69 results on '"PUTHAL, DEEPAK"'
Search Results
2. LiDAR-based Building Damage Detection in Edge-Cloud Continuum
3. SECBlock-IIoT: A Secure Blockchain-enabled Edge Computing Framework for Industrial Internet of Things
4. Human-Centered Explainable AI at the Edge for eHealth
5. Revolutionizing Cyber Security: Exploring the Synergy of Machine Learning and Logical Reasoning for Cyber Threats and Mitigation
6. IoMT Synthetic Cardiac Arrest Dataset for eHealth with AI-based Validation
7. Fortified-Edge: Secure PUF Certificate Authentication Mechanism for Edge Data Centers in Collaborative Edge Computing
8. Machine Learning-based Adaptive Access Control Mechanism for Private Blockchain Storage
9. A Secure RPL Rank Computation and Distribution Mechanism for Preventing Sinkhole Attack in IoT-based Systems
10. PUF-based Authentication Scheme for Edge Data Centers in Collaborative Edge Computing
11. PharmaChain 3.0: Blockchain Integrated Efficient QR Code Mechanism for Pharmaceutical Supply Chain
12. AI-based Block Identification and Classification in the Blockchain Integrated IoT
13. PharmaChain 2.0: A Blockchain Framework for Secure Remote Monitoring of Drug Environmental Parameters in Pharmaceutical Cold Supply Chain
14. Secure and Scalable Collaborative Edge Computing using Decision Tree
15. Blockchain and Federated Learning-enabled Distributed Secure and Privacy-preserving Computing Architecture for IoT Network
16. Performance Analysis of Classifier Techniques at the Edge Node
17. International Workshop on Privacy, Security and Trust in Computational Intelligence (PSTCI2021)
18. Multilevel Color Image Segmentation using Modified Fuzzy Entropy and Cuckoo Search Algorithm
19. Visualization Approach for Malware Classification with ResNeXt
20. McPoRA: A Multi-chain Proof of Rapid Authentication for Post-Blockchain Based Security in Large Scale Complex Cyber-Physical Systems
21. Adaptive Software Defined Node Deployment for Green Internet of Things
22. Software Defined Wide-Area Networks Control Plane Scaling using Bayesian Game Model
23. Proof-of-Authentication Consensus Algorithm: Blockchain-based IoT Implementation
24. Data Aware Web-Assembly Function Placement
25. PMsec: PUF-Based Energy-Efficient Authentication of Devices in the Internet of Medical Things (IoMT)
26. PUFchain: Hardware-Assisted Scalable Blockchain
27. A Novel Multi-Path Anonymous Randomized Key Distribution Scheme for Geo Distributed Networks
28. Proof-of-Authentication for Scalable Blockchain in Resource-Constrained Distributed Systems
29. Probabilistic RSS Fingerprinting for Localization in Smart Platforms
30. VM Selection using DVFS Technique to Minimize Energy Consumption in Cloud System
31. S2R: Service Trading Based Response Time Optimization in Mobile Edge Computing
32. Secure Authentication Protocol for 5G Enabled IoT Network
33. Software Defined Network Based Fault Detection in Industrial Wireless Sensor Networks
34. Graph-Based Symmetric Crypto-System for Data Confidentiality
35. Building Scalable Mobile Edge Computing by Enhancing Quality of Services
36. A Comparative Study of Machine Learning Techniques for Credit Card Fraud Detection Based on Time Variance
37. Blockchain Based Secured Identity Authentication and Expeditious Revocation Framework for Vehicular Networks
38. First Score Auction for Pricing-Based Resource Selection in Vehicular Cloud
39. A Fingerprinting Technique for Identification of Wireless Devices
40. Introducing Network Multi-Tenancy for Cloud-Based Enterprise Resource Planning: An IoT Application
41. CTOM: Collaborative Task Offloading Mechanism for Mobile Cloudlet Networks
42. Stock market analysis using social networks
43. A Chain Topology for Efficient Monitoring of Food Grain Storage using Smart Sensors
44. A Novel Hybrid Authentication Model for Geo Location Oriented Routing in Dynamic Wireless Mesh Networks
45. Secure Authentication Protocol for IoT Architecture
46. An Overview of Security Challenges in Vehicular Ad-Hoc Networks
47. Self Deployment Based on Circle Packing Algorithm for Movement Assisted Wireless Sensor Networks
48. Fast Deformable Model for Pedestrian Detection with Haar-like features
49. Privacy-Preserving Detection of Statically Mutually Exclusive Roles Constraints Violation in Interoperable Role-Based Access Control
50. Secure-GLOR: An Adaptive Secure Routing Protocol for Dynamic Wireless Mesh Networks
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.