Peer-Reviewed Journal / Conference Articles

Evaluating Consumer Behavior, Decision Making, Risks, and Challenges for Buying an IoT Product
M Nasirinejad, S Sampalli
IoT 4 (2), 78-94

Quantum-Safe Asymmetric Cryptosystems: Current Solutions and Future Directions against Quantum Attacks
S Ghosh, M Zaman, S Sampalli
Holistic Approach to Quantum Cryptography in Cyber Security, 99-120

IoT Adoption: Classification Based on Customer Purchase Behavior
M Nasirinejad, S Sampalli
2022 IEEE 8th World Forum on Internet of Things (WF-IoT), 1-2

Investigating the Avalanche Effect of Various Cryptographically Secure Hash Functions and Hash-Based Applications
D Upadhyay, N Gaikwad, M Zaman, S Sampalli
IEEE Access 10, 112472-112486

A Quantum-Based Signcryption for Supervisory Control and Data Acquisition (SCADA) Networks
S Ghosh, M Zaman, B Plourde, S Sampalli
Symmetry 14 (8), 1625

A Novel Distributed Ledger Technology Structure for Wireless Sensor Networks Based on IOTA Tangle
H Zhang, M Zaman, B Stacey, S Sampalli
Electronics 11 (15), 2403

“From Kilobytes to Kilodaltons”: A Novel Algorithm for Medical Image Encryption Based on the Central Dogma of Molecular Biology
A Gupta, S Sampalli
2022 44th Annual International Conference of the IEEE Engineering in Medicine & Biology Society (EMBC)

Persuasive Strategies and Their Implementations in Mobile Interventions for Physical Activity: A Systematic Review
N Aldenaini, A Alslaity, S Sampalli, R Orji
International Journal of Human–Computer Interaction, 1-47

Patients’, pharmacists’, and prescribers’ attitude toward using blockchain and machine learning in a proposed ePrescription system: online survey
B Aldughayfiq, S Sampalli
JAMIA (Journal of the American Medical Informatics Association) Open 5 (1), ooab115

Protecting Routing Data in WSNs with use of IOTA Tangle
R Soltani, L Saxena, R Joshi, S Sampalli
Procedia Computer Science 203, 197-204

Distributed Ledger Technologies and Their Applications: A Review
R Soltani, M Zaman, R Joshi, S Sampalli
Applied Sciences 12 (15), 7898

Quantum-Safe Asymmetric Cryptosystems: Current Solutions and Future Directions against Quantum Attacks
S Ghosh, M Zaman, S Sampalli
Holistic Approach to Quantum Cryptography in Cyber Security, 99-120

Automated labour detection framework to monitor pregnant women with a high risk of premature labour using machine learning and deep learning
H Allahem, S Sampalli
Informatics in Medicine Unlocked 28, 100771

An Efficient Key Management and Multi-layered Security Framework for SCADA Systems
D Upadhyay, M Zaman, R Joshi, S Sampalli
IEEE Transactions on Network and Service Management 19 (1), 642-660

A framework to lower the risk of medication prescribing and dispensing errors: a usability study of an NFC-based mobile application
B Aldughayfiq, S Sampalli
International journal of medical informatics 153, 104509

IEEE Access Special Section Editorial: Blockchain Technology: Principles and Applications
W Zhao, C Rong, J Wu, Z Sun, S Sampalli
IEEE Access 9, 110006-110010

Intrusion Detection in SCADA Based Power Grids: Recursive Feature Elimination Model with Majority Vote Ensemble Algorithm
D Upadhyay, J Manero, M Zaman, S Sampalli
IEEE Transactions on Network Science and Engineering 8 (3), 2559-2574

Digital Health in Physicians’ and Pharmacists’ Office: A Comparative Study of e-Prescription Systems’ Architecture and Digital Security in Eight Countries
Aldughayfiq, B., Sampalli, S.
OMICS: A Journal of Integrative Biology 25 (2), 102-122

Design and Implementation of Raspberry House: An IoT Security Framework
Fei, W., Ohno, H., Sampalli, S.
2020 IEEE International Conference on Internet of Things and Intelligence System (IoTaIS), 1-7

An Intrusion Resistant SCADA Framework Based on Quantum and Post-Quantum Scheme
Ghosh, S., Zaman, M., Sakauye, G., Sampalli, S.
Applied Sciences 11 (5), 2082

Sensing and Signal Processing in Smart Healthcare
Zhao, W., Sampalli, S.
Electronics 9 (11), 1954

Vulnerabilities’ Assessment and Mitigation Strategies for the Small Linux Server, Onion Omega2
Upadhyay, D., Sampalli, S., Plourde, B.
Electronics 9 (6), 967

