Analytical model for sybil attack phases in internet of things AK Mishra, AK Tripathy, D Puthal, LT Yang IEEE Internet of Things Journal 6 (1), 379-387, 2018 | 113 | 2018 |
Performance comparison and analysis of slowloris, goldeneye and xerxes ddos attack tools T Shorey, D Subbaiah, A Goyal, A Sakxena, AK Mishra 2018 International Conference on Advances in Computing, Communications and …, 2018 | 69 | 2018 |
Smart lighting: Intelligent and weather adaptive lighting in street lights using IOT AK Tripathy, AK Mishra, TK Das 2017 International Conference on Intelligent Computing, Instrumentation and …, 2017 | 57 | 2017 |
A comparative analysis of node replica detection schemes in wireless sensor networks AK Mishra, AK Turuk Journal of Network and Computer Applications 61, 21-32, 2016 | 35 | 2016 |
An enhancement of PEGASIS protocol with improved network lifetime for wireless sensor networks AK Mishra, RU Rahman, R Bharadwaj, R Sharma 2015 IEEE Power, Communication and Information Technology Conference (PCITC …, 2015 | 31 | 2015 |
A modified Adaptive-SAODV prototype for performance enhancement in MANET AK Mishra, B Sahoo | 28 | 2009 |
Adversary information gathering model for node capture attack in wireless sensor networks AK Mishra, AK Turuk 2011 international conference on devices and communications (ICDeCom), 1-5, 2011 | 27 | 2011 |
Optical character recognition using artificial neural network TK Das, AK Tripathy, AK Mishra 2017 International Conference on Computer Communication and Informatics …, 2017 | 26 | 2017 |
A zone-based node replica detection scheme for wireless sensor networks AK Mishra, AK Turuk Wireless personal communications 69, 601-621, 2013 | 19 | 2013 |
Exquisite analysis of popular machine learning–based phishing detection techniques for cyber systems M Das, S Saraswathi, R Panda, AK Mishra, AK Tripathy Journal of Applied Security Research 16 (4), 538-562, 2021 | 17 | 2021 |
Comparison of Nikto and Uniscan for measuring URL vulnerability N Karangle, AK Mishra, DA Khan 2019 10th International Conference on Computing, Communication and …, 2019 | 12 | 2019 |
Hybrid mode of operations for rpl in iot: A systematic survey AK Mishra, O Singh, A Kumar, D Puthal IEEE Transactions on Network and Service Management 19 (3), 3574-3586, 2022 | 11 | 2022 |
GraphCrypto: Next generation data security approach towards sustainable smart city building AK Mishra, D Puthal, AK Tripathy Sustainable Cities and Society 72, 103056, 2021 | 10 | 2021 |
A replica detection scheme based on the deviation in distance traveled sliding window for wireless sensor networks AK Mishra, AK Tripathy, A Kumar, AK Turuk Wireless Communications and Mobile Computing 2017 (1), 8457616, 2017 | 9 | 2017 |
A dynamic energy-efficient chain formation scheme for PEGASIS in wireless sensor networks AK Mishra, MK Samantara 2016 2nd international conference on computational intelligence and networks …, 2016 | 9 | 2016 |
A novel logo identification technique for logo-based phishing detection in cyber-physical systems P Panda, AK Mishra, D Puthal Future Internet 14 (8), 241, 2022 | 8 | 2022 |
Performance-based comparative analysis of open source vulnerability testing tools for web database applications AK Mishra, A Kumar 2020 11th International Conference on Computing, Communication and …, 2020 | 7 | 2020 |
Residual energy‐based replica detection scheme for mobile wireless sensor networks AK Mishra, AK Turuk Security and Communication Networks 8 (4), 637-648, 2015 | 7 | 2015 |
A chain topology for efficient monitoring of food grain storage using smart sensors AK Mishra, AK Tripathy, MS Obaidat, Z Tan, M Prasad, B Sadoun, ... Proceedings of the 15th International Joint Conference on e-Business and …, 2018 | 6 | 2018 |
Hybrid mode of operation schemes for p2p communication to analyze end-point individual behaviour in iot AK Mishra, O Singh, A Kumar, D Puthal, PK Sharma, B Pradhan ACM Transactions on Sensor Networks 19 (2), 1-23, 2022 | 5 | 2022 |