Publications
2024 (1)
DQN approach for Adaptive Self-healing of VNFs in Cloud-native Network. Arulappan, A., Mahanti, A., Passi, K., Thiruvenkadam, S., Naha, R., & Raja, G. (2024). IEEE Access. link
2023 (11)
Bankruptcy prediction for imbalanced dataset using oversampling and ensemble machine learning methods. Chowdhury, A., Kaisar, S., & Naha, R. (2023, November). In AIP Conference Proceedings (Vol. 2968, No. 1). AIP Publishing. link
Application and user-specific data prefetching and parallel read algorithms for distributed file systems. Nalajala, A., Ragunathan, T., Naha, R., & Battula, S. K. (2023). Cluster Computing, 1-21. link
Comprehensive Analysis of Feature Extraction Techniques and Runtime Performance Evaluation for Phishing Detection. Nath, S., Islam, M. M., Chowdhury, A., Rashid, M. R. A., Islam, M., Jabid, T., & Naha, R. (2023, October). In 2023 6th International Conference on Applied Computational Intelligence in Information Systems (ACIIS) (pp. 1-6). IEEE. link
Leveraging oversampling techniques in machine learning models for multi-class malware detection in smart home applications. Chowdhury, A., Isalm, M., Kaisar, S., Naha, R., Khoshkholghi, A., Aiash, M., & Khoda, M. (2023, September). In IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). link
Performance and cryptographic evaluation of security protocols in distributed networks using applied pi calculus and Markov Chain. Edris, E. K. K.; Aiash, M.; Khoshkholghi, M. A.; Naha, R.; Chowdhury, A.; and Loo, J. Internet of Things, 100913. 2023 (In Press). link
An Agriprecision Decision Support System for Weed Management in Pastures. Chegini, H.; Naha, R.; Mahanti, A.; Gong, M.; and Passi, K. IEEE Access, 11: 92660 - 92675. 2023. link
Defending SDN against packet injection attacks using deep learning. Phu, A. T.; Li, B.; Ullah, F.; Huque, T. U.; Naha, R.; Babar, M. A.; and Nguyen, H. Computer Networks, 234: 109935. 2023. link
Information fusion-based cybersecurity threat detection for intelligent transportation system. Chowdhury, A.; Naha, R.; Kaisar, S.; Khoshkholghi, M. A.; Ali, K.; and Galletta, A. In 2023 IEEE/ACM 23rd International Symposium on Cluster, Cloud and Internet Computing Workshops (CCGridW), pages 96–103, 2023. IEEE link
IoT-based emergency vehicle services in intelligent transportation system. Chowdhury, A.; Kaisar, S.; Khoda, M. E; Naha, R.; Khoshkholghi, M. A.; and Aiash, M. Sensors, 23(11): 5324. 2023. link
HRFP: Highly Relevant Frequent Patterns-Based Prefetching and Caching Algorithms for Distributed File Systems. Nalajala, A.; Ragunathan, T; Naha, R.; and Battula, S. K. Electronics, 12(5): 1183. 2023. link
Fog Device-as-a-Service (FDaaS): A Framework for Service Deployment in Public Fog Environments. Battula, S. K.; Garg, S.; Montgomery, J.; and Naha, R. arXiv preprint arXiv:2304.01915. 2023. link
2022 (5)
Multiple linear regression-based energy-aware resource allocation in the fog computing environment. Naha, R.; Garg, S.; Battula, S. K.; Amin, M. B.; and Georgakopoulos, D. Computer Networks, 216: 109240. 2022.
A blockchain-based framework for automatic SLA management in fog computing environments. Battula, S. K.; Garg, S.; Naha, R.; Amin, M. B.; Kang, B.; and Aghasian, E. The Journal of Supercomputing, 78(15): 16647–16677. 2022.
Secure IoT Data Using Blockchain. Dhatrak, A.; Gong, M.; Naha, R.; and Mahanti, A. In Emerging Real-World Applications of Internet of Things, pages 1–20. CRC Press, 2022.
Analysis of Applying Blockchain Technology to Hospitality Operation. Yeung, K. A.; Gong, M.; Naha, R.; and Mahanti, A. In Emerging Real-World Applications of Internet of Things, pages 103–132. CRC Press, 2022.
Efficient Prefetching and Client-Side Caching Algorithms for Improving the Performance of Read Operations in Distributed File Systems. Nalajala, A.; Ragunathan, T.; and Naha, R. IEEE Access, 10: 126232–126252. 2022.
