A secure hierarchical model for sensor network M Tubaishat, J Yin, B Panja, S Madria ACM Sigmod Record 33 (1), 7-13, 2004 | 110 | 2004 |
Energy and communication efficient group key management protocol for hierarchical sensor networks B Panja, SK Madria, B Bhargava IEEE international conference on sensor networks, ubiquitous, and …, 2006 | 77 | 2006 |
A role-based access in a hierarchical sensor network architecture to provide multilevel security B Panja, SK Madria, B Bhargava Computer Communications 31 (4), 793-806, 2008 | 41 | 2008 |
Cybersecurity in banking and financial sector: Security analysis of a mobile banking application B Panja, D Fattaleh, M Mercado, A Robinson, P Meharia 2013 international conference on collaboration technologies and systems (CTS …, 2013 | 35 | 2013 |
Wirelessly sensing open parking spaces: Accounting and management of parking facility B Panja, B Schneider, P Meharia | 22 | 2011 |
Handling cross site scripting attacks using cache check to reduce webpage rendering time with elimination of sanitization and filtering in light weight mobile web browser B Panja, T Gennarelli, P Meharia 2015 First Conference on Mobile and Secure Services (MOBISECSERV), 1-7, 2015 | 17 | 2015 |
Real-time logic verification of a wireless sensor network J Green, S Bhattacharyya, B Panja 2009 WRI World Congress on Computer Science and Information Engineering 3 …, 2009 | 15 | 2009 |
Training of intelligent intrusion detection system using neuro fuzzy B Panja, O Ogunyanwo, P Meharia 15th IEEE/ACIS International Conference on Software Engineering, Artificial …, 2014 | 14 | 2014 |
Energy-efficient group key management protocols for hierarchical sensor networks B Panja, S Madria, B Bhargava International Journal of Distributed Sensor Networks 3 (2), 201-223, 2007 | 14 | 2007 |
Crime analysis mapping, intrusion detection-using data mining B Panja, P Meharia, K Mannem 2020 IEEE Technology & Engineering Management Conference (TEMSCON), 1-5, 2020 | 8 | 2020 |
Security in wireless sensor networks for health monitoring helmet with anomaly detection using power analysis and probabilistic model B Panja, Z Scott, P Meharia 2014 IEEE Conference on Wireless Sensors (ICWiSE), 73-78, 2014 | 8 | 2014 |
Monitoring and managing cloud computing security using denial of service bandwidth allowance B Panja, B Bhargava, S Pati, D Paul, LT Lilien, P Meharia Recent Patents on Computer Science 6 (1), 73-81, 2013 | 8 | 2013 |
An energy and communication efficient group key in sensor networks using elliptic curve polynomial B Panja, SK Madria International Conference on Ad-Hoc Networks and Wireless, 153-171, 2007 | 7 | 2007 |
Intelligent gateway for SCADA system security: A multi-layer attack prevention approach B Panja, J Oros, J Britton, P Meharia, S Pati 2015 IEEE International Conference on Computational Intelligence and Virtual …, 2015 | 3 | 2015 |
Group Security of V2Vusing Cloud Computing Processing and 4G Wireless Services. B Panja, D Morrison, P Meharia, B Bhargava, A Prakash International Journal of Next-Generation Computing 5 (3), 2014 | 3 | 2014 |
A survey of dynamic key management schemes in sensor networks B Panja, SK Madria Intelligent techniques for warehousing and mining sensor network data, 326-351, 2010 | 3 | 2010 |
Integration of v2v with cloud computing to provide group security through the use of 4G LTE B Panja, D Morrison, S Turner, P Meharia ICCWS2014-9 th International Conference on Cyber Warfare and Security: ICCWS …, 2014 | 2 | 2014 |
Vehicle health monitoring system using secure wireless sensor network B Panja, L Wolleschensky Commercial Aviation Cyber Security: Current State and Essential Reading, 27, 2016 | 1 | 2016 |
Detection and classification of vehicles using wireless sensor network technology P Garrity, S Bhattacharyya, C Shen, D Dawadi, B Panja Journal of Information Systems Technology & Planning 4 (7), 2011 | 1 | 2011 |
Protecting Accounting Information Systems using Machine Learning Based Intrusion Detection B Panja International Journal of Computer Science & Network Security 24 (5), 111-118, 2024 | | 2024 |