A lightweight Sybil attack detection framework for Wireless Sensor Networks PR Vamsi, K Kant 2014 Seventh International Conference on Contemporary Computing (IC3),, 2014 | 30 | 2014 |
Systematic design of trust management systems for wireless sensor networks: A review K Kant 2014 Fourth International Conference on Advanced Computing & Communication …, 2014 | 27 | 2014 |
Trust and location-aware routing protocol for wireless sensor networks PR Vamsi, K Kant IETE Journal of Research 62 (5), 634-644, 2016 | 24 | 2016 |
Sybil attack detection using sequential hypothesis testing in wireless sensor networks PR Vamsi, K Kant 2014 International Conference on Signal Propagation and Computer Technology …, 2014 | 20 | 2014 |
Machine learning based hybrid model for fault detection in wireless sensors data PR Vamsi, A Chahuan EAI Endorsed Transactions on Scalable Information Systems 7 (24), e6-e6, 2020 | 17 | 2020 |
DETECTING SYBIL ATTACKS IN WIRELESS SENSOR NETWORKS USING SEQUENTIAL ANALYSIS PR Vamsi, K Kant International Journal on Smart Sensing and Intelligent Systems 9 (2), 651-680, 2016 | 16 | 2016 |
Secure Data Aggregation and Intrusion Detection in Wireless Sensor Networks PR Vamsi, K Krishna 2015 International Conference on Signal Processing and Communicaitons, 2015 | 15 | 2015 |
An improved trusted greedy perimeter stateless routing for wireless sensor networks PR Vamsi, K Kant International Journal of Computer Network and Information Security 6 (11), 13, 2014 | 15 | 2014 |
BT-GPSR: an integrated trust model for secure geographic routing in Wireless Sensor Networks PR Vamsi, PK Batra, K Kant 2014 Students Conference on Engineering and Systems, 1-6, 2014 | 15 | 2014 |
Self Adaptive Trust Model for Secure Geographic Routing in Wireless Sensor Networks PR Vamsi, K Kant International Journal of Intelligent Systems and Applications 7 (3), 21-28, 2015 | 13 | 2015 |
Generalized trust model for cooperative routing in MANETs PR Vamsi, K Kant Wireless Personal Communications 97 (3), 4385-4412, 2017 | 11 | 2017 |
A Review on Web Application Vulnerability Assessment and Penetration Testing U Ravindran, RV Potukuchi Review of Computer Engineering Studies 9 (1), 1-22, 2022 | 9 | 2022 |
An Analysis of Intrusion Detection Classification using Supervised Machine Learning Algorithms on NSL-KDD Dataset S Rastogi, A Shrotriya, MK Singh, PR Vamsi Journal of Computing Research and Innovation (JCRINN) 7 (1), 124-137, 2022 | 8 | 2022 |
A secure blockchain based finance application U Ravindran, PR Vamsi Proceedings of the 2021 Thirteenth International Conference on Contemporary …, 2021 | 8 | 2021 |
Performance analysis of range free localization methods for wireless sensor networks PRV A. Dwivedi 2017 4th International Conference on Signal Processing, Computing and …, 2017 | 8 | 2017 |
Practical security testing of electronic commerce web applications PR Vamsi, A Jain International Journal of Advanced Networking and Applications 13 (1), 4861-4873, 2021 | 6 | 2021 |
Trust aware cooperative routing method for WANETs PR Vamsi, K Kant Security and Communication Networks 9 (18), 6189-6201, 2016 | 6 | 2016 |
A Taxonomy of Key Management Schemes of Wireless Sensor Networks PR Vamsi, K Kant 5th International Conference on Advanced Computing & Communication …, 2015 | 6 | 2015 |
Adaptive trust model for secure geographic routing in wireless sensor networks PR Vamsi, K Kant 2014 Seventh International Conference on Contemporary Computing (IC3), 394-399, 2014 | 6 | 2014 |
DV-HOP based hybrid range-free localization methods for wireless sensor networks A Dwivedi, PR Vamsi Futuristic Trends in Network and Communication Technologies: First …, 2019 | 5 | 2019 |