Follow
Asish Kumar Dalai
Asish Kumar Dalai
Vellore Institute of Technology AP University, India
Verified email at vitap.ac.in
Title
Cited by
Cited by
Year
Evaluation of web application security risks and secure design patterns
AK Dalai, SK Jena
Proceedings of the 2011 International Conference on Communication, Computing …, 2011
342011
Neutralizing SQL injection attack using server side code modification in web applications
AK Dalai, SK Jena
Security and Communication Networks 2017 (1), 3825373, 2017
292017
Wdtf: A technique for wireless device type fingerprinting
AK Dalai, SK Jena
Wireless Personal Communications 97 (2), 1911-1928, 2017
252017
A code obfuscation technique to prevent reverse engineering
AK Dalai, SS Das, SK Jena
2017 International Conference on Wireless Communications, Signal Processing …, 2017
162017
A fingerprinting technique for identification of wireless devices
AK Dalai, A Jena, S Sharma, A Mohapatra, B Sahoo, MS Obaidat, ...
2018 International Conference on Computer, Information and Telecommunication …, 2018
132018
An ANN based approach for wireless device fingerprinting
K Kumar, AK Dalai, SK Panigrahy, SK Jena
2017 2nd IEEE International Conference on Recent Trends in Electronics …, 2017
92017
Hybrid network intrusion detection systems: a decade’s perspective
AK Dalai, SK Jena
Proceedings of the International Conference on Signal, Networks, Computing …, 2017
92017
A novel approach for message authentication to prevent parameter tampering attack in web applications
AK Dalai, SK Panigrahy, SK Jena
Procedia engineering 38, 1495-1500, 2012
82012
XSS attack prevention using DOM-based filter
AK Dalai, SD Ankush, SK Jena
Progress in Intelligent Computing Techniques: Theory, Practice, and …, 2018
62018
IoT based V2I framework for accident prevention
H Mohapatra, AK Dalai
2022 2nd international conference on artificial intelligence and signal …, 2022
52022
Intruder Identification in IEEE 802.11 Wireless Infrastructure Using Localization
AK Dalai, SK Jena
International Journal of Future Computer and Communication 3 (6), 372, 2014
52014
Varying password based scheme for user authentication
SK Sahu, AK Dalai, SK Jena
Advanced Computing, Networking and Informatics-Volume 2: Wireless Networks …, 2014
32014
Cognitive land cover mapping: A three-layer deep learning architecture for remote sensing data classification
M Sahu, R Dash
Environmental Challenges 15, 100876, 2024
22024
Supervised machine learning approaches for medical data classification
AK Dalai, AK Jena, BV Ramana, B Maneesha, N Panda
2022 2nd International Conference on Artificial Intelligence and Signal …, 2022
22022
Forest combustion recognition using deep learning
K Jahnavi, HK Kondaveeti, AK Dalai
Intelligent Computing and Communication Systems, 279-289, 2021
22021
Online identification of illegitimate web server requests
AK Dalai, SK Jena
Computer Networks and Intelligent Computing: 5th International Conference on …, 2011
22011
Efficient Energy Management by Using SJF Scheduling in Wireless Sensor Network
H Mohapatra, M Kolhar, AK Dalai
International Conference on Advances in Distributed Computing and Machine …, 2024
12024
Improved Chaotic Grey Wolf Optimization for Training Neural Networks: IMPROVED CGWO FOR TRAINING NEURAL NETWORKS
RV Bendi, N Panda, S Teja, H Mohapatra, A Dalai, SK Majhi
Journal of Scientific & Industrial Research (JSIR) 82 (11), 1193-1207, 2023
12023
Performance analysis of device-to-device communication in rural areas
UN Kar, AK Dalai, SR Gottam, SK Panigrahy
2022 International Conference on Artificial Intelligence and Data …, 2022
12022
A Device Fingerprinting Technique to Authenticate End-user Devices in Wireless Networks
AK Dalai, B Sahoo
2022 IEEE 2nd International Symposium on Sustainable Energy, Signal …, 2022
12022
The system can't perform the operation now. Try again later.
Articles 1–20