Attack graph—Based vulnerability assessment of rank property in RPL-6LOWPAN in IoT R Sahay, G Geethakumari, K Modugu 2018 IEEE 4th World Forum on Internet of Things (WF-IoT), 308-313, 2018 | 62 | 2018 |
A novel blockchain based framework to secure IoT-LLNs against routing attacks R Sahay, G Geethakumari, B Mitra Computing 102 (11), 2445-2470, 2020 | 61 | 2020 |
Efficient framework for detection of version number attack in Internet of Things R Sahay, G Geethakumari, B Mitra, I Sahoo Intelligent Systems Design and Applications: 18th International Conference …, 2020 | 27 | 2020 |
A novel network partitioning attack against routing protocol in internet of things R Sahay, G Geethakumari, B Mitra Ad Hoc Networks 121, 102583, 2021 | 25 | 2021 |
Mitigating the worst parent attack in RPL based internet of things R Sahay, G Geethakumari, B Mitra Cluster Computing 25 (2), 1303-1320, 2022 | 22 | 2022 |
Exponential smoothing based approach for detection of blackhole attacks in IoT R Sahay, G Geethakumari, B Mitra, V Thejas 2018 IEEE International Conference on Advanced Networks and …, 2018 | 20 | 2018 |
A holistic framework for prediction of routing attacks in IoT-LLNs R Sahay, G Geethakumari, B Mitra The Journal of Supercomputing 78 (1), 1409-1433, 2022 | 12 | 2022 |
Investigating packet dropping attacks in RPL-DODAG in IoT R Sahay, G Geethakumari, B Mitra, N Goyal 2019 IEEE 5th International Conference for Convergence in Technology (I2CT), 1-5, 2019 | 12 | 2019 |
A feedforward neural network based model to predict sub-optimal path attack in IoT-LLNs R Sahay, G Geethakumari, B Mitra 2020 20th IEEE/ACM International Symposium on Cluster, Cloud and Internet …, 2020 | 7 | 2020 |
Traffic convergence detection in IoT LLNs: a multilayer perceptron based mechanism R Sahay, G Geethakumari, K Modugu, B Mitra 2018 IEEE symposium series on computational intelligence (SSCI), 1715-1722, 2018 | 7 | 2018 |
Routing attack induced anomaly detection in IoT network using RBM-LSTM R Sahay, A Nayyar, RK Shrivastava, M Bilal, SP Singh, S Pack ICT Express 10 (3), 459-464, 2024 | 5 | 2024 |
Optimizing elliptic curve domain parameters using genetic algorithms VSS Sriram, R Ramadas, R Sahay, G Sahoo International Journal of Secure Digital Information Age 1 (2), 2009 | 3 | 2009 |
LIRAD: lightweight tree-based approaches on resource constrained IoT devices for attack detection S Mishra, T Anithakumari, R Sahay, RK Shrivastava, SN Mohanty, ... Cluster Computing 28 (2), 1-23, 2025 | 2 | 2025 |
Partitioning Attacks Against RPL in the Internet of Things Environment R Sahay, G Geethakumari, B Mitra Edge Analytics: Select Proceedings of 26th International Conference—ADCOM …, 2022 | 2 | 2022 |
Federated Learning-based Techniques for Healthcare IoV: Challenges and Future Directions -A Knowledge Review P Narsimhulu, R Sahay 2024 IEEE 9th International Conference for Convergence in Technology (I2CT), 2024 | 1 | 2024 |
Correction: Mitigating the worst parent attack in RPL based internet of things. R Sahay, G Geethakumari, B Mitra Clust. Comput. 25 (5), 3765, 2022 | 1 | 2022 |
IB-RPL: embedding isolation and blacklisting of malicious nodes in RPL for securing IoT-LLNs R Sahay, G Geethakumari, B Mitra 2021 IEEE International Conference on Advanced Networks and …, 2021 | 1 | 2021 |
An imitated human motion optimal b-spline path of a biped robot using genetic algorithm R Sahay, A Kumar, AD Udai, AN Sinha Proceedings of All India Seminar on Advances in Product Development (APD …, 2006 | 1 | 2006 |
Optimal Transportation System Based on Adaptive Federated Learning Techniques for Healthcare IoV (HIoV) P Narsimhulu, R Sahay, P Chithaluru Unmanned Aircraft Systems, 563-608, 2024 | | 2024 |
A Comparative Analysis of Deep Learning Algorithms for Intrusion Detection in IoT CG Sushant, VL Ajay, R Sahay 2024 International Conference on Emerging Techniques in Computational …, 2024 | | 2024 |