关注
Chhagan lal
Chhagan lal
NTNU Norway
在 ntnu.no 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
A survey on security and privacy issues of bitcoin
M Conti, ES Kumar, C Lal, S Ruj
IEEE communications surveys & tutorials 20 (4), 3416-3452, 2018
11802018
Blockchain-enabled secure energy trading with verifiable fairness in industrial Internet of Things
M Li, D Hu, C Lal, M Conti, Z Zhang
IEEE Transactions on Industrial Informatics 16 (10), 6564-6574, 2020
1742020
SAFETY: Early detection and mitigation of TCP SYN flood utilizing entropy in SDN
P Kumar, M Tripathi, A Nehra, M Conti, C Lal
IEEE Transactions on Network and Service Management 15 (4), 1545-1559, 2018
1682018
LEChain: A blockchain-based lawful evidence management scheme for digital forensics
M Li, C Lal, M Conti, D Hu
Future Generation Computer Systems 115, 406-420, 2021
1092021
Toward the development of secure underwater acoustic networks
C Lal, R Petroccia, K Pelekanakis, M Conti, J Alves
IEEE Journal of Oceanic Engineering 42 (4), 1075-1087, 2017
812017
Internet-of-Forensic (IoF): A blockchain based digital forensics framework for IoT applications
G Kumar, R Saha, C Lal, M Conti
Future Generation Computer Systems 120, 13-25, 2021
802021
A survey on software-defined VANETs: benefits, challenges, and future directions
WB Jaballah, M Conti, C Lal
arXiv preprint arXiv:1904.04577, 2019
762019
LiDL: Localization with early detection of sybil and wormhole attacks in IoT networks
P Kaliyar, WB Jaballah, M Conti, C Lal
Computers & Security 94, 101849, 2020
672020
A node-disjoint multipath routing method based on AODV protocol for MANETs
C Lal, V Laxmi, MS Gaur
2012 IEEE 26th International Conference on Advanced Information Networking …, 2012
622012
Anomaly detection techniques using deep learning in IoT: a survey
B Sharma, L Sharma, C Lal
2019 International conference on computational intelligence and knowledge …, 2019
612019
Security and design requirements for software-defined VANETs
WB Jaballah, M Conti, C Lal
Computer Networks 169, 107099, 2020
582020
Secure underwater acoustic networks: Current and future research directions
C Lal, R Petroccia, M Conti, J Alves
2016 IEEE third underwater communications and networking conference (UComms …, 2016
562016
JellyFish attack: Analysis, detection and countermeasure in TCP-based MANET
V Laxmi, C Lal, MS Gaur, D Mehta
Journal of Information Security and Applications 22, 99-112, 2015
562015
Reliable and secure data transfer in IoT networks
SP Gochhayat, C Lal, L Sharma, DP Sharma, D Gupta, JAM Saucedo, ...
Wireless Networks 26 (8), 5689-5702, 2020
552020
Anomaly based network intrusion detection for IoT attacks using deep learning technique
B Sharma, L Sharma, C Lal, S Roy
Computers and Electrical Engineering 107, 108626, 2023
532023
The road ahead for networking: A survey on icn-ip coexistence solutions
M Conti, A Gangwal, M Hassan, C Lal, E Losiouk
IEEE Communications Surveys & Tutorials 22 (3), 2104-2129, 2020
452020
Lightweight solutions to counter DDoS attacks in software defined networking
M Conti, C Lal, R Mohammadi, U Rawat
Wireless Networks 25, 2751-2768, 2019
452019
REMI: a reliable and secure multicast routing protocol for IoT networks
M Conti, P Kaliyar, C Lal
Proceedings of the 12th International Conference on Availability …, 2017
452017
Eunomia: Anonymous and secure vehicular digital forensics based on blockchain
M Li, Y Chen, C Lal, M Conti, M Alazab, D Hu
IEEE Transactions on Dependable and Secure Computing 20 (1), 225-241, 2021
422021
A survey on blockchain for healthcare: Challenges, benefits, and future directions
MS Arbabi, C Lal, NR Veeraragavan, D Marijan, JF Nygård, R Vitenberg
IEEE communications surveys & tutorials 25 (1), 386-424, 2022
412022
系统目前无法执行此操作,请稍后再试。
文章 1–20