Trends in Persuasive Technologies for Physical Activity and Sedentary Behavior: A Systematic Review
Aldenaini, N., Alqahtani, F., Orji, R., Sampalli, S.
Frontiers in Artificial Intelligence 3, 7

SCADA (Supervisory Control and Data Acquisition) Systems: Vulnerability Assessment and Security Recommendations
Upadhyay, D., Sampalli, S.
Computers & Security 89, 101666

Gradient Boosting Feature Selection with Machine Learning Classifiers for Intrusion Detection on Power Grids
Upadhyay, D., Manero, J., Zaman, M., Sampalli, S.
IEEE Transactions on Network and Service Management

Automated Uterine Contractions Pattern Detection Framework to Monitor Pregnant Women with a High Risk of Premature Labour
Allahem, H., Sampalli, S.
Informatics in Medicine Unlocked
20, 100404

Mobile Phone-based Persuasive Technology for Physical Activity and Sedentary Behavior: A Systematic Review
Aldenaini, N.F., Oyebode, O., Orji, R., Sampalli, S.
Frontiers in Computer Science 2, 19

How Effective is Personalization in Persuasive Interventions for Reducing Sedentary Behavior and Promoting Physical Activity: A Systematic Review
Aldenaini, N.F., Orji, R., Sampalli, S.

Design, Implementation and Performance Measurement of Raspberry Gate in the IoT Field
Hu, S., Suzuki, H., Kitaguchi, Y., Ohno, H., Sampalli, S.
Proceedings of the 2019 4th International Conference on Cloud Computing and Internet of Things, 82-89

DDoS Detection System: Using a Set of Classification Algorithms Controlled by Fuzzy Logic System in Apache Spark
Alsirhani, A., Sampalli, S., Bodorik, P.
IEEE Transactions on Network and Service Management 16 (3), 936-949

A Survey of Security in SCADA networks: Current Issues and Future Challenges
Ghosh, S., Sampalli, S.
IEEE Access 7, 135812-135831

BraillePassword: Accessible Web Authentication Technique on Touchscreen Devices
Alnfiai, M., Sampalli, S.
Journal of Ambient Intelligence and Humanized Computing 10 (6), 2375-2391

A Machine Learning Based Intrusion Detection Scheme for Data Fusion in Mobile Clouds Involving Heterogeneous Client Networks
Dey, S., Ye, Q., Sampalli, S.
Information Fusion 49, 205-215

Energy-Balancing Unequal Clustering Approach to Reduce the Blind Spot Problem in Wireless Sensor Networks (WSNs)
Islam, N., Dey, S., Sampalli, S.
Sensors 18 (12), 4258

High-Precision Indoor Localization Based on RFID and Stepscan Floor Tiles
Singh, I.P., Ye, Q., Sampalli, S.
2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), 612-617

KD1: A Sampling-Based Clustering Scheme for Large Data Sets
Odebode, A.A., Ye, Q., Sampalli, S., Dey, S.
2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), 822-827

A System to Lower the Risk of Dispensing Medication Errors at Pharmacies Using NFC
Aldughayfiq, B., Sampalli, S.
2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), 196-202

AMLT: A Mutual Authentication Scheme for Mobile Cloud Computing
Dey, S., Ye, Q., Sampalli, S.
IEEE International Conference on Cyber, Physical and Social Computing

Near Field Communication-Based System For Bedside Contraindication Verification
Alabdulhafith, M., Sampalli, S.
Proceedingss of the 8th ACM MobiHoc 2018 Workshop on Pervasive Wireless Healthcare Workshop, 1-7

Defining the Functional Requirements for the NFC-Based Medication Administration and Clinical Communication System
Alabdulhafith, M., Sampalli, S.
2018 IEEE International Conference on Healthcare Informatics (ICHI), 98-102 (Best Paper Award)

Customized Communication between Healthcare Members during the Medication Administration Stage
Alabdulhafith, M., Sampalli, S.
ACM International Conference on Human Computer Interaction with Mobile Devices and Services (MobileHCI 2018)

DDoS Detection System: Utilizing Gradient Boosting Algorithm and Apache Spark
Alsirhani, A., Bodorik, P., Sampalli, S.
IEEE Canadian Conference on Electrical and Computer Engineering (ICCEC)

DDoS Attack Detection System: Utilizing Classification Algorithms with Apache Spark
Alsirhani, A., Bodorik, P., Sampalli, S.
2018 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS), 1-7

Improved Single Tap Braille: Developing a Single Tap Text Entry Method Based on Grade 1 and 2 Braille Encoding
Alnfiai, M., Sampalli, S.
J. Ubiquitous Syst. Pervasive Networks 9 (1), 23-31

