Follow
Rashmi Sahay
Rashmi Sahay
Faculty of Science and Technology (IcfaiTech), The ICFAI Foundation for Higher Education, Hyderabad
Verified email at hyderabad.bits-pilani.ac.in
Title
Cited by
Cited by
Year
Attack graph—Based vulnerability assessment of rank property in RPL-6LOWPAN in IoT
R Sahay, G Geethakumari, K Modugu
2018 IEEE 4th World Forum on Internet of Things (WF-IoT), 308-313, 2018
552018
A novel blockchain based framework to secure IoT-LLNs against routing attacks
R Sahay, G Geethakumari, B Mitra
Computing 102 (11), 2445-2470, 2020
492020
Efficient framework for detection of version number attack in internet of things
R Sahay, G Geethakumari, B Mitra, I Sahoo
Intelligent Systems Design and Applications: 18th International Conference …, 2020
192020
Exponential smoothing based approach for detection of blackhole attacks in IoT
R Sahay, G Geethakumari, B Mitra, V Thejas
2018 IEEE International Conference on Advanced Networks and …, 2018
192018
A novel network partitioning attack against routing protocol in internet of things
R Sahay, G Geethakumari, B Mitra
Ad Hoc Networks 121, 102583, 2021
152021
Mitigating the worst parent attack in RPL based internet of things
R Sahay, G Geethakumari, B Mitra
Cluster Computing 25 (2), 1303-1320, 2022
142022
Investigating packet dropping attacks in RPL-DODAG in IoT
R Sahay, G Geethakumari, B Mitra, N Goyal
2019 IEEE 5th International Conference for Convergence in Technology (I2CT), 1-5, 2019
112019
A holistic framework for prediction of routing attacks in IoT-LLNs
R Sahay, G Geethakumari, B Mitra
The Journal of Supercomputing 78 (1), 1409-1433, 2022
92022
Traffic convergence detection in IoT LLNs: a multilayer perceptron based mechanism
R Sahay, G Geethakumari, K Modugu, B Mitra
2018 IEEE symposium series on computational intelligence (SSCI), 1715-1722, 2018
72018
A feedforward neural network based model to predict sub-optimal path attack in IoT-LLNs
R Sahay, G Geethakumari, B Mitra
2020 20th IEEE/ACM International Symposium on Cluster, Cloud and Internet …, 2020
62020
Attack graph—based vulnerability assessment of rank property in RPL-6LOWPAN in IoT. In 2018 IEEE 4th World Forum on Internet of Things (WF-IoT)
R Sahay, G Geethakumari, K Modugu
IEEE, 2018
62018
Partitioning Attacks Against RPL in the Internet of Things Environment
R Sahay, G Geethakumari, B Mitra
Edge Analytics: Select Proceedings of 26th International Conference—ADCOM …, 2022
22022
IB-RPL: Embedding Isolation and Blacklisting of Malicious Nodes in RPL for Securing IoT-LLNs
R Sahay, G Geethakumari, B Mitra
2021 IEEE International Conference on Advanced Networks and …, 2021
22021
Optimizing elliptic curve domain parameters using genetic algorithms
VSS Sriram, R Ramadas, R Sahay, G Sahoo
International Journal of Secure Digital Information Age 1 (2), 2009
22009
Investigating Vulnerabilities of Information Solicitation Process in RPL-Based IoT Networks
R Sahay, CG Sushant
International Conference on Frontiers of Intelligent Computing: Theory and …, 2023
2023
Comparative Analysis of Machine Learning Models for Customer Segmentation
P Joga, B Harshini, R Sahay
International Conference on Intelligent Systems Design and Applications, 49-61, 2022
2022
Mitigating the worst parent attack in RPL based internet of things (vol 25, pg 1303, 2022)
R Sahay, G Geethakumari, B Mitra
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS 25 …, 2022
2022
Correction: Mitigating the worst parent attack in RPL based internet of things.
R Sahay, G Geethakumari, B Mitra
Clust. Comput. 25 (5), 3765, 2022
2022
Securing the Internet of Things Environment against RPL Attacks
R Sahay
Pilani, 2021
2021
Popular Metaheuristic Optimization Techniques
MK Deep, R Sahay
University Science Press, 2010
2010
The system can't perform the operation now. Try again later.
Articles 1–20