Department of Computer Science and Information Systems
: [954]
Collection home page
Collection's Items (Sorted by Submit Date in Descending order): 221 to 240 of 954
Issue Date | Title | Author(s) |
2014-10 | UMAC: A Universal MAC protocol for Wireless Networks | Bhatia, Ashutosh |
2014-06 | A media access and feedback protocol for reliable multicast over wireless channel | Bhatia, Ashutosh |
2015-02 | A Distributed TDMA Slot Scheduling Algorithm for Spatially Correlated Contention in WSNs | Bhatia, Ashutosh |
2015 | DSLR: A Distributed Schedule Length Reduction Algorithm for WSNs | Bhatia, Ashutosh |
2016-07 | TRM-MAC: A TDMA-based reliable multicast MAC protocol for WSNs with flexibility to trade-off between latency and reliability | Bhatia, Ashutosh |
2016 | PMAC: A poll-based MAC protocol for wireless body area networks (WBANs) | Bhatia, Ashutosh |
2017 | Bandwidth Efficient Clock Skew Compensation in TDMA-Based Star Topology Wireless Networks | Bhatia, Ashutosh |
2018 | 3TAAV: A three-tier architecture for pseudonym-based anonymous authentication in VANETs | Bhatia, Ashutosh |
2018 | Faster detection and prediction of DDoS attacks using MapReduce and time series analysis | Bhatia, Ashutosh |
2017-12 | A Delay and Energy Efficient Poll-Based MAC Protocol for Wireless Body Area Networks | Bhatia, Ashutosh |
2018 | On the Learning Capabilities of Recurrent Neural Networks: A Cryptographic Perspective | Bhatia, Ashutosh |
2019 | A Topology Independent TDMA-based MAC protocol for Vehicular Networks | Bhatia, Ashutosh |
2019 | Trustless Two-Factor Authentication Using Smart Contracts in Blockchains | Bhatia, Ashutosh |
2019 | Zero Knowledge Proof based authentication protocol using graph isomorphism | Bhatia, Ashutosh |
2019-12 | Detecting Domain Generation Algorithms to prevent DDoS attacks using Deep Learning | Bhatia, Ashutosh |
2019 | A Blockchain based Solution to Know Your Customer (KYC) Dilemma | Bhatia, Ashutosh |
2019 | A Two-Phase Scheme for Distributed TDMA Scheduling in WSNs with Flexibility to Trade-off between Schedule Length and Scheduling Time | Bhatia, Ashutosh |
2019-03 | Exploiting Multiple Paths in Multi-hop Co-operative Ad-Hoc Networks for Providing Security without Trusted Third Party | Bhatia, Ashutosh |
2019-03 | Detection of Algorithmically Generated Domain Names in Botnets | Bhatia, Ashutosh |
2020-03 | Bitcoin Data Analytics: Exploring Research Avenues and Implementing a Hadoop-Based Analytics Framework | Bhatia, Ashutosh |
Collection's Items (Sorted by Submit Date in Descending order): 221 to 240 of 954