Attack graph—Based vulnerability assessment of rank property in RPL-6LOWPAN in IoT R Sahay, G Geethakumari, K Modugu 2018 IEEE 4th World Forum on Internet of Things (WF-IoT), 308-313, 2018 | 55 | 2018 |
A novel blockchain based framework to secure IoT-LLNs against routing attacks R Sahay, G Geethakumari, B Mitra Computing 102 (11), 2445-2470, 2020 | 49 | 2020 |
Efficient framework for detection of version number attack in internet of things R Sahay, G Geethakumari, B Mitra, I Sahoo Intelligent Systems Design and Applications: 18th International Conference …, 2020 | 19 | 2020 |
Exponential smoothing based approach for detection of blackhole attacks in IoT R Sahay, G Geethakumari, B Mitra, V Thejas 2018 IEEE International Conference on Advanced Networks and …, 2018 | 19 | 2018 |
Mitigating the worst parent attack in RPL based internet of things R Sahay, G Geethakumari, B Mitra Cluster Computing 25 (2), 1303-1320, 2022 | 15 | 2022 |
A novel network partitioning attack against routing protocol in internet of things R Sahay, G Geethakumari, B Mitra Ad Hoc Networks 121, 102583, 2021 | 15 | 2021 |
Investigating packet dropping attacks in RPL-DODAG in IoT R Sahay, G Geethakumari, B Mitra, N Goyal 2019 IEEE 5th International Conference for Convergence in Technology (I2CT), 1-5, 2019 | 11 | 2019 |
A holistic framework for prediction of routing attacks in IoT-LLNs R Sahay, G Geethakumari, B Mitra The Journal of Supercomputing 78 (1), 1409-1433, 2022 | 9 | 2022 |
Traffic convergence detection in IoT LLNs: a multilayer perceptron based mechanism R Sahay, G Geethakumari, K Modugu, B Mitra 2018 IEEE symposium series on computational intelligence (SSCI), 1715-1722, 2018 | 7 | 2018 |
A feedforward neural network based model to predict sub-optimal path attack in IoT-LLNs R Sahay, G Geethakumari, B Mitra 2020 20th IEEE/ACM International Symposium on Cluster, Cloud and Internet …, 2020 | 6 | 2020 |
Attack graph—based vulnerability assessment of rank property in RPL-6LOWPAN in IoT. In 2018 IEEE 4th World Forum on Internet of Things (WF-IoT) R Sahay, G Geethakumari, K Modugu IEEE, 2018 | 6 | 2018 |
Partitioning Attacks Against RPL in the Internet of Things Environment R Sahay, G Geethakumari, B Mitra Edge Analytics: Select Proceedings of 26th International Conference—ADCOM …, 2022 | 2 | 2022 |
IB-RPL: Embedding Isolation and Blacklisting of Malicious Nodes in RPL for Securing IoT-LLNs R Sahay, G Geethakumari, B Mitra 2021 IEEE International Conference on Advanced Networks and …, 2021 | 2 | 2021 |
Optimizing elliptic curve domain parameters using genetic algorithms VSS Sriram, R Ramadas, R Sahay, G Sahoo International Journal of Secure Digital Information Age 1 (2), 2009 | 2 | 2009 |
Investigating Vulnerabilities of Information Solicitation Process in RPL-Based IoT Networks R Sahay, CG Sushant International Conference on Frontiers of Intelligent Computing: Theory and …, 2023 | | 2023 |
Comparative Analysis of Machine Learning Models for Customer Segmentation P Joga, B Harshini, R Sahay International Conference on Intelligent Systems Design and Applications, 49-61, 2022 | | 2022 |
Mitigating the worst parent attack in RPL based internet of things (vol 25, pg 1303, 2022) R Sahay, G Geethakumari, B Mitra CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS 25 …, 2022 | | 2022 |
Correction: Mitigating the worst parent attack in RPL based internet of things. R Sahay, G Geethakumari, B Mitra Clust. Comput. 25 (5), 3765, 2022 | | 2022 |
Securing the Internet of Things Environment against RPL Attacks R Sahay Pilani, 2021 | | 2021 |
Popular Metaheuristic Optimization Techniques MK Deep, R Sahay University Science Press, 2010 | | 2010 |