Skip to main content

Dr. Meg

Areas of Research Interests

Wireless Ad hoc NetworksI,   Sensor NetworksII,   Network Science and Graph TheoryIII,    Other Areas (incl. Bioinformatics, Cyber Security)IV

Peer-reviewed Journal Papers
Peer-reviewed Conference Papers
Books/Videos
Book Chapters

Abstracts and Poster Presentations
Publication Profile

Peer-reviewed Journals

[107]III N. Meghanathan, “A Comprehensive Analysis of the Correlation between Maximal Clique Size and Centrality Metrics for Complex Network Graphs,” Egyptian Informatics Journal, vol. 22, no. 3, pp. 339-355, September 2021.

[106]III N. Meghanathan, A. Essien and R. Lawrence, “A two-hop neighbor preference-based random network graph model with high clustering coefficient for modeling real-world complex networks,” Egyptian Informatics Journal, vol. 22, no. 3, pp. 389-400, September 2021.

[105]III N. Meghanathan, “Neighborhood-based Bridge Node Centrality Tuple for Complex Network Analysis,” Springer Applied Network Science, vol. 6, no. 47, pp. 1-36, June 2021.

[104]III N. Meghanathan, “Exploring the Step Function Distribution of the Threshold Fraction of Adopted Neighbors vs. Minimum Fraction of Nodes as Initial Adopters to Assess the Cascade Blocking Intra-Cluster Density of Complex Real-World Networks,” Springer Applied Network Science, vol. 5, no. 97, pp. 1-33, December 2020. Published as part of Special issue on Epidemics Dynamics & Control on Networks 

[103]I N. Meghanathan, “Binary Search Algorithm to Predict the Time of Next Link Change for Wireless Mobile Networks,” Inderscience International Journal of Mobile Network Design and Innovation, vol. 10, no. 1, pp. 17-28, 2020.

[102]I N. Meghanathan, “A Binary Search Algorithm to Determine the Minimum Transmission Range for Minimum Connected Dominating Set of a Threshold Size in Ad hoc Networks,” International Journal of Wireless Networks and Broadband Technologies, vol. 9, no. 2, pp. 1-16, 2020.

[101]III N. Meghanathan, “Edge Similarity Index for Complex Network Analysis,” International Journal of Combinatorial Optimization Problems and Informatics, vol. 11, no. 3, pp. 76-96, September-December 2020. Link

[100]III N. Meghanathan, “Relative Assortativity Index: A Quantitative Metric to Assess the Impact of Link Prediction Techniques on Assortativity of Complex Networks,” The Computer Journal, vol. 63, no. 9, pp. 1417-1437, September 2020. DOI: 10.1093/comjnl/bxz089. 

[99]II N. Meghanathan, “An Ensemble Approach to Analyze Mobile Sensor Networks,” Inderscience International Journal of Mobile Network Design and Innovation, vol. 9, no. 3/4, pp. 142-152, 2019.

[98]III N. Meghanathan, “Centrality and Partial Correlation Coefficient-based Assortativity Analysis of Real-World Networks,” The Computer Journal, vol. 62, no. 9, pp. 1247-1264, September 2019. Link

[97]III N. Meghanathan, ” Unit Disk Graph-based Node Similarity Index for Complex Network Analysis,” Hindawi Complexity, vol. 2019, Article ID: 6871874, 22 pages, March 2019. Link

[96]III N. Meghanathan, “δ-Space for Real-World Networks: A Correlation Analysis of Decay Centrality vs. Degree Centrality and Closeness Centrality,” Elsevier Journal of King Saud University – Computer and Information Sciences, vol. 30, no. 3, pp. 391-403, July 2018. Available Online

[95]II N. Meghanathan, “Complex Network Analysis-based Graph Theoretic Metrics to Determine Stable Data Gathering Trees for Mobile Sensor Networks,” The Computer Journal, vol. 61, no. 2, pp. 199-222, February 2018.

[94]II N. Meghanathan, “A Location and Mobility Independent Scheme to Quantify the Neighborhood Stability of a Node in Mobile Sensor Networks,” Int. J. of Mobile Network Design and Innovation (IJMNDI), vol. 8, no. 2, pp. 111-125, January 2018. [Publication as part of the AFRL/Clarkson Aerospace Grant].

[93]III M. Akhter, Md. Rahman and N. Meghanathan, ” A Spectral Analysis and Network Science Approach to Identify Influential Diseases based on Disease-Gene Associations,” International Journal of Network Science, vol. 1, no. 4, pp. 325-343, 2017.

[92]III N. Meghanathan and F. Yang, “Correlation Analysis: Edge Betweenness Centrality vs. Neighborhood Overlap,” Inderscience International Journal of Network Science, vol. 1, no. 4, pp. 299-324, 2017.

[91]III N. Meghanathan, “Randomness Index for Complex Network Analysis,” Springer Social Network Analysis and Mining, vol. 7,  no. 25, pp. 1-15, December 2017, DOI: 10.1007/s13278-017-0444-3. Link.

[90]I N. Meghanathan, “On the Use of Centrality Measures to Determine Connected Dominating Sets for Mobile Ad hoc Netwoks,” International Journal of Ad Hoc and Ubiquitous Computing (IJAHUC), vol. 26, no. 4, pp. 205-221, October 2017.[Publication as part of the NASA EPSCoR Sub Award] Link

[89]II N. Meghanathan, “Bipartivity Index based Link Selection Strategy to Determine Stable and Energy-Efficient Data Gathering Trees for Mobile Sensor Networks,” Informatica, vol. 41, no. 3, pp. 259-274, September 2017 [Publication as part of the AFRL/Clarkson Aerospace Grant].

[88]III N. Meghanathan, “An Analysis of the Fat-Tailedness of the Centrality Distributions of Real-World Networks,” International Journal of Computer Networks and Communications, vol. 9, no. 5, pp. 1-15, September 2017.DOI: 10.5121/ijcnc.2017.9501. Link.

[87]III N. Meghanathan, “Evaluation of Correlation Measures for Computationally-Light vs. Computationally-Heavy Centrality Metrics on Real-World Graphs,” Journal of Computer and Information Technology, vol. 25, no. 2, pp. 103-132, June 2017.

[86]II N. Meghanathan, “Link Selection Strategies based on Network Analysis to Determine Stable and Energy-Efficient Data Gathering Trees for Mobile Sensor Networks,” Elsevier Ad Hoc Networks, vol. 62, pp. 50-75, July 2017. Abstract Link.

[85]III N. Meghanathan, “A Binary Search Algorithm for Correlation Study of Decay Centrality vs. Degree Centrality and Closeness Centrality,” Computer and Information Science, vol. 10, no. 2, pp. 52-75, June 2017. Available Online.

[84]III N. Meghanathan, “Curriculum Network Graph: Relative Contribution of Courses,” Inderscience International Journal of Network Science, vol. 1, no. 3, pp. 223-247, 2017.

[83]III N. Meghanathan, “Local Clustering Coefficient-based Assortativity Analysis of Real-World Network Graphs,” Inderscience International Journal of Network Science, vol. 1, no. 3, pp. 187-208, 2017.

[82]III N. Meghanathan, ” Complex Network Analysis of the Contiguous United States Graph,” Computer and Information Science, vol. 10, no. 1, pp. 54-76, February 2017. DOI: 10.5539/cis.v10n1p54, Link.

[81]III N. Meghanathan, “A Computationally-Lightweight and Localized Centrality Metric in lieu of Betweenness Centrality for Complex Network Analysis,” Springer Vietnam Journal of Computer Science, vol. 4, no. 1, pp. 23-38, February 2017. DOI: 10.1007/s40595-016-0073-1. Link

[80]II N. Meghanathan, “An Eigenvector Centrality-based Mobile Target Tracking Algorithm for Wireless Sensor Networks,”  International Journal of Mobile Network Design and Innovation, vol. 6, no. 4, pp. 202-211, December 2016.

[79]III N. Meghanathan and X. He, “Correlation and Regression Analysis for Node Betweenness Centrality,” International Journal of Foundations in Computer Science and Technology, vol. 6, no. 6, pp. 1-20, November 2016.

[78]III N. Meghanathan, A. Essien and R. Lawrence, “A Two-Hop Neighbor Preference-based Random Network Graph Model with High Clustering Coefficient for Modeling Real-World Complex Networks,” Elsevier Egyptian Informatics Journal, In Press, Available Online, September 2016. Link 

[77]III N. Meghanathan, “Maximal Assortative Matching for Real-World Network Graphs, Random Network Graphs and Scale-Free Network Graphs,” Springer Vietnam Journal of Computer Science, vol. 3, no. 3, pp. 151-179, August 2016. DOI: 10.1007/s40595-016-0066-0.

[76]III N. Meghanathan, “Assortativity Analysis of Real-World Network Graphs based on Centrality Metrics,” Computer and Information Science, vol. 9, no. 3, pp. 7-25, August 2016Link  DOI

[75]III N. Meghanathan, “On the Sufficiency of using the Degree Sequence of the Vertices to Generate Random Networks Corresponding to Real-World Networks,” Polibits: Research Journal on Computer Science and Computer Engineering with Applications, vol. 53, pp. 5-21, July 2016. Link  DOI

[74]II N. Meghanathan, “Neighborhood Overlap-based Stable Data Gathering Trees for Mobile Sensor Networks,” International Journal of Wireless Networks and Broadband Technologies, vol. 5, no. 1, pp. 1-23, January-June 2016. Link

[73]II N. Meghanathan, “Eigenvector Centrality-based Stable Path Routing for Cognitive Radio Ad hoc Networks,” International Journal of Network Science, vol. 1, no. 2, pp. 117-133, June 2016Link

[72]III N. Meghanathan, “Maximal Assortative Matching and Maximal Dissortative Matching for Complex Network Graphs,” The Computer Journal, vol. 59, no. 5, pp. 667-684, May 2016. DOI: 10.1093/comjnl/bxv102. Link

[71]III N. Meghanathan, “Correlation Analysis between Maximal Clique Size and Centrality Metrics for Random Networks and Scale-Free Networks,” Computer and Information Science, vol. 9, no. 2, pp. 41-57, May 2016. DOI: http://dx.doi.org/10.5539/cis.v9n2p1

[70]III N. Meghanathan, “Maximal Assortative Matching for Complex Network Graphs,” Elsevier Journal of King Saud University – Computer and Information Sciences, vol. 28, no. 2, pp. 230-246, April 2016. DOI: 10.1016/j.jksuci.2015.10.004.

