A survey on security and privacy issues of bitcoin M Conti, ES Kumar, C Lal, S Ruj IEEE Communications Surveys & Tutorials 20 (4), 3416-3452, 2018 | 502 | 2018 |
A node-disjoint multipath routing method based on AODV protocol for MANETs C Lal, V Laxmi, MS Gaur 2012 IEEE 26th International Conference on Advanced Information Networking …, 2012 | 52 | 2012 |
SAFETY: Early detection and mitigation of TCP SYN flood utilizing entropy in SDN P Kumar, M Tripathi, A Nehra, M Conti, C Lal IEEE Transactions on Network and Service Management 15 (4), 1545-1559, 2018 | 44 | 2018 |
JellyFish attack: Analysis, detection and countermeasure in TCP-based MANET V Laxmi, C Lal, MS Gaur, D Mehta Journal of Information Security and Applications 22, 99-112, 2015 | 41 | 2015 |
Toward the development of secure underwater acoustic networks C Lal, R Petroccia, K Pelekanakis, M Conti, J Alves IEEE Journal of Oceanic Engineering 42 (4), 1075-1087, 2017 | 36 | 2017 |
Secure underwater acoustic networks: Current and future research directions C Lal, R Petroccia, M Conti, J Alves 2016 IEEE third underwater communications and networking conference (UComms …, 2016 | 35 | 2016 |
A survey on software-defined VANETs: benefits, challenges, and future directions WB Jaballah, M Conti, C Lal arXiv preprint arXiv:1904.04577, 2019 | 29 | 2019 |
Performance analysis of MANET routing protocols for multimedia traffic C Lal, V Laxmi, MS Gaur 2011 2nd International Conference on Computer and Communication Technology …, 2011 | 29 | 2011 |
Blockchain-enabled secure energy trading with verifiable fairness in industrial internet of things M Li, D Hu, C Lal, M Conti, Z Zhang IEEE Transactions on Industrial Informatics 16 (10), 6564-6574, 2020 | 27 | 2020 |
REMI: a reliable and secure multicast routing protocol for IoT networks M Conti, P Kaliyar, C Lal Proceedings of the 12th International Conference on Availability …, 2017 | 27 | 2017 |
Bandwidth-aware routing and admission control for efficient video streaming over MANETs C Lal, V Laxmi, MS Gaur, SB Ko Wireless Networks 21 (1), 95-114, 2015 | 26 | 2015 |
Reliable and secure data transfer in IoT networks SP Gochhayat, C Lal, L Sharma, DP Sharma, D Gupta, JAM Saucedo, ... Wireless Networks, 1-14, 2019 | 16 | 2019 |
Impact analysis of JellyFish attack on TCP-based mobile ad-hoc networks V Laxmi, D Mehta, MS Gaur, P Faruki, C Lal Proceedings of the 6th International Conference on Security of Information …, 2013 | 16 | 2013 |
SLDP: A secure and lightweight link discovery protocol for software defined networking A Nehra, M Tripathi, MS Gaur, RB Battula, C Lal Computer Networks 150, 102-116, 2019 | 15 | 2019 |
Enhancing QoE for video streaming in MANETs via multi-constraint routing Chhagan, Vijay Laxmi, Manoj, Mauro Conti Wireless Networks, 1-19, 2016 | 15* | 2016 |
CENSOR: Cloud‐enabled secure IoT architecture over SDN paradigm M Conti, P Kaliyar, C Lal Concurrency and Computation: Practice and Experience 31 (8), e4978, 2019 | 14 | 2019 |
LSMRP: Link stability based multicast routing protocol in MANETs G Singal, V Laxmi, MS Gaur, C Lal 2014 Seventh International Conference on Contemporary Computing (IC3), 254-259, 2014 | 13 | 2014 |
Security and design requirements for software-defined VANETs WB Jaballah, M Conti, C Lal Computer Networks 169, 107099, 2020 | 12 | 2020 |
BlockAuth: BlockChain based distributed producer authentication in ICN M Conti, M Hassan, C Lal Computer Networks 164, 106888, 2019 | 11 | 2019 |
QoS-aware routing for transmission of H. 264/SVC encoded video traffic over MANETs C Lal, V Laxmi, MS Gaur 2013 19th Asia-Pacific Conference on Communications (APCC), 104-109, 2013 | 10 | 2013 |