Data Fragmentation Scheme: Improving Database Security in Cloud Computing
Alsirhani, A., Bodorik, P., Sampalli, S.
Recent Trends in Computer Applications, 115-138

Improving Database Security in Cloud Computing by Fragmentation of Data
Alsirhani, A., Bodorik, P., Sampalli, S.
2017 International Conference on Computer and Applications (ICCA), 43-49

HiveSec: Security in Resource-Constrained Wireless Networks Inspired by Beehives and Bee Swarms
Sampangi, R.V., Sampaslli, S.
International Journal of Information Security 16 (4), 417-433

BrailleTap: Developing a Calculator Based on Braille Using Tap Gestures
Alnfiai, M., Sampalli, S.
International Conference on Universal Access in Human-Computer Interaction, 213-223

Framework to Monitor Pregnant Women with a High Risk of Premature Labour using Sensor Networks
Allahem, H., Sampalli, S.
2017 IFIP/IEEE Symposium on Integrated Network and Service Management (IM), 1178-1181

Metamorphic Framework for Key Management and Authentication in Resource-Constrained Wireless Networks
Sampangi, R.V., Sampalli, S.
IJ Network Security 19 (3), 430-442

Multi-layered Defense Architecture against Ransomware
Patyal, M., Sampalli, S., Ye, Q., Rahman, M.
International Journal of Business and Cyber Security 1 (2)

BrailleEnter: A Touch Screen Braille Text Entry Method for the Blind
Alnfiai, M., Sampalli, S.
Procedia Computer Science 109, 257-264

MDA: Message Digest-based Authentication for Mobile Cloud Computing
Dey, S., Sampalli S., Ye, Q.
Journal of Cloud Computing 5 (1), 1-13

An Evaluation of SingleTapBraille Keyboard: A Text Entry Method that utilizes Braille Patterns on Touchscreen Devices
Alnfiai, M., Sampalli, S.
8th International ACM SIGACCESS Conference on Computers and Accessibility, 161-169

Group Rekeying Scheme for Dynamic Peer Group Security in Collaborative Networks
Li, D., Sampalli, S. 
IJ Network Security 18 (5), 946-959

Security and Privacy Issues in Mobile Cloud Computing
Dey, S., Sampalli, S., Ye, Q.
International Journal of Business and Cyber Security 1 (1)

Privacy-Enhancing of User’s Behaviour Toward Privacy Settings in Social Networking Sites
Alqarni, A., Sampalli, S.
2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems, 2758-2765

Understanding Nurses’ Perception Regarding the Use of NFC Application During Medication Administration
Alabdulhafith, M., Alqarni, A., Sampalli, S.
2016 CHI Conference Extended Abstracts on Human Factors in Computing Systems, 2976-2983

VirtualEyez: Developing NFC Technology to Enable the Visually Impaired to Shop Independently
Alnfiai, M., Sampalli, S., MacKay, B.
Proceedings of the 2nd International Conference on Computer and Information Science and Technology (CIST’16), Ottawa, Canada

Social and Communication Apps for the Deaf and Hearing Impaired People
Alnfiai, M., Sampalli, S.
The Rehabilitation Engineering and Assistive Technology Society of North America (RESNA), 2016.

Enhancement of GSM stream Cipher Security using Variable Taps Mechanism and Nonlinear Combination Functions on Linear Feedback Shift Registers
Upadhyay, D., Sharma, P., Sampalli, S.
First International Conference on Information and Communication Technology for Intelligent Systems 2, 175-183

SingleTapBraille: Developing a Text Entry Method based on Braille Patterns using a Single Tap
Alnfiai, M., Sampalli, S.
Procedia Computer Science 94, 248-255

A Context-Adaptive Security Framework for Mobile Cloud Computing
Dey, S., Sampalli, S., Ye, Q.
11th IEEE International Conference on Mobile Ad Hoc and Sensor Networks (IEEE MSN 2015)

An Efficient Pairwise and Group Key Management Protocol for Wireless Sensor Network
Rahman, M., Sampalli, S.
Wireless Personal Communications 84 (3), 2035-2053

Butterfly Encryption Scheme for Resource-Constrained Wireless Networks
Sampangi, R.V., Sampalli, S.
Sensors 15 (9), 23145-23167

HIDE: Hybrid Symmetric Key Algorithm for Integrity Check, Dynamic Key Generation and Encryption
Narayanaswamy, J., Sampangi, R.V., Sampalli, S.
2015 International Conference on Information Systems Security and Privacy (ICISSP), 124-131

Lightweight Protocol for Anonymity and Mutual Authentication in RFID Systems
Rahman, M., Sampangi, R.V., Sampalli, S.
2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC), 910-915