[69]III N. Meghanathan, “On the Conduciveness of Random Network Graphs for Maximal Assortative or Maximal Dissortative Matching,” Computer and Information Science, vol. 9, no. 1, pp. 21-30, February 2016. Link [Publication as part of the Massie Chair Grant]

[68]III N. Meghanathan, “Correlation Coefficient Analysis: Centrality vs. Maximal Clique Size for Complex Real-World Network Graphs,” International Journal of Network Science, vol. 1, no. 1, pp. 3-27, January 2016. Link

[67]III N. Meghanathan, “A Greedy Algorithm for Neighborhood Overlap-based Community Detection,” Algorithms, vol. 9, no. 1, p. 8: 1-26, 2016. DOI: 10.3390/a9010008. Link

[66]III N. Meghanathan, “A Model for Generating Random Networks with Clustering Coefficient Corresponding to Real-World Network Graphs,” International Journal of Control and Automation, vol. 9, no. 1, pp. 163-176, January 2016. DOI: http://dx.doi.org/10.14257/ijca.2016.9.1.15, Link

[65]III N. Meghanathan, “A Comprehensive Analysis of the Correlation between Maximal Clique Size and Centrality Metrics for Complex Network Graphs,” accepted for publication in Elsevier Egyptian Informatics Journal, 2016. Link

[64]II N. Meghanathan, “A Generic Algorithm to Determine Maximum Bottleneck Node Weight-based Data Gathering Trees for Wireless Sensor Networks,” Network Protocols and Algorithms (NPA), vol. 7, no. 3, pp. 18-51, November 2015. Link. DOI: http://dx.doi.org/10.5296/npa.v7i3.7961. [Publication as part of the NASA EPSCoR Sub Award]

[63]III N. Meghanathan, “Exploiting the Discriminating Power of the Eigenvector Centrality Measure to Detect Graph Isomorphism,” International Journal in Foundations of Computer Science and Technology (IJFCST), vol. 5, no. 6, pp. 1-13, November 2015. Link

[62]II N. Meghanathan, “A Benchmarking Algorithm for Maximum Bottleneck Node Trust Score-based Data Gathering Trees in Wireless Sensor Networks,” International Journal of Interdisciplinary Telecommunications and Networking (IJITN), vol. 7, no. 3, pp. 13-35, July-September 2015. Link [Publication as part of the NASA EPSCoR Sub Award]

[61]III N. Meghanathan, “Probabilistic Diffusion in Random Network Graphs,” International Journal in Foundations of Computer Science and Technology (IJFCST), vol. 5, no. 5, pp. 1-7, September 2015. [Publication as part of the NASA EPSCoR Sub Award] PDF

[60]I N. Meghanathan, “Maximum Lifetime Communication Topologies of Secondary User Nodes in Cognitive Radio Ad hoc Networks,” Computer and Information Science, vol. 8, no. 3, pp. 1-12, August 2015. [Publication as part of the NASA EPSCoR Sub Award] Link

[59]I N. Meghanathan, “Impact of Static Nodes and Pause Time on the Stability of Connected Dominating Sets in a Mobile Ad hoc Network,” International Journal of Wireless and Mobile Networks, vol. 7, no. 4, pp. 1-18, August 2015Link

[58]III N. Meghanathan, “Time-Dependent Variation of the Centrality Measures of the Nodes during the Evolution of a Scale-Free Network,” Journal of Networks, vol. 10, no. 7, pp. 431-442, July 2015. Link [Publication as part of the NASA EPSCoR Sub Award]

[57]II N. Meghanathan, “A Benchmarking Algorithm to Determine Minimum Aggregation Delay for Data Gathering Trees and an Analysis of the Diameter-Aggregation Delay Tradeoff,” Algorithms, vol. 8, no. 3, pp. 435-458, July 2015. Link  DOI: 10.3390/a8030435. [Publication as part of the NASA EPSCoR Sub Award]

[56]III N. Meghanathan, “Distribution of Maximal Clique Size of the Vertices for Theoretical Small-World Networks and Real-World Networks,” International Journal of Computer Networks and Communications, vol. 7, no. 4, pp. 21-41, July 2015.

[55]III N. Meghanathan, “Centrality-based Connected Dominating Sets for Mobile Ad hoc Networks,” Network Protocols and Algorithms, vol. 7, no. 2, pp. 16-41, July 2015. LinkDOI10.5296/npa.v7i2.7414 [Publication as part of the NASA EPSCoR Sub Award]

[54]I N. Meghanathan, “Stability of Connected Dominating Sets in the Presence of Static Nodes in a Mobile Ad hoc Network,” International Journal of Combinatorical Optimization Problems and Informatics, vol. 6, no. 2, pp. 43-53, May-August 2015. Link

[53]II N. Meghanathan, T. Gardner and J. Lewis, “An Energy-Efficient Tracking Algorithm to Trace a Radioactive Mobile Target in a Wireless Sensor Network,” Computer and Information Science, vol. 8, no. 2, pp. 15-23, May 2015. [Publication as part of the Massie Chair Grant] Link

[52]III N. Meghanathan, “Using Spectral Radius Ratio for Node Degree to Analyze the Evolution of Complex Networks,” International Journal of Computer Networks and Communications, vol. 7, no. 3, pp. 1-12, May 2015, DOI : 10.5121/ijcnc.2015.7301. Link

[51]III N. Meghanathan, “Distribution of Maximal Clique Size under the Watts-Strogatz Model of Evolution of Complex Networks,” International Journal in Foundations of Computer Science and Technology, vol. 5, no. 3, pp. 1-12, May 2015. DOI: 10.5121/ijfcst.2015.5301. Link

[50]III N. Meghanathan, “Correlations between Centrality Measures for Mobile Ad hoc Networks,” IGI International Journal of Wireless Networks and Broadband Technologies (IJWNBT), vol. 4, no. 2, pp. 15-28, April-June 2015. Link

[49]I N. Meghanathan, “A Stable Path Routing Protocol for Cognitive Radio Ad hoc Networks based on the Maximum Number of Common Primary User Channels,” Journal of Networks, vol. 10, no. 2, pp. 117-124, March 2015. [Publication as part of the Massie Chair Grant] Link

[48]II N. Meghanathan, “Stability-based and Energy-Efficient Distributed Data Gathering Algorithms for Mobile Sensor Networks,” Elsevier Ad hoc Networks, vol. 19, pp. 111-131, August 2014. Link

[47]II N. Meghanathan, “A Pair-wise Key Distribution Mechanism and Distributed Trust Evaluation Model for Secure Data Aggregation in Mobile Sensor Networks,” International Journal of Combinatorial Optimization Problems and Informatics, vol. 5, no. 2, pp. 29-46, May-August 2014. Link

[46]III N. Meghanathan, “Centrality-based Connected Dominating Sets for Complex Network Graphs,” IGI International Journal of Interdisciplinary Telecommunications and Networking (IJITN), vol. 6, no. 2, pp. 1-19, April-June 2014.

[45]II N. Meghanathan and P. Mumford, “Centralized and Distributed Algorithms for Stability-based Data Gathering in Mobile Sensor Networks,” Macrothink: Network Protocols and Algorithms (NPA), vol. 5, no. 3, pp. 84-116, December 2013. DOI: http://dx.doi.org/10.5296/npa.v5i4.4208. Link

[44]II N. Meghanathan and P. Mumford, “A Benchmarking Algorithm to Determine the Sequence of Stable Data Gathering Trees for Wireless Mobile Sensor Networks,” Informatica – An International Journal of Computing and Informatics, vol. 37, no. 3, pp. 315-338, October 2013. Link

[43]II N. Meghanathan and P. Mumford, “Node Failure Time and Coverage Loss Time Analysis for Maximum Stability Vs Minimum Distance Spanning Tree based Data Gathering in Mobile Sensor Networks,” International Journal of Computer Networks and Communications (IJCNC), vol. 5, no. 4, pp. 15-30, July 2013. DOI: 10.5121/ijcnc.2013.5402. PDF

[42]I N. Meghanathan and I. Dasari, “Performance Comparison Study of Connected Dominating Set Algorithms for Mobile Ad hoc Networks under Different Mobility Models,” International Journal of Combinatorial Optimization Problems and Informatics, vol. 4, no. 2, pp. 12-30, May-August 2013. PDF

[41]I N. Meghanathan, “A Comprehensive Review and Analysis of Solutions for Different Layers of the TCP/IP Layer Stack and Security Issues for Cognitive Radio Networks,” International Journal of Advancements in Technology, (IJOAT), vol. 4, no. 1, pp. 1-27, April 2013. Link

[40]I N. Meghanathan, “A Survey on the Communication Protocols and Security in Cognitive Radio Networks,” International Journal of Communication Networks and Information Security, (IJCNIS), vol. 5, no. 1, pp. 19-37, April 2013.

[39]I N. Meghanathan and J. A. Thompson, “On the Different Forms of Spanning Tree-based Broadcast Topologies for Mobile Ad hoc Networks,” International Journal of Combinatorial Optimization Problems and Informatics (IJCOPI), vol. 4, no. 1, pp. 3-11, January-April 2013. PDF [Publication as part of the NSF REU Grant]

[38]II N. Meghanathan, “Link Expiration Time and Minimum Distance Spanning Trees based Distributed Data Gathering Algorithms for Wireless Mobile Sensor Networks,” International Journal of Communication Networks and Information Security (IJCNIS), vol. 4, no. 3, pp. 196-206, December 2012. Link

[37]I N. Meghanathan and M. Terrell, “A Simulation Study on the Strong Neighborhood-based Stable Connected Dominating Sets for Mobile Ad hoc Networks,” International Journal of Computer Networks & Communications (IJCNC), vol. 4, no. 4, pp. 1-19, July 2012. PDF [Publication as part of the NSF REU Grant]

[36]I N. Meghanathan, “Routing Protocols to Determine Stable Paths and Trees using the Inverse of Predicted Link Expiration times for Mobile Ad hoc Networks,” International Journal of Mobile Network Design and Innovation, (IJMNDI), Inderscience Publishers, vol. 4, no. 4, pp. 214-234, June 2012. Link

[35]III N. Meghanathan, “Graph Theory Algorithms for Mobile Ad hoc Networks,” Informatica – An International Journal of Computing and Informatics, vol. 36, no. 2, pp. 185-200, June 2012. PDF [Publication as part of the NSF REU Grant]

[34]I N. Meghanathan and M. Terrell, “An Algorithm to Determine Stable Connected Dominating Sets for Mobile Ad hoc Networks using Strong Neighborhoods,” International Journal of Combinatorial Optimization Problems and Informatics (IJCOPI), vol. 3, no. 2, pp. 79-92, May – August 2012. PDF [Publication as part of the NSF REU Grant]

[33]II N. Meghanathan, “A Comprehensive Review and Performance Analysis of Data Gathering Algorithms for Wireless Sensor Networks,” International Journal of Interdisciplinary Telecommunications and Networking (IJITN), vol. 4, no. 2, pp. 1-29, April-June 2012. Journal Link

[32]I N. Meghanathan, “A Simulation-based Performance Comparison of the Minimum Node Size and Stability-based Connected Dominating Sets for Mobile Ad hoc Networks,” International Journal of Computers and Network Communications (IJCNC), vol. 4, no. 2, pp. 169-184, March 2012. DOI:10.5121/ijcnc.2012.4211 PDF

[31]II N. Meghanathan and P. D. Mumford, “Maximum Stability Data Gathering Trees for Mobile Sensor Networks,” International Journal of Mobile Network Design and Innovation, Inderscience Publishers, vol. 4, no. 3, pp. 164-178, February 2012. DOI: 10.1504/IJMNDI.2012.051972 [Publication as part of the AFOSR/AFRL/SFFP 2012 Research]

[30]I N. Meghanathan, “Node Stability Index: A Stability Metric and an Algorithm to Determine Long-Living Connected Dominating Sets for Mobile Ad hoc Networks,” International Journal of Interdisciplinary Telecommunications and Networking (IJITN), vol. 4, no. 1, pp. 31-46, January-March 2012. Journal Link

[29]I N. Meghanathan, “A Unicast Stable Path Routing Protocol for Mobile Ad hoc Networks based on the Inverse of Link Expiration Time,” International Journal of Network Protocols and Algorithms (NPA), vol. 3, no. 3, pp. 17-37, December 2011.

