Shetty, Sachin
Sachin Shetty researcher (ORCID 0000-0002-8789-0610)
Shetty, Sachin S.
VIAF ID: 7146574874738150004 (Personal)
Permalink: http://viaf.org/viaf/7146574874738150004
Preferred Forms
- 100 0 _ ‡a Sachin Shetty ‡c researcher (ORCID 0000-0002-8789-0610)
-
- 100 1 _ ‡a Shetty, Sachin
-
-
- 100 1 _ ‡a Shetty, Sachin
-
- 100 1 _ ‡a Shetty, Sachin
- 100 1 _ ‡a Shetty, Sachin
-
- 100 1 _ ‡a Shetty, Sachin
- 100 1 _ ‡a Shetty, Sachin
-
4xx's: Alternate Name Forms (6)
5xx's: Related Names (2)
Works
Title | Sources |
---|---|
Blockchain i bezpieczeństwo systemów rozproszonych | |
Coexistence of IEEE 802.11b and Bluetooth: An Integrated Performance Analysis | |
Cognitive Radio: Primary User Emulation Attacks and Remedies | |
Colluding Jamming Attack on a Grand Coalition by Aggrieved Nodes | |
Consensus protocols for blockchain-based data provenance: Challenges and opportunities | |
Cross layer attacks on GSM mobile networks using software defined radios | |
Data Mining of Bayesian Network Structure Using a Semantic Genetic Algorithm-Based Approach | |
Design and Performance Evaluation of a Biometric Iris Verification System | |
Detecting and Mitigating Smart Insider Jamming Attacks in MANETs Using Reputation-Based Coalition Game | |
Development of an integrated network visualisation and graph analysis tool for biological networks. | |
Development of information fusion model for layered sensing systems using computing with words | |
Diversity Modeling to Evaluate Security of Multiple SDN Controllers | |
Dynamic Spectrum Access for Wireless Networks | |
Enhanced learning classifier to locate data in cloud datacenters | |
Enhancing connectivity for spectrum-agile Vehicular Ad hoc NETworks in fading channels | |
Enhancing the classification accuracy of IP geolocation | |
Fair and Smooth Scheduling for Virtual Output Queuing Switches Achieving 100% Throughput | |
Feature-based transfer learning for network security | |
Game theoretic approach to dynamic spectrum access with multi-radio and QoS requirements | |
Game Theoretic Cloud-Assisted Opportunistic Spectrum Access in Cognitive Radio Networks | |
Generalized stochastic Petri Net model based security risk assessment of software defined networks | |
Generation of Labelled Datasets to Quantify the Impact of Security Threats to Cloud Data Centers | |
Hoeffding Tree Algorithms for Anomaly Detection in Streaming Datasets: A Survey | |
The impact of antenna orientation on wireless sensor network performance | |
An integrated machine learning and control theoretic model for mining concept-drifting data streams | |
Integrating blockchain for data sharing and collaboration in mobile healthcare applications | |
LDAKM-EIoT: Lightweight Device Authentication and Key Management Mechanism for Edge-Based IoT Deployment | |
Man in the Cloud (MITC) Defender: SGX-Based User Credential Protection for Synchronization Applications in Cloud Computing Platform | |
Mining Concept Drifting Network Traffic in Cloud Computing Environments | |
Modeling and design of secure Internet of things | |
Modeling Cost of Countermeasures in Software Defined Networking-enabled Energy Delivery Systems | |
Modeling decision uncertainties in total situation awareness using cloud computation theory | |
Moving target defense for distributed systems | |
Physical layer security in wireless cooperative relay networks: state of the art and beyond | |
Planning and Assessment of a Workshop on Undergraduate Education in Biometric Systems | |
PLL Based Time Synchronization in Wireless Sensor Networks | |
Polarized beamforming for near-field wireless jamming attacks mitigation | |
POSTER: Toward Energy-Wasting Misbehavior Detection Platform with Privacy Preservation in Building Energy Use | |
ProvChain: A Blockchain-Based Data Provenance Architecture in Cloud Environment with Enhanced Privacy and Availability | |
Reducing Informational Disadvantages to Improve Cyber Risk Management† | |
Resource Allocation for Cognitive Radio Enabled Vehicular Network Users | |
Risk Management Using Cyber-Threat Information Sharing and Cyber-Insurance | |
Robust transmit beamforming against steering vector uncertainty in cognitive radio networks | |
Rogue Access Point Detection by Analyzing Network Traffic Characteristics | |
RootkitDet: Practical End-to-End Defense against Kernel Rootkits in a Cloud Environment | |
Scalable detection of web malware on smartphones | |
Scalable Network Diversity Modeling For Assessing Threats in Cloud Networks | |
An SDN Based Framework for Guaranteeing Security and Performance in Information-Centric Cloud Networks | |
Secrecy Rates and Optimal Power Allocation for Full-Duplex Decode-and-Forward Relay Wire-Tap Channels | |
Secure Radio Resource Management in Cloud Computing Based Cognitive Radio Networks | |
Secured formation control for multi-agent systems under DoS attacks | |
A Security Framework for SDN-Enabled Smart Power Grids | |
Security Implications of Blockchain Cloud with Analysis of Block Withholding Attack | |
Software Defined Networking enabled resilience for IEC 61850-based substation communication systems | |
Special issue on information dissemination and new services in P2P systems | |
Strong Security Approach with Compromised Nodes Detection in Cognitive Radio Sensor Networks | |
Survey Toward a Smart Campus Using the Internet of Things | |
SustainCity - An interactive virtual reality game system | |
TCP Venoplus — A cross-layer approach to improve TCP performance in wired-cum-wireless networks using signal strength | |
A testbed for modeling and detecting attacks on NFC enabled mobile devices | |
A Testbed Using USRP | |
Toward a Real-Time Cloud Auditing Paradigm | |
Towards a Network-Aware VM Migration: Evaluating the Cost of VM Migration in Cloud Data Centers | |
Towards a Trusted and Privacy Preserving Membership Service in Distributed Ledger Using Intel Software Guard Extensions | |
Towards data assurance and resilience in IoT using blockchain | |
Towards Decentralized Accountability and Self-sovereignty in Healthcare Systems | |
Towards Modeling Attacker’s Opportunity for Improving Cyber Resilience in Energy Delivery Systems | |
Towards Network-Topology Aware Virtual Machine Placement in Cloud Datacenters | |
Using Hidden Markov Model to detect rogue access points | |
Virtual sensor tracking using byzantine fault tolerance and predictive outlier model for complex tasks recognition | |
Virtual wired transmission scheme using directional antennas to improve energy efficiency in wireless mobile ad-hoc networks | |
Waiting probability analysis for opportunistic spectrum access |