HILL: A Hybrid Indoor Localization Scheme
Kharidia, S., Ye, Q., Sampalli, S., Cheng, J., Du, H., Wang, L.
10th IEEE International Conference on Mobile Ad Hoc and Sensor Networks (IEEE MSN 2014), 201-206

A Lightweight Authentication Scheme based on Message Digest and Location for Mobile Cloud Computing
Dey, S., Sampalli, S., Ye, Q.
2014 IEEE 33rd International Performance Computing and Communications Conference (IPCCC), (Poster Paper), 1-2

Fine-grained Encryption for Search and Rescue Operation on Internet of Things
Li, D., Sampalli, S., Aung, Z., Williams, J., Sanchez, A.
Asia-Pacific World Congress on Computer Science and Engineering, 1-9

RFID Encryption Scheme Featuring Pseudorandom Numbers and Butterfly Seed Generation
Sampangi, R.V., Sampalli, S.
2014 22nd International Conference on Software, Telecommunications and Computer Networks (SoftCOM), 128-132
Recognized as the Best Paper in the General Conference Program.

HiveSign: Dynamic Message Signatures for Resource-Constrained Wireless Networks
Sampangi, R. V., Sampalli, S.
Proceedings of the 10th ACM symposium on QoS and Security for Wireless and Mobile Networks, 33-40

SCARS: Simplified Cryptographic Algorithm for RFID Systems
Narayanaswamy, J., Sampangi, R.V., Sampalli, S.
2014 IEEE RFID Technology and Applications Conference (RFID-TA), 32-37 (poster paper).

A Proposed RFID Authentication Protocol based on Two Stages of Authentication
Alqarni, A., Alabdalhafith, M., Sampalli, S.
Procedia Computer Science 37, 503-510

NFC-based Framework for Checking the Five Rights of Medication Administration
Alabdalhafith, M., Sampalli, S.
Procedia Computer Science 37, 434-438

Message Digest as Authentication Entity for Mobile Cloud Computing
Dey, S., Sampalli, S., Ye, Q.
2013 IEEE 32nd International Performance Computing and Communications Conference (IPCCC), 1-6

Energy Efficient Clustering using Fuzzy Logic
Khoshkangini, R., Zaboli, S., Sampalli, S.
International Journal of Computer Science and Mobile Computing (IJCSM) 2, 8-14

Deployment of Multiple Base Stations in Clustering Protocols of Wireless Sensor Networks
Reddy, G.S., Chitare, N., Sampalli, S.
Proceedings of the International Conference on Computing, Communications and Informatics (ICACCI 2013), 1003-1006

Privacy Preservation Scheme for Multicast Communications in Smart Buildings of the Smart Grid
Li, D., Aung, Z., Sampalli, S., Williams, J., Sanchez, A.
Smart Grid and Renewable Energy, vol. 4, no. 4, July 2013, pp.313-324.

RFID Mutual Authentication Protocols for Gene Mutation and Transfer
Sampangi, R.V., Sampalli, S.
International Journal of Communications Software and Systems (JCOMSS) 9 (1), 44-56
Special issue on RFID and Internet of Things

NFC-Enabled Smartphone Application for Drug Interaction and Drug Allergy Detection
Alabdalhafith, M., Sampangi, R.V., Sampalli, S.
2013 5th International Workshop on Near Field Communication (NFC), 1-6

AZR-LEACH: An Energy Efficient Routing Protocol for Wireless Sensor Networks
Khan, Z.A., Sampalli, S.
International Journal of Communications, Network and System Sciences 5 (11), 785

Tag-Server Mutual Authentication Scheme based on Gene Transfer and Gene Mutation
Sampangi, R.V., Sampalli, S.
2012 IEEE Symposium on Computational Intelligence for Security and Defence Applications, 1-8

A Mobile Role-based Access Control System with Identity based Encryption and Zero Knowledge Proof
Khandavilli, P., Rahman, M., Sampalli, S.
2012 IEEE Symposium on Computational Intelligence for Security and Defence Applications, 1-7

A Hybrid Key Management Protocol for Wireless Sensor Networks
Rahman, M., Sampalli, S.
2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications, 769-776

Privacy Preservation for Smart Grid Multicast via Hybrid Group Key Scheme
Li, D., Aung, Z., Sampalli, S., Williams, J., Sanchez, A.
International Conference on Electrical Engineering and Computer Science, 62-69

A Security Suite for Wireless Body Area Networks
Sampangi, R. V., Dey, S., Urs, S., Sampalli, S.
International Journal of Network Security and Its Applications (IJNSA) 4 (1), 97-116

