Embedded security for Internet of Things A Ukil, J Sen, S Koilakonda 2011 2nd National Conference on Emerging Trends and Applications in Computer …, 2011 | 153 | 2011 |
Wireless sensor networks: Current status and future trends S Khan, ASK Pathan, NA Alrajeh CRC press, 2016 | 143 | 2016 |
A mechanism for detection of cooperative black hole attack in mobile ad hoc networks J Sen, S Koilakonda, A Ukil 2011 Second International Conference on Intelligent Systems, Modelling and …, 2011 | 113 | 2011 |
Iot-privacy: To be private or not to be private A Ukil, S Bandyopadhyay, A Pal Computer Communications Workshops (INFOCOM WKSHPS), 2014 IEEE Conference on …, 2014 | 99 | 2014 |
IoT healthcare analytics: The importance of anomaly detection A Ukil, S Bandyoapdhyay, C Puri, A Pal 2016 IEEE 30th international conference on advanced information networking …, 2016 | 78 | 2016 |
Identifying normal, AF and other abnormal ECG rhythms using a cascaded binary classifier S Datta, C Puri, A Mukherjee, R Banerjee, AD Choudhury, R Singh, A Ukil, ... 2017 Computing in cardiology (cinc), 1-4, 2017 | 71 | 2017 |
Sequential command processing mode in a disc drive using command queuing C Baum, M Bosnich US Patent App. 10/172,528, 2003 | 45 | 2003 |
Lightweight security scheme for vehicle tracking system using CoAP A Ukil, S Bandyopadhyay, A Bhattacharyya, A Pal Proceedings of the International Workshop on Adaptive Security, 1-8, 2013 | 43 | 2013 |
Privacy for IoT: Involuntary privacy enablement for smart energy systems A Ukil, S Bandyopadhyay, A Pal 2015 IEEE International Conference on Communications (ICC), 536-541, 2015 | 41 | 2015 |
IoT data compression: Sensor-agnostic approach A Ukil, S Bandyopadhyay, A Pal 2015 data compression conference, 303-312, 2015 | 40 | 2015 |
A security framework in cloud computing infrastructure A Ukil, D Jana, A De Sarkar International Journal of Network Security & Its Applications 5 (5), 11, 2013 | 36 | 2013 |
Negotiation-based privacy preservation scheme in internet of things platform A Ukil, S Bandyopadhyay, J Joseph, V Banahatti, S Lodha Proceedings of the First International Conference on Security of Internet of …, 2012 | 35 | 2012 |
An adaptable and QoS-aware routing protocol for Wireless Sensor Networks J Sen, A Ukil 2009 1st International Conference on Wireless Communication, Vehicular …, 2009 | 35 | 2009 |
Lightweight security scheme for IoT applications using CoAP A Ukil, S Bandyopadhyay, A Bhattacharyya, A Pal, T Bose International Journal of Pervasive Computing and Communications, 2014 | 30 | 2014 |
iCarMa: Inexpensive Cardiac Arrhythmia Management--An IoT Healthcare Analytics Solution C Puri, A Ukil, S Bandyopadhyay, R Singh, A Pal, K Mandana Proceedings of the first workshop on IoT-enabled healthcare and wellness …, 2016 | 26 | 2016 |
LESS: Lightweight establishment of secure session: A cross-layer approach using CoAP and DTLS-PSK channel encryption A Bhattacharyya, T Bose, S Bandyopadhyay, A Ukil, A Pal 2015 IEEE 29th international conference on advanced information networking …, 2015 | 23 | 2015 |
Sensitivity inspector: Detecting privacy in smart energy applications A Ukil, S Bandyopadhyay, A Pal 2014 IEEE Symposium on Computers and Communications (ISCC), 1-6, 2014 | 23 | 2014 |
Privacy preserving data aggregation in wireless sensor networks A Ukil 2010 6th International Conference on Wireless and Mobile Communications, 435-440, 2010 | 22 | 2010 |
A distributed intrusion detection system for wireless ad hoc networks J Sen, A Ukil, D Bera, A Pal 2008 16th IEEE International Conference on Networks, 1-6, 2008 | 22 | 2008 |
Secure trust management in distributed computing systems A Ukil 2011 Sixth IEEE International Symposium on Electronic Design, Test and …, 2011 | 21 | 2011 |