Decentralized access control with anonymous authentication of data stored in clouds S Ruj, M Stojmenovic, A Nayak IEEE transactions on parallel and distributed systems 25 (2), 384-394, 2013 | 392 | 2013 |
DACC: Distributed access control in clouds S Ruj, A Nayak, I Stojmenovic 2011IEEE 10th International Conference on Trust, Security and Privacy in …, 2011 | 378 | 2011 |
Taxonomy and challenges of the integration of RFID and wireless sensor networks H Liu, M Bolic, A Nayak, I Stojmenovic IEEE network 22 (6), 26-35, 2008 | 352* | 2008 |
A survey of communication protocols for automatic meter reading applications T Khalifa, K Naik, A Nayak IEEE communications surveys & tutorials 13 (2), 168-182, 2010 | 302 | 2010 |
Privacy preserving access control with authentication for securing data in clouds S Ruj, M Stojmenovic, A Nayak 2012 12th IEEE/ACM International symposium on cluster, cloud and grid …, 2012 | 281 | 2012 |
Intersection-based geographical routing protocol for VANETs: A proposal and analysis H Saleet, R Langar, K Naik, R Boutaba, A Nayak, N Goel IEEE transactions on vehicular technology 60 (9), 4560-4574, 2011 | 271 | 2011 |
Wireless sensor and actuator networks: algorithms and protocols for scalable coordination and data communication A Nayak, I Stojmenovic John Wiley & Sons, 2010 | 259 | 2010 |
DL‐IDS: a deep learning–based intrusion detection framework for securing IoT Y Otoum, D Liu, A Nayak Transactions on Emerging Telecommunications Technologies 33 (3), e3803, 2022 | 242 | 2022 |
On data-centric misbehavior detection in VANETs S Ruj, MA Cavenaghi, Z Huang, A Nayak, I Stojmenovic 2011 IEEE Vehicular Technology Conference (VTC Fall), 1-5, 2011 | 240 | 2011 |
Design guidelines for routing protocols in ad hoc and sensor networks with a realistic physical layer I Stojmenovic, A Nayak, J Kuruvila IEEE Communications Magazine 43 (3), 101-106, 2005 | 187 | 2005 |
A decentralized security framework for data aggregation and access control in smart grids S Ruj, A Nayak IEEE transactions on smart grid 4 (1), 196-205, 2013 | 185 | 2013 |
Hop count optimal position-based packet routing algorithms for ad hoc wireless networks with a realistic physical layer J Kuruvila, A Nayak, I Stojmenovic IEEE Journal on selected areas in communications 23 (6), 1267-1275, 2005 | 183 | 2005 |
Byzantine-resilient secure software-defined networks with multiple controllers in cloud H Li, P Li, S Guo, A Nayak IEEE Transactions on Cloud Computing 2 (4), 436-447, 2014 | 177 | 2014 |
A social network approach to trust management in VANETs Z Huang, S Ruj, MA Cavenaghi, M Stojmenovic, A Nayak Peer-to-peer networking and applications 7, 229-242, 2014 | 162 | 2014 |
Anonymous and lightweight authentication for secure vehicular networks B Ying, A Nayak IEEE Transactions on Vehicular Technology 66 (12), 10626-10636, 2017 | 155 | 2017 |
Fault-tolerant algorithms/protocols in wireless sensor networks H Liu, A Nayak, I Stojmenović Guide to wireless sensor networks, 261-291, 2009 | 147 | 2009 |
Characterization of cascading failures in interdependent cyber-physical systems Z Huang, C Wang, M Stojmenovic, A Nayak IEEE Transactions on Computers 64 (8), 2158-2168, 2014 | 125 | 2014 |
DTSG: Dynamic time-stable geocast routing in vehicular ad hoc networks H Rahbar, K Naik, A Nayak 2010 The 9th IFIP Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc …, 2010 | 119 | 2010 |
Modeling cascading failures in smart power grid using interdependent complex networks and percolation theory Z Huang, C Wang, S Ruj, M Stojmenovic, A Nayak 2013 IEEE 8th Conference on Industrial Electronics and Applications (ICIEA …, 2013 | 118 | 2013 |
As-ids: Anomaly and signature based ids for the internet of things Y Otoum, A Nayak Journal of Network and Systems Management 29 (3), 23, 2021 | 117 | 2021 |