Spanning Tree based Reliable Data Transmission in LEACH
Chitare, N., Rashmi, M., Urs, S., Sampalli, S.
Third International Workshop on Ad Hoc and Ubiquitous Computing, Springer-Verlag, LNISCT, Bangalore, India and International Conference on Computer Science and Information Technology, 506-514 (NSERC)

IAMKeys: Independent and Adaptive Management of Keys for Security in Wireless Body Area Networks
Sampangi, R.V., Dey, S., Urs, S., Sampalli, S.
Third International Workshop on Ad Hoc and Ubiquitous Computing, Springer-Verlag, LNISCT, Bangalore, India and International Conference on Computer Science and Information Technology, 482-494

Vehicle Authentication Scheme based on Random Permutation for VANET
Vighnesh, V., Rao, K., Urs, S., Sampalli, S.
2011 World Congress on Information and Communication Technologies, Mumbai, India, 722-726

A Novel Sender Authentication Scheme Based on Hash Chain for Vehicular Ad Hoc Networks
Vighnesh, V., Rao, K., Urs, S., Sampalli, S.
2011 IEEE Symposium on Wireless Technology & Applications (ISWTA2011), Malaysia, 96-101 (NSERC)

A Novel Reliability Scheme Employing Multiple Sink Nodes for Wireless Body Area Networks
Sampangi, R.V., Urs, S., Sampalli, S.
2011 IEEE Symposium on Wireless Technology & Applications (ISWTA2011), Malaysia, 162-167 (NSERC)

Lightweight Matrix-based Authentication Protocol for RFID
Ramachandra, V., Rahman, M., Sampalli, S.
IEEE 19th International Conference on Software, Telecommunications and Computer Networks (IEEE SoftCom 2011), Split, Croatia, 1-6 (NSERC, Industry Canada)

An Intelligent RFID System for Consumer Businesses
Somasundaram, S., Khandavilli, P., Sampalli, S.
2010 IEEE/ACM International Conference on Green Computing and Communications and International Conference on Cyber, Physical and Social Computing, 539-545 (NSERC, Industry Canada)

Detection and Prevention of Routing Intrusions in Mobile Ad Hoc Networks
Moradiya, P., Sampalli, S.
IEEE/IFIP International Symposium on Trusted Computing and Communications (IEEE/IFIP Trustcom 2010), Hong Kong, and 2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, 542-547 (NSERC, Industry Canada)

A Robust Pairwise and Group Key Management Protocol for Wireless Sensor Network
Rahman, M., Hussain, S., Sampalli, S.
2010 IEEE Globecom workshops on Web and Pervasive Security, Miami, USA, 1528-1532 (NSERC)

Client-based Intrusion Prevention System for 802.11 Wireless Networks
Zhang, Y., Sampalli, S.
6th IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob 2010), Niagara Falls, Ontario, Canada, 100-107 (Industry Canada, NSERC)

Technique for Preventing DoS Attacks on RFID Systems
Tagra, D., Rahman, M., Sampalli, S.
18th IEEE International Conference on Software, Telecommunications and Computer Networks (IEEE SoftCom 2010), Split-Bol, Croatia, 6-10 (NSERC, Industry Canada)

Management Frame Attacks in WiMAX Networks: Analysis and Prevention
Bakthavathsalu, K., Sampalli, S., Ye, Q.
IEEE 7th International Conference on Wireless and Optical Networks (WOCN), Colombo, Sri Lanka, 1-7 (Industry Canada)

Test Suite for Vulnerability Analysis of RFID Systems
Rahman, M., Sampalli, S., Tagra, D., Shah, J., Ramachandra, V., Gugle, Y., Al-Khatari, M., Narayan, K.
International Conference on Wireless Networks (ICWN), World Comp 2010, Las Vegas, NV, USA, 70-75 (NSERC, Industry Canada)

A High Performance Contributory Group Key Management Scheme for Resource-limited Networks
Li, D., Sampalli, S.,
International Conference on Wireless Networks (ICWN), World Comp 2010, Las Vegas, NV, USA, 3-9 (NSERC)

Message from the TrustCom 2009 Symposium Chairs – Volume 2
Wang, G., Yang, L.T., Wu, J., Sampalli, S., Fu, X.
2009 International Conference on Computational Science and Engineering, Vancouver, Canada

Prevention of Management Frame Attacks on 802.11 WLANs
Ge, W., Li, J., Sampalli S.
International Journal of Wireless and Mobile Computing 3 (3), 133-144

Further Improvements of Fast Encryption Algorithm for Multimedia
Li, D., Sampalli, S.
IJ Network Security 7 (2), 187-192

A Hybrid Group Key Management Protocol for Reliable and Authenticated Rekeying
Li, D., Sampalli, S.
IJ Network Security 6 (3), 270-281

