065},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/NandaNHJP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/UsmanJHN20,
  author       = {Muhammad Usman and
                  Mian Ahmad Jan and
                  Xiangjian He and
                  Priyadarsi Nanda},
  title        = {{QASEC:} {A} secured data communication scheme for mobile Ad-hoc networks},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {109},
  pages        = {604--610},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.future.2018.05.007},
  doi          = {10.1016/J.FUTURE.2018.05.007},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/UsmanJHN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/ChomsiriHNT20,
  author       = {Thawatchai Chomsiri and
                  Xiangjian He and
                  Priyadarsi Nanda and
                  Zhiyuan Tan},
  title        = {Hybrid Tree-Rule Firewall for High Speed Data Transmission},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {8},
  number       = {4},
  pages        = {1237--1249},
  year         = {2020},
  url          = {https://doi.org/10.1109/TCC.2016.2554548},
  doi          = {10.1109/TCC.2016.2554548},
  timestamp    = {Thu, 31 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcc/ChomsiriHNT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/winet/MalikNHL20,
  author       = {Nisha Malik and
                  Priyadarsi Nanda and
                  Xiangjian He and
                  Ren Ping Liu},
  title        = {Vehicular networks with security and trust management solutions: proposed
                  secured message exchange via blockchain technology},
  journal      = {Wirel. Networks},
  volume       = {26},
  number       = {6},
  pages        = {4207--4226},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11276-020-02325-z},
  doi          = {10.1007/S11276-020-02325-Z},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/winet/MalikNHL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/QashlanNH20,
  author       = {Amjad Qashlan and
                  Priyadarsi Nanda and
                  Xiangjian He},
  editor       = {Guojun Wang and
                  Ryan K. L. Ko and
                  Md. Zakirul Alam Bhuiyan and
                  Yi Pan},
  title        = {Security and Privacy Implementation in Smart Home: Attributes Based
                  Access Control and Smart Contracts},
  booktitle    = {19th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2020, Guangzhou, China,
                  December 29, 2020 - January 1, 2021},
  pages        = {951--958},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00127},
  doi          = {10.1109/TRUSTCOM50675.2020.00127},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/QashlanNH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ci/LiuLNYZ19,
  author       = {Meng Liu and
                  Yun Luo and
                  Priyadarsi Nanda and
                  Shui Yu and
                  Jianbing Zhang},
  title        = {Efficient solution to the millionaires' problem based on asymmetric
                  commutative encryption scheme},
  journal      = {Comput. Intell.},
  volume       = {35},
  number       = {3},
  pages        = {555--576},
  year         = {2019},
  url          = {https://doi.org/10.1111/coin.12218},
  doi          = {10.1111/COIN.12218},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ci/LiuLNYZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/BaskaranNNH19,
  author       = {Annie Gilda Roselin Arockia Baskaran and
                  Priyadarsi Nanda and
                  Surya Nepal and
                  Sean He},
  title        = {Testbed evaluation of Lightweight Authentication Protocol {(LAUP)}
                  for 6LoWPAN wireless sensor networks},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {31},
  number       = {23},
  year         = {2019},
  url          = {https://doi.org/10.1002/cpe.4868},
  doi          = {10.1002/CPE.4868},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/concurrency/BaskaranNNH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/NandaPM19,
  author       = {Priyadarsi Nanda and
                  Deepak Puthal and
                  Saraju P. Mohanty},
  title        = {Editorial to the Special Issue on Recent Advances on Trust, Security
                  and Privacy in Computing and Communications},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {31},
  number       = {23},
  year         = {2019},
  url          = {https://doi.org/10.1002/cpe.5431},
  doi          = {10.1002/CPE.5431},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/concurrency/NandaPM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/FanLLTN19,
  author       = {Yongkai Fan and
                  Xiaodong Lin and
                  Wei Liang and
                  Gang Tan and
                  Priyadarsi Nanda},
  title        = {A secure privacy preserving deduplication scheme for cloud computing},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {101},
  pages        = {127--135},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.future.2019.04.046},
  doi          = {10.1016/J.FUTURE.2019.04.046},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/FanLLTN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/RoselinNNHW19,
  author       = {Annie Gilda Roselin and
                  Priyadarsi Nanda and
                  Surya Nepal and
                  Xiangjian He and
                  Jarod Wright},
  title        = {Exploiting the Remote Server Access Support of CoAP Protocol},
  journal      = {{IEEE} Internet Things J.},
  volume       = {6},
  number       = {6},
  pages        = {9338--9349},
  year         = {2019},
  url          = {https://doi.org/10.1109/JIOT.2019.2942085},
  doi          = {10.1109/JIOT.2019.2942085},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iotj/RoselinNNHW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpdc/PuthalRNNJZ19,
  author       = {Deepak Puthal and
                  Rajiv Ranjan and
                  Ashish Nanda and
                  Priyadarsi Nanda and
                  Prem Prakash Jayaraman and
                  Albert Y. Zomaya},
  title        = {Secure authentication and load balancing of distributed edge datacenters},
  journal      = {J. Parallel Distributed Comput.},
  volume       = {124},
  pages        = {60--69},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jpdc.2018.10.007},
  doi          = {10.1016/J.JPDC.2018.10.007},
  timestamp    = {Fri, 30 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jpdc/PuthalRNNJZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/NandaNOHP19,
  author       = {Ashish Nanda and
                  Priyadarsi Nanda and
                  Mohammad S. Obaidat and
                  Xiangjian He and
                  Deepak Puthal},
  title        = {A Novel Multi-Path Anonymous Randomized Key Distribution Scheme for
