default search action
Sumita Mishra
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j8]Aditya Kumar Singh, Jyoti Grover, Sumita Mishra:
Integration of Blockchain in VANET Using gRPC for Privacy Preservation of Vehicles. SN Comput. Sci. 5(1): 110 (2024) - [j7]Gaurav S. Wagh, Sumita Mishra, Anurag Agarwal:
A Distributed Privacy-Preserving Framework With Integrity Verification Capabilities for Metering Data and Dynamic Billing in a Malicious Setting. IEEE Trans. Smart Grid 15(6): 5813-5825 (2024) - [c31]Lalitha Donga, Shreya Pramod, Sumita Mishra, Rajendra K. Raj:
A Proactive Digital Chain of Custody for Internet of Healthcare Things (IoHT) Data. ICHI 2024: 598-603 - 2023
- [j6]Pallavi Asthana, Sumita Mishra, Nishu Gupta, Mohammad Omar Derawi, Anil Kumar:
Prediction of Student's Performance With Learning Coefficients Using Regression Based Machine Learning Models. IEEE Access 11: 72732-72742 (2023) - [c30]Vijay Anand, Natalie A. Bolton, Prasad Calyam, Rohit Chadha, Rajendra K. Raj, Sumita Mishra:
Enhancing Computing Curricular Outcomes and Student Accomplishments Through Collegiate Competitions. CompEd (1) 2023: 22-28 - [c29]Gaurav S. Wagh, Sumita Mishra:
A distributed approach to privacy-preservation and integrity assurance of smart metering data. e-Energy 2023: 60-65 - [c28]Gaurav S. Wagh, Sumita Mishra:
SM-DIV: A Smart Metering Distributed privacy framework with Integrity Verification. ISGT 2023: 1-5 - 2022
- [c27]Lalitha Donga, Rajendra K. Raj, Sumita Mishra:
Internet of Healthcare Things (IoHT): Towards a Digital Chain of Custody. ICHI 2022: 524-526 - 2021
- [c26]Geoff Twardokus, Jaime Ponicki, Samantha Baker, Peter Carenzo, Hanif Rahbari, Sumita Mishra:
Targeted Discreditation Attack against Trust Management in Connected Vehicles. ICC 2021: 1-6 - [c25]Gaurav S. Wagh, Sumita Mishra:
Divide & Conquer: A Privacy Safeguarding Framework for the Smart Grid. ICC 2021: 1-6 - [c24]Asma Alnemari, Rajendra K. Raj, Carol J. Romanowski, Sumita Mishra:
Interactive Range Queries for Healthcare Data under Differential Privacy. ICHI 2021: 228-237 - 2020
- [c23]Gaurav S. Wagh, Sahil Gupta, Sumita Mishra:
A distributed privacy preserving framework for the Smart Grid. ISGT 2020: 1-5 - [c22]Gaurav S. Wagh, Sumita Mishra:
A cyber-resilient privacy framework for the smart grid with dynamic billing capabilities. SmartGridComm 2020: 1-6
2010 – 2019
- 2019
- [c21]Siddharth Dongre, Sumita Mishra, Carol J. Romanowski, Manan Buddhadev:
Quantifying the Costs of Data Breaches. Critical Infrastructure Protection 2019: 3-16 - [i8]Sumita Mishra, Naresh Kumar Chaudhary, Pallavi Asthana, Anil Kumar:
Deep 3D Convolutional Neural Network for Automated Lung Cancer Diagnosis. CoRR abs/1906.01054 (2019) - 2018
- [c20]Asma Alnemari, Suchith Arodi, Valentina Rodriguez Sosa, Soni Pandey, Carol J. Romanowski, Rajendra K. Raj, Sumita Mishra:
Protecting Infrastructure Data via Enhanced Access Control, Blockchain and Differential Privacy. Critical Infrastructure Protection 2018: 113-125 - [i7]Sachin Kumar, Sumita Mishra, Pallavi Asthana, Pragya:
Automated Detection of Acute Leukemia using K-mean Clustering Algorithm. CoRR abs/1803.08544 (2018) - [i6]Sachin Kumar, Sumita Mishra, Pooja Khanna, Pragya:
Precision Sugarcane Monitoring Using SVM Classifier. CoRR abs/1803.09413 (2018) - 2017
- [c19]Sumita Mishra, Rajendra K. Raj, Paul Tymann, Jamie Fagan, Sage Miller:
CyberCSP: Integrating cybersecurity into the computer science principles course. FIE 2017: 1-5 - [c18]Sachin Kumar, Sumita Mishra, Pooja Khanna, Pragya:
Precision Sugarcane Monitoring Using SVM Classifier. ITQM 2017: 881-887 - [c17]Yin Pan, Sumita Mishra, David I. Schwartz:
Gamifying Course Modules for Entry Level Students. SIGCSE 2017: 435-440 - 2016
- [c16]Sumita Mishra, Trudy Howles, Rajendra K. Raj, Carol J. Romanowski, Jennifer Schneider, Alicia McNett, Daryl J. Dates:
A modular approach to teaching critical infrastructure protection concepts to engineering, technology and computing students. FIE 2016: 1-7 - [c15]Suhair Alshehri, Sumita Mishra, Rajendra K. Raj:
Using Access Control to Mitigate Insider Threats to Healthcare Systems. ICHI 2016: 55-60 - [c14]Carol J. Romanowski, Rajendra K. Raj, Jennifer Schneider, Sumita Mishra, Bernard Brooks, Jessica Pardee, Bharat Bhole, Nikolaus Robalino:
A Multidisciplinary Predictive Model for Managing Critical Infrastructure Disruptions. Critical Infrastructure Protection 2016: 203-218 - [c13]Sabrina Afrin, Sumita Mishra:
An anonymized authentication framework for smart metering data privacy. ISGT 2016: 1-5 - 2015
- [j5]Carol J. Romanowski, Rajendra K. Raj, Jennifer Schneider, Sumita Mishra, Vinay Shivshankar, Srikant Ayengar, Fernando Cueva:
Regional response to large-scale emergency events: Building on historical data. Int. J. Crit. Infrastructure Prot. 11: 12-21 (2015) - [i5]Bushra Aloraini, Daryl Johnson, Bill Stackpole, Sumita Mishra:
A New Covert Channel over Cellular Voice Channel in Smartphones. CoRR abs/1504.05647 (2015) - 2014
- [i4]Sumita Mishra, Nidhi Mathur:
Load Balancing Optimization in LTE/LTE-A Cellular Networks: A Review. CoRR abs/1412.7273 (2014) - 2013
- [c12]Sumita Mishra, Carol J. Romanowski, Rajendra K. Raj, Trudy Howles, Jennifer Schneider:
A curricular framework for critical infrastructure protection education for engineering, technology and computing majors. FIE 2013: 1779-1781 - [i3]Sumita Mishra, Naresh K. Chaudhary, Kalyan Singh:
Overview of Optical Interconnect Technology. CoRR abs/1303.3954 (2013) - 2012
- [j4]Hasan Tuncer, Sumita Mishra, Nirmala Shenoy:
A survey of identity and handoff management approaches for the future Internet. Comput. Commun. 36(1): 63-79 (2012) - [c11]Hasan Tuncer, Nirmala Shenoy, Andres Kwasinski, John F. Hamilton, Sumita Mishra:
A novel user-centric handoff cost framework applied to the Virtual Mobility Domains and IPv6-based mobility protocols. GLOBECOM 2012: 2578-2584 - [c10]Yin Pan, Sumita Mishra, Bo Yuan, Bill Stackpole, David I. Schwartz:
Game-based forensics course for first year students. SIGITE Conference 2012: 13-18 - 2011
- [j3]Geethapriya Thamilarasu, Sumita Mishra, Ramalingam Sridhar:
Improving Reliability of Jamming Attack Detection in Ad hoc Networks. Int. J. Commun. Networks Inf. Secur. 3(1) (2011) - [i2]Sumita Mishra, Naresh K. Chaudhary, Kalyan Singh:
Simulation and Optimization of MQW based optical modulator for on chip optical interconnect. CoRR abs/1109.6550 (2011) - [i1]Sumita Mishra:
A Novel comprehensive method for real time Video Motion Detection Surveillance. CoRR abs/1109.6840 (2011) - 2010
- [j2]Erik F. Golen, Sumita Mishra, Nirmala Shenoy:
An underwater sensor allocation scheme for a range dependent environment. Comput. Networks 54(3): 404-415 (2010) - [c9]David Pearson, Sumita Mishra, Yin Pan:
Security Attacks And Defenses In Sensor Networks. Security and Management 2010: 286-292 - [c8]Erik F. Golen, Sumita Mishra, Nirmala Shenoy:
On the effects of deployment imprecision on underwater sensor connectivity. WUWNet 2010: 17
2000 – 2009
- 2009
- [c7]Tae H. Oh, Sumita Mishra, Yin Pan:
Teaching high-assurance internet protocol encryption (haipe) using opnet modeler simulation tool. SIGITE Conference 2009: 161-165 - 2005
- [c6]V. Natarajan, Aruna Balasubramanian, Sumita Mishra, Ramalingam Sridhar:
Security for Energy Constrained RFID System. AutoID 2005: 181-186 - [c5]Geethapriya Thamilarasu, Aruna Balasubramanian, Sumita Mishra, Ramalingam Sridhar:
A cross-layer based intrusion detection approach for wireless ad hoc networks. MASS 2005 - [c4]Aruna Balasubramanian, Sumita Mishra, Ramalingam Sridhar:
Analysis of a hybrid key management solution for ad hoc networks. WCNC 2005: 2082-2087 - 2003
- [j1]Ranjani Sridharan, Ramalingam Sridhar, Sumita Mishra:
A robust header compression technique for wireless Ad hoc networks. ACM SIGMOBILE Mob. Comput. Commun. Rev. 7(3): 23-24 (2003) - 2002
- [c3]Evsen Yanmaz, Ozan K. Tonguz, Sumita Mishra, Hongyi Wu, Chunming Qiao:
Impact of the number of ISM-band ad hoc relay channels on the performance of iCAR systems. VTC Spring 2002: 1492-1496
1990 – 1999
- 1999
- [c2]Ozan K. Tonguz, Sumita Mishra, R. Josyula, D. M. Grasso:
Impact of random user motion on locating subscribers in mobile networks. ICC 1999: 1746-1750 - 1995
- [c1]Hanwook Jung, Sumita Mishra, Ozan K. Tonguz:
Efficient location management in PCS. PIMRC 1995: 284-288
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-14 21:00 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint