Proposed security model and threat taxonomy for the Internet of Things (IoT) S Babar, P Mahalle, A Stango, N Prasad, R Prasad Recent Trends in Network Security and Applications: Third International …, 2010 | 394 | 2010 |
Proposed embedded security framework for internet of things (iot) S Babar, A Stango, N Prasad, J Sen, R Prasad 2011 2nd International Conference on Wireless Communication, Vehicular …, 2011 | 392 | 2011 |
Identity management framework towards Internet of Things (IoT): Roadmap and key challenges P Mahalle, S Babar, NR Prasad, R Prasad Recent Trends in Network Security and Applications: Third International …, 2010 | 117 | 2010 |
Jamming attack: Behavioral modelling and analysis SD Babar, NR Prasad, R Prasad Wireless VITAE 2013, 1-5, 2013 | 33 | 2013 |
Trust management approach for detection of malicious devices in siot P Hankare, S Babar, P Mahalle Tehnički glasnik 15 (1), 43-50, 2021 | 15 | 2021 |
An efficient data locality driven task scheduling algorithm for cloud computing VW Thawari, SD Babar, NA Dhawas International Journal in Multidisciplinary and Academic Research (SSIJMAR) 1 (3), 2012 | 15 | 2012 |
Game theoretic modelling of WSN jamming attack and detection mechanism SD Babar, NR Prasad, R Prasad 2013 16th International Symposium on Wireless Personal Multimedia …, 2013 | 14 | 2013 |
Security framework and jamming detection for internet of things SD Babar Department of Electronic Systems, Aalborg University, 2015 | 9 | 2015 |
Recent Trends in Network Security and Applications: Third International Conference, CNSA 2010, Chennai, India, July 23-25, 2010 S Babar, P Mahalle, A Stango, N Prasad, R Prasad Proceedings, 420-429, 2010 | 9 | 2010 |
An efficient profile matching protocol using privacy preserving in mobile social network K Shewale, SD Babar Procedia Computer Science 79, 922-931, 2016 | 6 | 2016 |
Rolling curve ECC for centralized key management system used in ECC-MPICH2 S Shivaramakrishnan, SD Babar 2014 IEEE Global Conference on Wireless Computing & Networking (GCWCN), 169-173, 2014 | 6 | 2014 |
Trust system based intrusion detection in mobile ad-hoc network (MANET) PM Nanaware, SD Babar 2016 International Conference on Next Generation Intelligent Systems (ICNGIS …, 2016 | 5 | 2016 |
Supervised word sense disambiguation with recurrent neural network model CD Kokane, SD Babar Int. J. Eng. Adv. Technol.(IJEAT) 9 (2), 2019 | 4 | 2019 |
CMKMS: Cluster-based mobile key management scheme for wireless sensor network SD Babar, NR Prasad, R Prasad International Journal of Pervasive Computing and Communications 10 (2), 196-211, 2014 | 4 | 2014 |
Countermeasure for intelligent cluster-head jamming attack in wireless sensor network SD Babar, NR Prasad, R Prasad 2013 International Conference on Privacy and Security in Mobile Systems …, 2013 | 4 | 2013 |
Activity modelling and countermeasures on jamming attack SD Babar, NR Prasad, R Prasad Journal of Cyber Security and Mobility, 1–27-1–27, 2012 | 4 | 2012 |
E-commerce Development with Respect to its Security Issues and Solutions: A Literature Review JR Shaikh, SD Babar, G Iliev proceedings of ICEST, 28-30, 2017 | 3 | 2017 |
A hash key-based key management mechanism for cluster-based wireless sensor network SD Babar, PN Mahalle Journal of Cyber Security and Mobility, 73–88-73–88, 2016 | 3 | 2016 |
Research perspective on energy-efficient protocols in IoT: emerging development of green IoT UL Tupe, SD Babar, SP Kadam, PN Mahalle International Journal of Pervasive Computing and Communications 18 (2), 145-170, 2022 | 2 | 2022 |
Word Sense Disambiguation for Large Documents Using Neural Network Model CD Kokane, SD Babar, PN Mahalle 2021 12th International Conference on Computing Communication and Networking …, 2021 | 2 | 2021 |