Shambhu Upadhyaya

Affiliations: 
Computer Science and Engineering State University of New York, Buffalo, Buffalo, NY, United States 
Area:
Computer Science
Google:
"Shambhu Upadhyaya"
BETA: Related publications

Publications

You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Tong M, Sanzgiri A, Koutsonikolas D, et al. (2016) Twitter structure as a composition of two distinct networks 2016 International Conference On Computing, Networking and Communications, Icnc 2016
Sun Y, Upadhyaya S. (2015) Secure and privacy preserving data processing support for active authentication Information Systems Frontiers. 17: 1007-1015
Mehresh R, Upadhyaya S. (2015) Surviving advanced persistent threats in a distributed environment – Architecture and analysis Information Systems Frontiers. 17: 987-995
Duan Q, Virendra M, Upadhyaya S, et al. (2014) Minimum Cost Blocking Problem in Multi-Path Wireless Routing Protocols Ieee Transactions On Computers. 63: 1765-1777
Ryu C, Sharman R, Rao HR, et al. (2010) Security protection design for deception and real system regimes: A model and analysis European Journal of Operational Research. 201: 545-556
Jadliwala M, Duan Q, Xu J, et al. (2007) On extracting consistent graphs in wireless sensor networks International Journal of Sensor Networks. 2: 149-162
Upadhyaya S, Setiya R. (2007) Optimization of antnet routing through agent based intelligence Proceedings of the 2007 International Conference On Artificial Intelligence, Icai 2007. 2: 781-785
Ramaswami SS, Upadhyaya S. (2006) Smart handling of colluding black hole attacks in MANETs and wireless sensor networks using multipath routing Proceedings of the 2006 Ieee Workshop On Information Assurance. 2006: 253-260
Virendra M, Upadhyaya S. (2004) SWAN: A secure wireless LAN architecture Proceedings - Conference On Local Computer Networks, Lcn. 216-223
Ramamurthy B, Upadhyaya S, Bhargava B. (2000) Design and analysis of an integrated checkpointing and recovery scheme for distributed applications Ieee Transactions On Knowledge and Data Engineering. 12: 174-186
See more...