                  Geo Distributed Networks},
  booktitle    = {2019 {IEEE} Global Communications Conference, {GLOBECOM} 2019, Waikoloa,
                  HI, USA, December 9-13, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/GLOBECOM38437.2019.9013379},
  doi          = {10.1109/GLOBECOM38437.2019.9013379},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/NandaNOHP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccel/PuthalMNK019,
  author       = {Deepak Puthal and
                  Saraju P. Mohanty and
                  Priyadarsi Nanda and
                  Elias Kougianos and
                  Gautam Das},
  title        = {Proof-of-Authentication for Scalable Blockchain in Resource-Constrained
                  Distributed Systems},
  booktitle    = {{IEEE} International Conference on Consumer Electronics, {ICCE} 2019,
                  Las Vegas, NV, USA, January 11-13, 2019},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICCE.2019.8662009},
  doi          = {10.1109/ICCE.2019.8662009},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccel/PuthalMNK019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MalikNHL19,
  author       = {Nisha Malik and
                  Priyadarsi Nanda and
                  Xiangjian He and
                  Ren Ping Liu},
  title        = {Trust and Reputation in Vehicular Networks: {A} Smart Contract-Based
                  Approach},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {34--41},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00015},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00015},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/MalikNHL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/YangFPHNG18,
  author       = {Ning Yang and
                  Xiaochen Fan and
                  Deepak Puthal and
                  Xiangjian He and
                  Priyadarsi Nanda and
                  Shiping Guo},
  title        = {A Novel Collaborative Task Offloading Scheme for Secure and Sustainable
                  Mobile Cloudlet Networks},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {44175--44189},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2853634},
  doi          = {10.1109/ACCESS.2018.2853634},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/YangFPHNG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/FanHXPGNF18,
  author       = {Xiaochen Fan and
                  Xiangjian He and
                  Chaocan Xiang and
                  Deepak Puthal and
                  Liangyi Gong and
                  Priyadarsi Nanda and
                  Gengfa Fang},
  title        = {Towards System Implementation and Data Analysis for Crowdsensing Based
                  Outdoor {RSS} Maps},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {47535--47545},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2867578},
  doi          = {10.1109/ACCESS.2018.2867578},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/FanHXPGNF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/PuthalONPMZ18,
  author       = {Deepak Puthal and
                  Mohammad S. Obaidat and
                  Priyadarsi Nanda and
                  Mukesh Prasad and
                  Saraju P. Mohanty and
                  Albert Y. Zomaya},
  title        = {Secure and Sustainable Load Balancing of Edge Data Centers in Fog
                  Computing},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {56},
  number       = {5},
  pages        = {60--65},
  year         = {2018},
  url          = {https://doi.org/10.1109/MCOM.2018.1700795},
  doi          = {10.1109/MCOM.2018.1700795},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/PuthalONPMZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/JanNHL18,
  author       = {Mian Ahmad Jan and
                  Priyadarsi Nanda and
                  Xiangjian He and
                  Ren Ping Liu},
  title        = {A Sybil attack detection scheme for a forest wildfire monitoring application},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {80},
  pages        = {613--626},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.future.2016.05.034},
  doi          = {10.1016/J.FUTURE.2016.05.034},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/JanNHL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/NandaNHJP18,
  author       = {Ashish Nanda and
                  Priyadarsi Nanda and
                  Xiangjian He and
                  Aruna Jamdagni and
                  Deepak Puthal},
  editor       = {Tung Bui},
  title        = {A Novel Hybrid Authentication Model for Geo Location Oriented Routing
                  in Dynamic Wireless Mesh Networks},
  booktitle    = {51st Hawaii International Conference on System Sciences, {HICSS} 2018,
                  Hilton Waikoloa Village, Hawaii, USA, January 3-6, 2018},
  pages        = {1--10},
  publisher    = {ScholarSpace / {AIS} Electronic Library (AISeL)},
  year         = {2018},
  url          = {https://hdl.handle.net/10125/50579},
  timestamp    = {Wed, 04 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hicss/NandaNHJP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/FanHPCXNR18,
  author       = {Xiaochen Fan and
                  Xiangjian He and
                  Deepak Puthal and
                  Shiping Chen and
                  Chaocan Xiang and
                  Priyadarsi Nanda and
                  Xunpeng Rao},
  title        = {{CTOM:} Collaborative Task Offloading Mechanism for Mobile Cloudlet
                  Networks},
  booktitle    = {2018 {IEEE} International Conference on Communications, {ICC} 2018,
                  Kansas City, MO, USA, May 20-24, 2018},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICC.2018.8422114},
  doi          = {10.1109/ICC.2018.8422114},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/FanHPCXNR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/UmairNHC18,
  author       = {Amber Umair and
                  Priyadarsi Nanda and
                  Xiangjian He and
                  Kim{-}Kwang Raymond Choo},
  editor       = {Man Ho Au and
                  Siu{-}Ming Yiu and
                  Jin Li and
                  Xiapu Luo and
                  Cong Wang and
                  Aniello Castiglione and
                  Kamil Kluczniak},
  title        = {User Relationship Classification of Facebook Messenger Mobile Data
                  using {WEKA}},
  booktitle    = {Network and System Security - 12th International Conference, {NSS}
                  2018, Hong Kong, China, August 27-29, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11058},
  pages        = {337--348},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-02744-5\_25},
  doi          = {10.1007/978-3-030-02744-5\_25},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/UmairNHC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MalikNAHP18,