[28]I N. Meghanathan, “A Location Prediction Based Routing Protocol and its Extensions for Multicast and Multi-path Routing in Mobile Ad hoc Networks,” Elsevier Ad hoc Networks, vol. 9, no. 7, pp. 1104-1126, September 2011. Link [Publication as part of the ARL Grant]

[27]I N. Meghanathan, “Survey of Topology-based Multicast Routing Protocols for Mobile Ad hoc Networks,” International Journal of Communication Networks and Information Security (IJCNIS), vol. 3, no. 2, pp. 124-137, August 2011.

[26]I N. Meghanathan, “Performance Comparison Study of Multicast Routing Protocols for Mobile Ad hoc Networks under Default Flooding and Density and Mobility Aware Energy-Efficient (DMEF) Broadcast Strategies,” Informatica – An International Journal of Computing and Informatics, vol. 35, no. 2, pp. 165-184, June 2011. [Publication as part of the ARL Grant] PDF

[25]I N. Meghanathan, “Performance Comparison of Minimum Hop and Minimum Edge Based Multicast Routing Under Different Mobility Models for Mobile Ad Hoc Networks,” International Journal of Wireless and Mobile Networks, vol. 3, no. 3, pp. 1-14, June 2011. PDF

[24]IV N. Kostyuk, P. Cole, N. Meghanathan, R. Isokpehi, and H. Cohly, “Gas Discharge Visualization: An Imaging and Modeling Tool for Medical Biometrics,” International Journal of Biomedical Imaging, vol. 2011, Article ID 196460, 7 pages, May 2011. doi:10.1155/2011/196460. [Publication as part of the NSF MS EPSCoR Grant] PDF

[23]I N. Meghanathan, “Impact of the Optimum Routing and Least Overhead Routing Approaches on Minimum Hop Routes and Connected Dominating Sets in Mobile Ad hoc Networks,” International Journal of Wireless and Mobile Networks, vol. 3, no. 2, pp. 196-212, April 2011. PDF

[22]II N. Meghanathan, “Grid Block Energy based Data Gathering Algorithms for Wireless Sensor Networks,” International Journal of Communication Networks and Information Security, vol. 2, no. 3, pp. 151-161, December 2010. Link

[21]I N. Meghanathan, “Performance Comparison of Link, Node and Zone Disjoint Multi-path Routing Strategies and Minimum Hop Single Path Routing for Mobile Ad Hoc Networks,” International Journal of Wireless and Mobile Networks, vol. 2, no. 4, pp. 13-29, November 2010. PDF

[20]I N. Meghanathan, “Exploring the Performance Tradeoffs among Stability-Oriented Routing Protocols for Mobile Ad hoc Networks,” Network Protocols and Algorithms – Special Issue on Data Dissemination for Large scale Complex Critical Infrastructures, vol. 2, no. 3, pp. 18-36, November 2010. Link

[19]II N. Meghanathan, “A Data Gathering Algorithm based on Energy-aware Connected Dominating Sets to Minimize Energy Consumption and Maximize Node Lifetime in Wireless Sensor Networks,” International Journal of Interdisciplinary Telecommunications and Networking, vol. 2, no. 3, pp. 1-17, July-September 2010. Link

[18]I N. Meghanathan and L. C. Milton, “A Performance Comparison of stability, Load-Balancing and Power-Aware Routing Protocols for Mobile Ad hoc Networks,” International Journal of Advancements in Technology, vol. 1, no. 1, pp. 50-72, June 2010. PDF

[17]IV N. Meghanathan, R. Isokpehi and H. H. P. Cohly, “Experimental Design and Predictive Computational Modeling for the Toxicity of Nanomaterials on the Human Epidermal Cells,” International Journal of Biometrics and Bioinformatics, vol. 4, no. 2, pp. 34-41, May 2010. [Publication as part of the NSF MS EPSCoR Grant] PDF

[16]I N. Meghanathan, “A Simulation Study on the Impact of Mobility Models on the Network Connectivity, Hop Count and Lifetime of Routes for Ad hoc Networks,” Informatica – An International Journal of Computing and Informatics, vol. 34, no. 2, pp. 207-221, May 2010. PDF

[15]I N. Meghanathan, “Impact of the Gauss-Markov Mobility Model on Network Connectivity, Lifetime and Hop Count of Routes for Mobile Ad hoc Networks,” Journal of Networks, vol. 5, no. 5, pp. 509 – 516, May 2010. PDF

[14]I N. Meghanathan and M. Sugumar, “A Beaconless Minimum Interference Based Routing Protocol to Minimize End-to-End Delay per Packet for Mobile Adhoc Networks,” International Journal of Interdisciplinary Telecommunications and Networking (IJITN), vol. 2, no. 1, pp. 12 – 26, March 2010.

[13]I N. Meghanathan and G. W. Skelton, “Risk Notification Message Dissemination Protocol for Energy Efficient Broadcast in Vehicular Ad hoc Networks,” IAENG International Journal of Computer Science, vol. 37, no. 1, pp. 1 – 10, March 2010. PDF

[12]I N. Meghanathan and L. P. Judon, “Improvement in Network Lifetime for On-Demand Routing in Mobile Ad hoc Networks using either On-Demand Recharging or Transmission Power Control or Both,” Journal of Computer and Information Science, Canadian Center for Science and Education, vol. 3, no. 1, pp. 3 – 11, February 2010. PDF

[11]IV N. Meghanathan and L. Nayak, “Steganalysis Algorithms for Detecting the Hidden Information in Image, Audio and Video Cover Media,” International Journal of Network Security and its Applications, vol. 2, no. 1, pp. 43 – 55, January 2010. PDF

[10]I N. Cooper and N. Meghanathan, “Impact of Mobility Models on Multi-path Routing in Mobile Ad hoc Networks,” International Journal of Computer Networks and Communications, vol. 2, no. 1, pp. 185 – 194, January 2010. [Publication as part of the NSF REU Grant] PDF

[9]II N. Meghanathan, “Use of Tree Traversal Algorithms for Chain Formation in the PEGASIS Data Gathering Protocol for Wireless Sensor Networks,” KSII Transactions on Internet and Information Systems, vol. 3, no. 6, pp. 612 – 627, December 2009. PDF

[8]I N. Meghanathan, “Survey and Taxonomy of Unicast Routing Protocols for Mobile Ad hoc Networks,” The International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks, vol. 1, no. 1, pp. 1 – 21, December 2009. PDF

[7]II L. King and N. Meghanathan, “A Weighted-Density Connected Dominating Set Data Gathering Algorithm for Wireless Sensor Networks,” Journal of Computer and Information Science, Canadian Center for Science and Education, vol. 2, no. 4, pp. 3-13, November 2009. [Publication as part of the NSF REU Grant] PDF

[6]I N. Meghanathan, “A Location Prediction Based Reactive Routing Protocol to Minimize the Number of Route Discoveries and Hop Count per Path in Mobile Ad hoc Networks,” The Computer Journal, vol. 52, no. 4, pp. 461-482, Oxford Press, British Computer Society, July 2009. Link

[5]IV N. Meghanathan, S. R. Allam and L. A. Moore, “Tools and Techniques for Network Forensics,” International Journal of Network Security and its Applications, vol. 1, no. 1, pp. 14-25, April 2009. PDF

[4]I N. Meghanathan and A. Farago, “On the Stability of Paths, Steiner Trees and Connected Dominating Sets in Mobile Ad Hoc Networks,” Elsevier Ad Hoc Networks, vol. 6, no. 5, pp. 744 – 769, July 2008. Available Online

[3]I N. Meghanathan, “Exploring the Stability-Energy Consumption-Delay-Network Lifetime Tradeoff of Mobile Ad Hoc Network Routing Protocols,” Academy Publisher Journal of Networks, vol. 3, no. 2, pp. 17 – 28, February 2008. PDF

[2]IV S. Baskiyar and N. Meghanathan, “A Survey of Contemporary Real-time Operating Systems,” Informatica – An International Journal of Computing and Informatics, vol. 29, no. 2, pp. 233-240, June 2005. PDF

[1]III S. Baskiyar and N. Meghanathan, “Binary Codes for Fast Determination of Ancestor-Descendant Relationship in Trees and Directed A-cyclic Graphs,” International Journal of Computers and Applications , vol. 10, no. 1, pp. 67 – 71, March 2003.

Peer-reviewed Conferences

[93]III Y. Wu N. Meghanathan, “A Network Science Approach to Quantify the Extent of Co-occurrence of an Offense with other Offenses in a Crime Event,” accepted for the Proceedings of the 11th Computer Science Online Conference, to be published by Springer, April 2022. 

[92]III N. Ahmed, R. Alo, C. Amelink, Y. Y. Baek, A. Choudhary, K. Collins, A. Esterline, E. Fox, G. Fox, A. Hagberg, R. Kenyon, C. J. Kuhlman, J. Leskovec, D. Machi, M. V. Marathe, N. Meghanathan, Y. Miyasaki, J. Qiu, N. Ramakrishnan, S. S. Ravi, R. Rossil, R. Sosic and G. von Laszewski, “net.science: A Cyberinfrastructure for Sustained
Innovation in Network Science and Engineering,” accepted for Presentation at the Gateways 2020 Online Conference, Week of October 19, 2020.

[91]II N. Meghanathan, “Multi-variable Linear Regression-based Prediction of a Computationally-Heavy Link Stability Metric for Mobile Sensor Networks,” Proceedings of the 8th International Conference on Control, Modeling, Computing and Applications, pp. 29-38, Vienna, Austria, August 24-25, 2019. Link

[90]III Md. Rahman and N. Meghanathan, “Logical Clustering of Similar Vertices in Complex Real-World Networks,” Proceedings of the International Conference on Inventive Communication and Computational Technologies, Namakkal, India, April 29-30, 2019; published in Springer Lecture Notes in Networks and Systems, Vol. 89: Inventive Communication and Computational Technologies, pp. 891-899, 2020. Link

[89]II N. Meghanathan, “Computationally-Light Metrics to Quantify Link Stability in Mobile Sensor Networks,” Proceedings of the International Conference on Inventive Communication and Computational Technologies, Namakkal, India, April 29-30, 2019; published in Springer Lecture Notes in Networks and Systems, Vol. 89: Inventive Communication and Computational Technologies, pp. 227-235, 2020. Link

[88]III Md. Rahman and N. Meghanathan, “Analyzing the Similarity-Based Clusterability of the Vertices in a Complex Network,” Proceedings of the 16th International Conference on Information Technology-New Generations: published in Springer AISC vol. 800, pp. 237-243, Las Vegas, USA, April 1-3, 2019. Link

[87]III Md. Rahman, M. Akhter and N. Meghanathan, “ Use of Eigenvector Centrality to Rank the Vertices in a DiseaseDisease Network ,” Proceedings of the 16th International Conference on Information Technology-New Generations: published in Springer AISC vol. 800, pp. 429-434, Las Vegas, USA, April 1-3, 2019. Link

[86]III N. Meghanathan, “Kurtosis: Is it an Appropriate Measure to Compare the Extent of Fat- Tailedness of the Degree Distribution for any Two Real-World Networks?,” Proceedings of the Fifth International Conference on Foundations of Computer Science & Technology (FCST-2017), Sydney, Australia, June 24-25, 2017.

[85]III N. Meghanathan, “Correlation Analysis of Decay Centrality,” Proceedings of the 6th Computer Science Online Conference, (CSOC-2017), Advances in Intelligent Systems and Computing, vol. 574, pp. 407-418, April 26-29, 2017, DOI: 10.1007/978-3-319-57264-2_41. Link

[84]II N. Meghanathan and Q. Hart, “Jaccard Similarity-based Quantification of the Neighborhood Stability of a Node in  Mobile Sensor Networks,” Proceedings of the SPIE Cyber Sensing Conference, Anaheim, CA, April 9-13, 2017. [Publication as part of the AFRL/Clarkson Aerospace Grant]  DOI

[83]II N. Meghanathan, “Algebraic Connectivity based Stable Data Gathering Trees for Mobile Sensor Networks,” Proceedings of the International Conference on Computational Science and Computational Intelligence (CSCI’16), pp. 947-952, Las Vegas, USA, Dec 15-17, 2016. Link [Publication as part of the AFRL/Clarkson Aerospace Grant] 

[82]III X. He and N. Meghanathan, “Alternatives to Betweenness Centrality: A Measure of Correlation Coefficient,” Proceedings of the Fifth International Conference on Advanced Information Technologies and Applications (ICAITA), pp. 1-10, Dubai, UAE, November 12-13, 2016. Link

[81]III X. He and N. Meghanathan, “Correlation of Eigenvector Centrality to other Centrality Measures: Random, Small-World and Real-World Networks,” Proceedings of the 8th International Conference on Networks and Communications (NeCoM), pp. 9-18, Chennai, India, October 22-23, 2016. Link

[80]III N. Meghanathan and R. Lawrence, “Centrality Analysis of the United States Network Graph,” Proceedings of the 3rd International Conference on Electrical, Electronics, Engineering Trends, Communication, Optimization and Sciences (EEECOS), pp. 23-28, Tadepalligudem, India, June 1-2, 2016 (proceedings to be published in IEEE Xplore). [Publication as part of the Massie Chair Grant] Link

[79]III Y. Zhou, F. Wang and N. Meghanathan and Y. Huang, “Seed Based Approach for Automated Crack Detection from Pavement Images,” Proceedings of the 95th Annual Meeting of the Transportation Research Board (TRB), 17 pages (#16-4415), Washington DC, USA, January 10-14, 2016. Link 

[78]III N. Meghanathan, “A Random Network Model with High Clustering Coefficient and Variation in Node Degree,” Proceedings of the 8th International Conference on Control and Automation, published by IEEE CPS, pp. 54-57, Jeju Island, Korea, November 25-28, 2015.  

[77]III N. Meghanathan, “Use of Eigenvector Centrality to Detect Graph Isomorphism,” Proceedings of the Fourth International Conference on Advanced Information Technologies and Applications (ICAITA), pp. 1-9, Dubai, UAE, November 6-7, 2015. Link

[76]II N. Meghanathan, “Node Lifetime – Network Lifetime Tradeoff for Data Gathering Trees in Wireless Sensor Networks,ACM Proceedings of the International conference on Intelligent Information Processing, Security and Advanced Communication (IPAC’ 2015), Algeria, Batna, November 23-25, 2015. DOI: 10.1145/2816839.2816905. Link

[75]III N. Meghanathan, “Maximal Clique Size vs. Centrality: A Correlation Analysis for Complex Real-World Network Graphs,” Proceedings of the 3rd International Conference on Advanced Computing, Networking, and Informatics, (ICACNI-2015), Springer Smart Innovation, Systems and Technologies Series, vol. 44, pp. 95-101, June 23-25, 2015, Orissa, India. Springer Link

[74]I N. Meghanathan, “Performance of the Maximum Stable Connected Dominating Sets in the Presence of Static Nodes in a Mobile Ad hoc Network,” Proceedings of the Fourth International Conference on Mobile and Wireless Networks (MoWiN’ 2015), pp. 37-48, Vienna, Austria, May 23-24, 2015. Link

[73]III N. Meghanathan, “Correlation Coefficient Analysis of Centrality Metrics for Complex Network Graphs,” Proceedings of the 4th Computer Science Online Conference, (CSOC-2015), Intelligent Systems in Cybernetics and Automation Theory: Advances in Intelligent Systems and Computing, Vol. 348, pp. 11-20, April 27-30, 2015, DOI: 10.1007/978-3-319-18503-3_2, Link.

[72]III N. Meghanathan, “On the Distribution of the Maximal Clique Size for the Vertices in Real-World Network Graphs and Correlation Studies,” Proceedings of the International Conference on Computer Science and Information Technology, (CSTY-2015), pp. 1-12, Bangalore, India, April 25-26, 2015. DOI: 10.5121/csit.2015.50901 PDF.

[71]III N. Meghanathan, “Use of Centrality Metrics to Determine Connected Dominating Sets for Real-World Network Graphs,” Proceedings of the 12th International Conference on Information Technology: New Generations, (ITNG-2015), pp. 243-248, Las Vegas, USA, April 13-15, 2015. [Publication as part of the Massie Chair Grant]

[70]I N. Meghanathan and M. Fanuel, “A Minimum Channel Switch Routing Protocol for Cognitive Radio Ad hoc Networks,” Proceedings of the 12th International Conference on Information Technology: New Generations, (ITNG-2015), pp. 280-285, Las Vegas, USA, April 13-15, 2015. [Publication as part of the JSU 2014 Creative Awards for Faculty and Staff Program]

[69]III N. Meghanathan, “Using Spectral Radius Ratio for Node Degree to Analyze the Evolution of Scale-Free Networks and Small-World Networks,” Proceedings of the Second International Conference on Computer Science and Information Technology, (COSIT-2015), pp. 21-28, Geneva, Switzerland, March 21-22, 2015. PDF

[68]I N. Meghanathan, “A Benchmarking Algorithm to Determine Maximum Lifetime Communication Topologies in Cognitive Radio Ad hoc Networks,” ACM Proceedings of the International Conference on Advanced Research in Computer Science Engineering & Technology , (ICARCSET 2015), Eluru, Andhra Pradesh, India, March 6-7, 2015, DOI: 10.1145/2743065.2743069. Link

[67]III N. Meghanathan, “Use of Eigenvalues and Eigenvectors to Analyze Bipartivity of Network Graphs,” Proceedings of the International conference on Computer Science, Engineering and Information Technology , (CSEIT-2014), pp.221-230, Sydney, Australia, December 27-28, 2014. PDF

[66]III N. Meghanathan, “Spectral Radius as a Measure of Variation in Node Degree for Complex Network Graphs,” Proceedings of the 3rd International Conference on Digital Contents and Applications, (DCA 2014), pp. 30-33, Hainan, China, December 20-23, 2014. Link

[65]III S. Abdelhamid, M. Alam, R. Alo, S. Arifuzzaman, P. Beckman, T. Bhattacharjee, H. Bhuiyan, K. Bisset, S. Eubank, A. C. Esterline, E. A. Fox, G. C. Fox, S. M. Shamimul Hasan, H. Hayatnagarkar, M. Khan, C. J. Kuhlman, M. V. Marathe,  N. Meghanathan, H. S. Mortveit, J. Qiu, S. S. Ravi, Z. Shams, O. Sirisaengtaksin, S. Swarup, A. K. S. Vullikanti and  Tak-Lon Wu, “CINET 2.0: A CyberInfrastructure for Network Science,” Proceedings of the IEEE 10th International Conference on e-Science, vol. 1, pp. 324-331, Sao Paulo, Brazil, October 20-24, 2014. Link

[64]II N. Meghanathan, “A Distributed Trust Evaluation Model for Wireless Mobile Sensor Networks,” Proceedings of the 11th International Conference on Information Technology: New Generations, ITNG, pp. 186-191, Las Vegas, NV, USA, April 2014. Link [Publication as part of the Clarkson Aerospace/AFRL Subcontract]

[63]II N. Meghanathan and P. Mumford, “Node Failure Time Analysis for Maximum Stability Vs Minimum Distance Spanning Tree based Data Gathering in Mobile Sensor Networks,” Proceedings of The Fifth International Conference on Networks & Communications, NETCOM-2013, Chennai, India, December 27-29, 2013, published in Springer Lecture Notes in Electrical Engineering, LNEE 284, pp. 55-68, DOI: 10.1007/978-3-319-03692-2_5.

[62]II N. Meghanathan, “Design of a Secure Data Aggregation Framework for Wireless Mobile Sensor Networks,” Proceedings of the ISCA 26th International Conference on Computer Applications in Industry and Engineering, CAINE-2013, September 25-27, 2013, Los Angeles, USA. ISBN: 978-1-880843-93-2. [Publication as part of the Clarkson Aerospace/AFRL Subcontract]

[61]IV N. Meghanathan and M. Terrell, “Design of a Secure Framework for Session Mobility as a Service in Cloud Computing Environment,” Proceedings of the ISCA 3rd International Conference on Advanced Computing and Communications, ACC-2013, September 25-27, 2013, Los Angeles, USA. ISBN: 978-1-880843-91-8. [Publication as part of the Clarkson Aerospace/AFRL Subcontract]

[60]I N. Meghanathan and I. Dasari, “A Generic Algorithm to Determine Connected Dominating Sets for Mobile Ad hoc Networks and Performance Evaluation under Different Mobility Models,” Fifth International workshop on Networks & Communications, NeCoM, Proceedings of the Computer Science and Information Technology Series, vol. 3, no.4, pp. 239-248, July 27, 2013, Chennai, India. DOI: 10.5121/csit.2013.3425. PDF

[59]IV H. Kim, N.Meghanathan and L. Moore, “Enhancement of an Undergraduate Software Engineering Course by Infusing Security Lecture Modules,” Proceedings of the 7th International Multi-Conference on Society, Cybernetics and Informatics: IMSCI 2013, July 9-12, 2013, Orlando, FL, USA. [Publication as part of the NSF CCLI/TUES Grant] PDF

[58]I N. Meghanathan, “A Critical Review of the Routing Protocols for Cognitive Radio Networks and a Proposal for Load Balancing Local Spectrum Knowledge-based Routing,” Fifth International Conference on Wireless and Mobile Networks, WiMoN, Istanbul, Turkey, June 1-2, 2013.

