A survey on security and authentication in wireless body area networks B Narwal, AK Mohapatra Journal of Systems Architecture 113, 101883, 2021 | 91 | 2021 |
Towards a taxonomy of cyber threats against target applications B Narwal, AK Mohapatra, KA Usmani Journal of Statistics and Management Systems 22 (2), 301-325, 2019 | 43 | 2019 |
An insight into digital forensics branches and tools N Kumari, AK Mohapatra 2016 International Conference on Computational Techniques in Information and …, 2016 | 41 | 2016 |
Digital image authentication model based on edge adaptive steganography N Grover, AK Mohapatra 2013 2nd International Conference on Advanced Computing, Networking and …, 2013 | 38 | 2013 |
SEEMAKA: Secured energy-efficient mutual authentication and key agreement scheme for wireless body area networks B Narwal, AK Mohapatra Wireless Personal Communications 113 (4), 1985-2008, 2020 | 35 | 2020 |
Authentication protocols for wireless body area network with key management approach A Joshi, AK Mohapatra Journal of Discrete Mathematical Sciences and Cryptography 22 (2), 219-240, 2019 | 33 | 2019 |
SAMAKA: secure and anonymous mutual authentication and key agreement scheme for wireless body area networks B Narwal, AK Mohapatra Arabian Journal for Science and Engineering 46 (9), 9197-9219, 2021 | 30 | 2021 |
Cyber threat intelligence framework using advanced malware forensics YKAK Mohapatra International Journal of Information Technology, 1-10, 2019 | 30* | 2019 |
An insight into the security issues and their solutions for android phones A Khandelwal, AK Mohapatra 2015 2nd International Conference on Computing for Sustainable Global …, 2015 | 21 | 2015 |
Analysis of software vulnerability classification based on different technical parameters S Garg, RK Singh, AK Mohapatra Information Security Journal: A Global Perspective 28 (1-2), 1-19, 2019 | 20 | 2019 |
A review on authentication protocols in wireless body area networks (WBAN) B Narwal, AK Mohapatra 2018 3rd International Conference on Contemporary Computing and Informatics …, 2018 | 19 | 2018 |
Analysis and detection of ransomware through its delivery methods K Gangwar, S Mohanty, AK Mohapatra Data Science and Analytics: 4th International Conference on Recent …, 2018 | 17 | 2018 |
A survey and classification of XML based attacks on web applications C Gupta, RK Singh, AK Mohapatra Information Security Journal: A Global Perspective 29 (4), 183-198, 2020 | 14 | 2020 |
SALMAKA: secured, anonymity preserving and lightweight mutual authentication and key agreement scheme for WBAN B Narwal, AK Mohapatra International Journal of Sensors Wireless Communications and Control 11 (4 …, 2021 | 13 | 2021 |
Performance analysis of QoS parameters during vertical handover process between Wi-Fi and WiMAX networks B Narwal, AK Mohapatra Data Science and Analytics: 4th International Conference on Recent …, 2018 | 12 | 2018 |
A comprehensive and critical analysis of TLS 1.3 N Kumari, AK Mohapatra Journal of Information and Optimization Sciences 43 (4), 689-703, 2022 | 11 | 2022 |
GeneMiner: a classification approach for detection of XSS attacks on web services C Gupta, RK Singh, AK Mohapatra Computational Intelligence and Neuroscience 2022 (1), 3675821, 2022 | 11 | 2022 |
Mitigation of Blackhole attack in MANET A Tripathi, AK Mohapatra 2016 8th International Conference on Computational Intelligence and …, 2016 | 11 | 2016 |
Energy efficient model for recovery from multiple nodes failure in wireless sensor networks V Jha, N Prakash, AK Mohapatra Wireless Personal Communications 108, 1459-1479, 2019 | 10 | 2019 |
Energy efficient vertical handover algorithm for heterogeneous wireless networks B Narwal, A Mohapatra International Journal of Control Theory and Applications 9 (19), 9221-9225, 2016 | 10 | 2016 |