  author       = {Nisha Malik and
                  Priyadarsi Nanda and
                  Arushi Arora and
                  Xiangjian He and
                  Deepak Puthal},
  title        = {Blockchain Based Secured Identity Authentication and Expeditious Revocation
                  Framework for Vehicular Networks},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {674--679},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00099},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00099},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/MalikNAHP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuNZYYL18,
  author       = {Meng Liu and
                  Priyadarsi Nanda and
                  Xuyun Zhang and
                  Chi Yang and
                  Shui Yu and
                  Jianxin Li},
  title        = {Asymmetric Commutative Encryption Scheme Based Efficient Solution
                  to the Millionaires' Problem},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {990--995},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00139},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00139},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuNZYYL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cem/PuthalMNC17,
  author       = {Deepak Puthal and
                  Saraju P. Mohanty and
                  Priyadarsi Nanda and
                  Uma Choppali},
  title        = {Building Security Perimeters to Protect Network Systems Against Cyber
                  Threats [Future Directions]},
  journal      = {{IEEE} Consumer Electron. Mag.},
  volume       = {6},
  number       = {4},
  pages        = {24--27},
  year         = {2017},
  url          = {https://doi.org/10.1109/MCE.2017.2714744},
  doi          = {10.1109/MCE.2017.2714744},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cem/PuthalMNC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/JanNUH17,
  author       = {Mian Ahmad Jan and
                  Priyadarsi Nanda and
                  Muhammad Usman and
                  Xiangjian He},
  title        = {{PAWN:} a payload-based mutual authentication scheme for wireless
                  sensor networks},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {29},
  number       = {17},
  year         = {2017},
  url          = {https://doi.org/10.1002/cpe.3986},
  doi          = {10.1002/CPE.3986},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/concurrency/JanNUH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cit/MalikPN17,
  author       = {Nisha Malik and
                  Deepak Puthal and
                  Priyadarsi Nanda},
  title        = {An Overview of Security Challenges in Vehicular Ad-Hoc Networks},
  booktitle    = {2017 International Conference on Information Technology, {ICIT} 2017,
                  Bhubaneshwar, India, December 21-23, 2017},
  pages        = {208--213},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICIT.2017.14},
  doi          = {10.1109/ICIT.2017.14},
  timestamp    = {Sun, 08 Aug 2021 01:40:51 +0200},
  biburl       = {https://dblp.org/rec/conf/cit/MalikPN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/NagarNHT17,
  author       = {Upasana T. Nagar and
                  Priyadarsi Nanda and
                  Xiangjian He and
                  Zhiyuan Thomas Tan},
  editor       = {Rajveer Singh Shekhawat and
                  Manoj Singh Gaur and
                  Atilla El{\c{c}}i and
                  Jaideep Vaidya and
                  Oleg B. Makarevich and
                  Ron Poet and
                  Mehmet A. Orgun and
                  Vijaypal S. Dhaka and
                  Manoj Kumar Bohra and
                  Virender Singh and
                  Ludmila K. Babenko and
                  Naghmeh Moradpoor Sheykhkanloo and
                  Behnam Rahnama},
  title        = {A framework for data security in cloud using collaborative intrusion
                  detection scheme},
  booktitle    = {Proceedings of the 10th International Conference on Security of Information
                  and Networks, {SIN} 2017, Jaipur, IN, India, October 13-15, 2017},
  pages        = {188--193},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3136825.3136905},
  doi          = {10.1145/3136825.3136905},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sin/NagarNHT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/NandaNHJP17,
  author       = {Ashish Nanda and
                  Priyadarsi Nanda and
                  Xiangjian He and
                  Aruna Jamdagni and
                  Deepak Puthal},
  title        = {Secure-GLOR: An Adaptive Secure Routing Protocol for Dynamic Wireless
                  Mesh Networks},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {269--276},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.247},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.247},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/NandaNHJP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/RoselinNN17,
  author       = {Annie Gilda Roselin and
                  Priyadarsi Nanda and
                  Surya Nepal},
  title        = {Lightweight Authentication Protocol {(LAUP)} for 6LoWPAN Wireless
                  Sensor Networks},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {371--378},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.260},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.260},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/RoselinNN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AldebeiFJNH17,
  author       = {Khaled Aldebei and
                  Helia Farhood and
                  Wenjing Jia and
                  Priyadarsi Nanda and
                  Xiangjian He},
  title        = {Sequential and Unsupervised Document Authorial Clustering Based on
                  Hidden Markov Model},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {379--385},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.261},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.261},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/AldebeiFJNH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiTJNHH17,
  author       = {Qingru Li and
                  Zhiyuan Tan and
                  Aruna Jamdagni and
                  Priyadarsi Nanda and
                  Xiangjian He and
                  Wei Han},
  title        = {An Intrusion Detection System Based on Polynomial Feature Correlation
                  Analysis},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {978--983},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.340},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.340},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiTJNHH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/UmairNH17,
  author       = {Amber Umair and
                  Priyadarsi Nanda and
                  Xiangjian He},
  title        = {Online Social Network Information Forensics: {A} Survey on Use of
                  Various Tools and Determining How Cautious Facebook Users are?},
  booktitle    = {2017 {IEEE} Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4,
                  2017},
  pages        = {1139--1144},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.364},
  doi          = {10.1109/TRUSTCOM/BIGDATASE/ICESS.2017.364},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/UmairNH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/AmbusaidiHNT16,
  author       = {Mohammed A. Ambusaidi and
                  Xiangjian He and
                  Priyadarsi Nanda and
                  Zhiyuan Tan},
  title        = {Building an Intrusion Detection System Using a Filter-Based Feature
                  Selection Algorithm},
  journal      = {{IEEE} Trans. Computers},
  volume       = {65},
  number       = {10},
  pages        = {2986--2998},
  year         = {2016},
  url          = {https://doi.org/10.1109/TC.2016.2519914},
  doi          = {10.1109/TC.2016.2519914},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/AmbusaidiHNT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpcc/NandaNH16,
  author       = {Ashish Nanda and
                  Priyadarsi Nanda and
                  Xiangjian He},
  editor       = {Jinjun Chen and
                  Laurence T. Yang},
  title        = {Geo-Location Oriented Routing Protocol for Smart Dynamic Mesh Network},
  booktitle    = {18th {IEEE} International Conference on High Performance Computing
                  and Communications; 14th {IEEE} International Conference on Smart
                  City; 2nd {IEEE} International Conference on Data Science and Systems,
                  HPCC/SmartCity/DSS 2016, Sydney, Australia, December 12-14, 2016},
  pages        = {891--898},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/HPCC-SmartCity-DSS.2016.0128},
  doi          = {10.1109/HPCC-SMARTCITY-DSS.2016.0128},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hpcc/NandaNH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/NandaNHJ16,
  author       = {Ashish Nanda and
                  Priyadarsi Nanda and
                  Xiangjian He and
                  Aruna Jamdagni},
  editor       = {Indrajit Ray and
                  Manoj Singh Gaur and
                  Mauro Conti and
                  Dheeraj Sanghi and
                  V. Kamakoti},
  title        = {A Secure Routing Scheme for Wireless Mesh Networks},
  booktitle    = {Information Systems Security - 12th International Conference, {ICISS}
                  2016, Jaipur, India, December 16-20, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10063},
  pages        = {393--408},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-49806-5\_21},
  doi          = {10.1007/978-3-319-49806-5\_21},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/NandaNHJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChomsiriHNT16,
  author       = {Thawatchai Chomsiri and
                  Xiangjian He and
                  Priyadarsi Nanda and
                  Zhiyuan Tan},
  title        = {An Improvement of Tree-Rule Firewall for a Large Network: Supporting
                  Large Rule Size and Low Delay},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {178--184},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0061},
  doi          = {10.1109/TRUSTCOM.2016.0061},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChomsiriHNT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/UsmanJHN16,
  author       = {Muhammad Usman and
                  Mian Ahmad Jan and
                  Xiangjian He and
                  Priyadarsi Nanda},
  title        = {Data Sharing in Secure Multimedia Wireless Sensor Networks},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {590--597},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0114},
  doi          = {10.1109/TRUSTCOM.2016.0114},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/UsmanJHN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DangHN16,
  author       = {Thanh Dat Dang and
                  Doan B. Hoang and
                  Priyadarsi Nanda},
  title        = {A Novel Hash-Based File Clustering Scheme for Efficient Distributing,
                  Storing, and Retrieving of Large Scale Health Records},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {1485--1491},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0232},
  doi          = {10.1109/TRUSTCOM.2016.0232},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/DangHN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/TanJHNLH15,
  author       = {Zhiyuan Tan and
                  Aruna Jamdagni and
                  Xiangjian He and
                  Priyadarsi Nanda and
                  Ren Ping Liu and
                  Jiankun Hu},
  title        = {Detection of Denial-of-Service Attacks Based on Computer Vision Techniques},
  journal      = {{IEEE} Trans. Computers},
  volume       = {64},
  number       = {9},
  pages        = {2519--2533},
  year         = {2015},
  url          = {https://doi.org/10.1109/TC.2014.2375218},
  doi          = {10.1109/TC.2014.2375218},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/TanJHNLH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ewsdn/ChemalamarriNN15,
  author       = {Vijaya Durga Chemalamarri and
                  Priyadarsi Nanda and
                  Karla Felix Navarro},
  title        = {{SYMPHONY} - {A} Controller Architecture for Hybrid Software Defined
                  Networks},
  booktitle    = {Fourth European Workshop on Software Defined Networks, {EWSDN} 2015,
                  Bilbao, Spain, September 30 - October 2, 2015},
  pages        = {55--60},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/EWSDN.2015.61},
  doi          = {10.1109/EWSDN.2015.61},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ewsdn/ChemalamarriNN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ica3pp/JohannesNH15,
  author       = {Adrian Johannes and
                  Priyadarsi Nanda and
                  Xiangjian He},
  editor       = {Guojun Wang and
                  Albert Y. Zomaya and
                  Gregorio Mart{\'{\i}}nez P{\'{e}}rez and
                  Kenli Li},
  title        = {Resource Utilization Based Dynamic Pricing Approach on Cloud Computing
                  Application},
  booktitle    = {Algorithms and Architectures for Parallel Processing - {ICA3PP} International
                  Workshops and Symposiums, Zhangjiajie, China, November 18-20, 2015,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9532},
  pages        = {669--677},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27161-3\_61},
  doi          = {10.1007/978-3-319-27161-3\_61},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ica3pp/JohannesNH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sin/SainiGLN15,
