A survey on security and authentication in wireless body area networks B Narwal, AK Mohapatra Journal of Systems Architecture 113, 101883, 2021 | 103 | 2021 |
Towards a taxonomy of cyber threats against target applications B Narwal, AK Mohapatra, KA Usmani Journal of Statistics and Management Systems 22 (2), 301-325, 2019 | 48 | 2019 |
Cyber threat intelligence framework using advanced malware forensics YKAK Mohapatra International Journal of Information Technology, 1-10, 2019 | 42* | 2019 |
An insight into digital forensics branches and tools N Kumari, AK Mohapatra 2016 International Conference on Computational Techniques in Information and …, 2016 | 42 | 2016 |
SEEMAKA: Secured energy-efficient mutual authentication and key agreement scheme for wireless body area networks B Narwal, AK Mohapatra Wireless Personal Communications 113 (4), 1985-2008, 2020 | 39 | 2020 |
Digital image authentication model based on edge adaptive steganography N Grover, AK Mohapatra 2013 2nd International Conference on Advanced Computing, Networking and …, 2013 | 38 | 2013 |
Authentication protocols for wireless body area network with key management approach A Joshi, AK Mohapatra Journal of Discrete Mathematical Sciences and Cryptography 22 (2), 219-240, 2019 | 37 | 2019 |
SAMAKA: secure and anonymous mutual authentication and key agreement scheme for wireless body area networks B Narwal, AK Mohapatra Arabian Journal for Science and Engineering 46 (9), 9197-9219, 2021 | 34 | 2021 |
An insight into the security issues and their solutions for android phones A Khandelwal, AK Mohapatra 2015 2nd International Conference on Computing for Sustainable Global …, 2015 | 23 | 2015 |
A review on authentication protocols in wireless body area networks (WBAN) B Narwal, AK Mohapatra 2018 3rd International Conference on Contemporary Computing and Informatics …, 2018 | 21 | 2018 |
Analysis of software vulnerability classification based on different technical parameters S Garg, RK Singh, AK Mohapatra Information Security Journal: A Global Perspective 28 (1-2), 1-19, 2019 | 19 | 2019 |
Analysis and detection of ransomware through its delivery methods K Gangwar, S Mohanty, AK Mohapatra Data Science and Analytics: 4th International Conference on Recent …, 2018 | 17 | 2018 |
PSECAS: a physical unclonable function based secure authentication scheme for Internet of Drones M Sharma, B Narwal, R Anand, AK Mohapatra, R Yadav Computers and Electrical Engineering 108, 108662, 2023 | 16 | 2023 |
GeneMiner: a classification approach for detection of XSS attacks on web services C Gupta, RK Singh, AK Mohapatra Computational Intelligence and Neuroscience 2022 (1), 3675821, 2022 | 16 | 2022 |
A survey and classification of XML based attacks on web applications C Gupta, RK Singh, AK Mohapatra Information Security Journal: A Global Perspective 29 (4), 183-198, 2020 | 16 | 2020 |
A comprehensive and critical analysis of TLS 1.3 N Kumari, AK Mohapatra Journal of Information and Optimization Sciences 43 (4), 689-703, 2022 | 14 | 2022 |
SALMAKA: secured, anonymity preserving and lightweight mutual authentication and key agreement scheme for WBAN B Narwal, AK Mohapatra International Journal of Sensors Wireless Communications and Control 11 (4 …, 2021 | 14 | 2021 |
Performance analysis of QoS parameters during vertical handover process between Wi-Fi and WiMAX networks B Narwal, AK Mohapatra Data Science and Analytics: 4th International Conference on Recent …, 2018 | 12 | 2018 |
Energy efficient model for recovery from multiple nodes failure in wireless sensor networks V Jha, N Prakash, AK Mohapatra Wireless Personal Communications 108, 1459-1479, 2019 | 11 | 2019 |
Mitigation of Blackhole attack in MANET A Tripathi, AK Mohapatra 2016 8th International Conference on Computational Intelligence and …, 2016 | 11 | 2016 |