Evaluation of web application security risks and secure design patterns AK Dalai, SK Jena Proceedings of the 2011 International Conference on Communication, Computing …, 2011 | 34 | 2011 |
Neutralizing SQL injection attack using server side code modification in web applications AK Dalai, SK Jena Security and Communication Networks 2017 (1), 3825373, 2017 | 29 | 2017 |
Wdtf: A technique for wireless device type fingerprinting AK Dalai, SK Jena Wireless Personal Communications 97 (2), 1911-1928, 2017 | 25 | 2017 |
A code obfuscation technique to prevent reverse engineering AK Dalai, SS Das, SK Jena 2017 International Conference on Wireless Communications, Signal Processing …, 2017 | 16 | 2017 |
A fingerprinting technique for identification of wireless devices AK Dalai, A Jena, S Sharma, A Mohapatra, B Sahoo, MS Obaidat, ... 2018 International Conference on Computer, Information and Telecommunication …, 2018 | 13 | 2018 |
An ANN based approach for wireless device fingerprinting K Kumar, AK Dalai, SK Panigrahy, SK Jena 2017 2nd IEEE International Conference on Recent Trends in Electronics …, 2017 | 9 | 2017 |
Hybrid network intrusion detection systems: a decade’s perspective AK Dalai, SK Jena Proceedings of the International Conference on Signal, Networks, Computing …, 2017 | 9 | 2017 |
A novel approach for message authentication to prevent parameter tampering attack in web applications AK Dalai, SK Panigrahy, SK Jena Procedia engineering 38, 1495-1500, 2012 | 8 | 2012 |
XSS attack prevention using DOM-based filter AK Dalai, SD Ankush, SK Jena Progress in Intelligent Computing Techniques: Theory, Practice, and …, 2018 | 6 | 2018 |
IoT based V2I framework for accident prevention H Mohapatra, AK Dalai 2022 2nd international conference on artificial intelligence and signal …, 2022 | 5 | 2022 |
Intruder Identification in IEEE 802.11 Wireless Infrastructure Using Localization AK Dalai, SK Jena International Journal of Future Computer and Communication 3 (6), 372, 2014 | 5 | 2014 |
Varying password based scheme for user authentication SK Sahu, AK Dalai, SK Jena Advanced Computing, Networking and Informatics-Volume 2: Wireless Networks …, 2014 | 3 | 2014 |
Cognitive land cover mapping: A three-layer deep learning architecture for remote sensing data classification M Sahu, R Dash Environmental Challenges 15, 100876, 2024 | 2 | 2024 |
Supervised machine learning approaches for medical data classification AK Dalai, AK Jena, BV Ramana, B Maneesha, N Panda 2022 2nd International Conference on Artificial Intelligence and Signal …, 2022 | 2 | 2022 |
Forest combustion recognition using deep learning K Jahnavi, HK Kondaveeti, AK Dalai Intelligent Computing and Communication Systems, 279-289, 2021 | 2 | 2021 |
Online identification of illegitimate web server requests AK Dalai, SK Jena Computer Networks and Intelligent Computing: 5th International Conference on …, 2011 | 2 | 2011 |
Efficient Energy Management by Using SJF Scheduling in Wireless Sensor Network H Mohapatra, M Kolhar, AK Dalai International Conference on Advances in Distributed Computing and Machine …, 2024 | 1 | 2024 |
Improved Chaotic Grey Wolf Optimization for Training Neural Networks: IMPROVED CGWO FOR TRAINING NEURAL NETWORKS RV Bendi, N Panda, S Teja, H Mohapatra, A Dalai, SK Majhi Journal of Scientific & Industrial Research (JSIR) 82 (11), 1193-1207, 2023 | 1 | 2023 |
Performance analysis of device-to-device communication in rural areas UN Kar, AK Dalai, SR Gottam, SK Panigrahy 2022 International Conference on Artificial Intelligence and Data …, 2022 | 1 | 2022 |
A Device Fingerprinting Technique to Authenticate End-user Devices in Wireless Networks AK Dalai, B Sahoo 2022 IEEE 2nd International Symposium on Sustainable Energy, Signal …, 2022 | 1 | 2022 |