Parallel Improved Schnorr-Euchner Enumeration SE++ on Shared and Distributed Memory Systems, With and Without Extreme PruningScalable extensible middleware framework for context-aware mobile applications (SCAMMP)IP based Wireless Sensor Networks: Performance Analysis using Simulations and ExperimentsAn Android Application Protection Scheme against Dynamic Reverse Engineering AttacksReal-Time Implementation of Locality Sensitive Hashing Using NI WSN and LabVIEW for Outlier Detection in Wireless Sensor NetworksA Two-Level Approach to Characterizing Human Activities from Wearable Sensor DataDesign Technique for Secure Embedded Devices: Application for Creation of Integrated Cyber-Physical Security SystemApplication Vulnerabilities in Risk Assessment and ManagementRobust Decentralized Dierentially Private Stochastic Gradient DescentVerifying Group Authentication Protocols by Scyther