default search action
Meenakshi Tripathi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j20]Abhishek Vyas, Po-Ching Lin, Ren-Hung Hwang, Meenakshi Tripathi:
Privacy-Preserving Federated Learning for Intrusion Detection in IoT Environments: A Survey. IEEE Access 12: 127018-127050 (2024) - [j19]Meenakshi Tripathi, Lazaros Moysis, Mahendra Kumar Gupta, George F. Fragulis, Christos K. Volos:
Observer Design for Nonlinear Descriptor Systems: A Survey on System Nonlinearities. Circuits Syst. Signal Process. 43(5): 2853-2872 (2024) - [j18]Vikas Kumar Jain, Meenakshi Tripathi:
An integrated deep learning model for Ethereum smart contract vulnerability detection. Int. J. Inf. Sec. 23(1): 557-575 (2024) - [j17]Rukhsar Sultana, Jyoti Grover, Meenakshi Tripathi, Manhar Singh Sachdev, Sparsh Taneja:
Detecting Sybil Attacks in VANET: Exploring Feature Diversity and Deep Learning Algorithms with Insights into Sybil Node Associations. J. Netw. Syst. Manag. 32(3): 51 (2024) - [j16]Rukhsar Sultana, Jyoti Grover, Meenakshi Tripathi:
Intelligent defense strategies: Comprehensive attack detection in VANET with deep reinforcement learning. Pervasive Mob. Comput. 103: 101962 (2024) - [j15]Rukhsar Sultana, Jyoti Grover, Meenakshi Tripathi:
Cooperative approach for data-centric and node-centric misbehavior detection in VANET. Veh. Commun. 50: 100855 (2024) - 2023
- [c19]Shashvat Sharma, Meenakshi Tripathi, Harish Kumar Sahu, Ashish Karan:
A Post-Quantum End-to-End Encryption Protocol. ANTS 2023: 756-761 - [c18]Akhil Pariyarath, Shubham Tomar, Meenakshi Tripathi:
Efficient Privacy-Preserving Authentication using Blockchain for VANET. COMSNETS 2023: 423-426 - 2022
- [j14]Ankur Gupta, Meenakshi Tripathi, Samya Muhuri, Gaurav Singal, Neeraj Kumar:
A secure and lightweight anonymous mutual authentication scheme for wearable devices in Medical Internet of Things. J. Inf. Secur. Appl. 68: 103259 (2022) - [c17]Kawaldeep Kaur, Shubham Tomar, Meenakshi Tripathi:
Gas Fee Reduction by Detecting Loop Fusible Patterns in Ethereum Smart Contract. ANTS 2022: 458-463 - 2021
- [j13]Rukhsar Sultana, Jyoti Grover, Meenakshi Tripathi:
Security of SDN-based vehicular ad hoc networks: State-of-the-art and challenges. Veh. Commun. 27: 100284 (2021) - [c16]Shalin Kumar Deval, Meenakshi Tripathi, Bruhadeshwar Bezawada, Indrakshi Ray:
"X-Phish: Days of Future Past"‡: Adaptive & Privacy Preserving Phishing Detection. CNS 2021: 227-235 - [c15]Shweta Patidar, Meenakshi Tripathi, Subham Kumar Gupta:
Leveraging LSTM-RNN combined with SVM for Network Intrusion Detection. DSMLAI 2021: 26-31 - 2020
- [j12]Jyoti Gajrani, Vijay Laxmi, Meenakshi Tripathi, Manoj Singh Gaur, Akka Zemmari, Mohamed Mosbah, Mauro Conti:
Chapter Three - Effectiveness of state-of-the-art dynamic analysis techniques in identifying diverse Android malware and future enhancements. Adv. Comput. 119: 73-120 (2020) - [j11]Ankur Gupta, Meenakshi Tripathi, Aakar Sharma:
A provably secure and efficient anonymous mutual authentication and key agreement protocol for wearable devices in WBAN. Comput. Commun. 160: 311-325 (2020) - [j10]Jyoti Gajrani, Umang Agarwal, Vijay Laxmi, Bruhadeshwar Bezawada, Manoj Singh Gaur, Meenakshi Tripathi, Akka Zemmari:
EspyDroid+: Precise reflection analysis of android apps. Comput. Secur. 90: 101688 (2020) - [j9]Jyoti Gajrani, Meenakshi Tripathi, Vijay Laxmi, Gaurav Somani, Akka Zemmari, Manoj Singh Gaur:
Vulvet: Vetting of Vulnerabilities in Android Apps to Thwart Exploitation. DTRAP 1(2): 10:1-10:25 (2020) - [j8]Anugrah Jain, Vijay Laxmi, Meenakshi Tripathi, Manoj Singh Gaur, Rimpy Bishnoi:
TRACK: An algorithm for fault-tolerant, dynamic and scalable 2D mesh network-on-chip routing reconfiguration. Integr. 72: 92-110 (2020) - [c14]Rukhsar Sultana, Jyoti Grover, Meenakshi Tripathi:
A Novel Framework for Misbehavior Detection in SDN-based VANET. IEEE ANTS 2020: 1-6
2010 – 2019
- 2019