[57]IV N. Meghanathan, “Review of Access Control Models for Cloud Computing,” Proceedings of the Third International Conference on Computer Science, Engineering & Applications , ICCSEA, Chennai, India, pp. 77-85, May 24-26, 2013. DOI : 10.5121/csit.2013.3508. PDF

[56]II N. Meghanathan and P. D. Mumford, “A Benchmarking Algorithm to Determine Maximum Stability Data Gathering Trees for Wireless Mobile Sensor Networks,” Proceedings of the 10th International Conference on Information Technology: New Generations , ITNG, pp. 492-497, Las Vegas, NV, USA, April 15-17, 2013. Link [Publication as part of the AFOSR/AFRL/SFFP 2012 Research]

[55]IV M. Terrell and N. Meghanathan, “Setting up of a Cloud Cyber Infrastructure using Xen Hypervisor,” Proceedings of the 10th International Conference on Information Technology: New Generations , ITNG, pp. 648-652, Las Vegas, NV, USA, April 15-17, 2013. [Publication as part of the NSF CCLI/TUES Grant] Link

[54]IV N. Meghanathan, “Source Code Analysis of a Connection-Oriented File Reader Server Socket Program in Java and Removal of the Security Vulnerabilities,” The Fourth International Workshop on Network & Communications Security (NCS-2012), Chennai, India, December 2012; published in Springer Lecture Notes in Electrical Engineering, vol. 131, pp. 621-629, 2013. [Publication as part of the NSF CCLI/TUES Grant]

[53]II N. Meghanathan, “Data Gathering Algorithms to Optimize Stability-Delay and Node-Network Lifetime for Wireless Mobile Sensor Networks,” Proceedings of the Fourth International Conference on Sensor Networks and Applications (SNA-2012), pp. 237-242, New Orleans, LA, USA, November 14-16, 2012. ISBN: 978-1-880843-88-8/ISCA.

[52]IV N. Meghanathan, “Virtualization of Virtual Memory Address Space,” ACM Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology (CCSEIT 2012), pp. 732-737, Coimbatore, India, October 26-28, 2012. DOI: 10.1145/2393216.2393338. ISBN: 978-1-4503-1310-0. Acceptance Rate: 23%. [Publication as part of the NSF CCLI/TUES Grant] Link

[51]IV F. C. Dancer, D. A. Dampier, J. M. Jackson and N. Meghanathan, “A Theoretical Process Model for Smartphones,” Proceedings of the 2nd International Conference on Advances in Computing and Information Technology (ACITY-2012), Delhi, India, Springer Advances in Intelligent Systems and Computing, vol. 3, pp. 279-290, July 2012.

[50]IV N. Meghanathan and A. R. Geoghegan, “Testing for Software Security: A Case Study on Static Code Analysis of a File Reader Java Program,” Proceedings of the Springer LNICST 2nd International Conference on Computer Science, Engineering and Applications, ICCSEA, Delhi, India, pp. 529-538, May 25-27, 2012. DOI: 10.1007/978-3-642-30157-5_53. [Publication as part of the NSF CCLI/TUES Grant]

[49]I N. Meghanathan and M. Terrell, “Strong Neighborhood based Stable Connected Dominating Sets for Mobile Ad hoc Networks,” Proceedings of the 4th International Conference on Wireless, Mobile Network and Applications, WiMoA, Delhi, India, pp. 415-424, May 25-27, 2012. DOI: 10.1007/978-3-642-30111-7_39. ISBN: 978-3-642-30110-0. [Publication as part of the NSF REU Grant]

[48]I N. Meghanathan, “A Unicast MANET Routing Protocol to Simultaneously Minimize the Stability-Hop Count Tradeoff and End-to-End Delay,” Proceedings of the 9th International Conference on Information Technology : New Generations, ITNG, pp. 60-64, Las Vegas, NV, USA, April 16-18, 2012. DOI: http://doi.ieeecomputersociety.org/10.1109/ITNG.2012.17. ISBN: 978-0-7695-4654-4.

[47]IV N. Meghanathan, H. Kim and L. A. Moore, “Incorporation of Aspects of Systems Security and Software Security in Senior Capstone Projects,” Proceedings of the 9th International Conference on Information Technology : New Generations, ITNG, Las Vegas, NV, USA, pp. 319-324, April 16-18, 2012. DOI: http://doi.ieeecomputersociety.org/10.1109/ITNG.2012.54. ISBN: 978-0-7695-4654-4. [Publication as part of the NSF CCLI/TUES Grant]

[46]IV N. Meghanathan and B. Chituri, “A Secure Session Transfer Protocol for Downloading a Large File across a Cluster of Servers in the Presence of Network Congestion,” The 3rd International Conference on Networks and Communication Security, Bangalore, India, Springer-Verlag Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Series, LNICST 84, pp. 552-562, January 2012. [Publication as part of the NSF CCLI/TUES Grant]

[45]I N. Meghanathan, “A Link Distance Ratio based Stable Multicast Routing Protocol for Mobile Ad hoc Networks,” The 3rd International Conference on Wireless & Mobile Networks , Bangalore, India, Springer-Verlag Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Series, LNICST 84, pp. 253-262, January 2012.

[44]I N. Meghanathan, “A Node Stability Index-based Connected Dominating Set Algorithm for Mobile Ad hoc Networks,” The 3rd International Conference on Networks and Communications, Bangalore, India, Springer-Verlag Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Series, LNICST 84, pp. 31-40, January 2012.

[43]I N. Meghanathan, “A MANET Multicast Routing Protocol for Stable Trees based on the Inverse of Link Expiration Times,” Proceedings of the 9th IEEE International Consumer Communications and Networking Conference, Las Vegas, USA, pp. 947-951, January 2012, DOI: 10.1109/CCNC.2012.6180965.

[42]I N. Meghanathan, “Minimum Hop vs. Minimum Edge Based Multicast Routing for Mobile Ad hoc Networks,” The Third International Conference on Wireless, Mobile Networks and Applications, Dubai, UAE, Springer-Verlag Communications in Computer and Information Science Series, CCIS 154, pp. 1-10, May 2011.

[41]IV N. Meghanathan and L. A. Moore, “Experiences in Running a NSF-CISE REU Site at a HBCU,” Proceedings of The 2011 Annual Symposium on Computing at Minority Institutions (ADMI), Clemson, SC, USA, April 14-16, 2011.[Publication as part of the NSF REU Grant]

[40]I N. Meghanathan, “A Performance Comparison Study of Two Position-based Routing Protocols and their Improved Versions for Mobile Ad hoc Networks,” The First International Conference on Computer Science and Information Technology, Bangalore, India, Springer-Verlag Communications in Computer and Information Science Series, CCIS 131, Part I, pp. 14-23, January 2011.

[39]I N. Meghanathan, “Optimum Routing Approach vs. Least Overhead Routing Approach for Minimum Hop Routing in Mobile Ad hoc Networks,” The First International Conference on Computer Science and Information Technology, Bangalore, India, Springer-Verlag Communications in Computer and Information Science Series, CCIS 131, Part II, pp. 606-616, January 2011.

[38]I N. Meghanathan, “An Algorithm to Determine Minimum Velocity-based Stable Connected Dominating Sets for Ad hoc Networks,” The 3rd International Conference on Contemporary Computing, Noida, India, Springer-Verlag Communications in Computer and Information Science Series , CCIS 94, pp. 206-217, August 2010.

[37]I N. Meghanathan and S. R. Vavilala, “An Algorithm to Determine Multicast Meshes with Maximum Lifetime for Mobile Ad hoc Networks,” The Second International Conference on Wireless and Mobile Networks (WiMoN-2010), Chennai, India, Springer-Verlag Communications in Computer and Information Science Series, CCIS 90, pp. 250-259, July 2010.

[36]I N. Meghanathan, “Design of a Reliability-based Source Routing Protocol for Wireless Mobile Ad hoc Networks,” The First International Workshop on Trust Management in P2P Systems (IWTMP2PS), Chennai, India, Springer-Verlag Communications in Computer and Information Science Series, CCIS 89, pp. 463-472, July 2010.

[35]I N. Meghanathan, “On the Time between Successive Multi-Path Discoveries and Hop Count per Multi-Path for Zone-Disjoint Routing in Mobile Ad hoc Networks,” The Second International Conference on Wireless and Mobile Networks (WiMo 2010), Ankara, Turkey, Springer-Verlag Communications in Computer and Information Science Series, CCIS 84, pp. 254-265, June 2010.

[34]IV N. Meghanathan, N. Kostyuk, R. Isokpehi and H. H. P. Cohly, “Clustering Model to Identify Biological Signatures for English Language Anxiety,” Proceedings of The Second Annual ORNL Biomedical Science and Engineering Conference (BSEC), Oakridge, TN, USA, May 2010. [Publication as part of the NSF MS EPSCoR Grant]

[33]IV N. Meghanathan and L. Nayak, “A Review of the Audio and Video Steganalysis Algorithms,” Proceedings of the 48th ACM Southeast Conference, Oxford, MS, April 15-17, 2010.

[32]II N. Meghanathan, “Grid Block Energy based Data Gathering Algorithm for Lower Energy*Delay and Longer Lifetime in Wireless Sensor Networks,” Proceedings of the 1st ISCA International Conference on Sensor Networks and Applications (SNA 2009), pp.79-84, San Francisco, USA, November 4 – 6, 2009.