  author       = {Anil Saini and
                  Manoj Singh Gaur and
                  Vijay Laxmi and
                  Priyadarsi Nanda},
  editor       = {Oleg B. Makarevich and
                  Ron Poet and
                  Atilla El{\c{c}}i and
                  Manoj Singh Gaur and
                  Mehmet A. Orgun and
                  Ludmila K. Babenko and
                  Md. Sadek Ferdous and
                  Anthony T. S. Ho and
                  Vijay Laxmi and
                  Josef Pieprzyk},
  title        = {sandFOX: secure sandboxed and isolated environment for firefox browser},
  booktitle    = {Proceedings of the 8th International Conference on Security of Information
                  and Networks, {SIN} 2015, Sochi, Russian Federation, September 8-10,
                  2015},
  pages        = {20--27},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2799979.2800000},
  doi          = {10.1145/2799979.2800000},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sin/SainiGLN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AmbusaidiHN15,
  author       = {Mohammed A. Ambusaidi and
                  Xiangjian He and
                  Priyadarsi Nanda},
  title        = {Unsupervised Feature Selection Method for Intrusion Detection System},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {295--301},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.387},
  doi          = {10.1109/TRUSTCOM.2015.387},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/AmbusaidiHN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/JanNHL15,
  author       = {Mian Ahmad Jan and
                  Priyadarsi Nanda and
                  Xiangjian He and
                  Ren Ping Liu},
  title        = {A Sybil Attack Detection Scheme for a Centralized Clustering-Based
                  Hierarchical Network},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {318--325},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.390},
  doi          = {10.1109/TRUSTCOM.2015.390},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/JanNHL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/DangHN15,
  author       = {Thanh Dat Dang and
                  Doan B. Hoang and
                  Priyadarsi Nanda},
  title        = {Data Mobility Management Model for Active Data Cubes},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {750--757},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.443},
  doi          = {10.1109/TRUSTCOM.2015.443},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/DangHN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cloudcomp/TanNHNLWH14,
  author       = {Zhiyuan Tan and
                  Upasana T. Nagar and
                  Xiangjian He and
                  Priyadarsi Nanda and
                  Ren Ping Liu and
                  Song Wang and
                  Jiankun Hu},
  title        = {Enhancing Big Data Security with Collaborative Intrusion Detection},
  journal      = {{IEEE} Cloud Comput.},
  volume       = {1},
  number       = {3},
  pages        = {27--33},
  year         = {2014},
  url          = {https://doi.org/10.1109/MCC.2014.53},
  doi          = {10.1109/MCC.2014.53},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cloudcomp/TanNHNLWH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/JanNHL14,
  author       = {Mian Ahmad Jan and
                  Priyadarsi Nanda and
                  Xiangjian He and
                  Ren Ping Liu},
  title        = {{PASCCC:} Priority-based application-specific congestion control clustering
                  protocol},
  journal      = {Comput. Networks},
  volume       = {74},
  pages        = {92--102},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.comnet.2014.09.005},
  doi          = {10.1016/J.COMNET.2014.09.005},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/JanNHL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/HeCNT14,
  author       = {Xiangjian He and
                  Thawatchai Chomsiri and
                  Priyadarsi Nanda and
                  Zhiyuan Tan},
  title        = {Improving cloud network security using the Tree-Rule firewall},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {30},
  pages        = {116--126},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.future.2013.06.024},
  doi          = {10.1016/J.FUTURE.2013.06.024},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/HeCNT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipt/AmbusaidiTHNLJ14,
  author       = {Mohammed A. Ambusaidi and
                  Zhiyuan Tan and
                  Xiangjian He and
                  Priyadarsi Nanda and
                  Liang Fu Lu and
                  Aruna Jamdagni},
  title        = {Intrusion detection method based on nonlinear correlation measure},
  journal      = {Int. J. Internet Protoc. Technol.},
  volume       = {8},
  number       = {2/3},
  pages        = {77--86},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJIPT.2014.066377},
  doi          = {10.1504/IJIPT.2014.066377},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipt/AmbusaidiTHNLJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/TanJHNL14,
  author       = {Zhiyuan Tan and
                  Aruna Jamdagni and
                  Xiangjian He and
                  Priyadarsi Nanda and
                  Ren Ping Liu},
  title        = {A System for Denial-of-Service Attack Detection Based on Multivariate
                  Correlation Analysis},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {25},
  number       = {2},
  pages        = {447--456},
  year         = {2014},
  url          = {https://doi.org/10.1109/TPDS.2013.146},
  doi          = {10.1109/TPDS.2013.146},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tpds/TanJHNL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AmbusaidiHTNLN14,
  author       = {Mohammed A. Ambusaidi and
                  Xiangjian He and
                  Zhiyuan Tan and
                  Priyadarsi Nanda and
                  Liang Fu Lu and
                  Upasana T. Nagar},
  title        = {A Novel Feature Selection Approach for Intrusion Detection Data Classification},
  booktitle    = {13th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2014, Beijing, China, September
                  24-26, 2014},
  pages        = {82--89},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/TrustCom.2014.15},
  doi          = {10.1109/TRUSTCOM.2014.15},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/AmbusaidiHTNLN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ChomsiriHNT14,
  author       = {Thawatchai Chomsiri and
                  Xiangjian He and
                  Priyadarsi Nanda and
                  Zhiyuan Tan},
  title        = {A Stateful Mechanism for the Tree-Rule Firewall},
