On Designing a Lesser Obtrusive Authentication Protocol to Prevent Machine-Learning-Based Threats in Internet of Things | 0 | 0.34 | 2021 |
On Designing An Unaided Authentication Service With Threat Detection And Leakage Control For Defeating Opportunistic Adversaries | 0 | 0.34 | 2021 |
Intelligent Scheduling of V2G, V2V, G2V Operations in a Smart Microgrid | 0 | 0.34 | 2020 |
A Graph Combination With Edge Pruning‐Based Approach for Author Name Disambiguation | 1 | 0.35 | 2020 |
A Fast and Efficient Way to Obtain the Optimal Number of Ports in Electric Vehicle Charging Stations | 0 | 0.34 | 2020 |
A Many Objective Optimization Based Entity Matching Framework for Bibliographic Database | 0 | 0.34 | 2019 |
Multiobjective Optimal Scheduling Framework for HVAC Devices in Energy-Efficient Buildings | 1 | 0.35 | 2019 |
Towards identifying and preventing behavioral side channel attack on recording attack resilient unaided authentication services | 1 | 0.35 | 2019 |
A divide-and-conquer based efficient non-dominated sorting approach. | 2 | 0.39 | 2019 |
Towards incorporating honeywords in n-session recording attack resilient unaided authentication services. | 0 | 0.34 | 2019 |
Dispersion Ratio based Decision Tree Model for Classification. | 0 | 0.34 | 2019 |
Coordinated Scheduling of Residential Appliances and Heterogeneous Energy Sources in a Smart Microgrid. | 0 | 0.34 | 2019 |
Divide-and-conquer based non-dominated sorting with Reduced Comparisons | 0 | 0.34 | 2019 |
On Designing a Questionnaire Based Honeyword Generation Approach for Achieving Flatness | 0 | 0.34 | 2018 |
SGP - A Safe Graphical Password System Resisting Shoulder-Surfing Attack on Smartphones. | 0 | 0.34 | 2018 |
drPass - A Dynamic and Reusable Password Generator Protocol. | 0 | 0.34 | 2018 |
Towards optimal scheduling of thermal comfortability and smoothening of load profile in energy efficient buildings: work-in-progress. | 0 | 0.34 | 2018 |
GBOS: Generalized Best Order Sort algorithm for non-dominated sorting. | 1 | 0.35 | 2018 |
An Approach To Obtain The Upper Bound On The Number Of Non-Dominated Fronts In A Population | 0 | 0.34 | 2018 |
On Evaluation Of Entity Matching Techniques For Bibliographic Database | 0 | 0.34 | 2018 |
Towards Obtaining Upper Bound on Sensitivity Computation Process for Cluster Validity Measures. | 0 | 0.34 | 2018 |
Efficient Scheduling of Nonpreemptive Appliances for Peak Load Optimization in Smart Grid. | 0 | 0.34 | 2018 |
MBOS: Modified Best Order Sort Algorithm for Performing Non-Dominated Sorting | 1 | 0.35 | 2018 |
Multi-Objective Heuristic Charge Scheduling and Eco-Routing Mechanism for Electric Vehicles. | 0 | 0.34 | 2018 |
On designing a modified-UI based honeyword generation approach for overcoming the existing limitations. | 2 | 0.41 | 2017 |
GAEMTBD: Genetic algorithm based entity matching techniques for bibliographic databases. | 0 | 0.34 | 2017 |
On Designing A Questionnaire Based Legacy-UI Honeyword Generation Approach For Achieving Flatness. | 0 | 0.34 | 2017 |
Intelligent Scheduling of Thermostatic Devices for Efficient Energy Management in Smart Grid. | 1 | 0.41 | 2017 |
Sg-Pass: A Safe Graphical Password Scheme To Resist Shoulder Surfing And Spyware Attack | 0 | 0.34 | 2016 |
A multiobjective optimization based entity matching technique for bibliographic databases. | 1 | 0.35 | 2016 |
Sensitivity - An Important Facet of Cluster Validation Process for Entity Matching Technique. | 0 | 0.34 | 2016 |
Sposs: Secure Pin-Based-Authentication Obviating Shoulder Surfing | 2 | 0.39 | 2016 |
A New Storage Optimized Honeyword Generation Approach for Enhancing Security and Usability. | 0 | 0.34 | 2015 |
Few notes towards making honeyword system more secure and usable | 1 | 0.35 | 2015 |
Improved Solution to the Non-Domination Level Update Problem | 3 | 0.39 | 2015 |
CRDT: Correlation Ratio Based Decision Tree Model for Healthcare Data Mining | 2 | 0.39 | 2015 |
SLASS: Secure Login against Shoulder Surfing. | 2 | 0.46 | 2014 |
Tag Digit Based Honeypot to Detect Shoulder Surfing Attack. | 4 | 0.46 | 2014 |
On Validation of Clustering Techniques for Bibliographic Databases | 2 | 0.35 | 2014 |
Entity Matching Technique for Bibliographic Database. | 5 | 0.41 | 2013 |
Security analysis of GTRBAC and its variants using model checking | 4 | 0.41 | 2011 |
Role Based Access Control with Spatiotemporal Context for Mobile Applications | 29 | 0.91 | 2009 |
Supporting Negative Authorization in Spatiotemporal Role Based Access Control | 0 | 0.34 | 2009 |
Towards formal security analysis of GTRBAC using timed automata | 16 | 0.65 | 2009 |
XML-based policy specification framework for spatiotemporal access control | 2 | 0.39 | 2009 |
A Verification Framework for Temporal RBAC with Role Hierarchy (Short Paper) | 4 | 0.41 | 2008 |
Security Analysis of Temporal-RBAC Using Timed Automata | 13 | 0.64 | 2008 |