[31]I N. Meghanathan, D. Thomas and E. S. Addison, “Multicast Extensions to the Flow-Oriented Routing Protocol and Node Velocity-based Stable Path Routing Protocol for Mobile Ad hoc Networks,” Proceedings of the 1st IEEE Workshop on Mobile Computing and Networking Technologies, held in Conjunction with the 1st IEEE International Conference on Ultra Modern Telecommunications, St. Petersburg, Russia, October 12-14, 2009. (Acceptance Rate: 39%) [Publication as part of the NSF REU Grant]

[30]I N. Meghanathan, “A Node-Disjoint Multi-path Extension of the Location Prediction Based Routing Protocol for Mobile Ad hoc Networks,” Proceedings of the 3rd International Conference on Signal Processing and Communication Systems, Omaha, Nebraska, USA, September 28-30, 2009. (Acceptance Rate: 37.6%) [Publication as part of the ARL Grant]

[29]I N. Meghanathan, “Multicast Extensions to the Location-Prediction Based Routing Protocol for Mobile Ad hoc Networks,” International Conference on Wireless Algorithms, Systems and Applications, Lecture Notes of Computer Science Series, LNCS 5682, B. Liu et al. (Eds.), pp. 190-199, August 2009. Extended Version of the paper published in the ISAST Transactions on Computers and Intelligent Systems. [Publication as part of the ARL Grant]

[28]I N. Meghanathan, “On the Connectivity, Lifetime and Hop Count of Routes Determined using the City Section and Manhattan Mobility Models for Vehicular Ad hoc Networks,” 2nd International Conference on Contemporary Computing, Springer-Verlag Communications in Computer and Information Science Series, CCIS 40, pp. 170-181, August 2009. (Acceptance Rate: 31%)

[27]I N. Meghanathanand M. Sugumar, “A Beaconless Minimum Interference Based Routing Protocol for Mobile Ad hoc Networks,” 2nd International Conference on Contemporary Computing, Springer-Verlag Communications in Computer and Information Science Series, CCIS 40, pp. 58-69, August 2009. (Acceptance Rate: 31%)

[26]I N. Meghanathan, “A Density and Mobility Aware Energy-Efficient Broadcast Strategy to Minimize the Number of Route Discoveries in Mobile Ad hoc Networks,” Proceedings of the 2009 International Conference on Wireless Networks, ICWN 09, pp. 167 – 173, Las Vegas, July 13-16, 2009. (Acceptance Rate: 25%) [Publication as part of the ARL Grant]

[25]II N. Meghanathan, “An Algorithm to Determine Energy-aware Connected Dominating Set and Data Gathering Tree for Wireless Sensor Networks,” Proceedings of the 2009 International Conference on Wireless Networks, ICWN 09, pp. 608 – 614, Las Vegas, July 13-16, 2009. (Acceptance Rate: 25%)

[24]I N. Meghanathan and G. W. Skelton, “An Energy Efficient Risk Notification Message Dissemination Protocol for Vehicular Ad hoc Networks,” Proceedings of the International Conference on High Performance Computing, Networking and Communications Systems, HPCNCS-09, Orlando, July 13-16, 2009.

[23]I N. Meghanathan, “A Beaconless Node Velocity-based Stable Path Routing Protocol for Mobile Ad hoc Networks,” Proceedings of the IEEE Sarnoff Symposium, pp. 9-13, Princeton, NJ, March 30-April 1, 2009. (Acceptance rate: 45%)

[22]I N. Meghanathan, “Impact of Range of Simulation Time and Network Shape on the Hop Count and Stability of Routes for Mobile Ad hoc Networks,” Proceedings of the 47th ACM Southeast Conference, Clemson, March 19-21, 2009.

[21]I N. Meghanathan and L. C. Milton, “A Simulation-Based Performance Comparison Study of Stability-Based Routing, Power-Aware Routing and Load-Balancing Routing Protocols for Mobile Ad hoc Networks,” Proceedings of the 6th International Conference on Wireless On-demand Network Systems and Services, Snowbird, Utah, Feb 2 – 4, 2009.

[20]I N. Meghanathan, “Location Prediction Based Routing Protocol for Mobile Ad hoc Networks,” Proceedings of the IEEE Global Communications (GLOBECOM) Conference , New Orleans, Nov-Dec 2008. (Acceptance Rate: 36.8%, ECI: 0.75)

[19]I N. Meghanathan, “Stability and Link Efficiency of On-Demand Source Tree-Based Routing Protocols for Mobile Ad Hoc Networks,” Proceedings of the International Conference on High Performance Computing, Networking and Communication Systems, pp. 159-166, Orlando, USA, July 2008.

[18]II N. Meghanathan and G. W. Skelton, “A Two Layer Architecture of Mobile Sinks and Static Sensors,” Proceedings of the 15th International Conference on Advanced Computing and Communication, pp. 249-254, Guwahathi, India, December 2007.

[17]I N. Meghanathan, “Stability and Hop Count of Node-Disjoint and Link-Disjoint Multi-Path Routes in Ad Hoc Networks,” Proceedings of the 3rd IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), New York, October 2007 (Acceptance Rate: 44%).

[16]I N. Meghanathan, “Impact of Broadcast Route Discovery Strategies on the Performance of Mobile Ad Hoc Network Routing Protocols,” Proceedings of the International Conference on High Performance Computing, Networking and Communication Systems, pp. 144 – 151, Orlando, USA, July 2007 (Acceptance Rate: 30%).

[15]IV S. Knight, H. Kim, N. Meghanathan and C. Bland, “Fast Determination of Ancestor-Descendant Relationships using Bit Patterns,” Proceedings of the International Conference on Knowledge and Engineering, pp. 178 – 182, Las Vegas, June 2007 (Acceptance Rate: 22%).

[14]I N. Meghanathan, “Stability-Energy Consumption Tradeoff among Mobile Ad Hoc Network Routing Protocols,” Proceedings of 3rd IARIA International Conference on Wireless and Mobile Communications, March 2007 (Acceptance Rate: 31%).

[13]I N. Meghanathan, “A Simulation Study on the Stability-Oriented Routing Protocols for Mobile Ad Hoc Networks,” Proceedings of 3rd IEEE and IFIP International Conference on Wireless and Optical Communication Networks, Bangalore, India, April 2006.

[12]I N. Meghanathan, “Comparison of Stable Path Selection Strategies for Mobile Ad Hoc Networks,” Proceedings of 5th IFIP International Conference on Networking, Mauritius, April 2006. (Acceptance Rate: 39%).

[11]I N. Meghanathan, “On-demand Maximum Battery Lifetime Routing with Power Sensitive Power Control,” Proceedings of 5th IFIP International Conference on Networking, Mauritius, April 2006. (Acceptance Rate: 39%).

[10]I N. Meghanathan, “Determining a Sequence of Stable Multicast Steiner Trees in Mobile Ad Hoc Networks,” Proceedings of 44th ACM-Southeast Conference, pp. 102-106, Melbourne, FL, USA, March 2006. [Best Paper Award]

[9]I N. Meghanathan, “An Algorithm to Determine the Sequence of Stable Connected Dominating Sets in Mobile Ad Hoc Networks,” Proceedings of 2nd Advanced International Conference on Telecommunications, Guadeloupe, French Caribbean, February 2006. (Acceptance Rate: 37%).

[8]I N. Meghanathan and A. Farago, “Comparison of Routing Strategies for Minimizing Energy Consumption in Mobile Ad Hoc Networks,” Proceedings of the 4th Asian International Mobile Computing Conference, Kolkatta, India, January 2006.

[7]I N. Meghanathan and A. Farago, “An Efficient Algorithm for the Optimal Number of Route Transitions in Mobile Ad Hoc Networks,” Proceedings of the 1st IEEE – International Conference on Wireless and Mobile Computing, Networking and Communications, Canada, August 2005.

[6]I N. Meghanathan and A. Farago, “On the Route Refresh Frequency for On-demand Maximum Battery Life Routing in Ad Hoc Networks,” Proceedings of the 1st IEEE – International Conference on Wireless and Mobile Computing, Networking and Communications, Canada, August 2005.

[5]I N. Meghanathan and A. Farago, “Maximizing Network Lifetime under Fixed Energy Budget in Ad Hoc Networks,” Proceedings of the 6th IEEE- Southeast Conference, Fort. Lauderdale, FL, USA, April 2005.

[4]I N. Meghanathan and A. Farago, “Power Sensitive Power Control in Ad Hoc Networks,” Proceedings of 43rd ACM-Southeast Conference, Kennesaw, GA, USA, March 2005.

[3]I N. Meghanathan and A. Farago, “Looking at Protocol Efficiency from a New Angle: Stability – Delay Analysis,” Proceedings of 2nd ACM International Workshop on Mobility Management and Wireless Access (MobiWAC), in conjunction with Mobicom ’04, Philadephia, PA, USA, October 2004.

[2]I S. Baskiyar and N. Meghanathan, “Scheduling and Load Sharing in Mobile Computing Environments using Tickets,” Proceedings of 39th ACM- Southeast Conference, Athens, GA, USA, March 2001.

[1]IV N. Meghanathan, V. M. Saucedo and G. A. Krishnagopalan, “Modeling of Kraft Pulping Process Based on On-line Data from Near Infrared Analyzer,” AIChE Symposium Series 324, Volume 96, Fundamentals and Numerical Modeling of Unit Operations in the Forest Products Industries, pp. 36 – 41, 2001.

Books/Videos

[9]III N. Meghanathan (author and editor), Strategic Innovations and Interdisciplinary Perspectives in Telecommunications and Networking, 15 chapters (348 pages), IGI Global Publishers, Hershey, PA, USA, February 2019, ISBN: 9781522581888.

[8]III N. Meghanathan (author and editor), Centrality Metrics for Complex Network Analysis: Emerging Research and Opportunities, 7 chapters (183 pages), IGI Global Publishers, Hershey, PA, USA, April 2018, ISBN: 9781522538028.

[7]III N. Meghanathan (editor), Graph Theoretic Approaches for Analyzing Large-Scale Social Networks, 17 chapters (355 pages), IGI Global Publishers, Hershey, PA, USA, July 2017, ISBN: 9781522528142.

[6]I N. Meghanathan (author), Routing Protocols and Graph Theory Algorithms for Mobile Ad Hoc Networks, video series: 18 lessons, 3 hours and 8 minutes, DOI: 10.4018/978-1-5225-2227-0, EISBN: 9781522522270, IGI Global Publishers, Hershey, PA, USA, January 2017.

[5]III N. Meghanathan (editor), Advanced Methods for Complex Network Analysis, 17 chapters, 427 pages, DOI: 10.4018/978-1-4666-9964-9, ISBN: 9781466699649, IGI Global Publishers, Hershey, PA, USA, April 2016.

[4]I N. Meghanathan (author and editor), Recent Advances in Ad Hoc Networks Research, 10 chapters, 234 pages, ISBN: 978-1-63321-337-1, Nova Publishers, New York, USA, August 2014.

[3]I N. Meghanathan and Y. B. Reddy (authors and editors), Cognitive Radio Technology Applications for Wireless and Mobile Ad hoc Networks, 16 chapters, 370 pages, DOI: 10.4018/978-1-4666-4221-8, ISBN: 978-1-46664-221-8, IGI Global Publishers, Hershey, PA, USA, June 2013.

[2]IV N. Meghanathan (author), A Tutorial on Java Socket Programming and Source Code Analysis, LAP LAMBERT Academic Publishing , ISBN-13: 978-3-659-31445-2, 80 pages, 2013. Cover Page    Amazon Link
[Publication as part of the NSF CCLI/TUES Grant]

[1]IV N. Meghanathan, D. C. Johnson and A. R. Geoghegan (authors), An Analysis of Software Security Attacks and Mitigation Controls, LAP LAMBERT Academic Publishing , ISBN-13: 978-3-659-30944-1, 76 pages, 2013. Cover Page    Amazon Link
[Publication as part of the NSF CCLI/TUES Grant]

Book Chapters

[27III N. Meghanathan, “Binary Search Approach for Largest Cascade Capacity of Complex Network,” Encyclopedia of Data Science and Machine LearningEditor: John Wang, IGI, 2022.  

[26]IV N. Meghanathan and M. Terrell, “Design of a Secure Framework for Session Mobility as a Service in Cloud Computing Environment,” (Chapter 27, pp. 475-490), Computer and Network Security EssentialsEditor: Kevin Daimi, Springer, 2018. 

[25]IV N. Meghanathan, “Biometrics for User Authentication,” (Chapter 18, pp. 317-335), Computer and Network Security EssentialsEditor: Kevin Daimi, Springer, 2018.  

[24]III N. Meghanathan, “Leverage Centrality-Based Assortativity Analysis of Real-World Network Graphs,” chapter accepted for publication in Complex Networks: Advances in Research and Applications, NOVA Publishers, 2017.

[23]I N. Meghanathan, “A Graph Intersection-based Algorithm to Determine Maximum Lifetime Communication Topologies for Cognitive Radio Ad hoc Networks,” Chapter 567, Encyclopedia of Information Science and TechnologyEditor: Mehdi Khosrow-Pour, IGI Global, 2017. 

[22]III N. Meghanathan, “Clique Size and Centrality Metrics for Analysis of Real-World Network Graphs,” Chapter 565, Encyclopedia of Information Science and TechnologyEditor: Mehdi Khosrow-Pour, IGI Global, 2017.

[21]I N. Meghanathan, “Centralized and Distributed Algorithms for Stable Communication Topologies in Cognitive Radio Ad hoc Networks,” Chapter 6, pp. 153-182, Spectrum Access and Management for Cognitive Radio NetworksEditor: Mohammad A. Matin, Springer, 2017, DOI: 10.1007/978-981-10-2254-8: Link

[20]II N. Meghanathan, “Diameter-Aggregation Delay Tradeoff for Data Gathering Trees in Wireless Sensor Networks,” Chapter 10, pp. 237-253, Handbook of Research on Wireless Sensor Network Trends, Technologies, and ApplicationsEditor: Narendra Kumar Kamila, IGI Global, July 2016. Link

[19]II N. Meghanathan, “Eigenvector Centrality-Based Mobile Target Tracking in Wireless Sensor Networks,” Chapter 16, pp. 394-411, Handbook of Research on Wireless Sensor Network Trends, Technologies, and ApplicationsEditor: Narendra Kumar Kamila, IGI Global, July 2016. Link

[18]II N. Meghanathan, “Impact of the Structure of the Data Gathering Trees on Node Lifetime and Network Lifetime in Wireless Sensor Networks,” Chapter 7, pp. 192-204, Handbook of Research on Advanced Wireless Sensor Network Applications, Protocols, and ArchitecturesEditors: Niranjan Ray and Ashok Turuk, IGI Global, July 2016. Link

[17]II N. Meghanathan, “Distributed Data Gathering Algorithms for Mobile Sensor Networks,” Chapter 13, pp. 329-359, Emerging Communication Technologies Based on Wireless Sensor Networks: Current Research and Future Applications, Editors: Mubashir Husain Rehmani and Al-Sakib Khan Pathan, CRC Press, April 2016. Link

[16]II N. Meghanathan, “A Pairwise Key Distribution Mechanism and Distributed Trust Evaluation Model for Secure Data Aggregation in Mobile Sensor Networks,” Chapter 12, pp. 299-328, Emerging Communication Technologies Based on Wireless Sensor Networks: Current Research and Future ApplicationsEditors: Mubashir Husain Rehmani and Al-Sakib Khan Pathan, CRC Press, April 2016. Link

[15]IV N. Meghanathan, “Virtualization as The Catalyst for Cloud Computing,” Chapter 105, pp. 304-320, Encyclopedia of Information Science and Technology, Third Edition, Editor: Mehdi Khosrow-Pour, ISBN: 1466658886, DOI: 10.4018/978-1-4666-5888-2, IGI Global Publishers, Hershey, PA, USA, July 2014.

[14]I N. Meghanathan, “A Simulation-Based Comparison Study of Connected Dominating Sets for Mobile Ad hoc Networks under Different Mobility Models,” Chapter 1, Recent Advances in Ad Hoc Networks Research, Editor: N. Meghanathan, ISBN: 978-1-63321-337-1, Nova Publishers, USA, 3rd Quarter 2014. Book Link

[13]I N. Meghanathan, “A Performance Comparison of Zone-Disjoint and Node-Disjoint Multi-Path Routing with Single-Path Routing for Mobile Ad hoc Networks,” Chapter 2, Recent Advances in Ad Hoc Networks Research, Editor: N. Meghanathan, ISBN: 978-1-63321-337-1, Nova Publishers, USA, 3rd Quarter 2014. Book Link

[12]IV N. Meghanathan, “A Secure Data Aggregation Framework for Wireless Mobile Sensor Networks,” Chapter 5, Recent Advances in Ad Hoc Networks Research, Editor: N. Meghanathan, ISBN: 978-1-63321-337-1, Nova Publishers, USA, 3rd Quarter 2014. Book Link

[11]II N. Meghanathan, “Data Gathering Algorithms and Sink Mobility Models for Wireless Sensor Networks,” Chapter 8, pp. 123-151, Multidisciplinary Perspectives on Telecommunications, Wireless Systems, and Mobile Computing, Editor: W. Hu, ISBN: 1466647159, DOI: 10.4018/978-1-4666-4715-2.ch008, IGI Global Publishers, Hershey, PA, USA, 2014. Book Link

[10]I N. Meghanathan, “Algorithms to Determine Stable Connected Dominating Sets for Mobile Ad hoc Networks,” Chapter 9, pp. 249-274, Wireless Communications and Networking: Theory and Practice, Editor: M. Matin, ISBN: 1466651709, DOI: 10.4018/978-1-4666-5170-8.ch009, IGI Global Publishers, Hershey, PA, USA, February 2014. Book Chapter Link

[9]III N. Meghanathan and P. Mumford, “Graph Intersection-based Benchmarking Algorithm for Maximum Stability Data Gathering Trees in Wireless Mobile Sensor Networks,” Chapter 17, pp. 433-458, Wireless Communications and Networking: Theory and Practice, Editor: M. Matin, ISBN: 1466651709, DOI: 10.4018/978-1-4666-5170-8.ch017, IGI Global Publishers, Hershey, PA, USA, February 2014. Book Chapter Link

[8]IV N. Meghanathan, “Network Security: Attacks and Controls,” Chapter 11, pp. 174-203, Network Security Technologies: Design and Applications, Editors: A. Amine, O. Ait Mohamed and B. Benatallah, ISBN: 1466647892, IGI Global Publishers, Hershey, PA, USA, November 2013. Book Chapter Link

[7]I N. Meghanathan, “Introduction to Cognitive Radio Networks: Communication Protocols and Security Issues,” Chapter 1, pp. 1-30, Cognitive Radio Technology Applications for Wireless and Mobile Ad hoc Networks, Editors: N. Meghanathan and Y. B. Reddy, ISBN: TBA, IGI Global Publishers, Hershey, PA, USA, June 2013. Book Chapter Link

[6]II N. Meghanathan, “Data Gathering Algorithms for Wireless Sensor Networks,” Chapter 13: pp. 353-376, Wireless Sensor Networks: Current Status and Future Trends, Editors: S. Khan, A-S. Khan Pathan and N. A. Alrajeh, ISBN: 978-1-4665-0606-0, CRC Press, Taylor & Francis Group, USA, 2012. Book Link

[5]I N. Meghanathan, “Topology-based Classification of Multicast Routing Protocols for Mobile Ad hoc Networks,” Chapter 7: pp. 116-143, Technological Advancements and Applications in Mobile Ad hoc Networks: Research Trends , Editor: Kamaljit Lakhtaria, ISBN: 978-1-4666-0321-9, IGI Global Publishers, Hershey, PA, USA, 2012. Book Chapter Link

[4]IV N. Meghanathan and A. R. Geoghegan, “A Case Study on Testing for Software Security: Static Code Analysis of a File Reader Program Developed in Java,” Chapter 5: pp. 89-112, Advanced Automated Software Testing: Frameworks for Refined Practice, Editor: Izzat Alsmadi, ISBN: 978-1-4666-0089-8, 270 pages, IGI Global Publishers, Hershey, PA, USA, 2011. [Publication as part of the NSF CCLI/TUES Grant] Book Chapter Link

[3]III N. Meghanathan, “Applications of Graph Theory Algorithms in Mobile Ad hoc Networks,” Chapter 4: pp. 98-125, Mobile Computing Techniques in Emerging Markets: Systems, Applications and Services, Editors: A. V. Senthil Kumar and Hakikur Rehman, ISBN: 978-1-4666-0080-5, IGI Global Publishers, Hershey, PA, USA, 2011. [Publication as part of the NSF REU Grant] Book Chapter Link

[2]I N. Meghanathan, “A Location Prediction Based Routing Protocol and its Extensions for Multicast and Multi-path Routing in Mobile Ad hoc Networks,” Chapter 12: pp. 217-242, Mobile Ad-Hoc Networks: Protocol Design, Editor: Xin Wang, ISBN: 978-953-307-402-3, 656 pages, In-Tech Education and Publishing, Vienna, Austria, November 2010. Book Link

[1]I N. Meghanathan, “Greedy Algorithms to Determine Stable Paths and Trees in Mobile Ad hoc Networks,” Chapter 14: pp. 253 – 272, Advances in Greedy Algorithms, Editor: Witold Bednorz, ISBN: 978-953-7619-27-5, 586 pages, In-Tech Education and Publishing, Vienna, Austria, November 2008. Book Link

Peer-reviewed Abstract/Poster Publications and Presentations

[37]III N. Meghanathan, “Breadth First Search-based Efficient Algorithm for Betweenness Centrality,” Proceedings of the ACM-Mid Southeast Conference, p. 68, Gatlinburg, TN, November 2015.

[36]III N. Meghanathan, “Community Detection using Betweenness Centrality and Eigenvector Centrality,” Proceedings of the ACM-Mid Southeast Conference, p. 70, Gatlinburg, TN, November 2015.

[35]IV N. Meghanathan, “Design of an Algorithms for Bioinformatics Course for Computer Science Majors,” Proceedings of the 79th Annual Meeting of the Mississippi Academy of Sciences, vol. 60, no. 1, p. 131, Hattiesburg, MS, February 2015.

[34]I N. Meghanathan, “A Local Spectrum Knowledge-based Routing Protocol for Cognitive Radio Ad hoc Networks,” Proceedings of the ACM-Mid Southeast Conference, p. 75, Gatlinburg, TN, November 2014. PDF

[33]IV N. Meghanathan, “A Greedy Algorithm to Determine the Longest Suffix Prefix Overlap of two DNA Strings,” Proceedings of the ACM-Mid Southeast Conference, p.74, Gatlinburg, TN, November 2014. PDF

[32]IV N. Meghanathan, “Dynamic Access Control Models for Cross-domain Authentication in Cloud Computing Environments,” Proceedings of the ACM-Mid Southeast Conference, p. 74, Gatlinburg, TN, November 2013. PDF

[31]IV N. Meghanathan, “Attack Trees for Threat/Risk Analysis of Software Security,” Journal of the Mississippi Academy of Sciences, vol. 64, no. 1, p. 112, January 2013. PDF [Publication as part of the NSF CCLI/TUES Grant]

[30]IV N. Meghanathan, “Workshop: Incorporating Aspects of Systems and Software Security in Software Engineering Projects,” Journal of the Mississippi Academy of Sciences, vol. 64, no. 1, p. 113, January 2013. PDF [Publication as part of the NSF CCLI/TUES Grant]

[29]IV A. Overton, N. Meghanathan and R. Isokpehi, “A Binary Code-based Finite State Machine Model to Determine Ancestor-Descendant Relationships in Directed Acyclic Graphs,” Proceedings of the ACM-Mid Southeast Conference, p. 49, Gatlinburg, TN, November 2012. PDF [Publication as part of the NSF REU and MS EPSCoR Grants]

[28]IV S. Thumma and N. Meghanathan, “Secure Software Design and Development Incorporating Role-based Access Control, Cryptographic Storage and Validation, and Parameterized SQL Statements,” Proceedings of the ACM-Mid Southeast Conference, p. 57, Gatlinburg, TN, November 2012. PDF [Publication as part of the NSF CCLI/TUES Grant]

[27]IV M. Bailey and N. Meghanathan, “Implementation of a Virtual Network for Cloud Computing,” Proceedings of the ACM-Mid Southeast Conference, p. 63, Gatlinburg, TN, November 2012. PDF[Publication as part of the NSF REU Grant]

[26]IV N. Meghanathan, “Information Hiding through Cover Generation using Context-Free Grammar,” Journal of the Mississippi Academy of Sciences, vol. 63, no. 1, p. 127, January 2012. PDF [Publication as part of the NSF CCLI/TUES Grant]

[25]IV B. Chess, P. Fly, A. Moncrief, J. White, H. Kim and N. Meghanathan, “A Secure Online Student-Advisor Appointment Management and Registration System,” Journal of the Mississippi Academy of Sciences, vol. 57, no. 1, p. 127, January 2012. PDF [Publication as part of the NSF CCLI/TUES Grant]

[24]IV J. Bouldin, J. Etheredge, J. Harris, H. Kim and N. Meghanathan, “Simulation of a Secure Touch-Screen Kiosk System for Amusement Park Planning,” Journal of the Mississippi Academy of Sciences, vol. 57, no. 1, p. 127, January 2012. PDF [Publication as part of the NSF CCLI/TUES Grant]

[23]IV A. Komilov and N. Meghanathan, “Development of a Web-based Application to Remotely Access the Computer Network Systems and Security Research and Education Modules at Jackson State University,” Proceedings of the ACM-Mid Southeast Conference, Gatlinburg, TN, November 2011. [Publication as part of the NSF CCLI/TUES Grant]

[22]IV N. Meghanathan and R. Isokpehi, “A Cross-Reference Data Mining Study of the Universal Stress Protein Datasets of Viridiplantae,” presented at The 8th Annual Conference of the Mid-South Computational Biology and Bioinformatics Society (MCBIOS 2011), College Station, TX, USA, April 1-2, 2011. PDF [Publication as part of the NSF MS EPSCoR Grant]

[21]IV N. Meghanathan and R. Isokpehi, “On the Variations in the Cytotoxicity of Gold Nanoparticles of Different Shapes,” presented at The 8th Annual Conference of the Mid-South Computational Biology and Bioinformatics Society (MCBIOS 2011), College Station, TX, USA, April 1-2, 2011. PDF [Publication as part of the NSF MS EPSCoR Grant]

[20]IV P. Fly, N. Meghanathan and R. Isokpehi, “Implementation of the Binary Coding Scheme to Test for Ancestor-Descendant Relationships in K-ary Trees,” The 8th Annual Conference of the Mid-South Computational Biology and Bioinformatics Society (MCBIOS 2011), College Station, TX, USA, April 1-2, 2011. [Publication as part of the NSF MS EPSCoR Grant]

[19]IV J. Bouldin, S. Thumma, A. R. Geoghegan, M. Challagundla and N. Meghanathan, “A Preliminary Design of a Virtual Security Laboratory for Information Systems and Software Engineering Projects,” Journal of the Mississippi Academy of Sciences, vol. 56, no. 1, p. 100, February 2011.[Publication as part of the NSF CCLI/TUES Grant]

[18]III P. Fly, N. Meghanathan and R. Isokpehi, “Use of Binary Codes to Determine Ancestor-Descendant Relationships in K-ary Trees,” Journal of the Mississippi Academy of Sciences, vol. 56, no. 1, p. 102, February 2011. [Publication as part of the NSF MS EPSCoR Grant]

[17]IV M. Challagundla, J. Bouldin, A. R. Geoghegan, N. Meghanathan and H. Kim, “Role of Misuse Case Diagrams in Analyzing the Security Requirements of a Software Engineering Project,” Journal of the Mississippi Academy of Sciences, vol. 56, no. 1, p. 103, February 2011. [Publication as part of the NSF CCLI/TUES Grant]

[16]II B. Torres, Q. Pang, G. Skelton, S. Bridges and N. Meghanathan , “Integration of an RFID Reader to a Wireless Sensor Network and the Use of it to Identify an Individual Carrying RFID Tags,” abstract presented at the SACNAS (Society for Advancement of Chicanos and Native Americans in Science) National Conference, September 30 – October 3, 2010; poster presented at the 2010 AGMUS Research Symposium , September 10-11, 2010. [Publication as part of the NSF REU Grant]

[15]IV N. Kostyuk, N. Meghanathan, R. Isokpehi and H. H. P. Cohly, “Functional Status of Organ Systems in Mitral Valve Prolapse,” poster presented at the Jackson Heart Study 2010 Scientific Conference, September 23-24, 2010.

[14]IV N. Meghanathan, N. Kostyuk, H. H. P. Cohly and R. D. Isokpehi, “A Clustering Model for English Language Anxiety in Non-Native Speakers,” Proceedings of The 7th Annual Conference of the Mid-South Computational Biology and Bioinformatics Society (MCBIOS 2010), p. 34, Jonesboro, AR, USA, February 2010. [Publication as part of the NSF MS EPSCoR Grant]

[13]IV N. Meghanathan, N. Kostyuk, H. H. P. Cohly and R. D. Isokpehi, “Quadrant-Based Modeling for Assessing Functional State of Human Organ Systems,” Proceedings of The 7th Annual Conference of the Mid-South Computational Biology and Bioinformatics Society (MCBIOS 2010), p. 98, Jonesboro, AR, USA, February 2010. [Publication as part of the NSF MS EPSCoR Grant]

[12]I N. Meghanathan and S. Gorla, “On the Probability of k-Connectivity in Mobile Ad hoc Networks,” Journal of the Mississippi Academy of Sciences, vol. 55, no. 1, p. 112, February 2010.

[11]IV N. Kostyuk, R. Rajnarayanan, R. Isokpehi, N. Meghanathan , T. Bell and H. H. P. Cohly, “Non-invasive, Real-Time, Mobile Biometrics Device: Pilot Evaluation Studies,” Proceedings of The 7th Annual Conference of the Mid-South Computational Biology and Bioinformatics Society (MCBIOS 2010), p. 87, Jonesboro, AR, USA, February 2010.

[10]I J. Miller and N. Meghanathan, “Determining Maximum Vehicular Flow for City Evacuation Planning,” abstract poster presented at the Winter Simulation Conference, Austin, TX, December 2009. [Publication as part of the NSF REU Grant]

[9]I D. Thomas, E. S. Addison and N. Meghanathan, “Development of the Multicast Flow Oriented Routing Protocol for Mobile Ad hoc Networks,” Proceedings of the ACM-Mid Southeast Conference, p. 30, Gatlinburg, TN, November 2009. [Publication as part of the NSF REU Grant]

[8]II J. Henderson and N. Meghanathan, “An Energy-aware Grid-Cluster Based Data Gathering Protocol for Wireless Sensor Networks,” Proceedings of the ACM-Mid Southeast Conference, p. 36, Gatlinburg, TN, November 2009. [Publication as part of the NSF REU Grant]

[7]IV P. Fly and N. Meghanathan, “Implementation of Binary Tree Structures using Binary Codes,” Proceedings of the ACM-Mid Southeast Conference, p. 50, Gatlinburg, TN, November 2009.

[6]I M. C. Matthews and N. Meghanathan, “Probability of Connectivity in a Grid Network of Wireless Nodes,” Proceedings of the HBCU-UP 2009 Conference, p. A76, # 112, Washington DC, USA, October-November 2009.

[5]IV T. Oyeleye, R. D. Isokpehi, N. Meghanathan, H. H. P. Cohly and T. Pei, “Bioinformatics Tools Categorizer,” Proceedings of the Sixth International Symposium on Recent Advances in Environmental Health Research, PA-48, Jackson, MS, USA, September 2009. Link

[4]IV S. Allam and N. Meghanathan, “Development of an Automated Web-based Faculty Performance Evaluation Instrument,” Journal of the Mississippi Academy of Sciences, vol. 54, no. 1, p. 88, February 2009.

[3]III N. Meghanathan, “Digital Medical Image Indexing using Attributed Relational Graph and Rectangular Tree,” Proceedings of the ACM Mid-Southeast Conference, p. 70, Gatlinburg, TN, November 20 – 21, 2008.

[2]I N. Meghanathan and K. Mudunuri, “Simulation-based Analysis of the Bandwidth Usage and Number of Hops per Receiver for Mobile Ad Hoc Network Multicast Routing Protocols,” Journal of the Mississippi Academy of Sciences, vol. 53, no. 1, p. 98, January 2008.

[1]I N. Meghanathan, “An Algorithm to Determine the Sequence of Stable Multicast Trees in Mobile Ad Hoc Networks,” Journal of the Mississippi Academy of Sciences, vol. 51, no. 1, p. 92, February 2006.

Peer-reviewed Publication Profile of Natarajan Meghanathan

No. Research Area Journal Papers Conference Papers Abstracts   Book Chapters Books/Videos
I Wireless Ad hoc Networks 36 44 7 8 3
II Wireless Sensor Networks 23 13 2 7 0
III Network Science and Graph Theory 44 21 2 6 4
IV Other Areas: Binformatics, Cyber Security 4 15 26 6 2
Total Publications 107 93 37 27 9

 

Dr. Meg

Location

Engineering Building, Room 275

Phone: 601-979-3661