  booktitle    = {13th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2014, Beijing, China, September
                  24-26, 2014},
  pages        = {122--129},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/TrustCom.2014.20},
  doi          = {10.1109/TRUSTCOM.2014.20},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ChomsiriHNT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/JanNHTL14,
  author       = {Mian Ahmad Jan and
                  Priyadarsi Nanda and
                  Xiangjian He and
                  Zhiyuan Tan and
                  Ren Ping Liu},
  title        = {A Robust Authentication Scheme for Observing Resources in the Internet
                  of Things Environment},
  booktitle    = {13th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2014, Beijing, China, September
                  24-26, 2014},
  pages        = {205--211},
  publisher    = {{IEEE} Computer Society},
  year         = {2014},
  url          = {https://doi.org/10.1109/TrustCom.2014.31},
  doi          = {10.1109/TRUSTCOM.2014.31},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/JanNHTL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/JamdagniTHNL13,
  author       = {Aruna Jamdagni and
                  Zhiyuan Tan and
                  Xiangjian He and
                  Priyadarsi Nanda and
                  Ren Ping Liu},
  title        = {RePIDS: {A} multi tier Real-time Payload-based Intrusion Detection
                  System},
  journal      = {Comput. Networks},
  volume       = {57},
  number       = {3},
  pages        = {811--824},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.comnet.2012.10.002},
  doi          = {10.1016/J.COMNET.2012.10.002},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cn/JamdagniTHNL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijsnet/YuNCH13,
  author       = {Dong Yu and
                  Priyadarsi Nanda and
                  Longbing Cao and
                  Xiangjian He},
  title        = {{TCTM:} an evaluation framework for architecture design on wireless
                  sensor networks},
  journal      = {Int. J. Sens. Networks},
  volume       = {14},
  number       = {3},
  pages        = {168--177},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJSNET.2013.057517},
  doi          = {10.1504/IJSNET.2013.057517},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijsnet/YuNCH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpcc/JanNHL13,
  author       = {Mian Ahmad Jan and
                  Priyadarsi Nanda and
                  Xiangjian He and
                  Ren Ping Liu},
  title        = {Enhancing Lifetime and Quality of Data in Cluster-Based Hierarchical
                  Routing Protocol for Wireless Sensor Network},
  booktitle    = {10th {IEEE} International Conference on High Performance Computing
                  and Communications {\&} 2013 {IEEE} International Conference on
                  Embedded and Ubiquitous Computing, {HPCC/EUC} 2013, Zhangjiajie, China,
                  November 13-15, 2013},
  pages        = {1400--1407},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/HPCC.and.EUC.2013.198},
  doi          = {10.1109/HPCC.AND.EUC.2013.198},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hpcc/JanNHL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwcmc/Cruz-SanchezCSN13,
  author       = {Hugo Cruz{-}Sanchez and
                  Laurent Ciarletta and
                  Yeqiong Song and
                  Priyadarsi Nanda},
  editor       = {Roberto Saracco and
                  Khaled Ben Letaief and
                  Mario Gerla and
                  Sergio Palazzo and
                  Luigi Atzori},
  title        = {Routing scheme for a Wireless Sensor Network real-time locating system},
  booktitle    = {2013 9th International Wireless Communications and Mobile Computing
                  Conference, {IWCMC} 2013, Sardinia, Italy, July 1-5, 2013},
  pages        = {159--164},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/IWCMC.2013.6583552},
  doi          = {10.1109/IWCMC.2013.6583552},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwcmc/Cruz-SanchezCSN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wwic/JanNH13,
  author       = {Mian Ahmad Jan and
                  Priyadarsi Nanda and
                  Xiangjian He},
  editor       = {Vassilis Tsaoussidis and
                  Andreas J. Kassler and
                  Yevgeni Koucheryavy and
                  Abdelhamid Mellouk},
  title        = {Energy Evaluation Model for an Improved Centralized Clustering Hierarchical
                  Algorithm in {WSN}},
  booktitle    = {Wired/Wireless Internet Communication - 11th International Conference,
                  {WWIC} 2013, St. Petersburg, Russia, June 5-7, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7889},
  pages        = {154--167},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38401-1\_12},
  doi          = {10.1007/978-3-642-38401-1\_12},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wwic/JanNH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/idcs/ChomsiriHN12,
  author       = {Thawatchai Chomsiri and
                  Xiangjian He and
                  Priyadarsi Nanda},
  editor       = {Yang Xiang and
                  Mukaddim Pathan and
                  Xiaohui Tao and
                  Hua Wang},
  title        = {Limitation of Listed-Rule Firewall and the Design of Tree-Rule Firewall},
  booktitle    = {Internet and Distributed Computing Systems - 5th International Conference,
                  {IDCS} 2012, Wuyishan, Fujian, China, November 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7646},
  pages        = {275--287},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34883-9\_22},
  doi          = {10.1007/978-3-642-34883-9\_22},
  timestamp    = {Thu, 09 Mar 2023 09:06:05 +0100},
  biburl       = {https://dblp.org/rec/conf/idcs/ChomsiriHN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscit/MyintNH12,
  author       = {Hla Myint and
                  Priyadarsi Nanda and
                  Xiangjian He},
  title        = {Evaluation of billing and charging architecture for the Internet service
                  provisioning},
  booktitle    = {International Symposium on Communications and Information Technologies,
                  {ISCIT} 2012, Gold Coast, Australia, October 2-5, 2012},
  pages        = {895--900},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ISCIT.2012.6381030},
  doi          = {10.1109/ISCIT.2012.6381030},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iscit/MyintNH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isspit/HoangEMNSN12,
  author       = {Doan B. Hoang and
                  Doug Elliott and
                  Sharon McKinley and
                  Priyadarsi Nanda and
                  Jurgen Schulte and
                  Duc Nguyen},
  title        = {Tele-monitoring techniques to support recovery at home for survivors
                  of a critical illness},
  booktitle    = {{IEEE} International Symposium on Signal Processing and Information
                  Technology, {ISSPIT} 2012, Ho Chi Minh City, Vietnam, December 12-15,
                  2012},
  pages        = {101--106},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/ISSPIT.2012.6621268},
  doi          = {10.1109/ISSPIT.2012.6621268},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isspit/HoangEMNSN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securit/TanJNHL12,
  author       = {Zhiyuan Tan and
                  Aruna Jamdagni and
                  Priyadarsi Nanda and
                  Xiangjian He and
                  Ren Ping Liu},
  editor       = {R. Chandrasekhar and
                  Andrew S. Tanenbaum and
                  P. Venkat Rangan},
  title        = {Evaluation on multivariate correlation analysis based denial-of-service
                  attack detection system},
  booktitle    = {First International Conference on Security of Internet of Things,
                  {SECURIT} '12, Kollam, India - August 17 - 19, 2012},
  pages        = {160--164},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2490428.2490450},
  doi          = {10.1145/2490428.2490450},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/securit/TanJNHL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/TanJHNL12,
  author       = {Zhiyuan Tan and
                  Aruna Jamdagni and
                  Xiangjian He and
                  Priyadarsi Nanda and
                  Ren Ping Liu},
  editor       = {Geyong Min and
                  Yulei Wu and
                  Lei (Chris) Liu and
                  Xiaolong Jin and
                  Stephen A. Jarvis and
                  Ahmed Yassin Al{-}Dubai},
  title        = {Triangle-Area-Based Multivariate Correlation Analysis for Effective
                  Denial-of-Service Attack Detection},
  booktitle    = {11th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2012, Liverpool, United
                  Kingdom, June 25-27, 2012},
  pages        = {33--40},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/TrustCom.2012.284},
  doi          = {10.1109/TRUSTCOM.2012.284},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/TanJHNL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/MujtabaNH12,
  author       = {Muhammad Mujtaba and
                  Priyadarsi Nanda and
                  Xiangjian He},
  editor       = {Geyong Min and
                  Yulei Wu and
                  Lei (Chris) Liu and
                  Xiaolong Jin and
                  Stephen A. Jarvis and
                  Ahmed Yassin Al{-}Dubai},
  title        = {Border Gateway Protocol Anomaly Detection Using Failure Quality Control
                  Method},
  booktitle    = {11th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2012, Liverpool, United
                  Kingdom, June 25-27, 2012},
  pages        = {1239--1244},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/TrustCom.2012.100},
  doi          = {10.1109/TRUSTCOM.2012.100},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/MujtabaNH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/TanJHNL11,
  author       = {Zhiyuan Tan and
                  Aruna Jamdagni and
                  Xiangjian He and
                  Priyadarsi Nanda and
                  Ren Ping Liu},
  editor       = {Sihan Qing and
                  Willy Susilo and
                  Guilin Wang and
                  Dongmei Liu},
  title        = {Multivariate Correlation Analysis Technique Based on Euclidean Distance
                  Map for Network Traffic Characterization},
  booktitle    = {Information and Communications Security - 13th International Conference,
                  {ICICS} 2011, Beijing, China, November 23-26, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7043},
  pages        = {388--398},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25243-3\_31},
  doi          = {10.1007/978-3-642-25243-3\_31},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/TanJHNL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iconip/TanJHNL11,
  author       = {Zhiyuan Tan and
                  Aruna Jamdagni and
                  Xiangjian He and
                  Priyadarsi Nanda and
                  Ren Ping Liu},
  editor       = {Bao{-}Liang Lu and
                  Liqing Zhang and
                  James T. Kwok},
  title        = {Denial-of-Service Attack Detection Based on Multivariate Correlation
                  Analysis},
  booktitle    = {Neural Information Processing - 18th International Conference, {ICONIP}
                  2011, Shanghai, China, November 13-17, 2011, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7064},
  pages        = {756--765},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24965-5\_85},
  doi          = {10.1007/978-3-642-24965-5\_85},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iconip/TanJHNL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/snpd/MyintN11,
  author       = {Hla Myint and
                  Priyadarsi Nanda},
  editor       = {Morshed U. Chowdhury and
                  Sid Ray and
                  Roger Y. Lee},
  title        = {An Integrated Model Supporting Billing and {QOS} in the Internet},
  booktitle    = {12th {ACIS} International Conference on Software Engineering, Artificial
                  Intelligence, Networking, and Parallel {\&} Distributed Computing,
                  {SNPD} 2011, Sydney, Australia, July 6-8, 2011},
  pages        = {38--44},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SNPD.2011.22},
  doi          = {10.1109/SNPD.2011.22},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/snpd/MyintN11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/TanJHNLJY10,
  author       = {Zhiyuan Tan and
                  Aruna Jamdagni and
                  Xiangjian He and
                  Priyadarsi Nanda and
                  Ren Ping Liu and
                  Wenjing Jia and
                  Wei{-}Chang Yeh},
  editor       = {Miguel Soriano and
                  Sihan Qing and
                  Javier L{\'{o}}pez},
  title        = {A Two-Tier System for Web Attack Detection Using Linear Discriminant
                  Method},
  booktitle    = {Information and Communications Security - 12th International Conference,
                  {ICICS} 2010, Barcelona, Spain, December 15-17, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6476},
  pages        = {459--471},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17650-0\_32},
  doi          = {10.1007/978-3-642-17650-0\_32},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/TanJHNLJY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwcmc/JamdagniTNHL10,
  author       = {Aruna Jamdagni and