2021 (11)
Multi-criteria–based Dynamic User Behaviour–aware Resource Allocation in Fog Computing. Naha, R. K.; and Garg, S. ACM Transactions on Internet of Things, 2(1): 1–31. 2021.
SMOaaS: a Scalable Matrix Operation as a Service model in Cloud. Ujjwal, K.; Battula, S. K.; Garg, S.; Naha, R. K.; Patwary, M. A. K.; and Brown, A. The Journal of Supercomputing, 77: 3381–3401. 2021.
Computationally efficient path planning algorithm for autonomous vehicle. Debnath, S.; Omar, R; Latip, N.; Bagchi, S; Sabudin, E.; Mumin, A.; Soomro, A.; Nafea, M; Muhammad, B.; and Naha, R. K. . 2021.
Process automation in an IoT–fog–cloud ecosystem: A survey and taxonomy. Chegini, H.; Naha, R. K.; Mahanti, A.; and Thulasiraman, P. IoT, 2(1): 92–118. 2021.
Providing consistent state to distributed storage system. Talluri, L. S. R. K.; Thirumalaisamy, R.; Kota, R.; Sadi, R. P. R.; KC, U.; Naha, R. K.; and Mahanti, A. Computers, 10(2): 23. 2021.
Fuzzy Logic-based Robust Failure Handling Mechanism for Fog Computing. Naha, R. K.; Garg, S.; Amin, M. B.; and Ranjan, R. arXiv preprint arXiv:2103.06381. 2021.
Characterisation and comparative analysis of thematic video portals. Adib, S. A.; Mahanti, A.; and Naha, R. K. Technology in Society, 67: 101690. 2021.
Reliable scheduling and resource allocation for IoT applications in fog computing. Naha, R. K. Ph.D. Thesis, University Of Tasmania, 2021.
Mobility-Based Resource Allocation and Provisioning in Fog and Edge Computing Paradigms: Review, Challenges, and Future Directions. Battula, S. K.; Naha, R. K.; KC, U.; Hameed, K.; Garg, S.; and Amin, M. B. Mobile Edge Computing,251–279. 2021.
Towards secure fog computing: A survey on trust management, privacy, authentication, threats and access control. Patwary, A. A.; Naha, R. K.; Garg, S.; Battula, S. K.; Patwary, M. A. K.; Aghasian, E.; Amin, M. B.; Mahanti, A.; and Gong, M. Electronics, 10(10): 1171. 2021.
Process Automation in an IoT–Fog–Cloud Ecosystem: A Survey and Taxonomy. IoT 2021, 2, 92–118. Chegini, H; Naha, R.; Mahanti, A; and Thulasiraman, P 2021.
2020 (13)
Deadline-based dynamic resource allocation and provisioning algorithms in fog-cloud environment. Naha, R. K.; Garg, S.; Chan, A.; and Battula, S. K. Future Generation Computer Systems, 104: 131–141. 2020.
IoTSim-Edge: a simulation framework for modeling the behavior of Internet of Things and edge computing environments. Jha, D. N.; Alwasel, K.; Alshoshan, A.; Huang, X.; Naha, R. K.; Battula, S. K.; Garg, S.; Puthal, D.; James, P.; Zomaya, A.; and others Software: Practice and Experience, 50(6): 844–867. 2020.
A-CAFDSP: An adaptive-congestion aware Fibonacci sequence based data scheduling policy. Sharma, V. K.; Verma, L. P.; Kumar, M.; Naha, R. K.; and Mahanti, A. Computer Communications, 158: 141–165. 2020.
Energy efficient elliptical concave visibility graph algorithm for unmanned aerial vehicle in an obstacle-rich environment. Debnath, S. K.; Omar, R.; Bagchi, S.; Nafea, M.; Naha, R. K.; and Sabudin, E. N. In 2020 IEEE international conference on automatic control and intelligent systems (I2CACIS), pages 129–134, 2020. IEEE
FogAuthChain: A secure location-based authentication scheme in fog computing environments using Blockchain. Patwary, A. A.; Fu, A.; Battula, S. K.; Naha, R. K.; Garg, S.; and Mahanti, A. Computer Communications, 162: 212–224. 2020.
Blockchain for cybersecurity and privacy: architectures, challenges, and applications. Maleh, Y.; Shojafar, M.; Alazab, M.; and Romdhani, I. . 2020.
Towards Secure Internet of Things: Blockchain Solutions, Challenges, and Open Issues. Naha, R. K.; Battula, S. K.; Hameed, K.; Ujjwal, K.; Patwary, M. A. K.; Garg, S.; and Kang, B. In Blockchain for Cybersecurity and Privacy, pages 85–113. CRC Press, 2020.
A realistic and efficient real-time plant environment simulator. Seo, J.; Gong, M.; Naha, R. K.; and Mahanti, A. In 2020 International Symposium on Networks, Computers and Communications (ISNCC), pages 1–6, 2020. IEEE
Piracy on the internet: publisher-side analysis on file hosting services. Chan, M.; Gong, M.; Naha, R. K.; and Mahanti, A. In 2020 International Symposium on Networks, Computers and Communications (ISNCC), pages 1–7, 2020. IEEE
Machine learning-based modelling for museum visitations prediction. Yap, N.; Gong, M.; Naha, R. K.; and Mahanti, A. In 2020 International Symposium on Networks, Computers and Communications (ISNCC), pages 1–7, 2020. IEEE
How augment reality helps during the coronavirus pandemic. Burov, O; Kiv, A; Semerikov, S; and Kolgatina, L In 2020. CEUR Workshop Proceedings Volume 2731, 3rd International Workshop on …
Authentication, access control, privacy, threats and trust management towards securing fog computing environments: A review. Patwary, A. A.; Fu, A.; Naha, R. K.; Battula, S. K.; Garg, S.; Patwary, M. A. K.; and Aghasian, E. arXiv preprint arXiv:2003.00395. 2020.
SMOaaS: a Scalable Matrix Operation as a Service model in Cloud. KC, U.; Battula, S.; Garg, S.; Naha, R. K.; Patwary, M.; and Brown, A. . 2020.
2019 (2)
A micro-level compensation-based cost model for resource allocation in a fog environment. Battula, S. K.; Garg, S.; Naha, R. K.; Thulasiraman, P.; and Thulasiram, R. Sensors, 19(13): 2954. 2019.
Towards Secure Internet of Things: Blockchain Solutions, Challenges, and Open Issues. Naha, R. K.; Battula, S. K.; Hameed, K.; KC, U.; Patwary, M. A. K.; Garg, S.; Kang, undefined; and Byeong In Blockchain for Cybersecurity and Privacy (URL: https://www.routledge.com/Blockchain-for-Cybersecurity-and-Privacy-Architectures-Challenges-and/Maleh-Shojafar-Alazab-Romdhani/p/book/9780367343101). CRC Press, 2019.
2018 (4)
Fog computing: Survey of trends, architectures, requirements, and research directions. Naha, R. K.; Garg, S.; Georgakopoulos, D.; Jayaraman, P. P.; Gao, L.; Xiang, Y.; and Ranjan, R. IEEE access, 6: 47980–48009. 2018.
link BibTeX
Evaluation of Energy-efficient VM Consolidation for Cloud Based Data Center-Revisited. Akhter, N.; Othman, M.; and Naha, R. K. arXiv preprint arXiv:1812.06255. 2018.
Energy-aware virtual machine selection method for cloud data center resource allocation. Akhter, N.; Othman, M.; and Naha, R. K. arXiv preprint arXiv:1812.08375. 2018.
Fog Computing Architecture: Survey and Challenges. Naha, R. K.; Garg, S.; and Chan, A. arXiv preprint arXiv:1811.09047. 2018.
2017 (2)
Diverse approaches to cloud brokering: innovations and issues. Naha, R. K.; Othman, M.; and Akhter, N. International Journal of Communication Networks and Distributed Systems, 19(1): 99–120. 2017.
Reliable scheduling and resource allocation for Big Data IoT applications in Fog computing. Naha, R. K.; Garg, S.; and Chan, A. In 11th Annual Graduate Research Conference, 2017. http://www.utas.edu.au/__data/assets/pdf_file/0014/1021325/2017-Graduate …
2016 (1)
Cost-aware service brokering and performance sentient load balancing algorithms in the cloud. Naha, R. K.; and Othman, M. Journal of Network and Computer Applications, 75: 47–57. 2016.
2015 (2)
Evaluation of cloud brokering algorithms in cloud based data center. Naha, R. K.; Othman, M.; and Akhter, N. Far East Journal of Electronics and Communications, 15(2): 85–98. 2015.
Performance-aware cost-effective brokering and load balancing algorithms for data center in large scale cloud computing. Naha, R. K. 2015.
2014 (2)
Brokering and Load-Balancing Mechanism in the Cloud–Revisited. Naha, R. K.; and Othman, M. IETE Technical Review, (ahead-of-print): 271–276. 2014.
Optimized load balancing for efficient resource provisioning in the cloud. Naha, R. K.; and Othman, M. In 2014 IEEE 2nd International Symposium on Telecommunication Technologies (ISTT), pages 442–445, 2014. IEEE