Improved Security Mechanism for Mobile IPv6
Li, J., Zhang, P., Sampalli, S.
IJ Network Security 6 (3), 291-300

Periodically Scheduled Burst Flows in Optical Burst Switching Networks
Lei, L., Sampalli, S.
IEEE Fourth International Conference on Wireless and Optical Communication Networks (WOCN 2007), 262-281 (NSERC)

Routing Intrusions on Mobile Ad Hoc Networks: Test bed and Vulnerability Analysis
Sampalli, S., Jamwal, S., Shingne, T., Trabulsi, A., Moradiya, P., Thangaraj, A., Parikh, S.
IEEE International Conference on Software, Telecommunications and Computer Networks (SoftCom 2007), Split-Dubrovnik, Croatia, 1-5 (NSERC, Industry Canada)

An Efficient Contributory Group Rekeying Scheme based on Hash Functions for MANETs
Li, D., Sampalli, S.
2007 IFIP International Workshop on Network and System Security (NSS 2007), Dalian, China, 191-198 (NSERC)

Weight Functions for Shortest Path Routing of Periodically Scheduled Burst Flows
Lei, L., Sampalli, S.
2007 Fourth International Conference on Broadband Communications, Networks and Systems (BROADNETS’07), Raleigh, NC, USA, 41-45 (NSERC)

Detection of Spoofed MAC Addresses in 802.11 Wireless Networks
Tao, K., Li, J., Sampalli, S.
International Conference on E-Business and Telecommunications, 201-213

Cell Mobility based Admission Control for Wireless Networks with Link Adaptation
Li, J., Sampalli, S.
IEEE International Conference on Communications, IEEE ICC 2007, Glasgow, Scotland, 5862-5867 (NSERC)

WISE GUARD: A MAC Address Spoofing Intrusion Detection System for Wireless LANs
Tao, K., Li, J., Sampalli, S.
IEEE International Conference on Security and Cryptography (SECRYPT 2007), Barcelona, Spain (NSERC, Industry Canada)

QoS-Guaranteed Wireless Packet Scheduling for Mixed Services in HSDPA
Li, J., Sampalli, S.
9th ACM-IEEE International Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems (MSWiM 2006), Spain, 126-129 (NSERC)

AAA Architecture for Mobile IP in Overlay Networks
Zhen, Z., Sampalli, S.
Workshop on Network Security, IEEE Local Computer Networks Conference, Sydney, Australia (NSERC)

An Efficient Group Key Establishment in Location-aided Mobile Ad hoc Networks
Li, D., Sampalli, S.
2nd ACM Workshop on Performance Evaluation of Wireless Ad hoc, Sensor, and Ubiquitous Networks (PE-WASUN’05), 57-64, Montreal, Canada (NSERC)

Distributed Online LSP Merging Algorithms for MPLS-TE
Lei, L., Sampalli, S.
Thirteenth IEEE International Workshop on Quality of Service (IWQOS 2005), 366-368, Passau, Germany, LNCS 3552 (NSERC)

Cluster-head Election using Fuzzy Logic for Wireless Sensor Networks
Gupta, I., Riordan, D., Sampalli, S.
Third Annual Conference on Communication Networks and Services Research (CNSR 2005), 255-260, Canada (NSERC)

A Hierarchical Micro-mobility Management Model with QoS Support
Li, J., Sampalli, S.
International Workshop on Mobile and Wireless Computing, MWN 2004 2 (02), 223-241, Montreal, Canada

A Load Balancing Hierarchical Model for Micro-mobility Management
Li, J., Sampalli, S.
IEEE International Conference on Computer Communications and Networks, ICCCN 2004, 347-351, Chicago, USA

Backward Connection Preemption in Multi-class QoS Aware Networks
Lei, L., Sampalli, S.
Twelfth IEEE International Workshop on Quality of Service, IWQOS 2004, 153-160, Montreal, Canada

Secure Architecture for Multicasting on Active Virtual Private Networks
Labonte, C., Sampalli, S.
IEEE Military Communications Conference, MILCOM 2004 1, 301-307, Monterey, CA, USA

Active Networking Approach to the Design of Adaptive Virtual Private Networks
Haggag, Y., Sampalli, S.
IEEE Military Communications Conference, MILCOM 2004 1, 308-314, Monterey, CA, USA

Preventing Replay Attacks for Secure Routing in Ad Hoc Networks
Zhen, J., Sampalli, S.
International Conference on Ad-Hoc Networks and Wireless, 140-150

New Mechanisms for Extending PLAN Functionality in Active Networks
Labonte, C., Srinivas, S.
Lecture Notes in Computer Science (LNCS 1942), Springer Verlag, from the Second International Working Conference on Active Networks, IWAN 2000, 57-70, Tokyo, Japan

