A survey on security and privacy issues of bitcoin M Conti, ES Kumar, C Lal, S Ruj IEEE communications surveys & tutorials 20 (4), 3416-3452, 2018 | 1341 | 2018 |
Blockchain-enabled secure energy trading with verifiable fairness in industrial Internet of Things M Li, D Hu, C Lal, M Conti, Z Zhang IEEE Transactions on Industrial Informatics 16 (10), 6564-6574, 2020 | 199 | 2020 |
SAFETY: Early detection and mitigation of TCP SYN flood utilizing entropy in SDN P Kumar, M Tripathi, A Nehra, M Conti, C Lal IEEE Transactions on Network and Service Management 15 (4), 1545-1559, 2018 | 183 | 2018 |
LEChain: A blockchain-based lawful evidence management scheme for digital forensics M Li, C Lal, M Conti, D Hu Future Generation Computer Systems 115, 406-420, 2021 | 134 | 2021 |
Anomaly based network intrusion detection for IoT attacks using deep learning technique B Sharma, L Sharma, C Lal, S Roy Computers and Electrical Engineering 107, 108626, 2023 | 126 | 2023 |
Internet-of-Forensic (IoF): A blockchain based digital forensics framework for IoT applications G Kumar, R Saha, C Lal, M Conti Future Generation Computer Systems 120, 13-25, 2021 | 100 | 2021 |
Toward the development of secure underwater acoustic networks C Lal, R Petroccia, K Pelekanakis, M Conti, J Alves IEEE Journal of Oceanic Engineering 42 (4), 1075-1087, 2017 | 90 | 2017 |
Anomaly detection techniques using deep learning in IoT: a survey B Sharma, L Sharma, C Lal 2019 International conference on computational intelligence and knowledge …, 2019 | 83 | 2019 |
A survey on software-defined VANETs: benefits, challenges, and future directions WB Jaballah, M Conti, C Lal arXiv preprint arXiv:1904.04577, 2019 | 81 | 2019 |
LiDL: Localization with early detection of sybil and wormhole attacks in IoT networks P Kaliyar, WB Jaballah, M Conti, C Lal Computers & Security 94, 101849, 2020 | 79 | 2020 |
Explainable artificial intelligence for intrusion detection in IoT networks: A deep learning based approach B Sharma, L Sharma, C Lal, S Roy Expert Systems with Applications 238, 121751, 2024 | 76 | 2024 |
Security and design requirements for software-defined VANETs WB Jaballah, M Conti, C Lal Computer Networks 169, 107099, 2020 | 73 | 2020 |
Reliable and secure data transfer in IoT networks SP Gochhayat, C Lal, L Sharma, DP Sharma, D Gupta, JAM Saucedo, ... Wireless Networks 26 (8), 5689-5702, 2020 | 66 | 2020 |
A survey on blockchain for healthcare: Challenges, benefits, and future directions MS Arbabi, C Lal, NR Veeraragavan, D Marijan, JF Nygård, R Vitenberg IEEE communications surveys & tutorials 25 (1), 386-424, 2022 | 64 | 2022 |
A node-disjoint multipath routing method based on AODV protocol for MANETs C Lal, V Laxmi, MS Gaur 2012 IEEE 26th International Conference on Advanced Information Networking …, 2012 | 62 | 2012 |
Secure underwater acoustic networks: Current and future research directions C Lal, R Petroccia, M Conti, J Alves 2016 IEEE third underwater communications and networking conference (UComms …, 2016 | 61 | 2016 |
The road ahead for networking: A survey on icn-ip coexistence solutions M Conti, A Gangwal, M Hassan, C Lal, E Losiouk IEEE Communications Surveys & Tutorials 22 (3), 2104-2129, 2020 | 58 | 2020 |
Anonymous and verifiable reputation system for E-commerce platforms based on blockchain M Li, L Zhu, Z Zhang, C Lal, M Conti, M Alazab IEEE Transactions on Network and Service Management 18 (4), 4434-4449, 2021 | 57 | 2021 |
JellyFish attack: Analysis, detection and countermeasure in TCP-based MANET V Laxmi, C Lal, MS Gaur, D Mehta Journal of Information Security and Applications 22, 99-112, 2015 | 57 | 2015 |
Eunomia: Anonymous and secure vehicular digital forensics based on blockchain M Li, Y Chen, C Lal, M Conti, M Alazab, D Hu IEEE Transactions on Dependable and Secure Computing 20 (1), 225-241, 2021 | 51 | 2021 |