Evaluation of web application security risks and secure design patterns AK Dalai, SK Jena Proceedings of the 2011 International Conference on Communication, Computing …, 2011 | 34 | 2011 |
Neutralizing SQL injection attack using server side code modification in web applications AK Dalai, SK Jena Security and Communication Networks 2017 (1), 3825373, 2017 | 29 | 2017 |
Wdtf: A technique for wireless device type fingerprinting AK Dalai, SK Jena Wireless Personal Communications 97 (2), 1911-1928, 2017 | 26 | 2017 |
Bcgeo: Blockchain-assisted geospatial web service for smart healthcare system SR Mallick, RK Lenka, V Goswami, S Sharma, AK Dalai, H Das, RK Barik IEEE Access 11, 58610-58623, 2023 | 18 | 2023 |
A code obfuscation technique to prevent reverse engineering AK Dalai, SS Das, SK Jena 2017 International Conference on Wireless Communications, Signal Processing …, 2017 | 16 | 2017 |
A fingerprinting technique for identification of wireless devices AK Dalai, A Jena, S Sharma, A Mohapatra, B Sahoo, MS Obaidat, ... 2018 International Conference on Computer, Information and Telecommunication …, 2018 | 13 | 2018 |
An ANN based approach for wireless device fingerprinting K Kumar, AK Dalai, SK Panigrahy, SK Jena 2017 2nd IEEE International Conference on Recent Trends in Electronics …, 2017 | 9 | 2017 |
Hybrid network intrusion detection systems: a decade’s perspective AK Dalai, SK Jena Proceedings of the International Conference on Signal, Networks, Computing …, 2017 | 9 | 2017 |
A novel approach for message authentication to prevent parameter tampering attack in web applications AK Dalai, SK Panigrahy, SK Jena Procedia engineering 38, 1495-1500, 2012 | 8 | 2012 |
IoT based V2I framework for accident prevention H Mohapatra, AK Dalai 2022 2nd international conference on artificial intelligence and signal …, 2022 | 7 | 2022 |
XSS attack prevention using DOM-based filter AK Dalai, SD Ankush, SK Jena Progress in Intelligent Computing Techniques: Theory, Practice, and …, 2018 | 6 | 2018 |
Intruder Identification in IEEE 802.11 Wireless Infrastructure Using Localization AK Dalai, SK Jena International Journal of Future Computer and Communication 3 (6), 372, 2014 | 5 | 2014 |
Efficient Energy Management by Using SJF Scheduling in Wireless Sensor Network H Mohapatra, M Kolhar, AK Dalai International Conference on Advances in Distributed Computing and Machine …, 2024 | 4 | 2024 |
Varying password based scheme for user authentication SK Sahu, AK Dalai, SK Jena Advanced Computing, Networking and Informatics-Volume 2: Wireless Networks …, 2014 | 3 | 2014 |
Supervised machine learning approaches for medical data classification AK Dalai, AK Jena, BV Ramana, B Maneesha, N Panda 2022 2nd International Conference on Artificial Intelligence and Signal …, 2022 | 2 | 2022 |
Forest combustion recognition using deep learning K Jahnavi, HK Kondaveeti, AK Dalai Intelligent Computing and Communication Systems, 279-289, 2021 | 2 | 2021 |
Component based web application firewall for analyzing and defending SQL injection attack vectors P Bisht, MS Rauthan, RK Bisht | 2 | 2014 |
Online identification of illegitimate web server requests AK Dalai, SK Jena Computer Networks and Intelligent Computing: 5th International Conference on …, 2011 | 2 | 2011 |
An Ensemble deep learning model for oral squamous cell carcinoma detection using histopathological image analysis M Das, R Dash, SK Mishra, AK Dalai IEEE Access, 2024 | 1 | 2024 |
Improved chaotic grey wolf optimization for training neural networks BV Ramana, N Panda, S Teja, H Mohapatra, AK Dalai, SK Majhi NIScPR-CSIR, India, 2023 | 1 | 2023 |