- [j7]Ankur Gupta, Meenakshi Tripathi, Tabish Jamil Shaikh, Aakar Sharma:
A lightweight anonymous user authentication and key establishment scheme for wearable devices. Comput. Networks 149: 29-42 (2019) - [j6]Ajay Nehra, Meenakshi Tripathi, Manoj Singh Gaur, Ramesh Babu Battula, Chhagan Lal:
SLDP: A secure and lightweight link discovery protocol for software defined networking. Comput. Networks 150: 102-116 (2019) - [j5]Ajay Nehra, Meenakshi Tripathi, Manoj Singh Gaur, Ramesh Babu Battula, Chhagan Lal:
TILAK: A token-based prevention approach for topology discovery threats in SDN. Int. J. Commun. Syst. 32(17) (2019) - [j4]Anugrah Jain, Vijay Laxmi, Meenakshi Tripathi, Manoj Singh Gaur, Rimpy Bishnoi:
S2DIO: an extended scalable 2D mesh network-on-chip routing reconfiguration for efficient bypass of link failures. J. Supercomput. 75(10): 6855-6881 (2019) - 2018
- [j3]Prashant Kumar, Meenakshi Tripathi, Ajay Nehra, Mauro Conti, Chhagan Lal:
SAFETY: Early Detection and Mitigation of TCP SYN Flood Utilizing Entropy in SDN. IEEE Trans. Netw. Serv. Manag. 15(4): 1545-1559 (2018) - [c13]Himanshu Sharma, Meenakshi Tripathi, Amit Kumar, Manoj Singh Gaur:
Embedded Assistive Stick for Visually Impaired Persons. ICCCNT 2018: 1-6 - [c12]Ankur Gupta, Meenakshi Tripathi:
Poster: A lightweight Mutually Authenticated Key-Agreement scheme for Wireless Body Area Networks in Internet of Things Environment. MobiCom 2018: 804-806 - [c11]Shivam Anand, Amit Kumar, Meenakshi Tripathi, Manoj Singh Gaur:
Human Face Detection Enabled Smart Stick for Visually Impaired People. WIR 2018: 277-289 - 2017
- [j2]Gaurav Singal, Vijay Laxmi, Manoj Singh Gaur, Swati Todi, D. Vijay Rao, Meenakshi Tripathi, Riti Kushwaha:
Multi-constraints link stable multicast routing protocol in MANETs. Ad Hoc Networks 63: 115-128 (2017) - [j1]Meenakshi Tripathi, Manoj Singh Gaur, Vijay Laxmi, Ramesh Babu Battula:
Balanced energy routing protocol for clustered wireless sensor network. Int. J. Inf. Commun. Technol. 11(3): 396-411 (2017) - [c10]Jyoti Gajrani, Meenakshi Tripathi, Vijay Laxmi, Manoj Singh Gaur, Mauro Conti, Muttukrishnan Rajarajan:
sPECTRA: A precise framEwork for analyzing CrypTographic vulneRabilities in Android apps. CCNC 2017: 854-860 - [c9]Jyoti Gajrani, Li Li, Vijay Laxmi, Meenakshi Tripathi, Manoj Singh Gaur, Mauro Conti:
Detection of Information Leaks via Reflection in Android Apps. AsiaCCS 2017: 911-913 - [c8]Ajay Nehra, Meenakshi Tripathi, Manoj Singh Gaur:
FICUR: Employing SDN programmability to secure ARP. CCWC 2017: 1-8 - [c7]Sharang Sharma, Manind Gupta, Amit Kumar, Meenakshi Tripathi, Manoj Singh Gaur:
Multiple distance sensors based smart stick for visually impaired people. CCWC 2017: 1-5 - [c6]Jyoti Gajrani, Vijay Laxmi, Meenakshi Tripathi, Manoj Singh Gaur, Daya Ram Sharma, Akka Zemmari, Mohamed Mosbah, Mauro Conti:
Unraveling Reflection Induced Sensitive Leaks in Android Apps. CRiSIS 2017: 49-65 - [c5]Ajay Nehra, Meenakshi Tripathi, Manoj Singh Gaur:
'Global view' in SDN: existing implementation, vulnerabilities & threats. SIN 2017: 303-306 - [c4]Anugrah Jain, Vijay Laxmi, Meenakshi Tripathi, Manoj Singh Gaur, Rimpy Bishnoi:
Performance-Enhanced d^2 -LBDR for 2D Mesh Network-on-Chip. VDAT 2017: 313-323 - 2015
- [c3]Jyoti Gajrani, Jitendra Sarswat, Meenakshi Tripathi, Vijay Laxmi, Manoj Singh Gaur, Mauro Conti:
A robust dynamic analysis system preventing SandBox detection by Android malware. SIN 2015: 290-295 - 2013
- [c2]Meenakshi Tripathi, Manoj Singh Gaur, Vijay Laxmi:
Comparing the Impact of Black Hole and Gray Hole Attack on LEACH in WSN. ANT/SEIT 2013: 1101-1107 - [c1]Meenakshi Tripathi, Ramesh Babu Battula, Manoj Singh Gaur, Vijay Laxmi:
Energy Efficient Clustered Routing for Wireless Sensor Network. MSN 2013: 330-335
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-03 21:22 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint