Ranesh Kumar Naha, PhD
Ranesh Kumar Naha, PhD
School of ICT, University of Tasmania, Australia.
Verified email at utas.edu.au
Title
Cited by
Cited by
Year
Fog computing: Survey of trends, architectures, requirements, and research directions
RK Naha, S Garg, D Georgakopoulos, PP Jayaraman, L Gao, Y Xiang, ...
IEEE access 6, 47980-48009, 2018
2972018
Cost-aware service brokering and performance sentient load balancing algorithms in the cloud
RK Naha, M Othman
Journal of Network and Computer Applications 75, 47-57, 2016
562016
Deadline-based dynamic resource allocation and provisioning algorithms in fog-cloud environment
RK Naha, S Garg, A Chan, SK Battula
Future Generation Computer Systems 104, 131-141, 2020
532020
IoTSim‐Edge: A simulation framework for modeling the behavior of Internet of Things and edge computing environments
DN Jha, K Alwasel, A Alshoshan, X Huang, RK Naha, SK Battula, S Garg, ...
Software: Practice and Experience 50 (6), 844-867, 2020
342020
A micro-level compensation-based cost model for resource allocation in a fog environment
SK Battula, S Garg, RK Naha, P Thulasiraman, R Thulasiram
Sensors 19 (13), 2954, 2019
192019
Brokering and Load-Balancing Mechanism in the Cloud–Revisited
RK Naha, M Othman
IETE Technical Review, 271-276, 2014
182014
Fog Computing Architecture: Survey and Challenges
RK Naha, S Garg, A Chan
arXiv preprint arXiv:1811.09047, 2018
172018
Blockchain for cybersecurity and privacy: architectures, challenges, and applications
Y Maleh, M Shojafar, M Alazab, I Romdhani
CRC Press, 2020
162020
Evaluation of cloud brokering algorithms in cloud based data center
RK Naha, M Othman, N Akhter
Far East Journal of Electronics and Communications 15 (2), 85-98, 2015
112015
Optimized load balancing for efficient resource provisioning in the cloud
RK Naha, M Othman
2014 IEEE 2nd International Symposium on Telecommunication Technologies …, 2014
102014
Authentication, access control, privacy, threats and trust management towards securing fog computing environments: A review
AAN Patwary, A Fu, RK Naha, SK Battula, S Garg, MAK Patwary, ...
arXiv preprint arXiv:2003.00395, 2020
82020
FogAuthChain: A secure location-based authentication scheme in fog computing environments using Blockchain
AAN Patwary, A Fu, SK Battula, RK Naha, S Garg, A Mahanti
Computer Communications 162, 212-224, 2020
72020
Process Automation in an IoT–Fog–Cloud Ecosystem: A Survey and Taxonomy
H Chegini, RK Naha, A Mahanti, P Thulasiraman
IoT 2 (1), 92-118, 2021
62021
Multi-criteria--based Dynamic User Behaviour--aware Resource Allocation in Fog Computing
RK Naha, S Garg
ACM Transactions on Internet of Things 2 (1), 1-31, 2021
52021
A-CAFDSP: An adaptive-congestion aware Fibonacci sequence based data scheduling policy
VK Sharma, LP Verma, M Kumar, RK Naha, A Mahanti
Computer Communications 158, 141-165, 2020
42020
Energy-aware virtual machine selection method for cloud data center resource allocation
N Akhter, M Othman, RK Naha
arXiv preprint arXiv:1812.08375, 2018
42018
Diverse approaches to cloud brokering: innovations and issues
RK Naha, M Othman, N Akhter
International Journal of Communication Networks and Distributed Systems 19 …, 2017
42017
Energy Efficient Elliptical Concave Visibility Graph Algorithm for Unmanned Aerial Vehicle in an Obstacle-rich Environment
SK Debnath, R Omar, S Bagchi, M Nafea, RK Naha, EN Sabudin
2020 IEEE International Conference on Automatic Control and Intelligent …, 2020
32020
Evaluation of Energy-efficient VM Consolidation for Cloud Based Data Center-Revisited
N Akhter, M Othman, RK Naha
arXiv preprint arXiv:1812.06255, 2018
32018
Towards Secure Fog Computing: A Survey on Trust Management, Privacy, Authentication, Threats and Access Control
AAN Patwary, RK Naha, S Garg, SK Battula, MAK Patwary, E Aghasian, ...
Electronics 10 (10), 1171, 2021
22021
The system can't perform the operation now. Try again later.
Articles 1–20