IPSec-based Secure Wireless Virtual Private Network
Qu, W., Srinivas, S.
IEEE Military Communications Conference (IEEE MilCom 2002) 2, 1107-1112, California

Agent-based Routing Algorithms on a LAN
Yang, Y., Zincir-Heywood, A.N., Heywood, M.I., Srinivas, S.
2002 IEEE Canadian Conference on Electrical and Computer Engineering 3, 1442-1447, Winnipeg, Canada

Active Network Approach to the Design of Secure Online Auction Systems
Shihada, B., Srinivas, S.
IEEE International Conference on Telecommunications, ICT 2001, Bucharest, Romania

Group Management Strategies for Secure Multicasting Using Active Networks
Labonte, C., Sampalli, S.
IEEE 25th Conference on Local Computer Networks (LCN 2000), 213-222, Florida, USA

Routing Algorithms on Static Interconnection Networks: A Classification Scheme
Demaine, E.D., Srinivas, S.
International Journal of Computer Systems Science and Engineering, 12 (6), 359-367

A New Routing Algorithm for k-ary n-cube Interconnection Networks
Demaine, E.D., Srinivas, S.
International Journal of High Speed Computing 8 (01), 81-92,  World Scientific Press

A Study of the Parallelization and Vectorization of Scientific Codes on the Alliant FX/2800
Srinivas, S.
International Conference on Massively Parallel Computing Systems, MPCS 94, 514-517, Ischia, Italy

A Fast Algorithm for Data Exchange in Reconfigurable Tree Structures
Srinivas, S., Biswas, N.N. 
International Journal of Computer Systems Science and Engineering, CRL Publishing Ltd. 11 (4), 235-244 and First International Conference on Massively Parallel Computing Systems (MPCS) The Challenges of General-Purpose and Special-Purpose Computing, 554-563

Design and Analysis of a Generalized Architecture for Reconfigurable m-ary Tree Structures
Srinivas, S., Biswas, N.N.
IEEE Transactions on Computers 41 (11), 1465-1478

A MIN-based Architecture for Reconfigurable de Bruijn Structures
Srinivas, S., Thulasiraman, K., Swamy, M.N.S. 
International Journal of High Speed Electronics and Systems 3 (03n04), 279-296

Pipelined Ring Algorithm for Matrix Multiplication on Transputer Networks
Srinivas, S., Basu, A., Paulraj, A., Patnaik, L.M.
International Journal of Computer Systems Science and Engineering 7 (1), 42-51

A Parallel Algorithm for Logic Simulation on Transputer Networks
Srinivas, S., Basu, A., Paulraj, A., Patnaik, L.M.
First Great Lakes Symposium on VLSI, 249-254

A Reconfigurable Tree Architecture with Multistage Interconnection Network
Biswas, N. N., Srinivas, S.
IEEE Transactions on Computers 39 (12), 1481-1485

Studies on the Performance of a Parallel Iterative Algorithm on Transputer Arrays
Srinivas, S., Basu, A., Paulraj, A., Patnaik, L. M.
International Journal of High Speed Computing 2 (03), 265-287

Performance Analysis of Message Passing Multiprocessors
Basu, A., Srinivas, S., Paulraj, A., Kumar, K.G.
Computer Engineering Journal 71, 19-23 and Centre for Development of Advanced Computing, Bangalore, India

Parallel Matrix Multiplication on Transputer Networks: Performance Analysis and Estimation
Basu, A., Srinivas, S., Paulraj, A., Kumar, K.G.
Centre for Development of Advanced Computing, Bangalore (India)

A Model for Performance Prediction of Message passing Multiprocessors achieving Concurrency by Domain Decomposition
Basu, A., Srinivas, S., Paulraj, A., Kumar, K.G.
CONPAR 90—VAPP IV, 75-85

An Efficient Global Convergence Detection Scheme for Parallel Algorithms on Transputer Networks
Basu, A., Srinivas, S., Paulraj, A., Kumar, K.G.
Tools and Techniques for Transputer Applications: OUG-12: 12th Occam User Group Technical Meeting, 68, Exeter, England

Simple Methods for the Calculation of Root of a Reconfigurable Binary Tree Structure
Biswas, N.N., Srinivas, S.
Proceedings of the IEEE 75 (12), 1690-1692

Fault Tolerance in Multiprocessor Systems
Biswas, N.N., Srinivas, S.
Sadhana 11 (1-2), 93-110

A Centrally Controlled Shuffle Network for Reconfigurable and Fault-tolerant Architecture
Biswas, N.N., Srinivas, S., Dharanendra, T.
ACM SIGARCH Computer Architecture News 15 (1), 81-87

Novel Reconfigurable Tree Machine
Biswas, N.N., Srinivas, S.
Electronics letters 23 (21), 1144-1145

Anomaly Detection Scheme for Routing Intrusions on Mobile Ad Hoc Networks
Thangaraj, A., Sampalli, S.
International Conference on Wireless Networks (ICWN 2009), Las Vegas, USA (NSERC, Industry Canada)

Saving Public Addresses in Mobile IP
Zhen, Z., Sampalli, S.
International Conference on Networking and International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICNICONSMCL’06), Mauritius (NSERC)

Parallelism Analysis and Optimization in SPEFY, A Programming Environment
Li, M., Moriarty, K.J.M., Srinivas, S.
Computer Physics Communications, Vol. 79, January 1994, pp.1-12.

Efficient Periodic Batch Group Rekeying for Dynamic Peer Groups
Li, D., Sampalli, S.
17th International Conference on Computer Communications and Networks (ICCCN), US Virgin Islands, August 2008 (NSERC)

Tunnel Traffic Shaper Architecture for Improving Security in Wireless Networks
Qu, W., Srinivas, S.
International Conference on Wireless Networks (ICWN 2002), Las Vegas, USA, June 2002.

Secure Mobile IP System using IPSec
Liu, S., Srinivas, S.
Proceedings of Systemics, Cybernetics and Informatics (SCI 2002), July 2002, Orlando, USA

On the Design of a VPN-on-demand Protocol using Active Networks
Rouse, J., Fifield, J., Srinivas, S.
IEEE International Conference on Telecommunications (ICT 2001), Bucharest, Romania, June 2001

Building Dynamic VPN Multicast Trees using Active Networks
Haggag, Y., Srinivas, S.
DIMACS Workshop on Multicasting, Rutgers University, USA, May 2-4, 2001

SPHINX: A new switch architecture for ATM networks
Moawad, I., Srinivas, S.
International Conference on Massively Parallel Computing Systems (MPCS 96), Ischia, Italy, May 1996

Perspectives on using ATM networks for Distance Education
Srinivas, S.
Proceedings of the Workshop on ECE Education and Research in India: Future Directions, Bangalore, India, July 1996

Current Trends in ATM Networks: Realities and Challenges
Srinivas, S.
International Conference on Massively Parallel Computing Systems (MPCS 96), Ischia, Italy, May 1996

Buffering and Cell-selection Algorithms for a New Switch for ATM-based Computer Networks
Moawad, I., Srinivas, S.
IASTED International Conference on Computer Applications in Industry, Cairo, December 1995.

Direction first e-cube: A New Routing Algorithm for k-ary n-cube Networks
Demaine, E., Srinivas, S.
Proceedings of the High Performance Computing Symposium, 329-338, Montreal, Canada, 1995

Compiler-directed Cache Coherence in Multiprocessors
Malek, E., Srinivas, S.
International Conference on Computer Systems and Education, 32-46, India, 1994

A Nevel Compiler-directed Technique for maintaining Cache Coherence using Array Partitioning
Malek, E., Srinivas, S.
Proceedings of the High Performance Computing Symposium, Toronto, Canada, 1994

A New Reconfiguration Model for Fault-tolerant Architectures
Srinivas, S.
IEEE International Workshop on Fault and Error Models of Failures in Computer Systems, Florida, USA, January 1993

Security in Virtual Private Networks
Sampalli, S.
Network Security: Current Status and Future Directions, 51-63, C. Douligeris (Editor), IEEE Press

Security Architectures with Active Networks
Sampalli, S., Haggag, Y., Labonte, C.
Network Security: Current Status and Future Directions, 135-151, C. Douligeris (Editor), IEEE Press

Biswas-Srinivas Shortest Paths Algorithm
Biswas, N.N., Srinivas, S.
Computer Networks: An Introduction by N.N. Biswas, Adventure Books, ISBN 81-900876-1-4, 2000.

Title of the Invention: A Robust Pair-wise and Group Key Management Protocol for Wireless Sensor Networks US
Inventors: Rahman, M., Hussain, S., Sampalli, S.
Provisional Patent filed on June 15, 2010, Application Number: 61354867, EFS Number: 7816186.

Title of the Invention: Empowering NFC-enabled Smartphones with any Cloud Application
Inventors: Kolybaba, B., Sampalli, S., Rahman, M., Khandivilli, P., Palanivelu, K.
Provisional Patent filed on November 4, 2012.

Title of the Invention: Verified Interaction Network
Inventors: Sampalli, S., Rahman, M., Sharma, G., Thomas, B.
Provisional Patent filed on July 2, 2013. US 61/842, 018