Follow
Asish Kumar Dalai
Asish Kumar Dalai
Vellore Institute of Technology AP University, India
Verified email at vitap.ac.in
Title
Cited by
Cited by
Year
Evaluation of web application security risks and secure design patterns
AK Dalai, SK Jena
Proceedings of the 2011 International Conference on Communication, Computing …, 2011
342011
Neutralizing SQL injection attack using server side code modification in web applications
AK Dalai, SK Jena
Security and Communication Networks 2017 (1), 3825373, 2017
292017
Wdtf: A technique for wireless device type fingerprinting
AK Dalai, SK Jena
Wireless Personal Communications 97 (2), 1911-1928, 2017
262017
Bcgeo: Blockchain-assisted geospatial web service for smart healthcare system
SR Mallick, RK Lenka, V Goswami, S Sharma, AK Dalai, H Das, RK Barik
IEEE Access 11, 58610-58623, 2023
182023
A code obfuscation technique to prevent reverse engineering
AK Dalai, SS Das, SK Jena
2017 International Conference on Wireless Communications, Signal Processing …, 2017
162017
A fingerprinting technique for identification of wireless devices
AK Dalai, A Jena, S Sharma, A Mohapatra, B Sahoo, MS Obaidat, ...
2018 International Conference on Computer, Information and Telecommunication …, 2018
132018
An ANN based approach for wireless device fingerprinting
K Kumar, AK Dalai, SK Panigrahy, SK Jena
2017 2nd IEEE International Conference on Recent Trends in Electronics …, 2017
92017
Hybrid network intrusion detection systems: a decade’s perspective
AK Dalai, SK Jena
Proceedings of the International Conference on Signal, Networks, Computing …, 2017
92017
A novel approach for message authentication to prevent parameter tampering attack in web applications
AK Dalai, SK Panigrahy, SK Jena
Procedia engineering 38, 1495-1500, 2012
82012
IoT based V2I framework for accident prevention
H Mohapatra, AK Dalai
2022 2nd international conference on artificial intelligence and signal …, 2022
72022
XSS attack prevention using DOM-based filter
AK Dalai, SD Ankush, SK Jena
Progress in Intelligent Computing Techniques: Theory, Practice, and …, 2018
62018
Intruder Identification in IEEE 802.11 Wireless Infrastructure Using Localization
AK Dalai, SK Jena
International Journal of Future Computer and Communication 3 (6), 372, 2014
52014
Efficient Energy Management by Using SJF Scheduling in Wireless Sensor Network
H Mohapatra, M Kolhar, AK Dalai
International Conference on Advances in Distributed Computing and Machine …, 2024
42024
Varying password based scheme for user authentication
SK Sahu, AK Dalai, SK Jena
Advanced Computing, Networking and Informatics-Volume 2: Wireless Networks …, 2014
32014
Supervised machine learning approaches for medical data classification
AK Dalai, AK Jena, BV Ramana, B Maneesha, N Panda
2022 2nd International Conference on Artificial Intelligence and Signal …, 2022
22022
Forest combustion recognition using deep learning
K Jahnavi, HK Kondaveeti, AK Dalai
Intelligent Computing and Communication Systems, 279-289, 2021
22021
Component based web application firewall for analyzing and defending SQL injection attack vectors
P Bisht, MS Rauthan, RK Bisht
22014
Online identification of illegitimate web server requests
AK Dalai, SK Jena
Computer Networks and Intelligent Computing: 5th International Conference on …, 2011
22011
An Ensemble deep learning model for oral squamous cell carcinoma detection using histopathological image analysis
M Das, R Dash, SK Mishra, AK Dalai
IEEE Access, 2024
12024
Improved chaotic grey wolf optimization for training neural networks
BV Ramana, N Panda, S Teja, H Mohapatra, AK Dalai, SK Majhi
NIScPR-CSIR, India, 2023
12023
The system can't perform the operation now. Try again later.
Articles 1–20