                  Zhiyuan Tan and
                  Priyadarsi Nanda and
                  Xiangjian He and
                  Ren Ping Liu},
  editor       = {Ahmed Helmy and
                  Peter Mueller and
                  Yan Zhang},
  title        = {Intrusion detection using {GSAD} model for {HTTP} traffic on web services},
  booktitle    = {Proceedings of the 6th International Wireless Communications and Mobile
                  Computing Conference, {IWCMC} 2010, Caen, France, June 28 - July 2,
                  2010},
  pages        = {1193--1197},
  publisher    = {{ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1815396.1815669},
  doi          = {10.1145/1815396.1815669},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwcmc/JamdagniTNHL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcns/NandaS09,
  author       = {Priyadarsi Nanda and
                  Andrew Simmonds},
  title        = {A Scalable Architecture Supporting QoS Guarantees Using Traffic Engineering
                  and Policy Based Routing in the Internet},
  journal      = {Int. J. Commun. Netw. Syst. Sci.},
  volume       = {2},
  number       = {7},
  pages        = {583--591},
  year         = {2009},
  url          = {https://doi.org/10.4236/ijcns.2009.27065},
  doi          = {10.4236/IJCNS.2009.27065},
  timestamp    = {Fri, 02 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcns/NandaS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fcst/JamdagniTNHL09,
  author       = {Aruna Jamdagni and
                  Zhiyuan Tan and
                  Priyadarsi Nanda and
                  Xiangjian He and
                  Ren Liu},
  title        = {Intrusion Detection Using Geometrical Structure},
  booktitle    = {Fourth International Conference on Frontier of Computer Science and
                  Technology, {FCST} 2009, Shanghai, China, 17-19 December, 2009},
  pages        = {327--333},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/FCST.2009.97},
  doi          = {10.1109/FCST.2009.97},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fcst/JamdagniTNHL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispa/TanHN09,
  author       = {Zhiyuan Tan and
                  Xiangjian He and
                  Priyadarsi Nanda},
  title        = {Web Service Locating Unit in RFID-Centric Anti-counterfeit System},
  booktitle    = {{IEEE} International Symposium on Parallel and Distributed Processing
                  with Applications, {ISPA} 2009, Chengdu, Sichuan, China, 10-12 August
                  2009},
  pages        = {389--393},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ISPA.2009.94},
  doi          = {10.1109/ISPA.2009.94},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispa/TanHN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csse/Nanda08,
  author       = {Priyadarsi Nanda},
  title        = {Supporting QoS Guarantees Using Traffic Engineering and Policy Based
                  Routing},
  booktitle    = {International Conference on Computer Science and Software Engineering,
                  {CSSE} 2008, Volume 3: Grid Computing / Distributed and Parallel Computing
                  / Information Security, December 12-14, 2008, Wuhan, China},
  pages        = {137--142},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/CSSE.2008.767},
  doi          = {10.1109/CSSE.2008.767},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csse/Nanda08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icds/NandaF07,
  author       = {Priyadarsi Nanda and
                  Rohan C. Fernandes},
  title        = {Quality of Service in Telemedicine},
  booktitle    = {First International Conference on the Digital Society {(ICDS} 2007),
                  2-6 January 2007, Guadeloupe, French Caribbean},
  pages        = {2},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICDS.2007.35},
  doi          = {10.1109/ICDS.2007.35},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icds/NandaF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cic/NandaS06,
  author       = {Priyadarsi Nanda and
                  Andrew James Simmonds},
  editor       = {Brian J. d'Auriol and
                  Hamid R. Arabnia and
                  Antonio Pescap{\`{e}}},
  title        = {Policy Based QoS Support using {BGP} Routing},
  booktitle    = {Proceedings of the 2006 International Conference on Communications
                  in Computing, {CIC} 2006, Las Vegas, Nevada, USA, June 26-29, 2006},
  pages        = {63--69},
  publisher    = {{CSREA} Press},
  year         = {2006},
  timestamp    = {Tue, 05 Dec 2006 13:00:12 +0100},
  biburl       = {https://dblp.org/rec/conf/cic/NandaS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic/NandaS03,
  author       = {Priyadarsi Nanda and
                  Andrew James Simmonds},
  editor       = {Hamid R. Arabnia and
                  Youngsong Mun},
  title        = {Policy Based Architecture for QoS over Differentiated Services Network},
  booktitle    = {Proceedings of the International Conference on Internet Computing,
                  {IC} '03, Las Vegas, Nevada, USA, June 23-26, 2003, Volume 2},
  pages        = {866--872},
  publisher    = {{CSREA} Press},
  year         = {2003},
  timestamp    = {Thu, 22 Sep 2005 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ic/NandaS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/interworking/SimmondsN02,
  author       = {Andrew James Simmonds and
                  Priyadarsi Nanda},
  editor       = {Chris McDonald},
  title        = {Resource Management in Differentiated Services Networks},
  booktitle    = {Converged Networking: Data and Real-time Communications over IP, {IFIP}
                  {TC6} / {WG6.2} Sixth International Symposium on Communications Interworking
                  (Interworking 2002), October 13-16, 2002, Perth, Western Australia},
  series       = {{IFIP} Conference Proceedings},
  volume       = {247},
  pages        = {313--323},
  publisher    = {Kluwer},
  year         = {2002},
  timestamp    = {Thu, 22 Sep 2005 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/interworking/SimmondsN02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/lcn/JhaHNA00,
  author       = {Sanjay K. Jha and
                  Mahbub Hassan and
                  Priyadarsi Nanda and
                  Nadeem Ahmed},
  title        = {Intra-domain Bandwidth Management in Differentiated Services Network},
  booktitle    = {Proceedings 27th Conference on Local Computer Networks, Tampa, Florida,
                  USA, 8-10 November, 2000},
  pages        = {326--327},
  publisher    = {{IEEE} Computer Society},
  year         = {2000},
  url          = {https://doi.org/10.1109/LCN.2000.891064},
  doi          = {10.1109/LCN.2000.891064},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/lcn/JhaHNA00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics