{"id":38,"date":"2015-04-30T20:54:34","date_gmt":"2015-05-01T01:54:34","guid":{"rendered":"https:\/\/www.jsums.edu\/nmeghanathan\/?page_id=38"},"modified":"2023-06-09T16:09:15","modified_gmt":"2023-06-09T21:09:15","slug":"research","status":"publish","type":"page","link":"https:\/\/www.jsums.edu\/nmeghanathan\/research\/","title":{"rendered":"Research"},"content":{"rendered":"<p><u style=\"line-height: 1.2em;\">Areas of Research Interests<\/u><\/p>\n<p><span style=\"line-height: 1.6em;\">Wireless Ad hoc Networks<\/span><sup style=\"line-height: 1.6em;\">I<\/sup><span style=\"line-height: 1.6em;\">, \u00a0 Sensor Networks<\/span><sup style=\"line-height: 1.6em;\">II<\/sup><span style=\"line-height: 1.6em;\">, \u00a0 Network Science and Graph Theory<\/span><sup style=\"line-height: 1.6em;\">III<\/sup><span style=\"line-height: 1.6em;\">, \u00a0\u00a0 Other Areas (incl. Bioinformatics, Cyber Security)<\/span><sup style=\"line-height: 1.6em;\">IV<\/sup><\/p>\n<p><span style=\"font-size: 14px;\"><a href=\"#JournalPapers\">Peer-reviewed Journal Papers<\/a><br \/>\n<a href=\"#ConferencePapers\">Peer-reviewed Conference Papers<\/a><br \/>\n<a href=\"#Books\">Books\/Videos<\/a><br \/>\n<a href=\"#BookChapters\">Book Chapters<\/a><\/span><br \/>\n<span style=\"font-size: 14px;\"><a href=\"#Abstracts\">Abstracts and Poster Presentations<\/a><br \/>\n<a href=\"#PublicationProfile\">Publication Profile<\/a><\/span><\/p>\n<h3><u><a name=\"JournalPapers\"><\/a>Peer-reviewed Journals<\/u><\/h3>\n<p>[107]<sup>III<\/sup> <strong>N. Meghanathan<\/strong>, \u201cA Comprehensive Analysis of the Correlation between Maximal Clique Size and Centrality Metrics for Complex Network Graphs,\u201d <em>Egyptian Informatics Journal<\/em>, vol. 22, no. 3, pp. 339-355, September 2021.<\/p>\n<p>[106]<sup>III<\/sup> <strong>N. Meghanathan<\/strong>, A. Essien and R. Lawrence, \u201cA two-hop neighbor preference-based random network graph model with high clustering coefficient for modeling real-world complex networks,\u201d <em>Egyptian Informatics Journal<\/em>, vol. 22, no. 3, pp. 389-400, September 2021.<\/p>\n<p>[105]<sup>III<\/sup> <strong>N. Meghanathan<\/strong>, &#8220;Neighborhood-based Bridge Node Centrality Tuple for Complex Network Analysis,&#8221; <em>Springer Applied Network Science<\/em>, vol. 6, no. 47, pp. 1-36, June 2021.<\/p>\n<p>[104]<sup>III<\/sup> <strong>N. Meghanathan<\/strong>, &#8220;Exploring the Step Function Distribution of the Threshold Fraction of Adopted Neighbors vs. Minimum Fraction of Nodes as Initial Adopters to Assess the Cascade Blocking Intra-Cluster Density of Complex Real-World Networks,&#8221; <em>Springer Applied Network Science<\/em>, vol. 5, no. 97, pp. 1-33, December 2020. Published as part of <em>Special issue on Epidemics Dynamics &amp; Control on Networks\u00a0<\/em><\/p>\n<p>[103]<sup>I<\/sup> <strong>N. Meghanathan<\/strong>, &#8220;Binary Search Algorithm to Predict the Time of Next Link Change for Wireless Mobile Networks,&#8221; <em>Inderscience International Journal of Mobile Network Design and Innovation<\/em>, vol. 10, no. 1, pp. 17-28, 2020.<\/p>\n<p>[102]<sup>I<\/sup> <strong>N. Meghanathan<\/strong>, &#8220;A Binary Search Algorithm to Determine the Minimum Transmission Range for Minimum Connected Dominating Set of a Threshold Size in Ad hoc Networks,&#8221;<em> International Journal of Wireless Networks and Broadband Technologies<\/em>, vol. 9, no. 2, pp. 1-16, 2020.<\/p>\n<p>[101]<sup>III<\/sup> <b>N. Meghanathan<\/b>, &#8220;Edge Similarity Index for Complex Network Analysis,&#8221; <em>International Journal of Combinatorial Optimization Problems and Informatics<\/em>, vol. 11, no. 3, pp. 76-96, September-December 2020. <a href=\"https:\/\/ijcopi.org\/ojs\/article\/view\/129\/137\" target=\"_blank\" rel=\"noopener noreferrer\">Link<\/a><\/p>\n<p><span style=\"font-size: 14px;\">[100]<sup>III<\/sup> <strong>N. Meghanathan<\/strong>, \u201cRelative Assortativity Index: A Quantitative Metric to Assess the Impact of Link Prediction Techniques on Assortativity of Complex Networks,\u201d <em>The Computer Journal<\/em>, vol. 63, no. 9, pp. 1417-1437, September 2020. DOI: 10.1093\/comjnl\/bxz089.\u00a0 <\/span><\/p>\n<p>[99]<sup>II<\/sup> <strong>N. Meghanathan<\/strong>, &#8220;An Ensemble Approach to Analyze Mobile Sensor Networks,&#8221; <em>Inderscience International Journal of Mobile Network Design and Innovation<\/em>, vol. 9, no. 3\/4, pp. 142-152, 2019.<\/p>\n<p>[98]<sup>III<\/sup> <b>N. Meghanathan<\/b>, &#8220;Centrality and Partial Correlation Coefficient-based Assortativity Analysis of Real-World Networks,&#8221; <em>The Computer Journal<\/em>, vol. 62, no. 9, pp. 1247-1264, September 2019. <a href=\"https:\/\/academic.oup.com\/comjnl\/advance-article-abstract\/doi\/10.1093\/comjnl\/bxy098\/5112948\" target=\"_blank\" rel=\"noopener noreferrer\">Link<\/a><\/p>\n<p>[97]<sup>III<\/sup> <b>N. Meghanathan<\/b>, &#8221; Unit Disk Graph-based Node Similarity Index for Complex Network Analysis,&#8221; Hindawi <em>Complexity<\/em>, vol. 2019, Article ID: 6871874, 22 pages, March 2019. <a href=\"https:\/\/www.hindawi.com\/journals\/complexity\/2019\/6871874\/\" target=\"_blank\" rel=\"noopener noreferrer\">Link<\/a><\/p>\n<p>[96]<sup>III<\/sup> <b>N. Meghanathan<\/b>, &#8220;\u03b4-Space for Real-World Networks: A Correlation Analysis of Decay Centrality vs. Degree Centrality and Closeness Centrality,&#8221; <em>Elsevier <\/em> <em>Journal of King Saud University &#8211; Computer and Information Sciences<\/em><span style=\"font-size: 14px; line-height: 20.8px;\">, vol. 30, no. 3, pp. 391-403, July 2018. <\/span><a href=\"https:\/\/www.sciencedirect.com\/science\/article\/pii\/S131915781730006X\" target=\"_blank\" rel=\"noopener noreferrer\">Available Online<\/a><\/p>\n<p>[95]<sup>II<\/sup> <b>N. Meghanathan<\/b>, &#8220;Complex Network Analysis-based Graph Theoretic Metrics to Determine Stable Data Gathering Trees for Mobile Sensor Networks,&#8221; <em>The Computer Journal<\/em><span style=\"font-size: 14px; line-height: 20.8px;\">, vol. 61, no. 2, pp. 199-222, February 2018.<\/span><\/p>\n<p>[94]<sup>II<\/sup>\u00a0<b>N. Meghanathan<\/b>, &#8220;A Location and Mobility Independent Scheme to Quantify the Neighborhood Stability of a Node in Mobile Sensor Networks,&#8221; <em>Int. J. of Mobile Network Design and Innovation<\/em> (<em><span class=\"il\">IJMNDI<\/span><\/em>)<span style=\"font-size: 14px; line-height: 20.8px;\">, vol. 8, no. 2, pp. 111-125, January 2018. <\/span><b style=\"font-size: 14px; line-height: 20.8px;\">[Publication as part of the AFRL\/Clarkson Aerospace Grant]<\/b><span style=\"font-size: 14px; line-height: 20.8px;\">.<\/span><\/p>\n<p>[93]<sup>III<\/sup> M. Akhter, Md. Rahman and <b>N. Meghanathan<\/b>, &#8221; A Spectral Analysis and Network Science Approach to Identify Influential Diseases based on Disease-Gene Associations,&#8221; <em>International Journal of Network Science<\/em>, vol. 1, no. 4, pp. 325-343, 2017.<\/p>\n<p>[92]<sup>III<\/sup> <b>N. Meghanathan <\/b>and F. Yang, &#8220;Correlation Analysis: Edge Betweenness Centrality vs. Neighborhood Overlap,&#8221; <em>Inderscience International Journal of Network Science<\/em>, vol. 1, no. 4, pp. 299-324, 2017.<\/p>\n<p>[91]<sup>III<\/sup> <b>N. Meghanathan<\/b>, &#8220;Randomness Index for Complex Network Analysis,&#8221; <em>Springer Social Network Analysis and Mining<\/em><span style=\"font-size: 14px; line-height: 20.8px;\">, vol. 7,\u00a0 no. 25, pp. 1-15, December 2017, DOI: 10.1007\/s13278-017-0444-3. <a href=\"https:\/\/link.springer.com\/article\/10.1007\/s13278-017-0444-3\" target=\"_blank\" rel=\"noopener noreferrer\">Link<\/a><\/span><a href=\"https:\/\/link.springer.com\/article\/10.1007\/s13278-017-0444-3\" target=\"_blank\" rel=\"noopener noreferrer\">.<\/a><\/p>\n<p><span style=\"font-size: 14px; line-height: 20.8px;\">[90]<\/span><sup style=\"line-height: 20.8px;\">I<\/sup><span style=\"font-size: 14px; line-height: 20.8px;\">\u00a0<\/span><b style=\"font-size: 14px; line-height: 20.8px;\">N. Meghanathan<\/b><span style=\"font-size: 14px; line-height: 20.8px;\">, &#8220;On the Use of\u00a0<\/span><span style=\"font-size: 14px; line-height: 1.6em;\">Centrality Measures to Determine Connected Dominating Sets for Mobile Ad hoc Netwoks<\/span><span style=\"font-size: 14px; line-height: 20.8px;\">,&#8221; <em>International Journal of Ad Hoc and Ubiquitous Computing (<\/em>IJAHUC), vol. 26, no. 4, pp. 205-221, October 2017.<\/span><b style=\"font-size: 14px; line-height: 1.6em;\">[Publication as part of the NASA EPSCoR Sub Award]\u00a0<\/b><span style=\"font-size: 14px;\"><a href=\"http:\/\/www.inderscience.com\/info\/ingeneral\/forthcoming.php?jcode=IJAHUC\" target=\"_blank\" rel=\"noopener noreferrer\">Link<\/a><\/span><\/p>\n<p>[89]<sup>II<\/sup>\u00a0<b>N. Meghanathan<\/b>, &#8220;Bipartivity Index based Link Selection Strategy to Determine Stable and Energy-Efficient Data Gathering Trees for Mobile Sensor Networks,&#8221; <em>Informatica<\/em><span style=\"font-size: 14px; line-height: 20.8px;\">, vol. 41, no. 3, pp. 259-274, September 2017 <\/span><b style=\"font-size: 14px; line-height: 20.8px;\">[Publication as part of the AFRL\/Clarkson Aerospace Grant]<\/b><span style=\"font-size: 14px; line-height: 20.8px;\">.<\/span><\/p>\n<p>[88]<sup>III<\/sup> <b>N. Meghanathan<\/b>, &#8220;An Analysis of the Fat-Tailedness of the Centrality Distributions of Real-World Networks<span style=\"font-size: 14px;\">,&#8221; <em>International Journal of Computer Networks and Communications<\/em>, vol. 9, no. 5, pp. 1-15, September 2017.<\/span>DOI: 10.5121\/ijcnc.2017.9501. <a href=\"http:\/\/aircconline.com\/ijcnc\/V9N5\/9517cnc01.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Link.<\/a><\/p>\n<p>[87]<sup>III<\/sup> <b>N. Meghanathan<\/b>, &#8220;Evaluation of Correlation Measures for Computationally-Light vs. Computationally-Heavy Centrality Metrics on Real-World Graphs,&#8221; <em>Journal of Computer and Information Technology<\/em><span style=\"font-size: 14px; line-height: 20.8px;\">, vol. 25, no. 2, pp. 103-132, June 2017. <\/span><\/p>\n<p>[86]<sup>II<\/sup> <b>N. Meghanathan<\/b>, &#8220;Link Selection Strategies based on Network Analysis to Determine Stable and Energy-Efficient Data Gathering Trees for Mobile Sensor Networks,&#8221; <em>Elsevier\u00a0<\/em><em>Ad Hoc Networks<\/em><span style=\"font-size: 14px; line-height: 20.8px;\">, vol. 62, pp. 50-75, July 2017. <\/span><span style=\"font-size: 14px;\"><a href=\"http:\/\/www.sciencedirect.com\/science\/article\/pii\/S1570870517300793\" target=\"_blank\" rel=\"noopener noreferrer\">Abstract Link<\/a><\/span>.<\/p>\n<p>[85]<sup>III<\/sup> <b>N. Meghanathan<\/b>, &#8220;A Binary Search Algorithm for Correlation Study of Decay Centrality vs. Degree Centrality and Closeness Centrality,&#8221; <em>Computer and Information Science<\/em><span style=\"font-size: 14px; line-height: 20.8px;\">, vol. 10, no. 2, pp. 52-75, June 2017. <\/span><span style=\"font-size: 14px;\"><a href=\"https:\/\/doi.org\/10.5539\/cis.v10n2p52\" target=\"_blank\" rel=\"noopener noreferrer\">Available Online<\/a><\/span><span style=\"font-size: 14px; line-height: 20.8px;\">.<\/span><\/p>\n<p><span style=\"font-size: 14px;\">[84]<sup>III<\/sup>\u00a0<b>N. Meghanathan<\/b>, &#8220;Curriculum Network Graph: Relative Contribution of Courses,&#8221; <em>Inderscience <\/em><em>International Journal of Network Science<\/em><span style=\"line-height: 20.8px;\">, vol. 1, no. 3, pp. 223-247, 2017.<\/span><\/span><\/p>\n<p><span style=\"font-size: 14px;\">[83]<sup>III<\/sup>\u00a0<b>N. Meghanathan<\/b>, &#8220;Local Clustering Coefficient-based Assortativity Analysis of Real-World Network Graphs,&#8221; <em>Inderscience International Journal of Network Science<\/em>, vol. 1, no. 3, pp. 187-208, 2017.<\/span><\/p>\n<p>[82]<sup>III<\/sup>\u00a0<b>N. Meghanathan<\/b>, &#8221; Complex Network Analysis of the Contiguous United States Graph,&#8221; <em>Computer and Information Science<\/em><span style=\"font-size: 14px; line-height: 20.8px;\">, vol. 10, no. 1, pp. 54-76, February 2017. DOI: <\/span> 10.5539\/cis.v10n1p54, <a href=\"http:\/\/www.ccsenet.org\/journal\/index.php\/cis\/article\/view\/65198\/35831\" target=\"_blank\" rel=\"noopener noreferrer\">Link<\/a>.<\/p>\n<p>[81]<sup>III<\/sup>\u00a0<b>N. Meghanathan<\/b>, &#8220;A Computationally-Lightweight and Localized Centrality Metric in lieu of Betweenness Centrality for Complex Network Analysis,&#8221; <i>Springer Vietnam Journal of Computer Science<\/i>, vol. 4, no. 1, pp. 23-38, February 2017.\u00a0DOI: 10.1007\/s40595-016-0073-1.\u00a0<a href=\"http:\/\/link.springer.com\/article\/10.1007\/s40595-016-0073-1?wt_mc=Internal.Event.1.SEM.ArticleAuthorOnlineFirst\" target=\"_blank\" rel=\"noopener noreferrer\">Link<\/a><\/p>\n<p><span style=\"font-size: 14px;\"><span style=\"line-height: 20.8px;\">[80]<\/span><sup style=\"line-height: 20.8px;\">II<\/sup><span style=\"line-height: 20.8px;\">\u00a0<\/span><b style=\"font-size: 14px; line-height: 20.8px;\">N. Meghanathan<\/b><span style=\"line-height: 20.8px;\">, &#8220;<\/span>An Eigenvector Centrality-based Mobile Target Tracking Algorithm for Wireless Sensor Networks<span style=\"line-height: 20.8px;\">,&#8221;\u00a0 <\/span><em>International Journal of Mobile Network Design and Innovation<\/em><span style=\"line-height: 20.8px;\">, vol. 6, no. 4, pp. 202-211, December 2016.<\/span><\/span><\/p>\n<p>[79]<sup>III<\/sup>\u00a0<b>N. Meghanathan <\/b>and X. He, &#8220;Correlation and Regression Analysis for Node Betweenness Centrality,&#8221; <em>International Journal of Foundations in Computer Science and Technology<\/em><span style=\"font-size: 14px; line-height: 20.8px;\">, vol. 6, no. 6, pp. 1-20, November 2016.<\/span><\/p>\n<p>[78]<sup>III<\/sup>\u00a0<b>N. Meghanathan<\/b>, A. Essien and R. Lawrence, &#8220;A Two-Hop Neighbor Preference-based Random Network Graph Model with High Clustering Coefficient for Modeling Real-World Complex Networks,&#8221; <em>Elsevier Egyptian Informatics J<\/em><em style=\"font-size: 14px; line-height: 20.8px;\">ournal<\/em><span style=\"font-size: 14px; line-height: 20.8px;\">, In Press, Available Online, September 2016. <\/span><a href=\"http:\/\/www.sciencedirect.com\/science\/article\/pii\/S1110866516300342\" target=\"_blank\" rel=\"noopener noreferrer\">Link<\/a><span style=\"font-size: 14px; line-height: 20.8px;\">\u00a0 <\/span><\/p>\n<p><span style=\"line-height: 1.6em; font-size: 14px;\"><span style=\"line-height: 20.8px;\">[77]<\/span><sup style=\"line-height: 20.8px;\">III<\/sup><span style=\"line-height: 20.8px;\">\u00a0<\/span><b style=\"line-height: 20.8px;\">N. Meghanathan<\/b><span style=\"line-height: 20.8px;\">, &#8220;<\/span>Maximal Assortative Matching for Real-World Network Graphs, Random Network Graphs and Scale-Free Network Graphs<span style=\"line-height: 20.8px;\">,&#8221;\u00a0<i>Springer Vietnam Journal of Computer Science<\/i>, vol. 3, no. 3, pp. 151-179, August 2016.\u00a0DOI:\u00a0<\/span><\/span><span style=\"line-height: 20.8px; font-size: 14px;\"><a href=\"http:\/\/link.springer.com\/article\/10.1007\/s40595-016-0066-0\" target=\"_blank\" rel=\"noopener noreferrer\">10.1007\/s40595-016-0066-0<\/a><\/span><span style=\"font-family: Arial; font-size: 14px; line-height: normal;\">.<\/span><\/p>\n<p><span style=\"font-size: 14px;\"><span style=\"line-height: 20.8px;\">[76]<\/span><sup style=\"line-height: 20.8px;\">III<\/sup><span style=\"line-height: 20.8px;\">\u00a0<\/span><b style=\"font-size: 14px; line-height: 20.8px;\">N. Meghanathan<\/b><span style=\"line-height: 20.8px;\">, &#8220;<\/span>Assortativity Analysis of Real-World Network Graphs based on Centrality Metrics<span style=\"line-height: 20.8px;\">,&#8221; <i>Computer and Information Science<\/i><\/span><span style=\"line-height: 20.8px;\">, vol. 9, no. 3, pp. 7-25, August 2016<\/span><span style=\"line-height: 20.8px;\">.\u00a0<\/span><a href=\"http:\/\/www.ccsenet.org\/journal\/index.php\/cis\/article\/view\/59661\" target=\"_blank\" rel=\"noopener noreferrer\">Link<\/a>\u00a0\u00a0<a href=\"http:\/\/dx.doi.org\/10.5539\/cis.v9n3p7\" target=\"_blank\" rel=\"noopener noreferrer\">DOI<\/a><\/span><\/p>\n<p><span style=\"font-size: 14px; line-height: 20.8px;\">[75]<\/span><sup style=\"line-height: 20.8px;\">III<\/sup><span style=\"font-size: 14px; line-height: 20.8px;\">\u00a0<\/span><b style=\"font-size: 14px; line-height: 20.8px;\">N. Meghanathan<\/b><span style=\"font-size: 14px; line-height: 20.8px;\">, &#8220;On the Sufficiency of using the Degree Sequence of the Vertices to Generate Random Networks Corresponding to Real-World Networks<\/span><span style=\"font-size: 14px; line-height: 20.8px;\">,&#8221; <em>Polibits: Research Journal on Computer Science and Computer Engineering with Applications<\/em><\/span><span style=\"font-size: 14px; line-height: 20.8px;\">, vol. 53, pp. 5-21, July 2016.\u00a0<\/span><a style=\"font-size: 14px; line-height: 20.8px;\" href=\"http:\/\/www.gelbukh.com\/polibits\/2016_53\/On%20the%20Sufficiency%20of%20Using%20Degree%20Sequence%20of%20the%20Vertices%20to%20Generate%20Random%20Networks%20Corresponding%20to%20Real-World%20Networks.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Link<\/a><span style=\"font-size: 14px; line-height: 20.8px;\">\u00a0\u00a0<\/span><a style=\"font-size: 14px; line-height: 20.8px;\" href=\"http:\/\/dx.doi.org\/10.17562\/PB-53-1\" target=\"_blank\" rel=\"noopener noreferrer\">DOI<\/a><\/p>\n<p><span style=\"font-size: 14px;\"><span style=\"line-height: 1.6em;\">[74]<\/span><sup style=\"line-height: 1.6em;\">II<\/sup> <b style=\"font-size: 13px; line-height: 1.6em;\">N. Meghanathan<\/b><span style=\"line-height: 1.6em;\">, &#8220;Neighborhood Overlap-based Stable Data Gathering Trees for Mobile Sensor Networks,&#8221; <\/span><i style=\"font-size: 13px; line-height: 1.6em;\">International Journal of Wireless Networks and Broadband Technologies<\/i><span style=\"line-height: 1.6em;\">, vol. 5, no. 1, pp. 1-23, January-June 2016.\u00a0<\/span><span style=\"line-height: 20.8px;\"><a href=\"http:\/\/www.igi-global.com\/article\/neighborhood-overlap-based-stable-data-gathering-trees-for-mobile-sensor-networks\/170426\" target=\"_blank\" rel=\"noopener noreferrer\">Link<\/a><\/span><\/span><\/p>\n<p><span style=\"font-size: 14px;\"><span style=\"line-height: 1.6em;\">[73]<\/span><sup style=\"line-height: 1.6em;\">II<\/sup><span style=\"line-height: 1.6em;\">\u00a0<\/span><b style=\"font-size: 13px; line-height: 1.6em;\">N. Meghanathan<\/b><span style=\"line-height: 1.6em;\">, &#8220;Eigenvector Centrality-based Stable Path Routing for Cognitive Radio <\/span> Ad hoc Networks,&#8221;\u00a0<i>International Journal of Network Science<\/i>, vol. 1, no. 2, pp. 117-133, June\u00a02016<span style=\"line-height: 1.6em;\">.\u00a0<\/span><span style=\"line-height: 20.8px;\"><a href=\"http:\/\/www.inderscience.com\/info\/ingeneral\/forthcoming.php?jcode=ijns\" target=\"_blank\" rel=\"noopener noreferrer\">Link<\/a><\/span><\/span><\/p>\n<p><span style=\"line-height: 20.8px; font-size: 14px;\">[72]<\/span><sup style=\"line-height: 20.8px;\">III<\/sup><span style=\"line-height: 20.8px; font-size: 14px;\">\u00a0<\/span><b style=\"line-height: 20.8px; font-size: 14px;\">N. Meghanathan<\/b><span style=\"line-height: 20.8px; font-size: 14px;\">, &#8220;<\/span><span style=\"line-height: 20.8px; font-size: 14px;\">Maximal Assortative Matching and Maximal Dissortative Matching for Complex Network Graphs<\/span><span style=\"line-height: 20.8px; font-size: 14px;\">,&#8221; <i>The Computer Journal<\/i>, vol. 59, no. 5, pp. 667-684, May\u00a02016. DOI:\u00a0<\/span><span style=\"line-height: 20.8px; font-size: 14px;\">10.1093\/comjnl\/bxv102.\u00a0<\/span><a style=\"line-height: 20.8px; font-size: 14px;\" href=\"http:\/\/comjnl.oxfordjournals.org\/content\/59\/5\/667\" target=\"_blank\" rel=\"noopener noreferrer\">Link<\/a><\/p>\n<p><span style=\"font-size: 14px; line-height: 20.8px;\">[71<\/span><span style=\"font-size: 14px; line-height: 20.8px;\">]<\/span><sup style=\"line-height: 20.8px;\">III<\/sup><span style=\"font-size: 14px; line-height: 20.8px;\">\u00a0<\/span><b style=\"font-size: 14px; line-height: 20.8px;\">N. Meghanathan<\/b><span style=\"font-size: 14px; line-height: 20.8px;\">, &#8220;<\/span><span style=\"font-size: 14px; line-height: 20.8px;\">Correlation Analysis between Maximal Clique Size and Centrality Metrics for Random Networks and Scale-Free Networks,&#8221; <i>Computer and Information Science<\/i>, vol. 9, no. 2, pp. 41-57, May\u00a02016. DOI:\u00a0<\/span><span style=\"font-size: 14px; line-height: 1.6em;\">http:\/\/dx.doi.org\/10.5539\/cis.v9n2p1<\/span><\/p>\n<p><span style=\"line-height: 20.8px; font-size: 14px;\">[70]<\/span><sup style=\"line-height: 20.8px;\">III<\/sup><span style=\"line-height: 20.8px; font-size: 14px;\"><span style=\"line-height: 20.8px;\">\u00a0<\/span><b style=\"font-size: 13px; line-height: 20.8px;\">N. Meghanathan<\/b><span style=\"line-height: 20.8px;\">, &#8220;Maximal Assortative Matching for Complex Network Graphs,&#8221;\u00a0<em>Elsevier Journal of King Saud University &#8211; Computer and Information Sciences<\/em>, vol. 28, no. 2, pp. 230-246, April 2016. DOI:\u00a0<\/span><\/span><span style=\"font-size: 14px;\"><a id=\"ddDoi\" class=\"S_C_ddDoi\" href=\"http:\/\/dx.doi.org\/10.1016\/j.jksuci.2015.10.004\" target=\"doilink\" rel=\"noopener noreferrer\">10.1016\/j.jksuci.2015.10.004<\/a>.<\/span><\/p>\n<p><span style=\"line-height: 1.6em; font-size: 14px;\"><span style=\"line-height: 1.6em;\">[69]<\/span><sup style=\"line-height: 1.6em;\">III<\/sup><\/span><span style=\"line-height: 1.6em;\">\u00a0<\/span><b style=\"line-height: 20.8px; font-size: 14px;\">N. Meghanathan<\/b><span style=\"line-height: 1.6em; font-size: 14px;\"><span style=\"line-height: 1.6em;\">, &#8220;<\/span>On the Conduciveness of Random Network Graphs for Maximal Assortative or Maximal Dissortative Matching<span style=\"line-height: 1.6em;\">,&#8221; <em>Computer and Information Science<\/em><\/span><span style=\"line-height: 1.6em;\">, vol. 9, no. 1, pp. 21-30, February 2016.\u00a0<\/span><a href=\"http:\/\/www.ccsenet.org\/journal\/index.php\/cis\/article\/view\/54357\" target=\"_blank\" rel=\"noopener noreferrer\">Link<\/a>\u00a0<\/span><b style=\"font-size: 14px; line-height: 1.6em;\">[Publication as part of the Massie Chair Grant]<\/b><\/p>\n<p><span style=\"font-size: 13px; line-height: 20.8px;\">[68]<\/span><sup style=\"line-height: 20.8px;\">III<\/sup><span style=\"line-height: 20.8px; font-size: 14px;\"><span style=\"line-height: 20.8px;\">\u00a0<\/span><b style=\"font-size: 13px; line-height: 20.8px;\">N. Meghanathan<\/b><span style=\"line-height: 20.8px;\">, &#8220;Correlation Coefficient Analysis: Centrality vs. Maximal Clique Size for Complex Real-World Network Graphs,&#8221;\u00a0<\/span><i style=\"font-size: 13px; line-height: 20.8px;\">International Journal of Network Science<\/i><span style=\"line-height: 20.8px;\">, vol. 1, no. 1, pp. 3-27, January 2016.\u00a0<\/span><a href=\"http:\/\/www.inderscienceonline.com\/doi\/abs\/10.1504\/IJNS.2016.073560\" target=\"_blank\" rel=\"noopener noreferrer\">Link<\/a><\/span><\/p>\n<p><span style=\"font-size: 14px; line-height: 20.8px;\">[67]<\/span><sup style=\"line-height: 20.8px;\">III<\/sup><span style=\"font-size: 14px; line-height: 20.8px;\"><span style=\"line-height: 20.8px;\">\u00a0<\/span><b style=\"font-size: 13px; line-height: 20.8px;\">N. Meghanathan<\/b><span style=\"line-height: 20.8px;\">, &#8220;<\/span><\/span><span style=\"font-size: 14px; line-height: 20.8px;\">A Greedy Algorithm for Neighborhood Overlap-based Community Detection<span style=\"line-height: 20.8px;\">,&#8221; <em>Algorithms<\/em>, vol. 9, no. 1, p. 8: 1-26,\u00a02016. DOI:\u00a0<\/span><\/span><span style=\"font-size: 14px; line-height: 1.6em;\">10.3390\/a9010008.\u00a0<\/span><a style=\"font-size: 14px; line-height: 1.6em;\" href=\"http:\/\/www.mdpi.com\/1999-4893\/9\/1\/8\" target=\"_blank\" rel=\"noopener noreferrer\">Link<\/a><\/p>\n<p><span style=\"font-size: 14px;\"><span style=\"line-height: 20.8px;\">[66]<\/span><sup style=\"line-height: 20.8px;\">III<\/sup><span style=\"line-height: 20.8px;\"><span style=\"line-height: 20.8px;\">\u00a0<\/span><b style=\"font-size: 13px; line-height: 20.8px;\">N. Meghanathan<\/b><span style=\"line-height: 20.8px;\">, &#8220;<\/span><\/span>A Model for Generating Random Networks with Clustering Coefficient Corresponding to Real-World Network Graphs<span style=\"line-height: 20.8px;\"><span style=\"line-height: 20.8px;\">,&#8221; <\/span><i style=\"font-size: 13px; line-height: 20.8px;\">International Journal of Control and Automation<\/i><span style=\"line-height: 20.8px;\">, vol. 9, no. 1, pp. 163-176, January 2016. DOI:\u00a0<\/span><\/span>http:\/\/dx.doi.org\/10.14257\/ijca.2016.9.1.15,\u00a0<a href=\"http:\/\/www.sersc.org\/journals\/IJCA\/vol9_no1\/15.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Link<\/a><\/span><\/p>\n<p><span style=\"font-size: 14px;\"><span style=\"line-height: 20.8px;\">[65]<\/span><sup style=\"line-height: 20.8px;\">III<\/sup><span style=\"line-height: 20.8px;\">\u00a0<\/span><b style=\"font-size: 14px; line-height: 20.8px;\">N. Meghanathan<\/b><span style=\"line-height: 20.8px;\">, &#8220;<\/span>A Comprehensive Analysis of the Correlation between Maximal Clique Size and Centrality Metrics for Complex Network Graphs<span style=\"line-height: 20.8px;\">,&#8221; accepted for publication in <em>Elsevier Egyptian Informatics Journal<\/em>,\u00a02016. <\/span><a href=\"http:\/\/www.sciencedirect.com\/science\/article\/pii\/S1110866516300305\" target=\"_blank\" rel=\"noopener noreferrer\">Link<\/a><\/span><\/p>\n<p><span style=\"line-height: 20.8px; font-size: 14px;\">[64]<\/span><sup style=\"line-height: 20.8px;\">II<\/sup><span style=\"line-height: 20.8px; font-size: 14px;\">\u00a0<\/span><b style=\"line-height: 20.8px; font-size: 14px;\">N. Meghanathan<\/b><span style=\"line-height: 20.8px; font-size: 14px;\">, &#8220;<\/span><span style=\"line-height: 1.6em; font-size: 14px;\">A Generic Algorithm to Determine\u00a0Maximum Bottleneck Node Weight-based Data Gathering Trees for Wireless\u00a0Sensor Networks<\/span><span style=\"line-height: 20.8px; font-size: 14px;\">,&#8221; <em>Network Protocols and Algorithms\u00a0<\/em>(NPA), vol. 7, no. 3, pp. 18-51, November\u00a02015. <\/span><a style=\"line-height: 1.6em;\" href=\"http:\/\/www.macrothink.org\/journal\/index.php\/npa\/article\/view\/7961\/7009\" target=\"_blank\" rel=\"noopener noreferrer\">Link<\/a><span style=\"line-height: 1.6em;\">. <\/span><span style=\"line-height: 1.6em; font-size: 14px;\">DOI: http:\/\/dx.doi.org\/10.5296\/npa.v7i3.7961.\u00a0<\/span><b style=\"font-size: 14px; line-height: 1.6em;\">[Publication as part of the NASA EPSCoR Sub Award]<\/b><\/p>\n<p><span style=\"font-size: 14px;\"><span style=\"line-height: 20.8px;\">[63]<\/span><sup style=\"line-height: 20.8px;\">III<\/sup><span style=\"line-height: 20.8px;\">\u00a0<\/span><b style=\"font-size: 14px; line-height: 20.8px;\">N. Meghanathan<\/b><span style=\"line-height: 20.8px;\">, &#8220;<\/span><span style=\"line-height: 20.8px;\">Exploiting the Discriminating Power of the Eigenvector Centrality Measure to Detect Graph Isomorphism<\/span><span style=\"line-height: 20.8px;\">,&#8221; <\/span><em style=\"font-size: 14px; line-height: 20.8px;\">International Journal in Foundations of Computer Science and Technology<\/em><span style=\"line-height: 20.8px;\">\u00a0(IJFCST), vol. 5, no. 6, pp. 1-13, November 2015.\u00a0<\/span><a href=\"http:\/\/wireilla.com\/papers\/ijfcst\/V5N6\/5615ijfcst01.pdf\">Link<\/a><\/span><\/p>\n<p><span style=\"font-size: 14px;\"><span style=\"line-height: 20.8px;\">[62]<\/span><sup style=\"line-height: 1.6em;\">II<\/sup><span style=\"line-height: 1.6em;\">\u00a0<\/span><b style=\"font-size: 13px; line-height: 1.6em;\">N. Meghanathan<\/b><span style=\"line-height: 1.6em;\">, &#8220;<\/span><span style=\"line-height: 20.8px;\">A Benchmarking Algorithm for Maximum Bottleneck Node Trust Score-based Data Gathering Trees in Wireless Sensor Networks<\/span><span style=\"line-height: 1.6em;\">,&#8221;\u00a0<em>International Journal of Interdisciplinary Telecommunications and Networking\u00a0<\/em>(IJITN), vol. 7, no. 3, pp. 13-35, July-September\u00a02015.\u00a0<\/span><a href=\"http:\/\/www.igi-global.com\/article\/a-benchmarking-algorithm-for-maximum-bottleneck-node-trust-score-based-data-gathering-trees-in-wireless-sensor-networks\/142179\" target=\"_blank\" rel=\"noopener noreferrer\">Link<\/a><\/span>\u00a0<span style=\"font-size: 14px;\"><b style=\"font-size: 13px; line-height: 1.6em;\">[Publication as part of the NASA EPSCoR Sub Award]<\/b><\/span><\/p>\n<p><span style=\"line-height: 20.8px; font-size: 14px;\"><span style=\"line-height: 20.8px;\">[61]<\/span><sup style=\"line-height: 20.8px;\">III\u00a0<\/sup><b style=\"line-height: 20.8px;\">N. Meghanathan<\/b><span style=\"line-height: 20.8px;\">, &#8220;Probabilistic Diffusion in Random Network Graphs,<\/span><span style=\"line-height: 20.8px;\">&#8221;\u00a0<em>International Journal in Foundations of Computer Science and Technology<\/em>\u00a0(IJFCST), vol. 5, no. 5, pp. 1-7, September\u00a02015.\u00a0<\/span><\/span><b style=\"font-size: 13px; line-height: 1.6em;\">[Publication as part of the NASA EPSCoR Sub Award]\u00a0<\/b><a style=\"font-size: 13px; line-height: 20.8px;\" href=\"http:\/\/wireilla.com\/papers\/ijfcst\/V5N5\/5515ijfcst01.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a><\/p>\n<p><span style=\"font-size: 14px;\"><span style=\"line-height: 1.6em;\">[60]<\/span><sup style=\"line-height: 1.6em;\">I<\/sup> <b style=\"line-height: 1.6em;\"> N. Meghanathan<\/b><span style=\"line-height: 1.6em;\">, &#8220;Maximum Lifetime Communication Topologies of Secondary User Nodes in Cognitive Radio Ad hoc Networks,&#8221; <\/span><i style=\"line-height: 1.6em;\">Computer and Information Science<\/i><span style=\"line-height: 1.6em;\">, vol. 8, no. 3, pp. 1-12, August 2015. <\/span><b style=\"line-height: 1.6em;\">[Publication as part of the NASA EPSCoR Sub Award]<\/b> <a style=\"line-height: 1.6em;\" href=\"http:\/\/www.ccsenet.org\/journal\/index.php\/cis\/article\/viewFile\/47304\/25545\" target=\"_blank\" rel=\"noopener noreferrer\">Link<\/a><\/span><\/p>\n<p><span style=\"font-size: 14px;\"><span style=\"line-height: 20.7999992370605px;\">[59]<\/span><sup style=\"line-height: 20.7999992370605px;\">I<\/sup><span style=\"line-height: 20.7999992370605px;\">\u00a0<\/span><b style=\"line-height: 20.7999992370605px; font-size: 13px;\">N. Meghanathan<\/b><span style=\"line-height: 20.7999992370605px;\">, &#8220;Impact of Static Nodes and Pause Time on the Stability of Connected Dominating Sets in a Mobile Ad hoc Network,&#8221;\u00a0<\/span><i style=\"line-height: 20.7999992370605px; font-size: 13px;\">International Journal of Wireless and Mobile Networks<\/i><\/span><span style=\"line-height: 20.7999992370605px;\"><span style=\"font-size: 14px;\">, vol. 7, no. 4, pp. 1-18, August 2015<\/span>.\u00a0<\/span><a style=\"font-size: 14px; line-height: 20.7999992370605px;\" href=\"http:\/\/airccse.org\/journal\/jwmn\/7415ijwmn01.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Link<\/a><\/p>\n<p><span style=\"line-height: 20.7999992370605px;\"><span style=\"font-size: 14px;\"><span style=\"line-height: 20.7999992370605px;\">[58]<\/span><sup style=\"line-height: 1.6em;\">III<\/sup><span style=\"line-height: 1.6em;\">\u00a0<\/span><b style=\"font-size: 13px; line-height: 1.6em;\">N. Meghanathan<\/b><span style=\"line-height: 1.6em;\">, &#8220;<\/span>Time-Dependent Variation of the Centrality Measures of the Nodes during the Evolution of a Scale-Free Network<span style=\"line-height: 1.6em;\">,&#8221;\u00a0<\/span><i style=\"font-size: 13px; line-height: 1.6em;\">Journal of Networks<\/i><\/span><span style=\"line-height: 1.6em;\"><span style=\"font-size: 14px;\">, vol. 10, no. 7, pp. 431-442, July 2015<\/span>.<\/span><span style=\"line-height: 20.7999992370605px;\">\u00a0<\/span><\/span><a style=\"font-size: 13px; line-height: 20.7999992370605px;\" href=\"http:\/\/ojs.academypublisher.com\/index.php\/jnw\/article\/view\/jnw1007431442\/10670\" target=\"_blank\" rel=\"noopener noreferrer\">Link<\/a><span style=\"font-size: 13px; line-height: 20.7999992370605px;\">\u00a0<\/span><span style=\"line-height: 20.7999992370605px;\"><b style=\"font-size: 13px; line-height: 1.6em;\">[Publication as part of the NASA EPSCoR Sub Award]<\/b><\/span><\/p>\n<p><span style=\"font-size: 14px;\"><span style=\"line-height: 20.7999992370605px;\">[57]<\/span><sup style=\"line-height: 20.7999992370605px;\">II<\/sup><span style=\"line-height: 20.7999992370605px;\">\u00a0<\/span><b style=\"font-size: 13px; line-height: 20.7999992370605px;\">N. Meghanathan<\/b><span style=\"line-height: 20.7999992370605px;\">, &#8220;A Benchmarking Algorithm to Determine Minimum Aggregation Delay for Data Gathering Trees and an Analysis of the Diameter-Aggregation Delay Tradeoff,&#8221; <em>Algorithms<\/em>, vol. 8, no. 3, pp. 435-458, July\u00a02015. <\/span><a href=\"http:\/\/www.mdpi.com\/1999-4893\/8\/3\/435\" target=\"_blank\" rel=\"noopener noreferrer\">Link<\/a><span style=\"line-height: 20.7999992370605px;\">\u00a0\u00a0<\/span><a href=\"http:\/\/dx.doi.org\/10.3390\/a8030435\">DOI: 10.3390\/a8030435<\/a>.<\/span><span style=\"line-height: 20.7999992370605px;\">\u00a0<\/span><b style=\"font-size: 13px; line-height: 1.6em;\">[Publication as part of the NASA EPSCoR Sub Award]<\/b><\/p>\n<p><span style=\"font-size: 14px;\"><span style=\"line-height: 20.8px;\">[56]<\/span><sup style=\"line-height: 20.7999992370605px;\">III<\/sup><span style=\"line-height: 20.8px;\">\u00a0<\/span><b style=\"font-size: 13px; line-height: 20.7999992370605px;\">N. Meghanathan<\/b><span style=\"line-height: 20.8px;\">, &#8220;<\/span><span style=\"line-height: 1.6em;\">Distribution of Maximal Clique Size of the Vertices for Theoretical Small-World Networks and Real-World Networks<\/span><span style=\"line-height: 20.8px;\">,&#8221;\u00a0<\/span><i style=\"font-size: 13px; line-height: 20.7999992370605px;\">International Journal of Computer Networks and Communications<\/i><span style=\"line-height: 20.8px;\">, vol. 7, no. 4, pp. 21-41, July 2015.<\/span><\/span><\/p>\n<p><span style=\"font-size: 14px;\"><span style=\"line-height: 20.7999992370605px;\">[55]<\/span><sup style=\"line-height: 20.7999992370605px;\">III<\/sup><span style=\"line-height: 20.7999992370605px;\">\u00a0<\/span><b style=\"font-size: 14px; line-height: 20.7999992370605px;\">N. Meghanathan<\/b><span style=\"line-height: 20.7999992370605px;\">, &#8220;<\/span><span style=\"line-height: 1.6em;\">Centrality-based Connected Dominating Sets for Mobile Ad hoc Networks<\/span><span style=\"line-height: 20.7999992370605px;\">,&#8221;\u00a0<em>Network Protocols and Algorithms<\/em>, vol. 7, no. 2, pp. 16-41, July 2015. <\/span><a href=\"http:\/\/www.macrothink.org\/journal\/index.php\/npa\/article\/view\/7414\" target=\"_blank\" rel=\"noopener noreferrer\">Link<\/a><span style=\"line-height: 20.7999992370605px;\">.\u00a0<\/span><\/span><a href=\"http:\/\/dx.doi.org\/10.5296\/npa.v7i2.7414\" target=\"_blank\" rel=\"noopener noreferrer\">DOI<\/a>:\u00a0<span style=\"font-size: 14px;\">10.5296\/npa.v7i2.7414\u00a0<b style=\"font-size: 14px; line-height: 1.6em;\">[Publication as part of the NASA EPSCoR Sub Award]<\/b><\/span><\/p>\n<p><span style=\"font-size: 14px;\"><span style=\"line-height: 20.8px;\">[54]<\/span><sup style=\"line-height: 20.8px;\">I<\/sup><span style=\"line-height: 20.8px;\">\u00a0<\/span><b style=\"font-size: 13px; line-height: 20.8px;\">N. Meghanathan<\/b><span style=\"line-height: 20.8px;\">, &#8220;Stability of Connected Dominating Sets in the Presence of Static Nodes in a Mobile Ad hoc Network<\/span><span style=\"line-height: 20.8px;\">,&#8221;\u00a0<\/span><i style=\"font-size: 13px; line-height: 20.8px;\">International Journal of Combinatorical Optimization Problems and Informatics<\/i><\/span><span style=\"font-size: 13px; line-height: 20.8px;\"><span style=\"font-size: 14px;\">, vol. 6, no. 2, pp. 43-53, May-August\u00a02015.<\/span>\u00a0<\/span><span style=\"font-size: 14px;\"><a href=\"http:\/\/ijcopi.org\/ojs\/index.php?journal=ijcopi&amp;page=article&amp;op=view&amp;path%5B%5D=147&amp;path%5B%5D=233\" target=\"_blank\" rel=\"noopener noreferrer\">Link<\/a><\/span><\/p>\n<p>[53]<sup>II<\/sup> <b> N. Meghanathan<\/b>, T. Gardner and J. Lewis, &#8220;An Energy-Efficient Tracking Algorithm to Trace a Radioactive Mobile Target in a Wireless Sensor Network,&#8221; <i>Computer and Information Science<\/i>, vol. 8, no. 2, pp. 15-23, May 2015. <b>[Publication as part of the Massie Chair Grant]<\/b>\u00a0<a href=\"http:\/\/www.ccsenet.org\/journal\/index.php\/cis\/article\/download\/44610\/25534\" target=\"_blank\" rel=\"noopener noreferrer\">Link<\/a><\/p>\n<p><span style=\"line-height: 20.7999992370605px;\">[52]<\/span><sup style=\"line-height: 20.7999992370605px;\">III<\/sup><span style=\"line-height: 20.7999992370605px;\">\u00a0<\/span><b style=\"line-height: 20.7999992370605px;\">N. Meghanathan<\/b><span style=\"line-height: 20.7999992370605px;\">, &#8220;Using Spectral Radius Ratio for Node Degree to Analyze the Evolution of Complex Networks,&#8221; <\/span><i style=\"line-height: 20.7999992370605px;\">International Journal of Computer Networks and Communications<\/i><span style=\"line-height: 20.7999992370605px;\">, vol. 7, no. 3, pp. 1-12, May 2015, <\/span><span style=\"line-height: 1.6em;\">DOI : 10.5121\/ijcnc.2015.7301.\u00a0<\/span><a style=\"line-height: 1.6em;\" href=\"http:\/\/airccse.org\/journal\/cnc\/7315cnc01.pdf\">Link<\/a><\/p>\n<p><span style=\"line-height: 20.7999992370605px;\">[51]<\/span><sup style=\"line-height: 20.7999992370605px;\">III<\/sup><span style=\"line-height: 20.7999992370605px;\">\u00a0<\/span><b style=\"line-height: 1.6em;\">N. Meghanathan<\/b><span style=\"line-height: 1.6em;\">, &#8220;Distribution of Maximal Clique Size under the Watts-Strogatz Model of Evolution of Complex Networks,&#8221;\u00a0<em>International Journal in Foundations of Computer Science and Technology<\/em>, vol. 5, no. 3, pp. 1-12, May 2015. DOI: 10.5121\/ijfcst.2015.5301.<\/span><span style=\"line-height: 20.7999992370605px;\">\u00a0<\/span><span style=\"font-size: 14px;\"><a href=\"http:\/\/wireilla.com\/papers\/ijfcst\/V5N3\/5315ijfcst01.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Link<\/a><\/span><\/p>\n<p><span style=\"font-size: 14px;\"><span style=\"line-height: 20.7999992370605px;\">[50]<\/span><sup style=\"line-height: 20.7999992370605px;\">III<\/sup><span style=\"line-height: 20.7999992370605px;\">\u00a0<\/span><b style=\"font-size: 13px; line-height: 20.7999992370605px;\">N. Meghanathan<\/b><span style=\"line-height: 20.7999992370605px;\">, &#8220;<\/span><span style=\"line-height: 1.6em;\">Correlations between Centrality Measures for Mobile Ad hoc Networks<\/span><span style=\"line-height: 20.7999992370605px;\">,&#8221; <em>IGI\u00a0<\/em><\/span><span style=\"line-height: 1.6em;\"><em>International Journal of Wireless Networks and Broadband Technologies\u00a0<\/em>(<em>IJWNBT<\/em>)<\/span><span style=\"line-height: 20.7999992370605px;\">, vol. 4, no. 2, pp. 15-28, April-June 2015. <\/span><a href=\"http:\/\/www.igi-global.com\/article\/correlations-between-centrality-measures-for-mobile-ad-hoc-networks\/133996\">Link<\/a><\/span><\/p>\n<p>[49]<sup>I<\/sup> <b> N. Meghanathan<\/b>, &#8220;A Stable Path Routing Protocol for Cognitive Radio Ad hoc Networks based on the Maximum Number of Common Primary User Channels,&#8221; <i>Journal of Networks<\/i>, vol. 10, no. 2, pp. 117-124, March 2015. <b>[Publication as part of the Massie Chair Grant]<\/b> <a href=\"http:\/\/ojs.academypublisher.com\/index.php\/jnw\/article\/view\/jnw1002117124\" target=\"_blank\" rel=\"noopener noreferrer\">Link<\/a><\/p>\n<p>[48]<sup>II<\/sup> <b> N. Meghanathan<\/b>, &#8220;Stability-based and Energy-Efficient Distributed Data Gathering Algorithms for Mobile Sensor Networks,&#8221; Elsevier <i>Ad hoc Networks<\/i>, vol. 19, pp. 111-131, August 2014. <a href=\"http:\/\/www.sciencedirect.com\/science\/article\/pii\/S1570870514000432\" target=\"_blank\" rel=\"noopener noreferrer\">Link<\/a><\/p>\n<p>[47]<sup>II<\/sup> <b> N. Meghanathan<\/b>, &#8220;A Pair-wise Key Distribution Mechanism and Distributed Trust Evaluation Model for Secure Data Aggregation in Mobile Sensor Networks,&#8221; <i>International Journal of Combinatorial Optimization Problems and Informatics<\/i>, vol. 5, no. 2, pp. 29-46, May-August 2014. <a href=\"http:\/\/ijcopi.org\/ojs\/index.php?journal=ijcopi&amp;page=article&amp;op=view&amp;path%5B%5D=136&amp;path%5B%5D=191\" target=\"_blank\" rel=\"noopener noreferrer\">Link<\/a><\/p>\n<p>[46]<sup>III<\/sup> <b> N. Meghanathan<\/b>, &#8220;Centrality-based Connected Dominating Sets for Complex Network Graphs,&#8221; <i>IGI International Journal of Interdisciplinary Telecommunications and Networking<\/i> (IJITN), vol. 6, no. 2, pp. 1-19, April-June 2014.<\/p>\n<p>[45]<sup>II<\/sup> <b> N. Meghanathan<\/b> and P. Mumford, &#8220;Centralized and Distributed Algorithms for Stability-based Data Gathering in Mobile Sensor Networks,&#8221; <i>Macrothink: Network Protocols and Algorithms (NPA)<\/i>, vol. 5, no. 3, pp. 84-116, December 2013. DOI: http:\/\/dx.doi.org\/10.5296\/npa.v5i4.4208. <a href=\"http:\/\/www.macrothink.org\/journal\/index.php\/npa\/article\/view\/4208\/3941\" target=\"_blank\" rel=\"noopener noreferrer\">Link<\/a><\/p>\n<p>[44]<sup>II<\/sup> <b> N. Meghanathan<\/b> and P. Mumford, &#8220;A Benchmarking Algorithm to Determine the Sequence of Stable Data Gathering Trees for Wireless Mobile Sensor Networks,&#8221; <i>Informatica &#8211; An International Journal of Computing and Informatics<\/i>, vol. 37, no. 3, pp. 315-338, October 2013. <span style=\"font-size: 14px;\"><a href=\"http:\/\/www.informatica.si\/index.php\/informatica\/article\/view\/460\/464\" target=\"_blank\" rel=\"noopener noreferrer\">Link<\/a><\/span><\/p>\n<p>[43]<sup>II<\/sup> <b> N. Meghanathan<\/b> and P. Mumford, &#8220;Node Failure Time and Coverage Loss Time Analysis for Maximum Stability Vs Minimum Distance Spanning Tree based Data Gathering in Mobile Sensor Networks,&#8221; <i>International Journal of Computer Networks and Communications<\/i> (IJCNC), vol. 5, no. 4, pp. 15-30, July 2013. DOI: 10.5121\/ijcnc.2013.5402. <a href=\"http:\/\/airccse.org\/journal\/cnc\/5413cnc02.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a><\/p>\n<p>[42]<sup>I<\/sup> <b> N. Meghanathan<\/b> and I. Dasari, &#8220;Performance Comparison Study of Connected Dominating Set Algorithms for Mobile Ad hoc Networks under Different Mobility Models,&#8221; <i>International Journal of Combinatorial Optimization Problems and Informatics<\/i>, vol. 4, no. 2, pp. 12-30, May-August 2013. <a href=\"http:\/\/ijcopi.org\/ojs\/index.php?journal=ijcopi&amp;page=article&amp;op=view&amp;path%5B%5D=116&amp;path%5B%5D=177\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a><\/p>\n<p>[41]<sup>I<\/sup> <b> N. Meghanathan<\/b>, &#8220;A Comprehensive Review and Analysis of Solutions for Different Layers of the TCP\/IP Layer Stack and Security Issues for Cognitive Radio Networks,&#8221; <i>International Journal of Advancements in Technology<\/i>, (IJOAT), vol. 4, no. 1, pp. 1-27, April 2013. <a href=\"http:\/\/ijict.org\/index.php\/ijoat\/article\/view\/tcpiplayerstack\" target=\"_blank\" rel=\"noopener noreferrer\">Link<\/a><\/p>\n<p>[40]<sup>I<\/sup> <b> N. Meghanathan<\/b>, &#8220;A Survey on the Communication Protocols and Security in Cognitive Radio Networks,&#8221; <i>International Journal of Communication Networks and Information Security<\/i>, (IJCNIS), vol. 5, no. 1, pp. 19-37, April 2013.<\/p>\n<p>[39]<sup>I<\/sup> <b> N. Meghanathan<\/b> and J. A. Thompson, &#8220;On the Different Forms of Spanning Tree-based Broadcast Topologies for Mobile Ad hoc Networks,&#8221; <i> International Journal of Combinatorial Optimization Problems and Informatics<\/i> (IJCOPI), vol. 4, no. 1, pp. 3-11, January-April 2013. <a href=\"..\/journalPapers\/112-491-1-LE-IJCOPI-published.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a> <b>[Publication as part of the NSF REU Grant]<\/b><\/p>\n<p>[38]<sup>II<\/sup> <b> N. Meghanathan<\/b>, &#8220;Link Expiration Time and Minimum Distance Spanning Trees based Distributed Data Gathering Algorithms for Wireless Mobile Sensor Networks,&#8221; <i> International Journal of Communication Networks and Information Security <\/i> (IJCNIS), vol. 4, no. 3, pp. 196-206, December 2012. <a href=\"http:\/\/www.ijcnis.org\/index.php\/ijcnis\/article\/view\/248\" target=\"_blank\" rel=\"noopener noreferrer\">Link<\/a><\/p>\n<p>[37]<sup>I<\/sup> <b> N. Meghanathan<\/b> and M. Terrell, &#8220;A Simulation Study on the Strong Neighborhood-based Stable Connected Dominating Sets for Mobile Ad hoc Networks,&#8221; <i> International Journal of Computer Networks &amp; Communications <\/i> (IJCNC), vol. 4, no. 4, pp. 1-19, July 2012. <a href=\"http:\/\/airccse.org\/journal\/cnc\/0712cnc01.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a> <b>[Publication as part of the NSF REU Grant]<\/b><\/p>\n<p>[36]<sup>I<\/sup> <b> N. Meghanathan<\/b>, &#8220;Routing Protocols to Determine Stable Paths and Trees using the Inverse of Predicted Link Expiration times for Mobile Ad hoc Networks,&#8221; <i>International Journal of Mobile Network Design and Innovation<\/i>, (IJMNDI), Inderscience Publishers, vol. 4, no. 4, pp. 214-234, June 2012. <a href=\"http:\/\/www.inderscience.com\/info\/inarticle.php?artid=54463\" target=\"_blank\" rel=\"noopener noreferrer\">Link<\/a><\/p>\n<p>[35]<sup>III<\/sup> <b> N. Meghanathan<\/b>, &#8220;Graph Theory Algorithms for Mobile Ad hoc Networks,&#8221; <i> Informatica &#8211; An International Journal of Computing and Informatics<\/i>, vol. 36, no. 2, pp. 185-200, June 2012. <a href=\"http:\/\/www.informatica.si\/PDF\/36-2\/13_Maghanathan%20-%20Graph%20Theory%20Algorithms%20for%20Mobile%20Ad%20h.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a> <b>[Publication as part of the NSF REU Grant]<\/b><\/p>\n<p>[34]<sup>I<\/sup> <b> N. Meghanathan<\/b> and M. Terrell, &#8220;An Algorithm to Determine Stable Connected Dominating Sets for Mobile Ad hoc Networks using Strong Neighborhoods,&#8221; <i> International Journal of Combinatorial Optimization Problems and Informatics<\/i> (IJCOPI), vol. 3, no. 2, pp. 79-92, May &#8211; August 2012. <a href=\"http:\/\/ijcopi.org\/ojs\/index.php?journal=ijcopi&amp;page=article&amp;op=view&amp;path%5B%5D=102\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a> <b>[Publication as part of the NSF REU Grant]<\/b><\/p>\n<p>[33]<sup>II<\/sup> <b> N. Meghanathan<\/b>, &#8220;A Comprehensive Review and Performance Analysis of Data Gathering Algorithms for Wireless Sensor Networks,&#8221; <i> International Journal of Interdisciplinary Telecommunications and Networking<\/i> (IJITN), vol. 4, no. 2, pp. 1-29, April-June 2012. <a href=\"http:\/\/www.igi-global.com\/article\/comprehensive-review-performance-analysis-data\/67574\" target=\"_blank\" rel=\"noopener noreferrer\">Journal Link<\/a><\/p>\n<p>[32]<sup>I<\/sup> <b> N. Meghanathan<\/b>, &#8220;A Simulation-based Performance Comparison of the Minimum Node Size and Stability-based Connected Dominating Sets for Mobile Ad hoc Networks,&#8221; <i> International Journal of Computers and Network Communications<\/i> (IJCNC), vol. 4, no. 2, pp. 169-184, March 2012. DOI:10.5121\/ijcnc.2012.4211 <a href=\"http:\/\/airccse.org\/journal\/cnc\/0312cnc11.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a><\/p>\n<p>[31]<sup>II<\/sup> <b> N. Meghanathan<\/b> and P. D. Mumford, &#8220;Maximum Stability Data Gathering Trees for Mobile Sensor Networks,&#8221; <i>International Journal of Mobile Network Design and Innovation<\/i>, Inderscience Publishers, vol. 4, no. 3, pp. 164-178, February 2012. DOI: 10.1504\/IJMNDI.2012.051972<b> [Publication as part of the AFOSR\/AFRL\/SFFP 2012 Research]<\/b><\/p>\n<p>[30]<sup>I<\/sup> <b> N. Meghanathan<\/b>, &#8220;Node Stability Index: A Stability Metric and an Algorithm to Determine Long-Living Connected Dominating Sets for Mobile Ad hoc Networks,&#8221; <i> International Journal of Interdisciplinary Telecommunications and Networking<\/i> (IJITN), vol. 4, no. 1, pp. 31-46, January-March 2012. <a href=\"http:\/\/www.igi-global.com\/article\/node-stability-index\/64226\" target=\"_blank\" rel=\"noopener noreferrer\">Journal Link<\/a><\/p>\n<p>[29]<sup>I<\/sup> <b> N. Meghanathan<\/b>, &#8220;A Unicast Stable Path Routing Protocol for Mobile Ad hoc Networks based on the Inverse of Link Expiration Time,&#8221; <i> International Journal of Network Protocols and Algorithms <\/i> (NPA), vol. 3, no. 3, pp. 17-37, December 2011.<\/p>\n<p>[28]<sup>I<\/sup> <b> N. Meghanathan<\/b>, &#8220;A Location Prediction Based Routing Protocol and its Extensions for Multicast and Multi-path Routing in Mobile Ad hoc Networks,&#8221; Elsevier <i> Ad hoc Networks<\/i>, vol. 9, no. 7, pp. 1104-1126, September 2011. <a href=\"http:\/\/www.sciencedirect.com\/science\/article\/pii\/S1570870511000035\">Link<\/a> <b>[Publication as part of the ARL Grant]<\/b><\/p>\n<p>[27]<sup>I<\/sup> <b>N. Meghanathan<\/b>, &#8220;Survey of Topology-based Multicast Routing Protocols for Mobile Ad hoc Networks,&#8221; <i> International Journal of Communication Networks and Information Security (IJCNIS)<\/i>, vol. 3, no. 2, pp. 124-137, August 2011.<\/p>\n<p>[26]<sup>I<\/sup> <b>N. Meghanathan<\/b>, &#8220;Performance Comparison Study of Multicast Routing Protocols for Mobile Ad hoc Networks under Default Flooding and Density and Mobility Aware Energy-Efficient (DMEF) Broadcast Strategies,&#8221; <i> Informatica &#8211; An International Journal of Computing and Informatics<\/i>, vol. 35, no. 2, pp. 165-184, June 2011. <b>[Publication as part of the ARL Grant]<\/b> <a href=\"http:\/\/www.informatica.si\/PDF\/35-2\/03_Meghanathan%20-%20Performance%20Comparison.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a><\/p>\n<p>[25]<sup>I<\/sup> <b>N. Meghanathan<\/b>, &#8220;Performance Comparison of Minimum Hop and Minimum Edge Based Multicast Routing Under Different Mobility Models for Mobile Ad Hoc Networks,&#8221; <i> International Journal of Wireless and Mobile Networks<\/i>, vol. 3, no. 3, pp. 1-14, June 2011. <a href=\"http:\/\/airccse.org\/journal\/jwmn\/0611wmn01.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a><\/p>\n<p>[24]<sup>IV<\/sup> N. Kostyuk, P. Cole, <b>N. Meghanathan<\/b>, R. Isokpehi, and H. Cohly, &#8220;Gas Discharge Visualization: An Imaging and Modeling Tool for Medical Biometrics,&#8221; <i>International Journal of Biomedical Imaging<\/i>, vol. 2011, Article ID 196460, 7 pages, May 2011. doi:10.1155\/2011\/196460. <b>[Publication as part of the NSF MS EPSCoR Grant] <\/b> <a href=\"..\/docs\/Journals\/GDV-IJBI-Nataliya-Cohly-June2011-Paper.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a><\/p>\n<p>[23]<sup>I<\/sup> <b>N. Meghanathan<\/b>, &#8220;Impact of the Optimum Routing and Least Overhead Routing Approaches on Minimum Hop Routes and Connected Dominating Sets in Mobile Ad hoc Networks,&#8221; <i> International Journal of Wireless and Mobile Networks<\/i>, vol. 3, no. 2, pp. 196-212, April 2011. <a href=\"http:\/\/airccse.org\/journal\/jwmn\/0411wmn16.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a><\/p>\n<p>[22]<sup>II<\/sup> <b> N. Meghanathan<\/b>, &#8220;Grid Block Energy based Data Gathering Algorithms for Wireless Sensor Networks,&#8221; <i> International Journal of Communication Networks and Information Security<\/i>, vol. 2, no. 3, pp. 151-161, December 2010. <a href=\"http:\/\/www.ijcnis.org\/index.php\/ijcnis\/article\/view\/48\" target=\"_blank\" rel=\"noopener noreferrer\">Link<\/a><\/p>\n<p>[21]<sup>I<\/sup> <b> N. Meghanathan<\/b>, &#8220;Performance Comparison of Link, Node and Zone Disjoint Multi-path Routing Strategies and Minimum Hop Single Path Routing for Mobile Ad Hoc Networks,&#8221; <i> International Journal of Wireless and Mobile Networks<\/i>, vol. 2, no. 4, pp. 13-29, November 2010. <a href=\"http:\/\/airccse.org\/journal\/jwmn\/1110ijwmn02.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a><\/p>\n<p>[20]<sup>I<\/sup> <b> N. Meghanathan<\/b>, &#8220;Exploring the Performance Tradeoffs among Stability-Oriented Routing Protocols for Mobile Ad hoc Networks,&#8221; <i> Network Protocols and Algorithms &#8211; Special Issue on Data Dissemination for Large scale Complex Critical Infrastructures<\/i>, vol. 2, no. 3, pp. 18-36, November 2010. <a href=\"http:\/\/www.macrothink.org\/journal\/index.php\/npa\/article\/viewFile\/436\/351\">Link<\/a><\/p>\n<p>[19]<sup>II<\/sup> <b> N. Meghanathan<\/b>, &#8220;A Data Gathering Algorithm based on Energy-aware Connected Dominating Sets to Minimize Energy Consumption and Maximize Node Lifetime in Wireless Sensor Networks,&#8221; <i> International Journal of Interdisciplinary Telecommunications and Networking<\/i>, vol. 2, no. 3, pp. 1-17, July-September 2010. <a href=\"http:\/\/www.igi-global.com\/article\/data-gathering-algorithm-based-energy\/46964\">Link<\/a><\/p>\n<p>[18]<sup>I<\/sup> <b> N. Meghanathan<\/b> and L. C. Milton, &#8220;A Performance Comparison of stability, Load-Balancing and Power-Aware Routing Protocols for Mobile Ad hoc Networks,&#8221; <i> International Journal of Advancements in Technology<\/i>, vol. 1, no. 1, pp. 50-72, June 2010. <a href=\"http:\/\/www.ijict.org\/index.php\/ijoat\/article\/viewPDFInterstitial\/performance-comparison-manet-routing-protocols\/pdf_5\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a><\/p>\n<p>[17]<sup>IV<\/sup> <b> N. Meghanathan<\/b>, R. Isokpehi and H. H. P. Cohly, &#8220;Experimental Design and Predictive Computational Modeling for the Toxicity of Nanomaterials on the Human Epidermal Cells,&#8221; <i> International Journal of Biometrics and Bioinformatics<\/i>, vol. 4, no. 2, pp. 34-41, May 2010. <b>[Publication as part of the NSF MS EPSCoR Grant]<\/b> <a href=\"..\\journalPapers\\IJBB-Experimental-Modeling.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a><\/p>\n<p>[16]<sup>I<\/sup> <b>N. Meghanathan<\/b>, &#8220;A Simulation Study on the Impact of Mobility Models on the Network Connectivity, Hop Count and Lifetime of Routes for Ad hoc Networks,&#8221; <i> Informatica &#8211; An International Journal of Computing and Informatics<\/i>, vol. 34, no. 2, pp. 207-221, May 2010. <a href=\"..\\journalPapers\\Informatica-Paper-Simulation-Study.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a><\/p>\n<p>[15]<sup>I<\/sup> <b>N. Meghanathan<\/b>, &#8220;Impact of the Gauss-Markov Mobility Model on Network Connectivity, Lifetime and Hop Count of Routes for Mobile Ad hoc Networks,&#8221; <i> Journal of Networks<\/i>, vol. 5, no. 5, pp. 509 &#8211; 516, May 2010. <a href=\"..\\journalPapers\\JNW-GaussMarkov-Mobility-Model.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a><\/p>\n<p>[14]<sup>I<\/sup> <b>N. Meghanathan<\/b> and M. Sugumar, &#8220;A Beaconless Minimum Interference Based Routing Protocol to Minimize End-to-End Delay per Packet for Mobile Adhoc Networks,&#8221; <i> International Journal of Interdisciplinary Telecommunications and Networking<\/i> (IJITN), vol. 2, no. 1, pp. 12 &#8211; 26, March 2010.<\/p>\n<p>[13]<sup>I<\/sup> <b>N. Meghanathan<\/b> and G. W. Skelton, &#8220;Risk Notification Message Dissemination Protocol for Energy Efficient Broadcast in Vehicular Ad hoc Networks,&#8221; <i> IAENG International Journal of Computer Science<\/i>, vol. 37, no. 1, pp. 1 &#8211; 10, March 2010. <a href=\"..\\journalPapers\\RNMDP-Protocol.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a><\/p>\n<p>[12]<sup>I<\/sup> <b>N. Meghanathan<\/b> and L. P. Judon, &#8220;Improvement in Network Lifetime for On-Demand Routing in Mobile Ad hoc Networks using either On-Demand Recharging or Transmission Power Control or Both,&#8221; <i> Journal of Computer and Information Science<\/i>, Canadian Center for Science and Education, vol. 3, no. 1, pp. 3 &#8211; 11, February 2010. <a href=\"..\\journalPapers\\CIS-Judon-OndemandRechg-Paper.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a><\/p>\n<p>[11]<sup>IV<\/sup> <b>N. Meghanathan<\/b> and L. Nayak, &#8220;Steganalysis Algorithms for Detecting the Hidden Information in Image, Audio and Video Cover Media,&#8221; <i>International Journal of Network Security and its Applications<\/i>, vol. 2, no. 1, pp. 43 &#8211; 55, January 2010. <a href=\"..\\journalPapers\\IJNSA-Steg-Lopa-Paper.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a><\/p>\n<p>[10]<sup>I<\/sup> N. Cooper and <b> N. Meghanathan<\/b>, &#8220;Impact of Mobility Models on Multi-path Routing in Mobile Ad hoc Networks,&#8221; <i> International Journal of Computer Networks and Communications<\/i>, vol. 2, no. 1, pp. 185 &#8211; 194, January 2010. <b> [Publication as part of the NSF REU Grant] <\/b> <a href=\"..\\journalPapers\\Impact-Mobility-Models-MultipathRouting-Nicholas-Paper.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a><\/p>\n<p>[9]<sup>II<\/sup> <b> N. Meghanathan<\/b>, &#8220;Use of Tree Traversal Algorithms for Chain Formation in the PEGASIS Data Gathering Protocol for Wireless Sensor Networks,&#8221; <i> KSII Transactions on Internet and Information Systems<\/i>, vol. 3, no. 6, pp. 612 &#8211; 627, December 2009. <a href=\"..\\journalPapers\\TreeTraversal-PEGASIS-Protocol.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a><\/p>\n<p>[8]<sup>I<\/sup> <b> N. Meghanathan<\/b>, &#8220;Survey and Taxonomy of Unicast Routing Protocols for Mobile Ad hoc Networks,&#8221; <i> The International Journal on Applications of Graph Theory in Wireless Ad hoc Networks and Sensor Networks<\/i>, vol. 1, no. 1, pp. 1 &#8211; 21, December 2009. <a href=\"http:\/\/airccse.org\/journal\/graphhoc\/1209s1.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a><\/p>\n<p>[7]<sup>II<\/sup> L. King and <b> N. Meghanathan<\/b>, &#8220;A Weighted-Density Connected Dominating Set Data Gathering Algorithm for Wireless Sensor Networks,&#8221; <i>Journal of Computer and Information Science<\/i>, Canadian Center for Science and Education, vol. 2, no. 4, pp. 3-13, November 2009. <b> [Publication as part of the NSF REU Grant] <\/b> <a href=\"..\\journalPapers\\wDCDS-CIS-Paper.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a><\/p>\n<p>[6]<sup>I<\/sup> <b>N. Meghanathan<\/b>, &#8220;A Location Prediction Based Reactive Routing Protocol to Minimize the Number of Route Discoveries and Hop Count per Path in Mobile Ad hoc Networks,&#8221; <i> The Computer Journal<\/i>, vol. 52, no. 4, pp. 461-482, Oxford Press, British Computer Society, July 2009. <a href=\"http:\/\/dl.acm.org\/citation.cfm?id=1556880\">Link<\/a><\/p>\n<p>[5]<sup>IV<\/sup> <b>N. Meghanathan<\/b>, S. R. Allam and L. A. Moore, &#8220;Tools and Techniques for Network Forensics,&#8221; <i> International Journal of Network Security and its Applications<\/i>, vol. 1, no. 1, pp. 14-25, April 2009. <a href=\"..\\journalPapers\\IJNSA-Forensics-Paper.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a><\/p>\n<p>[4]<sup>I<\/sup> <b>N. Meghanathan<\/b> and A. Farago, &#8220;On the Stability of Paths, Steiner Trees and Connected Dominating Sets in Mobile Ad Hoc Networks,&#8221; <i> Elsevier Ad Hoc Networks<\/i>, vol. 6, no. 5, pp. 744 &#8211; 769, July 2008. <a href=\"http:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1570870507001266\" target=\"_blank\" rel=\"noopener noreferrer\">Available Online<\/a><\/p>\n<p>[3]<sup>I<\/sup> <b>N. Meghanathan<\/b>, &#8220;Exploring the Stability-Energy Consumption-Delay-Network Lifetime Tradeoff of Mobile Ad Hoc Network Routing Protocols,&#8221; <i> Academy Publisher Journal of Networks<\/i>, vol. 3, no. 2, pp. 17 &#8211; 28, February 2008. <a href=\"..\\journalPapers\\JNW-Stability-EnergyConsumption-Tradeoff.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a><\/p>\n<p>[2]<sup>IV<\/sup> S. Baskiyar and <b>N. Meghanathan<\/b>, &#8220;A Survey of Contemporary Real-time Operating Systems,&#8221; <i>Informatica &#8211; An International Journal of Computing and Informatics<\/i>, vol. 29, no. 2, pp. 233-240, June 2005. <a href=\"http:\/\/www.informatica.si\/pdf\/29-2\/12_baskiyar-a%20survey%20of%20contemporary...pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a><\/p>\n<p>[1]<sup>III<\/sup> S. Baskiyar and <b>N. Meghanathan<\/b>, &#8220;Binary Codes for Fast Determination of Ancestor-Descendant Relationship in Trees and Directed A-cyclic Graphs,&#8221; <i> International Journal of Computers and Applications<\/i> , vol. 10, no. 1, pp. 67 &#8211; 71, March 2003.<\/p>\n<h3><u><a name=\"ConferencePapers\"><\/a>Peer-reviewed Conferences<\/u><\/h3>\n<p><span style=\"font-size: 14px;\">[93]<span style=\"line-height: 20.8px;\"><sup style=\"line-height: 20.8px;\">III<\/sup> Y. Wu <strong>N<\/strong><strong>.<\/strong><b style=\"line-height: 20.8px;\">\u00a0Meghanathan<\/b>, &#8220;A Network Science Approach to Quantify the Extent of Co-occurrence of an Offense with other Offenses in a Crime Event<\/span><span style=\"line-height: 20.8px;\">,&#8221; accepted for the <\/span>Proceedings of the 11th Computer Science Online Conference, to be published by Springer, April 2022.\u00a0<\/span><\/p>\n<p>[92]<sup>III<\/sup> N. Ahmed, R. Alo, C. Amelink, Y. Y. Baek, A. Choudhary, K. Collins, A. Esterline, E. Fox, G. Fox, A. Hagberg, R. Kenyon, C. J. Kuhlman, J. Leskovec, D. Machi, M. V. Marathe, <strong>N. Meghanathan<\/strong>, Y. Miyasaki, J. Qiu, N. Ramakrishnan, S. S. Ravi, R. Rossil, R. Sosic and G. von Laszewski, &#8220;net.science: A Cyberinfrastructure for Sustained<br \/>\nInnovation in Network Science and Engineering,&#8221; accepted for Presentation at the Gateways 2020 Online Conference, Week of October 19, 2020.<\/p>\n<p><span style=\"font-size: 14px;\">[91]<span style=\"line-height: 20.8px;\"><sup style=\"line-height: 20.8px;\">II<\/sup> <span style=\"line-height: 20.8px;\"><strong>N.<\/strong><\/span><b style=\"line-height: 20.8px;\">\u00a0Meghanathan<\/b><span style=\"line-height: 20.8px;\">, &#8220;<\/span><\/span>Multi-variable Linear Regression-based Prediction of a Computationally-Heavy Link Stability Metric for Mobile Sensor Networks<span style=\"line-height: 20.8px;\"><span style=\"line-height: 20.8px;\">,&#8221; <\/span><\/span>Proceedings of the 8th International Conference on Control, Modeling, Computing and Applications, pp. 29-38, Vienna, Austria, August 24-25, 2019. <\/span><a href=\"http:\/\/aircconline.com\/csit\/papers\/vol9\/csit91103.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Link<\/a><\/p>\n<p><span style=\"font-size: 14px;\">[90]<span style=\"line-height: 20.8px;\"><sup style=\"line-height: 20.8px;\">III<\/sup> <span style=\"line-height: 20.8px;\">Md. Rahman and <strong>N.<\/strong><\/span><b style=\"line-height: 20.8px;\">\u00a0Meghanathan<\/b><span style=\"line-height: 20.8px;\">, &#8220;<\/span><\/span>Logical Clustering of Similar Vertices in Complex Real-World Networks<span style=\"line-height: 20.8px;\"><span style=\"line-height: 20.8px;\">,&#8221; <\/span><\/span>Proceedings of the International Conference on Inventive Communication and Computational Technologies, Namakkal, India, April 29-30, 2019; published in Springer Lecture Notes in Networks and Systems, Vol. 89: Inventive Communication and Computational Technologies, pp. 891-899, 2020. <\/span><a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-981-15-0146-3_86\" target=\"_blank\" rel=\"noopener noreferrer\">Link<\/a><\/p>\n<p><span style=\"font-size: 14px;\">[89]<span style=\"line-height: 20.8px;\"><sup style=\"line-height: 20.8px;\">II<\/sup><span style=\"line-height: 20.8px;\"> <strong>N.<\/strong><\/span><b style=\"line-height: 20.8px;\">\u00a0Meghanathan<\/b><span style=\"line-height: 20.8px;\">, &#8220;<\/span><\/span>Computationally-Light Metrics to Quantify Link Stability in Mobile Sensor Networks<span style=\"line-height: 20.8px;\"><span style=\"line-height: 20.8px;\">,&#8221; <\/span><\/span>Proceedings of the International Conference on Inventive Communication and Computational Technologies, Namakkal, India, April 29-30, 2019; published in Springer Lecture Notes in Networks and Systems, Vol. 89: Inventive Communication and Computational Technologies, pp. 227-235, 2020. <\/span><a href=\"https:\/\/doi.org\/10.1007\/978-981-15-0146-3_23\" target=\"_blank\" rel=\"noopener noreferrer\">Link<\/a><\/p>\n<p><span style=\"font-size: 14px;\">[88]<span style=\"line-height: 20.8px;\"><sup style=\"line-height: 20.8px;\">III<\/sup><span style=\"line-height: 20.8px;\"> Md. Rahman and <strong>N.<\/strong><\/span><b style=\"line-height: 20.8px;\">\u00a0Meghanathan<\/b><span style=\"line-height: 20.8px;\">, &#8220;<\/span><\/span>Analyzing the Similarity-Based Clusterability of the Vertices in a Complex Network<span style=\"line-height: 20.8px;\"><span style=\"line-height: 20.8px;\">,&#8221; <\/span><\/span>Proceedings of the 16th International Conference on Information Technology-New Generations: published in Springer AISC vol. 800, pp. 237-243, Las Vegas, USA, April 1-3, 2019. <\/span><a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-030-14070-0_33\" target=\"_blank\" rel=\"noopener noreferrer\">Link<\/a><\/p>\n<p><span style=\"font-size: 14px;\">[87]<span style=\"line-height: 20.8px;\"><sup style=\"line-height: 20.8px;\">III<\/sup> <span style=\"line-height: 20.8px;\">Md. Rahman,\u00a0M. Akhter and <strong>N.<\/strong><\/span><b style=\"line-height: 20.8px;\">\u00a0Meghanathan<\/b><span style=\"line-height: 20.8px;\">, &#8220;<\/span><\/span> Use of Eigenvector Centrality to Rank the Vertices in a DiseaseDisease Network <span style=\"line-height: 20.8px;\"><span style=\"line-height: 20.8px;\">,&#8221; <\/span><\/span>Proceedings of the 16th International Conference on Information Technology-New Generations: published in Springer AISC vol. 800, pp. 429-434, Las Vegas, USA, April 1-3, 2019. <\/span><a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-030-14070-0_59\" target=\"_blank\" rel=\"noopener noreferrer\">Link<\/a><\/p>\n<p><span style=\"font-size: 14px;\">[86]<span style=\"line-height: 20.8px;\"><sup style=\"line-height: 20.8px;\">III<\/sup><span style=\"line-height: 20.8px;\"> <strong>N.<\/strong><\/span><b style=\"line-height: 20.8px;\">\u00a0Meghanathan<\/b><span style=\"line-height: 20.8px;\">, &#8220;<\/span><\/span><\/span>Kurtosis: Is it an Appropriate Measure to Compare the Extent of Fat- Tailedness of the Degree Distribution for any Two Real-World Networks?<span style=\"font-size: 14px;\"><span style=\"line-height: 20.8px;\"><span style=\"line-height: 20.8px;\">,&#8221; <\/span><\/span>Proceedings of the <\/span>Fifth International Conference on Foundations of Computer Science &amp; Technology (FCST-2017)<span style=\"font-size: 14px;\">, Sydney, Australia, June 24-25, 2017<span style=\"line-height: 20.8px;\">.<\/span><\/span><\/p>\n<p><span style=\"font-size: 14px;\">[85]<span style=\"line-height: 20.8px;\"><sup style=\"line-height: 20.8px;\">III<\/sup><span style=\"line-height: 20.8px;\"> <strong>N.<\/strong><\/span><b style=\"line-height: 20.8px;\">\u00a0Meghanathan<\/b><span style=\"line-height: 20.8px;\">, &#8220;Correlation Analysis of Decay Centrality,&#8221; <\/span><\/span>Proceedings of the<i> 6th Computer Science Online Conference<\/i>, (CSOC-2017), Advances in Intelligent Systems and Computing, vol. 574, pp. 407-418, April 26-29, 2017, DOI: 10.1007\/978-3-319-57264-2_41<span style=\"line-height: 20.8px;\">. <\/span><a href=\"https:\/\/link.springer.com\/chapter\/10.1007\/978-3-319-57264-2_41\" target=\"_blank\" rel=\"noopener noreferrer\">Link<\/a><\/span><\/p>\n<p><span style=\"font-size: 14px;\">[84]<span style=\"line-height: 20.8px;\"><sup style=\"line-height: 20.8px;\">II<\/sup><span style=\"line-height: 20.8px;\"> <strong>N.<\/strong><\/span><b style=\"line-height: 20.8px;\">\u00a0Meghanathan<\/b><span style=\"line-height: 20.8px;\"> and Q. Hart, &#8220;Jaccard Similarity-based Quantification of the Neighborhood Stability of a Node in\u00a0 Mobile Sensor Networks,&#8221; Proceedings of<\/span> the SPIE Cyber Sensing Conference<\/span>, Anaheim, CA, April 9-13, 2017<span style=\"line-height: 20.8px;\">. <\/span><\/span><b style=\"font-size: 14px; line-height: 20.8px;\">[Publication as part of the AFRL\/Clarkson Aerospace Grant]\u00a0 <\/b><a href=\"http:\/\/dx.doi.org\/10.1117\/12.2266548\" target=\"_blank\" rel=\"noopener noreferrer\">DOI<\/a><\/p>\n<p><span style=\"font-size: 14px;\">[83]<span style=\"line-height: 20.8px;\"><sup style=\"line-height: 20.8px;\">II<\/sup><span style=\"line-height: 20.8px;\"> <strong>N.<\/strong><\/span><b style=\"line-height: 20.8px;\">\u00a0Meghanathan<\/b><span style=\"line-height: 20.8px;\">, &#8220;Algebraic Connectivity based Stable Data Gathering Trees for Mobile Sensor Networks,&#8221; <\/span><em>Proceedings of the\u00a0<\/em><\/span><em>International Conference on Computational Science and Computational Intelligence<\/em> (CSCI&#8217;16), pp. 947-952, Las Vegas, USA, Dec 15-17, 2016<span style=\"line-height: 20.8px;\">. <\/span><a href=\"http:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?arnumber=7881475\" target=\"_blank\" rel=\"noopener noreferrer\">Link<\/a><\/span> <b style=\"font-size: 14px; line-height: 20.8px;\">[Publication as part of the AFRL\/Clarkson Aerospace Grant]\u00a0<\/b><\/p>\n<p>[82]<span style=\"line-height: 20.8px; font-size: 14px;\"><sup style=\"line-height: 20.8px;\">III<\/sup><span style=\"line-height: 20.8px;\">\u00a0X. He and\u00a0<strong>N.<\/strong><\/span><b style=\"line-height: 20.8px;\">\u00a0Meghanathan<\/b><span style=\"line-height: 20.8px;\">, &#8220;Alternatives to Betweenness Centrality: A Measure of Correlation Coefficient,&#8221; <\/span><em>Proceedings of the<\/em>\u00a0Fifth International Conference on Advanced Information Technologies and Applications (ICAITA), pp. 1-10, Dubai, UAE, November 12-13, 2016. <\/span><span style=\"font-size: 14px;\"><a href=\"http:\/\/airccj.org\/CSCP\/vol6\/csit66001.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Link<\/a><\/span><\/p>\n<p>[81]<span style=\"line-height: 20.8px; font-size: 14px;\"><sup style=\"line-height: 20.8px;\">III<\/sup><span style=\"line-height: 20.8px;\">\u00a0X. He and\u00a0<strong>N.<\/strong><\/span><b style=\"line-height: 20.8px;\">\u00a0Meghanathan<\/b><span style=\"line-height: 20.8px;\">, &#8220;Correlation of Eigenvector Centrality to other Centrality Measures: Random, Small-World and Real-World Networks,&#8221; <\/span><em>Proceedings of the<\/em>\u00a0<em>8th International Conference on Networks and Communications<\/em>\u00a0(NeCoM), pp. 9-18, Chennai, India, October 22-23, 2016.<\/span> <span style=\"font-size: 14px;\"><a href=\"http:\/\/airccj.org\/CSCP\/vol6\/csit65902.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Link<\/a><\/span><\/p>\n<p><span style=\"font-size: 14px;\"><span style=\"line-height: 20.8px;\">[80]<\/span><sup style=\"line-height: 20.8px;\">III<\/sup><span style=\"line-height: 20.8px;\">\u00a0<strong>N.<\/strong><\/span><b style=\"line-height: 20.8px; font-size: 14px;\">\u00a0Meghanathan\u00a0<\/b>and R. Lawrence<span style=\"line-height: 20.8px;\">, &#8220;Centrality Analysis of the United States Network Graph,&#8221;\u00a0<\/span>Proceedings of the <em>3rd International Conference on Electrical, Electronics, Engineering Trends, Communication, Optimization and Sciences<\/em> (EEECOS), pp. 23-28, Tadepalligudem, India, June 1-2, 2016 (proceedings to be published in IEEE Xplore). <\/span><b style=\"font-size: 14px; line-height: 20.8px;\">[Publication as part of the Massie Chair Grant]\u00a0<\/b><span style=\"font-size: 14px;\"><a href=\"http:\/\/eeecos.org\/papers\/ES0017.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Link<\/a><\/span><\/p>\n<p><span style=\"font-size: 14px; line-height: 20.8px;\">[79]<\/span><sup style=\"line-height: 20.8px;\">III<\/sup><span style=\"font-size: 14px; line-height: 20.8px;\">\u00a0Y. Zhou, F. Wang and\u00a0<\/span><b style=\"font-size: 14px; line-height: 20.8px;\">N. Meghanathan\u00a0<\/b>and Y. Huang<span style=\"font-size: 14px; line-height: 20.8px;\">, &#8220;<\/span><span style=\"font-size: 14px; line-height: 20.8px;\">Seed Based Approach for Automated Crack Detection from Pavement Images,&#8221; <em>Proceedings of the 95th Annual Meeting of the\u00a0<\/em><em>Transportation Research Board <\/em>(<em>TRB<\/em>), 17 pages (<\/span>#16-4415<span style=\"font-size: 14px; line-height: 20.8px;\">), Washington DC, USA, January 10-14, 2016. <\/span><span style=\"font-size: 14px;\"><a href=\"http:\/\/trid.trb.org\/view.aspx?id=1393663\" target=\"_blank\" rel=\"noopener noreferrer\">Link<\/a><span style=\"line-height: 20.8px;\">\u00a0<\/span><\/span><\/p>\n<p><span style=\"font-size: 14px;\"><span style=\"line-height: 20.8px;\">[78]<\/span><sup style=\"line-height: 20.8px;\">III<\/sup><span style=\"line-height: 20.8px;\">\u00a0<\/span><b style=\"font-size: 13px; line-height: 20.8px;\">N. Meghanathan<\/b><span style=\"line-height: 20.8px;\">,<\/span><span style=\"line-height: 20.8px;\">\u00a0&#8220;<\/span>A Random Network Model with High Clustering Coefficient and Variation in Node Degree<span style=\"line-height: 20.8px;\">,<\/span><span style=\"line-height: 20.8px;\">&#8221;\u00a0<em>Proceedings of the<\/em><\/span><em style=\"font-size: 13px; line-height: 20.8px;\"><span style=\"line-height: 20.8px;\">\u00a0<\/span><\/em>8th International Conference on Control and Automation<span style=\"line-height: 20.8px;\"><span style=\"line-height: 20.8px;\">, published by IEEE CPS, pp. 54-57, Jeju Island, Korea, November 25-28, 2015. \u00a0<\/span><\/span><\/span><\/p>\n<p><span style=\"font-size: 14px; line-height: 20.8px;\">[77]<\/span><sup style=\"line-height: 20.8px;\">III<\/sup><span style=\"font-size: 14px; line-height: 20.8px;\">\u00a0<\/span><b style=\"line-height: 20.8px; font-size: 13px;\">N. Meghanathan<\/b><span style=\"line-height: 20.8px;\">,<\/span><span style=\"font-size: 14px; line-height: 20.8px;\"> &#8220;Use of Eigenvector Centrality to Detect Graph Isomorphism<\/span><span style=\"font-size: 14px; line-height: 20.8px;\">,<\/span><span style=\"font-size: 14px; line-height: 20.8px;\">&#8221;\u00a0<em>Proceedings of the<\/em><\/span><em><span style=\"line-height: 20.8px;\">\u00a0<\/span><\/em><span style=\"font-size: 14px;\"><em>Fourth International Conference on Advanced Information Technologies and Applications<\/em> (ICAITA)<span style=\"line-height: 20.8px;\">, pp. 1-9, Dubai, UAE, November 6-7, 2015.\u00a0<\/span><a href=\"http:\/\/airccj.org\/CSCP\/vol5\/csit54601.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Link<\/a><\/span><\/p>\n<p><span style=\"font-size: 14px;\"><span style=\"line-height: 20.7999992370605px;\">[76]<\/span><sup style=\"line-height: 20.7999992370605px;\">II<\/sup><span style=\"line-height: 20.7999992370605px;\">\u00a0<\/span><b style=\"font-size: 13px; line-height: 20.7999992370605px;\">N. Meghanathan<\/b><span style=\"line-height: 20.7999992370605px;\">, &#8220;<\/span>Node Lifetime &#8211; Network Lifetime Tradeoff for Data\u00a0Gathering Trees in Wireless Sensor Networks,<span style=\"line-height: 20.7999992370605px;\">&#8221; <em>ACM P<\/em><em>roceedings of the<\/em><\/span><em><i style=\"font-size: 13px; line-height: 20.7999992370605px;\">\u00a0<\/i>International conference on Intelligent Information Processing, Security and Advanced Communication<\/em> (IPAC&#8217; 2015), Algeria, Batna,\u00a0November 23-25, 2015<span style=\"line-height: 20.7999992370605px;\">. DOI:\u00a0<\/span>10.1145\/2816839.2816905.\u00a0<a href=\"http:\/\/dl.acm.org\/citation.cfm?doid=2816839.2816905\" target=\"_blank\" rel=\"noopener noreferrer\">Link<\/a><\/span><\/p>\n<p><span style=\"font-size: 14px;\"><span style=\"line-height: 1.6em;\">[75]<\/span><sup style=\"line-height: 1.6em;\">III<\/sup> <b style=\"line-height: 1.6em;\"> N. Meghanathan<\/b><span style=\"line-height: 1.6em;\">, &#8220;Maximal Clique Size vs. Centrality: A Correlation Analysis for Complex Real-World Network <span style=\"line-height: 1.6em;\">Graphs,&#8221;<em> Proceedings of the<\/em><\/span><i style=\"line-height: 1.6em;\"> 3rd International Conference on Advanced Computing, Networking, and Informatics<\/i><span style=\"line-height: 1.6em;\">, (ICACNI-2015), <em>Springer Smart Innovation, Systems and Technologies Series<\/em>, vol. 44,\u00a0pp. 95-101, June 23-25, 2015, Orissa, India.\u00a0<\/span><\/span><a href=\"http:\/\/link.springer.com\/chapter\/10.1007\/978-81-322-2529-4_9\" target=\"_blank\" rel=\"noopener noreferrer\">Springer Link<\/a><\/span><\/p>\n<p><span style=\"font-size: 14px;\">[74]<sup>I<\/sup> <b> N. Meghanathan<\/b>, &#8220;Performance of the Maximum Stable Connected Dominating Sets in the Presence of Static Nodes in a Mobile Ad hoc Network,&#8221;\u00a0<em>Proceedings of the Fourth International Conference on Mobile and Wireless Networks<\/em> (MoWiN&#8217; 2015), pp. 37-48,\u00a0Vienna, Austria, May 23-24, 2015.\u00a0<a href=\"http:\/\/airccj.org\/CSCP\/vol5\/csit54105.pdf\">Link<\/a><\/span><\/p>\n<p><span style=\"font-size: 14px;\">[73]<sup>III<\/sup> <b> N. Meghanathan<\/b>, &#8220;Correlation Coefficient Analysis of Centrality Metrics for Complex Network Graphs,&#8221; Proceedings of the<i> 4th Computer Science Online Conference<\/i>, (CSOC-2015), Intelligent Systems in Cybernetics and Automation Theory: Advances in Intelligent Systems and Computing, Vol. 348, pp. 11-20, April 27-30, 2015, DOI:\u00a010.1007\/978-3-319-18503-3_2,\u00a0<a href=\"http:\/\/link.springer.com\/chapter\/10.1007\/978-3-319-18503-3_2\" target=\"_blank\" rel=\"noopener noreferrer\">Link<\/a>.<\/span><\/p>\n<p><span style=\"font-size: 14px;\">[72]<sup>III<\/sup> <b> N. Meghanathan<\/b>, &#8220;On the Distribution of the Maximal Clique Size for the Vertices in Real-World Network Graphs and Correlation Studies,&#8221; Proceedings of the<i> International Conference on Computer Science and Information Technology<\/i>, (CSTY-2015), pp. 1-12, Bangalore, India, April 25-26, 2015. DOI: 10.5121\/csit.2015.50901 <a href=\"http:\/\/airccj.org\/CSCP\/vol5\/csit54001.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a>.<\/span><\/p>\n<p><span style=\"font-size: 14px;\">[71]<sup>III<\/sup> <b> N. Meghanathan<\/b>, &#8220;Use of Centrality Metrics to Determine Connected Dominating Sets for Real-World Network Graphs,&#8221; Proceedings of the<i> 12th International Conference on Information Technology: New Generations<\/i>, (ITNG-2015), pp. 243-248, Las Vegas, USA, April 13-15, 2015. <b>[Publication as part of the Massie Chair Grant]<\/b><\/span><\/p>\n<p><span style=\"font-size: 14px;\">[70]<sup>I<\/sup> <b> N. Meghanathan<\/b> and M. Fanuel, &#8220;A Minimum Channel Switch Routing Protocol for Cognitive Radio Ad hoc Networks,&#8221; Proceedings of the<i> 12th International Conference on Information Technology: New Generations<\/i>, (ITNG-2015), pp. 280-285, Las Vegas, USA, April 13-15, 2015. <b>[Publication as part of the JSU 2014 Creative Awards for Faculty and Staff Program]<\/b><\/span><\/p>\n<p><span style=\"font-size: 14px;\">[69]<sup>III<\/sup> <b> N. Meghanathan<\/b>, &#8220;Using Spectral Radius Ratio for Node Degree to Analyze the Evolution of Scale-Free Networks and Small-World Networks,&#8221; Proceedings of the<i> Second International Conference on Computer Science and Information Technology<\/i>, (COSIT-2015), pp. 21-28, Geneva, Switzerland, March 21-22, 2015. <a href=\"http:\/\/airccj.org\/CSCP\/vol5\/csit53703.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a><\/span><\/p>\n<p><span style=\"font-size: 14px;\">[68]<sup>I<\/sup> <b> N. Meghanathan<\/b>, &#8220;A Benchmarking Algorithm to Determine Maximum Lifetime Communication Topologies in Cognitive Radio Ad hoc Networks,&#8221; ACM\u00a0Proceedings of the<i> International Conference on Advanced Research in Computer Science Engineering &amp; Technology <\/i>, (ICARCSET 2015), Eluru, Andhra Pradesh, India, March 6-7, 2015, DOI: 10.1145\/2743065.2743069.\u00a0<a href=\"http:\/\/dl.acm.org\/citation.cfm?id=2743069&amp;CFID=503890226&amp;CFTOKEN=90680330\" target=\"_blank\" rel=\"noopener noreferrer\">Link<\/a><\/span><\/p>\n<p><span style=\"font-size: 14px;\">[67]<sup>III<\/sup> <b> N. Meghanathan<\/b>, &#8220;Use of Eigenvalues and Eigenvectors to Analyze Bipartivity of Network Graphs,&#8221; Proceedings of the<i> International conference on Computer Science, Engineering and Information Technology <\/i>, (CSEIT-2014), pp.221-230, Sydney, Australia, December 27-28, 2014. <a href=\"http:\/\/airccj.org\/CSCP\/vol4\/csit43018.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a><\/span><\/p>\n<p><span style=\"font-size: 14px;\">[66]<sup>III<\/sup> <b> N. Meghanathan<\/b>, &#8220;Spectral Radius as a Measure of Variation in Node Degree for Complex Network Graphs,&#8221; Proceedings of the<i> 3rd International Conference on Digital Contents and Applications<\/i>, (DCA 2014), pp. 30-33, Hainan, China, December 20-23, 2014. <a href=\"http:\/\/ieeexplore.ieee.org\/xpl\/login.jsp?tp=&amp;arnumber=7024682\" target=\"_blank\" rel=\"noopener noreferrer\">Link<\/a><\/span><\/p>\n<p><span style=\"font-size: 14px;\"><span style=\"line-height: 20.8px;\">[65]<\/span><sup style=\"line-height: 20.8px;\">III<\/sup><span style=\"line-height: 20.8px;\">\u00a0<\/span>S. Abdelhamid, M. Alam, R. Alo, S. Arifuzzaman, P. Beckman, T. Bhattacharjee, H. Bhuiyan, K. Bisset, S. Eubank, A. C. Esterline, E. A. Fox, G. C. Fox, S. M. Shamimul Hasan, H. Hayatnagarkar, M. Khan, C. J. Kuhlman, M. V. Marathe, \u00a0<strong>N. Meghanathan<\/strong>, H. S. Mortveit, J. Qiu, S. S. Ravi, Z. Shams, O. Sirisaengtaksin, S. Swarup, A. K. S. Vullikanti and \u00a0Tak-Lon Wu, &#8220;CINET 2.0: A CyberInfrastructure for Network Science,&#8221; <em>Proceedings of the IEEE 10th International Conference on e-Science<\/em>, vol. 1, pp. 324-331, Sao Paulo, Brazil, October 20-24, 2014.\u00a0<a href=\"http:\/\/ieeexplore.ieee.org\/xpl\/articleDetails.jsp?arnumber=6972280\" target=\"_blank\" rel=\"noopener noreferrer\">Link<\/a><\/span><\/p>\n<p><span style=\"font-size: 14px; line-height: 1.6em;\">[64]<\/span><sup style=\"line-height: 1.6em;\">II<\/sup> <b style=\"font-size: 14px; line-height: 1.6em;\"> N. Meghanathan<\/b><span style=\"font-size: 14px; line-height: 1.6em;\">, &#8220;A Distributed Trust Evaluation Model for Wireless Mobile Sensor Networks,&#8221; Proceedings of the<\/span><i style=\"font-size: 14px; line-height: 1.6em;\"> 11th International Conference on Information Technology: New Generations<\/i><span style=\"font-size: 14px; line-height: 1.6em;\">, ITNG, pp. 186-191, Las Vegas, NV, USA, April 2014. <\/span><a style=\"font-size: 14px; line-height: 1.6em;\" href=\"http:\/\/ieeexplore.ieee.org\/xpl\/login.jsp?tp=&amp;arnumber=6822196\" target=\"_blank\" rel=\"noopener noreferrer\">Link<\/a> <b style=\"font-size: 14px; line-height: 1.6em;\">[Publication as part of the Clarkson Aerospace\/AFRL Subcontract]<\/b><\/p>\n<p><span style=\"font-size: 14px;\">[63]<sup>II<\/sup> <b> N. Meghanathan<\/b> and P. Mumford, &#8220;Node Failure Time Analysis for Maximum Stability Vs Minimum Distance Spanning Tree based Data Gathering in Mobile Sensor Networks,&#8221; Proceedings of <i>The Fifth International Conference on Networks &amp; Communications<\/i>, NETCOM-2013, Chennai, India, December 27-29, 2013, published in Springer Lecture Notes in Electrical Engineering, LNEE 284, pp. 55-68, DOI: 10.1007\/978-3-319-03692-2_5.<\/span><\/p>\n<p><span style=\"font-size: 14px;\">[62]<sup>II<\/sup> <b> N. Meghanathan<\/b>, &#8220;Design of a Secure Data Aggregation Framework for Wireless Mobile Sensor Networks,&#8221; Proceedings of the <i> ISCA 26th International Conference on Computer Applications in Industry and Engineering<\/i>, CAINE-2013, September 25-27, 2013, Los Angeles, USA. ISBN: 978-1-880843-93-2. <b>[Publication as part of the Clarkson Aerospace\/AFRL Subcontract]<\/b><\/span><\/p>\n<p><span style=\"font-size: 14px;\">[61]<sup>IV<\/sup> <b> N. Meghanathan<\/b> and M. Terrell, &#8220;Design of a Secure Framework for Session Mobility as a Service in Cloud Computing Environment,&#8221; Proceedings of the <i> ISCA 3rd International Conference on Advanced Computing and Communications<\/i>, ACC-2013, September 25-27, 2013, Los Angeles, USA. ISBN: 978-1-880843-91-8. <b>[Publication as part of the Clarkson Aerospace\/AFRL Subcontract]<\/b><\/span><\/p>\n<p><span style=\"font-size: 14px;\">[60]<sup>I<\/sup> <b> N. Meghanathan<\/b> and I. Dasari, &#8220;A Generic Algorithm to Determine Connected Dominating Sets for Mobile Ad hoc Networks and Performance Evaluation under Different Mobility Models,&#8221; <i> Fifth International workshop on Networks &amp; Communications<\/i>, NeCoM, Proceedings of the Computer Science and Information Technology Series, vol. 3, no.4, pp. 239-248, July 27, 2013, Chennai, India. DOI: 10.5121\/csit.2013.3425. <a href=\"http:\/\/airccj.org\/CSCP\/vol3\/csit3425.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a><\/span><\/p>\n<p><span style=\"font-size: 14px;\">[59]<sup>IV<\/sup> H. Kim, <b>N.Meghanathan<\/b> and L. Moore, &#8220;Enhancement of an Undergraduate Software Engineering Course by Infusing Security Lecture Modules,&#8221; <i>Proceedings of the 7th International Multi-Conference on Society, Cybernetics and Informatics: IMSCI 2013<\/i>, July 9-12, 2013, Orlando, FL, USA. <b>[Publication as part of the NSF CCLI\/TUES Grant]<\/b> <a href=\"http:\/\/www.iiis.org\/CDs2013\/CD2013SCI\/IMSCI_2013\/PapersPdf\/EA174VB.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a><\/span><\/p>\n<p><span style=\"font-size: 14px;\">[58]<sup>I<\/sup> <b> N. Meghanathan<\/b>, &#8220;A Critical Review of the Routing Protocols for Cognitive Radio Networks and a Proposal for Load Balancing Local Spectrum Knowledge-based Routing,&#8221; <i> Fifth International Conference on Wireless and Mobile Networks<\/i>, WiMoN, Istanbul, Turkey, June 1-2, 2013.<\/span><\/p>\n<p><span style=\"font-size: 14px;\">[57]<sup>IV<\/sup> <b> N. Meghanathan<\/b>, &#8220;Review of Access Control Models for Cloud Computing,&#8221; Proceedings of the<i> Third International Conference on Computer Science, Engineering &amp; Applications <\/i>, ICCSEA, Chennai, India, pp. 77-85, May 24-26, 2013. DOI : 10.5121\/csit.2013.3508. <a href=\"http:\/\/airccj.org\/CSCP\/vol3\/csit3508.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a><\/span><\/p>\n<p><span style=\"font-size: 14px;\">[56]<sup>II<\/sup> <b> N. Meghanathan<\/b> and P. D. Mumford, &#8220;A Benchmarking Algorithm to Determine Maximum Stability Data Gathering Trees for Wireless Mobile Sensor Networks,&#8221; Proceedings of the<i> 10th International Conference on Information Technology: New Generations <\/i>, ITNG, pp. 492-497, Las Vegas, NV, USA, April 15-17, 2013. <a href=\"http:\/\/ieeexplore.ieee.org\/xpls\/abs_all.jsp?arnumber=6614355\" target=\"_blank\" rel=\"noopener noreferrer\">Link<\/a> <b>[Publication as part of the AFOSR\/AFRL\/SFFP 2012 Research]<\/b><\/span><\/p>\n<p><span style=\"font-size: 14px;\">[55]<sup>IV<\/sup> M. Terrell and <b> N. Meghanathan<\/b>, &#8220;Setting up of a Cloud Cyber Infrastructure using Xen Hypervisor,&#8221; <i> Proceedings of the 10th International Conference on Information Technology: New Generations <\/i>, ITNG, pp. 648-652, Las Vegas, NV, USA, April 15-17, 2013. <b>[Publication as part of the NSF CCLI\/TUES Grant]<\/b> <a href=\"http:\/\/dl.acm.org\/citation.cfm?id=2497031\" target=\"_blank\" rel=\"noopener noreferrer\">Link<\/a><\/span><\/p>\n<p><span style=\"font-size: 14px;\">[54]<sup>IV<\/sup> <b> N. Meghanathan<\/b>, &#8220;Source Code Analysis of a Connection-Oriented File Reader Server Socket Program in Java and Removal of the Security Vulnerabilities,&#8221; <i> The Fourth International Workshop on Network &amp; Communications Security <\/i> (NCS-2012), Chennai, India, December 2012; published in Springer Lecture Notes in Electrical Engineering, vol. 131, pp. 621-629, 2013. <b>[Publication as part of the NSF CCLI\/TUES Grant]<\/b><\/span><\/p>\n<p><span style=\"font-size: 14px;\">[53]<sup>II<\/sup> <b> N. Meghanathan<\/b>, &#8220;Data Gathering Algorithms to Optimize Stability-Delay and Node-Network Lifetime for Wireless Mobile Sensor Networks,&#8221; <i> Proceedings of the Fourth International Conference on Sensor Networks and Applications <\/i> (SNA-2012), pp. 237-242, New Orleans, LA, USA, November 14-16, 2012. ISBN: 978-1-880843-88-8\/ISCA.<\/span><\/p>\n<p><span style=\"font-size: 14px;\">[52]<sup>IV<\/sup> <b> N. Meghanathan<\/b>, &#8220;Virtualization of Virtual Memory Address Space,&#8221; <i> ACM Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology<\/i> (CCSEIT 2012), pp. 732-737, Coimbatore, India, October 26-28, 2012. DOI: 10.1145\/2393216.2393338. ISBN: 978-1-4503-1310-0. Acceptance Rate: 23%. <b>[Publication as part of the NSF CCLI\/TUES Grant]<\/b> <a href=\"http:\/\/dl.acm.org\/citation.cfm?id=2393338\" target=\"_blank\" rel=\"noopener noreferrer\">Link<\/a><\/span><\/p>\n<p><span style=\"font-size: 14px;\">[51]<sup>IV<\/sup> F. C. Dancer, D. A. Dampier, J. M. Jackson and <b> N. Meghanathan<\/b>, &#8220;A Theoretical Process Model for Smartphones,&#8221; <i>Proceedings of the 2nd International Conference on Advances in Computing and Information Technology<\/i> (ACITY-2012), Delhi, India, <i>Springer Advances in Intelligent Systems and Computing<\/i>, vol. 3, pp. 279-290, July 2012.<\/span><\/p>\n<p><span style=\"font-size: 14px;\">[50]<sup>IV<\/sup> <b> N. Meghanathan<\/b> and A. R. Geoghegan, &#8220;Testing for Software Security: A Case Study on Static Code Analysis of a File Reader Java Program,&#8221; <i> Proceedings of the Springer LNICST 2nd International Conference on Computer Science, Engineering and Applications<\/i>, ICCSEA, Delhi, India, pp. 529-538, May 25-27, 2012. DOI: 10.1007\/978-3-642-30157-5_53. <b>[Publication as part of the NSF CCLI\/TUES Grant]<\/b><\/span><\/p>\n<p><span style=\"font-size: 14px;\">[49]<sup>I<\/sup> <b> N. Meghanathan<\/b> and M. Terrell, &#8220;Strong Neighborhood based Stable Connected Dominating Sets for Mobile Ad hoc Networks,&#8221; <i> Proceedings of the 4th International Conference on Wireless, Mobile Network and Applications<\/i>, WiMoA, Delhi, India, pp. 415-424, May 25-27, 2012. DOI: 10.1007\/978-3-642-30111-7_39. ISBN: 978-3-642-30110-0. <b>[Publication as part of the NSF REU Grant]<\/b><\/span><\/p>\n<p><span style=\"font-size: 14px;\">[48]<sup>I<\/sup> <b> N. Meghanathan<\/b>, &#8220;A Unicast MANET Routing Protocol to Simultaneously Minimize the Stability-Hop Count Tradeoff and End-to-End Delay,&#8221; <i> Proceedings of the 9th International Conference on Information Technology : New Generations<\/i>, ITNG, pp. 60-64, Las Vegas, NV, USA, April 16-18, 2012. DOI: http:\/\/doi.ieeecomputersociety.org\/10.1109\/ITNG.2012.17. ISBN: 978-0-7695-4654-4.<\/span><\/p>\n<p><span style=\"font-size: 14px;\">[47]<sup>IV<\/sup> <b> N. Meghanathan<\/b>, H. Kim and L. A. Moore, &#8220;Incorporation of Aspects of Systems Security and Software Security in Senior Capstone Projects,&#8221; <i> Proceedings of the 9th International Conference on Information Technology : New Generations<\/i>, ITNG, Las Vegas, NV, USA, pp. 319-324, April 16-18, 2012. DOI: http:\/\/doi.ieeecomputersociety.org\/10.1109\/ITNG.2012.54. ISBN: 978-0-7695-4654-4. <b>[Publication as part of the NSF CCLI\/TUES Grant]<\/b><\/span><\/p>\n<p><span style=\"font-size: 14px;\">[46]<sup>IV<\/sup> <b> N. Meghanathan<\/b> and B. Chituri, &#8220;A Secure Session Transfer Protocol for Downloading a Large File across a Cluster of Servers in the Presence of Network Congestion,&#8221; <i> The 3rd International Conference on Networks and Communication Security<\/i>, Bangalore, India, <i> Springer-Verlag Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Series<\/i>, LNICST 84, pp. 552-562, January 2012. <b>[Publication as part of the NSF CCLI\/TUES Grant]<\/b><\/span><\/p>\n<p><span style=\"font-size: 14px;\">[45]<sup>I<\/sup> <b> N. Meghanathan<\/b>, &#8220;A Link Distance Ratio based Stable Multicast Routing Protocol for Mobile Ad hoc Networks,&#8221; <i> The 3rd International Conference on Wireless &amp; Mobile Networks <\/i>, Bangalore, India, <i> Springer-Verlag Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Series<\/i>, LNICST 84, pp. 253-262, January 2012.<\/span><\/p>\n<p><span style=\"font-size: 14px;\">[44]<sup>I<\/sup> <b> N. Meghanathan<\/b>, &#8220;A Node Stability Index-based Connected Dominating Set Algorithm for Mobile Ad hoc Networks,&#8221; <i> The 3rd International Conference on Networks and Communications<\/i>, Bangalore, India, <i> Springer-Verlag Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering Series<\/i>, LNICST 84, pp. 31-40, January 2012.<\/span><\/p>\n<p><span style=\"font-size: 14px;\">[43]<sup>I<\/sup> <b> N. Meghanathan<\/b>, &#8220;A MANET Multicast Routing Protocol for Stable Trees based on the Inverse of Link Expiration Times,&#8221; <i> Proceedings of the 9th IEEE International Consumer Communications and Networking Conference<\/i>, Las Vegas, USA, pp. 947-951, January 2012, DOI: 10.1109\/CCNC.2012.6180965.<\/span><\/p>\n<p><span style=\"font-size: 14px;\">[42]<sup>I<\/sup> <b> N. Meghanathan<\/b>, &#8220;Minimum Hop vs. Minimum Edge Based Multicast Routing for Mobile Ad hoc Networks,&#8221; <i> The Third International Conference on Wireless, Mobile Networks and Applications<\/i>, Dubai, UAE,<i> Springer-Verlag Communications in Computer and Information Science Series<\/i>, CCIS 154, pp. 1-10, May 2011.<\/span><\/p>\n<p><span style=\"font-size: 14px;\">[41]<sup>IV<\/sup> <b> N. Meghanathan<\/b> and L. A. Moore, &#8220;Experiences in Running a NSF-CISE REU Site at a HBCU,&#8221; <i> Proceedings of The 2011 Annual Symposium on Computing at Minority Institutions (ADMI)<\/i>, Clemson, SC, USA, April 14-16, 2011.<b>[Publication as part of the NSF REU Grant] <\/b><\/span><\/p>\n<p><span style=\"font-size: 14px;\">[40]<sup>I<\/sup> <b> N. Meghanathan<\/b>, &#8220;A Performance Comparison Study of Two Position-based Routing Protocols and their Improved Versions for Mobile Ad hoc Networks,&#8221; <i> The First International Conference on Computer Science and Information Technology<\/i>, Bangalore, India, <i> Springer-Verlag Communications in Computer and Information Science Series<\/i>, CCIS 131, Part I, pp. 14-23, January 2011.<\/span><\/p>\n<p><span style=\"font-size: 14px;\">[39]<sup>I<\/sup> <b> N. Meghanathan<\/b>, &#8220;Optimum Routing Approach vs. Least Overhead Routing Approach for Minimum Hop Routing in Mobile Ad hoc Networks,&#8221; <i> The First International Conference on Computer Science and Information Technology<\/i>, Bangalore, India, <i> Springer-Verlag Communications in Computer and Information Science Series<\/i>, CCIS 131, Part II, pp. 606-616, January 2011.<\/span><\/p>\n<p><span style=\"font-size: 14px;\">[38]<sup>I<\/sup> <b> N. Meghanathan<\/b>, &#8220;An Algorithm to Determine Minimum Velocity-based Stable Connected Dominating Sets for Ad hoc Networks,&#8221; The 3rd International Conference on Contemporary Computing, Noida, India, <i> Springer-Verlag Communications in Computer and Information Science Series <\/i>, CCIS 94, pp. 206-217, August 2010.<\/span><\/p>\n<p><span style=\"font-size: 14px;\">[37]<sup>I<\/sup> <b> N. Meghanathan<\/b> and S. R. Vavilala, &#8220;An Algorithm to Determine Multicast Meshes with Maximum Lifetime for Mobile Ad hoc Networks,&#8221; The Second International Conference on Wireless and Mobile Networks (WiMoN-2010), Chennai, India, <i> Springer-Verlag Communications in Computer and Information Science Series<\/i>, CCIS 90, pp. 250-259, July 2010.<\/span><\/p>\n<p><span style=\"font-size: 14px;\">[36]<sup>I<\/sup> <b> N. Meghanathan<\/b>, &#8220;Design of a Reliability-based Source Routing Protocol for Wireless Mobile Ad hoc Networks,&#8221; The First International Workshop on Trust Management in P2P Systems (IWTMP2PS), Chennai, India, <i> Springer-Verlag Communications in Computer and Information Science Series<\/i>, CCIS 89, pp. 463-472, July 2010.<\/span><\/p>\n<p><span style=\"font-size: 14px;\">[35]<sup>I<\/sup> <b> N. Meghanathan<\/b>, &#8220;On the Time between Successive Multi-Path Discoveries and Hop Count per Multi-Path for Zone-Disjoint Routing in Mobile Ad hoc Networks,&#8221; The Second International Conference on Wireless and Mobile Networks (WiMo 2010), Ankara, Turkey, <i> Springer-Verlag Communications in Computer and Information Science Series<\/i>, CCIS 84, pp. 254-265, June 2010.<\/span><\/p>\n<p><span style=\"font-size: 14px;\">[34]<sup>IV<\/sup> <b> N. Meghanathan<\/b>, N. Kostyuk, R. Isokpehi and H. H. P. Cohly, &#8220;Clustering Model to Identify Biological Signatures for English Language Anxiety,&#8221; Proceedings of <i> The Second Annual ORNL Biomedical Science and Engineering Conference (BSEC)<\/i>, Oakridge, TN, USA, May 2010. <b>[Publication as part of the NSF MS EPSCoR Grant]<\/b><\/span><\/p>\n<p><span style=\"font-size: 14px;\">[33]<sup>IV<\/sup> <b> N. Meghanathan<\/b> and L. Nayak, &#8220;A Review of the Audio and Video Steganalysis Algorithms,&#8221; Proceedings of the <i> 48th ACM Southeast Conference<\/i>, Oxford, MS, April 15-17, 2010.<\/span><\/p>\n<p><span style=\"font-size: 14px;\">[32]<sup>II<\/sup> <b> N. Meghanathan<\/b>, &#8220;Grid Block Energy based Data Gathering Algorithm for Lower Energy*Delay and Longer Lifetime in Wireless Sensor Networks,&#8221; <i> Proceedings of the 1st ISCA International Conference on Sensor Networks and Applications<\/i> (SNA 2009), pp.79-84, San Francisco, USA, November 4 &#8211; 6, 2009.<\/span><\/p>\n<p><span style=\"font-size: 14px;\">[31]<sup>I<\/sup> <b>N. Meghanathan<\/b>, D. Thomas and E. S. Addison, &#8220;Multicast Extensions to the Flow-Oriented Routing Protocol and Node Velocity-based Stable Path Routing Protocol for Mobile Ad hoc Networks,&#8221; Proceedings of the 1st <i> IEEE Workshop on Mobile Computing and Networking Technologies<\/i>, held in Conjunction with the 1st <i> IEEE International Conference on Ultra Modern Telecommunications<\/i>, St. Petersburg, Russia, October 12-14, 2009. (Acceptance Rate: 39%) <b> [Publication as part of the NSF REU Grant] <\/b><\/span><\/p>\n<p><span style=\"font-size: 14px;\">[30]<sup>I<\/sup> <b>N. Meghanathan<\/b>, &#8220;A Node-Disjoint Multi-path Extension of the Location Prediction Based Routing Protocol for Mobile Ad hoc Networks,&#8221; <i> Proceedings of the 3rd International Conference on Signal Processing and Communication Systems<\/i>, Omaha, Nebraska, USA, September 28-30, 2009. (Acceptance Rate: 37.6%) <b>[Publication as part of the ARL Grant]<\/b><\/span><\/p>\n<p><span style=\"font-size: 14px;\">[29]<sup>I<\/sup> <b>N. Meghanathan<\/b>, &#8220;Multicast Extensions to the Location-Prediction Based Routing Protocol for Mobile Ad hoc Networks,&#8221; International Conference on Wireless Algorithms, Systems and Applications, <i> Lecture Notes of Computer Science Series<\/i>, LNCS 5682, B. Liu et al. (Eds.), pp. 190-199, August 2009. Extended Version of the paper published in the ISAST Transactions on Computers and Intelligent Systems. <b>[Publication as part of the ARL Grant] <\/b><\/span><\/p>\n<p><span style=\"font-size: 14px;\">[28]<sup>I<\/sup> <b>N. Meghanathan<\/b>, &#8220;On the Connectivity, Lifetime and Hop Count of Routes Determined using the City Section and Manhattan Mobility Models for Vehicular Ad hoc Networks,&#8221; 2nd International Conference on Contemporary Computing, <i> Springer-Verlag Communications in Computer and Information Science Series<\/i>, CCIS 40, pp. 170-181, August 2009. (Acceptance Rate: 31%)<\/span><\/p>\n<p><span style=\"font-size: 14px;\">[27]<sup>I<\/sup> <b>N. Meghanathan<\/b>and M. Sugumar, &#8220;A Beaconless Minimum Interference Based Routing Protocol for Mobile Ad hoc Networks,&#8221; 2nd International Conference on Contemporary Computing, <i> Springer-Verlag Communications in Computer and Information Science Series<\/i>, CCIS 40, pp. 58-69, August 2009. (Acceptance Rate: 31%)<\/span><\/p>\n<p><span style=\"font-size: 14px;\">[26]<sup>I<\/sup> <b>N. Meghanathan<\/b>, &#8220;A Density and Mobility Aware Energy-Efficient Broadcast Strategy to Minimize the Number of Route Discoveries in Mobile Ad hoc Networks,&#8221; <i> Proceedings of the 2009 International Conference on Wireless Networks<\/i>, ICWN 09, pp. 167 &#8211; 173, Las Vegas, July 13-16, 2009. (Acceptance Rate: 25%) <b> [Publication as part of the ARL Grant] <\/b><\/span><\/p>\n<p><span style=\"font-size: 14px;\">[25]<sup>II<\/sup> <b>N. Meghanathan<\/b>, &#8220;An Algorithm to Determine Energy-aware Connected Dominating Set and Data Gathering Tree for Wireless Sensor Networks,&#8221; <i> Proceedings of the 2009 International Conference on Wireless Networks<\/i>, ICWN 09, pp. 608 &#8211; 614, Las Vegas, July 13-16, 2009. (Acceptance Rate: 25%)<\/span><\/p>\n<p><span style=\"font-size: 14px;\">[24]<sup>I<\/sup> <b>N. Meghanathan<\/b> and G. W. Skelton, &#8220;An Energy Efficient Risk Notification Message Dissemination Protocol for Vehicular Ad hoc Networks,&#8221; <i> Proceedings of the International Conference on High Performance Computing, Networking and Communications Systems<\/i>, HPCNCS-09, Orlando, July 13-16, 2009.<\/span><\/p>\n<p><span style=\"font-size: 14px;\">[23]<sup>I<\/sup> <b>N. Meghanathan<\/b>, &#8220;A Beaconless Node Velocity-based Stable Path Routing Protocol for Mobile Ad hoc Networks,&#8221; <i> Proceedings of the IEEE Sarnoff Symposium<\/i>, pp. 9-13, Princeton, NJ, March 30-April 1, 2009. (Acceptance rate: 45%)<\/span><\/p>\n<p><span style=\"font-size: 14px;\">[22]<sup>I<\/sup> <b>N. Meghanathan<\/b>, &#8220;Impact of Range of Simulation Time and Network Shape on the Hop Count and Stability of Routes for Mobile Ad hoc Networks,&#8221; <i> Proceedings of the 47th ACM Southeast Conference<\/i>, Clemson, March 19-21, 2009.<\/span><\/p>\n<p><span style=\"font-size: 14px;\">[21]<sup>I<\/sup> <b>N. Meghanathan<\/b> and L. C. Milton, &#8220;A Simulation-Based Performance Comparison Study of Stability-Based Routing, Power-Aware Routing and Load-Balancing Routing Protocols for Mobile Ad hoc Networks,&#8221; <i> Proceedings of the 6th International Conference on Wireless On-demand Network Systems and Services<\/i>, Snowbird, Utah, Feb 2 &#8211; 4, 2009.<\/span><\/p>\n<p><span style=\"font-size: 14px;\">[20]<sup>I<\/sup> <b>N. Meghanathan<\/b>, &#8220;Location Prediction Based Routing Protocol for Mobile Ad hoc Networks,&#8221; <i> Proceedings of the IEEE Global Communications (GLOBECOM) Conference<\/i> , New Orleans, Nov-Dec 2008. (Acceptance Rate: 36.8%, ECI: 0.75)<\/span><\/p>\n<p><span style=\"font-size: 14px;\">[19]<sup>I<\/sup> <b>N. Meghanathan<\/b>, &#8220;Stability and Link Efficiency of On-Demand Source Tree-Based Routing Protocols for Mobile Ad Hoc Networks,&#8221; <i> Proceedings of the International Conference on High Performance Computing, Networking and Communication Systems<\/i>, pp. 159-166, Orlando, USA, July 2008.<\/span><\/p>\n<p><span style=\"font-size: 14px;\">[18]<sup>II<\/sup> <b>N. Meghanathan<\/b> and G. W. Skelton, &#8220;A Two Layer Architecture of Mobile Sinks and Static Sensors,&#8221; <i> Proceedings of the 15th International Conference on Advanced Computing and Communication<\/i>, pp. 249-254, Guwahathi, India, December 2007.<\/span><\/p>\n<p><span style=\"font-size: 14px;\">[17]<sup>I<\/sup> <b>N. Meghanathan<\/b>, &#8220;Stability and Hop Count of Node-Disjoint and Link-Disjoint Multi-Path Routes in Ad Hoc Networks,&#8221; <i> Proceedings of the 3rd IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)<\/i>, New York, October 2007 (Acceptance Rate: 44%).<\/span><\/p>\n<p><span style=\"font-size: 14px;\">[16]<sup>I<\/sup> <b>N. Meghanathan<\/b>, &#8220;Impact of Broadcast Route Discovery Strategies on the Performance of Mobile Ad Hoc Network Routing Protocols,&#8221; <i> Proceedings of the International Conference on High Performance Computing, Networking and Communication Systems<\/i>, pp. 144 &#8211; 151, Orlando, USA, July 2007 (Acceptance Rate: 30%).<\/span><\/p>\n<p><span style=\"font-size: 14px;\">[15]IV S. Knight, H. Kim, <b>N. Meghanathan<\/b> and C. Bland, &#8220;Fast Determination of Ancestor-Descendant Relationships using Bit Patterns,&#8221; <i>Proceedings of the International Conference on Knowledge and Engineering<\/i>, pp. 178 &#8211; 182, Las Vegas, June 2007 (Acceptance Rate: 22%).<\/span><\/p>\n<p><span style=\"font-size: 14px;\">[14]I <b>N. Meghanathan<\/b>, &#8220;Stability-Energy Consumption Tradeoff among Mobile Ad Hoc Network Routing Protocols,&#8221; Proceedings of 3rd IARIA International Conference on Wireless and Mobile Communications, March 2007 (Acceptance Rate: 31%).<\/span><\/p>\n<p><span style=\"font-size: 14px;\">[13]<sup>I<\/sup> <b>N. Meghanathan<\/b>, &#8220;A Simulation Study on the Stability-Oriented Routing Protocols for Mobile Ad Hoc Networks,&#8221; <i> Proceedings of 3rd IEEE and IFIP International Conference on Wireless and Optical Communication Networks<\/i>, Bangalore, India, April 2006.<\/span><\/p>\n<p><span style=\"font-size: 14px;\">[12]<sup>I<\/sup> <b>N. Meghanathan<\/b>, &#8220;Comparison of Stable Path Selection Strategies for Mobile Ad Hoc Networks,&#8221; <i> Proceedings of 5th IFIP International Conference on Networking<\/i>, Mauritius, April 2006. (Acceptance Rate: 39%).<\/span><\/p>\n<p><span style=\"font-size: 14px;\">[11]<sup>I<\/sup> <b>N. Meghanathan<\/b>, &#8220;On-demand Maximum Battery Lifetime Routing with Power Sensitive Power Control,&#8221; <i> Proceedings of 5th IFIP International Conference on Networking<\/i>, Mauritius, April 2006. (Acceptance Rate: 39%).<\/span><\/p>\n<p><span style=\"font-size: 14px;\">[10]<sup>I<\/sup> <b>N. Meghanathan<\/b>, &#8220;Determining a Sequence of Stable Multicast Steiner Trees in Mobile Ad Hoc Networks,&#8221; Proceedings of 44th ACM-Southeast Conference, pp. 102-106, Melbourne, FL, USA, March 2006. <b> [Best Paper Award] <\/b><\/span><\/p>\n<p><span style=\"font-size: 14px;\">[9]<sup>I<\/sup> <b>N. Meghanathan<\/b>, &#8220;An Algorithm to Determine the Sequence of Stable Connected Dominating Sets in Mobile Ad Hoc Networks,&#8221; <i> Proceedings of 2nd Advanced International Conference on Telecommunications<\/i>, Guadeloupe, French Caribbean, February 2006. (Acceptance Rate: 37%).<\/span><\/p>\n<p><span style=\"font-size: 14px;\">[8]<sup>I<\/sup> <b>N. Meghanathan<\/b> and A. Farago, &#8220;Comparison of Routing Strategies for Minimizing Energy Consumption in Mobile Ad Hoc Networks,&#8221; <i> Proceedings of the 4th Asian International Mobile Computing Conference<\/i>, Kolkatta, India, January 2006.<\/span><\/p>\n<p><span style=\"font-size: 14px;\">[7]<sup>I<\/sup> <b>N. Meghanathan<\/b> and A. Farago, &#8220;An Efficient Algorithm for the Optimal Number of Route Transitions in Mobile Ad Hoc Networks,&#8221; <i> Proceedings of the 1st IEEE &#8211; International Conference on Wireless and Mobile Computing, Networking and Communications<\/i>, Canada, August 2005.<\/span><\/p>\n<p><span style=\"font-size: 14px;\">[6]<sup>I<\/sup> <b>N. Meghanathan<\/b> and A. Farago, &#8220;On the Route Refresh Frequency for On-demand Maximum Battery Life Routing in Ad Hoc Networks,&#8221; <i> Proceedings of the 1st IEEE &#8211; International Conference on Wireless and Mobile Computing, Networking and Communications<\/i>, Canada, August 2005.<\/span><\/p>\n<p><span style=\"font-size: 14px;\">[5]<sup>I<\/sup> <b>N. Meghanathan<\/b> and A. Farago, &#8220;Maximizing Network Lifetime under Fixed Energy Budget in Ad Hoc Networks,&#8221; <i> Proceedings of the 6th IEEE- Southeast Conference<\/i>, Fort. Lauderdale, FL, USA, April 2005.<\/span><\/p>\n<p><span style=\"font-size: 14px;\">[4]<sup>I<\/sup> <b>N. Meghanathan<\/b> and A. Farago, &#8220;Power Sensitive Power Control in Ad Hoc Networks,&#8221; <i> Proceedings of 43rd ACM-Southeast Conference<\/i>, Kennesaw, GA, USA, March 2005.<\/span><\/p>\n<p><span style=\"font-size: 14px;\">[3]<sup>I<\/sup> <b>N. Meghanathan<\/b> and A. Farago, &#8220;Looking at Protocol Efficiency from a New Angle: Stability &#8211; Delay Analysis,&#8221; <i> Proceedings of 2nd ACM International Workshop on Mobility Management and Wireless Access (MobiWAC)<\/i>, in conjunction with Mobicom &#8217;04, Philadephia, PA, USA, October 2004.<\/span><\/p>\n<p><span style=\"font-size: 14px;\">[2]<sup>I<\/sup> S. Baskiyar and <b>N. Meghanathan<\/b>, &#8220;Scheduling and Load Sharing in Mobile Computing Environments using Tickets,&#8221; <i> Proceedings of 39th ACM- Southeast Conference<\/i>, Athens, GA, USA, March 2001.<\/span><\/p>\n<p><span style=\"font-size: 14px;\">[1]<sup>IV<\/sup> <b>N. Meghanathan<\/b>, V. M. Saucedo and G. A. Krishnagopalan, &#8220;Modeling of Kraft Pulping Process Based on On-line Data from Near Infrared Analyzer,&#8221; AIChE Symposium Series 324, Volume 96, Fundamentals and Numerical Modeling of Unit Operations in the Forest Products Industries, pp. 36 &#8211; 41, 2001.<\/span><\/p>\n<h3><u><a name=\"Books\"><\/a>Books\/Videos<\/u><\/h3>\n<p><span style=\"font-size: 14px;\"><span style=\"line-height: 20.8px;\">[9]<\/span><sup style=\"line-height: 20.8px;\">III<\/sup> <b style=\"font-size: 13px; line-height: 20.8px;\">N. Meghanathan<\/b><span style=\"line-height: 20.8px;\">\u00a0(author and editor), <\/span><a href=\"https:\/\/www.igi-global.com\/book\/strategic-innovations-interdisciplinary-perspectives-telecommunications\/215962\" target=\"_blank\" rel=\"noopener noreferrer\">Strategic Innovations and Interdisciplinary Perspectives in Telecommunications and Networking<\/a><span style=\"line-height: 20.8px;\">, 15 chapters (348 pages), IG<\/span><span style=\"line-height: 20.8px;\">I Global Publishers, Hershey, PA, USA, February 2019, ISBN: 9781522581888.<\/span><\/span><\/p>\n<p><span style=\"font-size: 14px;\"><span style=\"line-height: 20.8px;\">[8]<\/span><sup style=\"line-height: 20.8px;\">III<\/sup> <b style=\"font-size: 13px; line-height: 20.8px;\">N. Meghanathan<\/b><span style=\"line-height: 20.8px;\">\u00a0(author and editor), <\/span><a href=\"https:\/\/www.igi-global.com\/book\/centrality-metrics-complex-network-analysis\/181520\" target=\"_blank\" rel=\"noopener noreferrer\">Centrality Metrics for Complex Network Analysis: Emerging Research and Opportunities<\/a><span style=\"line-height: 20.8px;\">, 7 chapters (183 pages), IG<\/span><span style=\"line-height: 20.8px;\">I Global Publishers, Hershey, PA, USA, April 2018, ISBN: 9781522538028.<\/span><\/span><\/p>\n<p><span style=\"font-size: 14px;\"><span style=\"line-height: 20.8px;\">[7]<\/span><sup style=\"line-height: 20.8px;\">III<\/sup> <b style=\"font-size: 13px; line-height: 20.8px;\">N. Meghanathan<\/b><span style=\"line-height: 20.8px;\">\u00a0(editor), <\/span><a href=\"https:\/\/www.igi-global.com\/book\/centrality-metrics-complex-network-analysis\/181520\" target=\"_blank\" rel=\"noopener noreferrer\">Graph Theoretic Approaches for Analyzing Large-Scale Social Networks<\/a><span style=\"line-height: 20.8px;\">, 17 chapters (355 pages), IG<\/span><span style=\"line-height: 20.8px;\">I Global Publishers, Hershey, PA, USA, July 2017, ISBN: 9781522528142.<\/span><\/span><\/p>\n<p><span style=\"font-size: 14px;\"><span style=\"line-height: 20.8px;\">[6]<\/span><sup style=\"line-height: 20.8px;\">I<\/sup><span style=\"line-height: 20.8px;\">\u00a0<\/span><b style=\"font-size: 13px; line-height: 20.8px;\">N. Meghanathan<\/b><span style=\"line-height: 20.8px;\">\u00a0(author), <\/span><a href=\"http:\/\/www.igi-global.com\/video\/routing-protocols-graph-theory-algorithms\/173008\" target=\"_blank\" rel=\"noopener noreferrer\">Routing Protocols and Graph Theory Algorithms for Mobile Ad Hoc Networks<\/a><span style=\"line-height: 20.8px;\">, video series: 18 lessons, 3 hours and 8 minutes, DOI: <\/span> 10.4018\/978-1-5225-2227-0<span style=\"line-height: 20.8px;\">, EISBN: <\/span> 9781522522270<span style=\"line-height: 20.8px;\">, IGI Global Publishers, Hershey, PA, USA, January 2017.<\/span><\/span><\/p>\n<p><span style=\"font-size: 14px;\"><span style=\"line-height: 20.8px;\">[5]<\/span><sup style=\"line-height: 20.8px;\">III<\/sup> <b style=\"font-size: 13px; line-height: 20.8px;\">N. Meghanathan<\/b><span style=\"line-height: 20.8px;\">\u00a0(editor),\u00a0<\/span><a href=\"http:\/\/www.igi-global.com\/book\/advanced-methods-complex-network-analysis\/141912\" target=\"_blank\" rel=\"noopener noreferrer\">Advanced Methods for Complex Network Analysis<\/a><span style=\"line-height: 20.8px;\">, 17\u00a0chapters, 427\u00a0pages, DOI: <\/span><span style=\"font-family: Arial, Helvetica, sans-serif; line-height: normal;\">10.4018\/978-1-4666-9964-9<\/span><span style=\"line-height: 20.8px;\">, ISBN: <\/span><span style=\"font-family: Arial, Helvetica, sans-serif; line-height: normal;\">9781466699649<\/span><span style=\"line-height: 20.8px;\">, IGI Global Publishers, Hershey, PA, USA, April 2016.<\/span><\/span><\/p>\n<p><span style=\"font-size: 14px;\">[4]<sup>I<\/sup> <b> N. Meghanathan<\/b> (author and editor), <a href=\"https:\/\/www.novapublishers.com\/catalog\/product_info.php?products_id=50389\" target=\"_blank\" rel=\"noopener noreferrer\">Recent Advances in Ad Hoc Networks Research<\/a>, 10 chapters, 234 pages, ISBN: 978-1-63321-337-1, Nova Publishers, New York, USA, August 2014.<\/span><\/p>\n<p><span style=\"font-size: 14px;\">[3]<sup>I<\/sup> <b> N. Meghanathan<\/b> and Y. B. Reddy (authors and editors), <a href=\"http:\/\/www.igi-global.com\/book\/cognitive-radio-technology-applications-wireless\/74190\" target=\"_blank\" rel=\"noopener noreferrer\">Cognitive Radio Technology Applications for Wireless and Mobile Ad hoc Networks<\/a>, 16 chapters, 370 pages, DOI: 10.4018\/978-1-4666-4221-8, ISBN: 978-1-46664-221-8, IGI Global Publishers, Hershey, PA, USA, June 2013.<\/span><\/p>\n<p><span style=\"font-size: 14px;\">[2]<sup>IV<\/sup> <b> N. Meghanathan\u00a0<\/b>(author),\u00a0A Tutorial on Java Socket Programming and Source Code Analysis, <i> LAP LAMBERT Academic Publishing <\/i>, ISBN-13: 978-3-659-31445-2, 80 pages, 2013. <a href=\"..\\journalPapers\\978-3-659-31445-2_Coverpreview.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Cover Page<\/a> \u00a0\u00a0 <a href=\"http:\/\/www.amazon.com\/dp\/3659314455\/ref=cm_sw_r_fa_dp_kDM3qb1Q9V6TB\" target=\"_blank\" rel=\"noopener noreferrer\">Amazon Link<\/a><br \/>\n<b>[Publication as part of the NSF CCLI\/TUES Grant]<\/b><\/span><\/p>\n<p><span style=\"font-size: 14px;\">[1]<sup>IV<\/sup> <b> N. Meghanathan<\/b>, D. C. Johnson and A. R. Geoghegan (authors), An Analysis of Software Security Attacks and Mitigation Controls, <i> LAP LAMBERT Academic Publishing <\/i>, ISBN-13: 978-3-659-30944-1, 76 pages, 2013. <a href=\"..\\journalPapers\\978-3-659-30944-1_Coverpreview.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Cover Page<\/a> \u00a0\u00a0 <a href=\"http:\/\/www.amazon.com\/Analysis-Software-Security-Mitigation-Controls\/dp\/3659309443\/ref=sr_1_2?s=books&amp;ie=UTF8&amp;qid=1356752894&amp;sr=1-2\" target=\"_blank\" rel=\"noopener noreferrer\">Amazon Link<\/a><br \/>\n<b>[Publication as part of the NSF CCLI\/TUES Grant]<\/b><\/span><\/p>\n<h3><\/h3>\n<h3><u><a name=\"BookChapters\"><\/a>Book Chapters<\/u><\/h3>\n<h5><span style=\"font-size: 13px; line-height: 20.7999992370605px;\">[27<\/span><sup style=\"line-height: 20.8px;\">III<\/sup>\u00a0<b style=\"font-size: 13px; line-height: 20.8px;\">N. Meghanathan<\/b><span style=\"font-size: 13px; line-height: 20.8px;\">, &#8220;Binary Search Approach for Largest Cascade Capacity of Complex Network<\/span><span style=\"font-size: 13px; line-height: 20.8px;\">,&#8221; <\/span><em style=\"font-size: 13px; line-height: 20.8px;\">Encyclopedia of Data Science and Machine Learning<\/em><i style=\"font-size: 13px; line-height: 20.8px;\">,\u00a0<\/i><span style=\"font-size: 13px; line-height: 20.8px;\">Editor: John Wang, IGI, 2022.<\/span>\u00a0<span style=\"font-size: 13px; line-height: 20.8px;\">\u00a0<\/span><\/h5>\n<p><span style=\"font-size: 13px; line-height: 20.7999992370605px;\">[26]<\/span><sup style=\"line-height: 20.8px;\">IV<\/sup> <b style=\"font-size: 13px; line-height: 20.8px;\">N. Meghanathan <\/b>and M. Terrell<span style=\"font-size: 13px; line-height: 20.8px;\">, &#8220;<\/span>Design of a Secure Framework for Session Mobility as a Service in Cloud Computing Environment<span style=\"font-size: 13px; line-height: 20.8px;\">,&#8221; (Chapter 27, pp. 475-490), <\/span><em style=\"font-size: 13px; line-height: 20.8px;\">Computer and Network Security Essentials<\/em><i style=\"font-size: 13px; line-height: 20.8px;\">,\u00a0<\/i><span style=\"font-size: 13px; line-height: 20.8px;\">Editor: <\/span>Kevin Daimi<span style=\"font-size: 13px; line-height: 20.8px;\">, Springer, 2018.\u00a0 <\/span><\/p>\n<p><span style=\"font-size: 13px; line-height: 20.7999992370605px;\">[25]<\/span><sup style=\"line-height: 20.8px;\">IV<\/sup> <b style=\"font-size: 13px; line-height: 20.8px;\">N. Meghanathan<\/b><span style=\"font-size: 13px; line-height: 20.8px;\">, &#8220;<\/span>Biometrics for User Authentication<span style=\"font-size: 13px; line-height: 20.8px;\">,&#8221; (Chapter 18, pp. 317-335), <\/span><em style=\"font-size: 13px; line-height: 20.8px;\">Computer and Network Security Essentials<\/em><i style=\"font-size: 13px; line-height: 20.8px;\">,\u00a0<\/i><span style=\"font-size: 13px; line-height: 20.8px;\">Editor: <\/span>Kevin Daimi, Springer, 2018.\u00a0<span style=\"font-size: 13px; line-height: 20.8px;\">\u00a0 <\/span><\/p>\n<p><span style=\"font-size: 13px; line-height: 20.7999992370605px;\">[24]<\/span><sup style=\"line-height: 20.8px;\">III<\/sup><span style=\"font-size: 13px; line-height: 20.8px;\">\u00a0<\/span><b style=\"font-size: 13px; line-height: 20.8px;\">N. Meghanathan<\/b><span style=\"font-size: 13px; line-height: 20.8px;\">, &#8220;<\/span>Leverage Centrality-Based Assortativity Analysis of Real-World Network Graphs<span style=\"font-size: 13px; line-height: 20.8px;\">,&#8221; chapter accepted for publication in <\/span> <em>Complex Networks: Advances in Research and Applications<\/em>, NOVA Publishers, 2017.<\/p>\n<p><span style=\"font-size: 13px; line-height: 20.7999992370605px;\">[23]<\/span><sup style=\"line-height: 20.8px;\">I<\/sup><span style=\"font-size: 13px; line-height: 20.8px;\">\u00a0<\/span><b style=\"font-size: 13px; line-height: 20.8px;\">N. Meghanathan<\/b><span style=\"font-size: 13px; line-height: 20.8px;\">, &#8220;<\/span>A Graph Intersection-based Algorithm to Determine Maximum Lifetime Communication Topologies for Cognitive Radio Ad hoc Networks<span style=\"font-size: 13px; line-height: 20.8px;\">,&#8221; Chapter 567, <\/span><em style=\"font-size: 13px; line-height: 20.8px;\">Encyclopedia of Information Science and Technology<\/em><i style=\"font-size: 13px; line-height: 20.8px;\">,\u00a0<\/i><span style=\"font-size: 13px; line-height: 20.8px;\">Editor:\u00a0<\/span><span style=\"font-size: 13px; line-height: 20.8px;\">Mehdi Khosrow-Pour<\/span><span style=\"font-size: 13px; line-height: 20.8px;\">, IGI Global, 2017.\u00a0<\/span><\/p>\n<p><span style=\"font-size: 13px; line-height: 20.7999992370605px;\">[22]<\/span><sup style=\"line-height: 20.8px;\">III<\/sup><span style=\"font-size: 13px; line-height: 20.8px;\">\u00a0<\/span><b style=\"font-size: 13px; line-height: 20.8px;\">N. Meghanathan<\/b><span style=\"font-size: 13px; line-height: 20.8px;\">, &#8220;<\/span>Clique Size and Centrality Metrics for Analysis of Real-World Network Graphs<span style=\"font-size: 13px; line-height: 20.8px;\">,&#8221; Chapter 565, <\/span><em style=\"font-size: 13px; line-height: 20.8px;\">Encyclopedia of Information Science and Technology<\/em><i style=\"font-size: 13px; line-height: 20.8px;\">,\u00a0<\/i><span style=\"font-size: 13px; line-height: 20.8px;\">Editor:\u00a0<\/span><span style=\"font-size: 13px; line-height: 20.8px;\">Mehdi Khosrow-Pour<\/span><span style=\"font-size: 13px; line-height: 20.8px;\">, IGI Global, 2017<\/span>.<\/p>\n<p><span style=\"font-size: 13px; line-height: 20.7999992370605px;\">[21]<\/span><sup style=\"line-height: 20.8px;\">I<\/sup> <b style=\"font-size: 13px; line-height: 20.8px;\">N. Meghanathan<\/b><span style=\"font-size: 13px; line-height: 20.8px;\">, &#8220;<\/span>Centralized and Distributed Algorithms for Stable Communication Topologies in Cognitive Radio Ad hoc Networks,&#8221; Chapter 6, pp. 153-182, <em>Spectrum Access and Management for Cognitive Radio Networks<\/em><i style=\"font-size: 13px; line-height: 20.8px;\">,\u00a0<\/i><span style=\"font-size: 13px; line-height: 20.8px;\">Editor: <\/span>Mohammad A. Matin<span style=\"font-size: 13px; line-height: 20.8px;\">, Springer, 2017, DOI: <\/span>10.1007\/978-981-10-2254-8<span style=\"font-size: 13px; line-height: 20.8px;\">: <\/span><a href=\"http:\/\/www.springer.com\/gp\/book\/9789811022531#aboutBook\" target=\"_blank\" rel=\"noopener noreferrer\">Link<\/a><\/p>\n<p><span style=\"font-size: 13px; line-height: 20.7999992370605px;\">[20]<\/span><sup style=\"line-height: 20.8px;\">II<\/sup><span style=\"font-size: 13px; line-height: 20.8px;\">\u00a0<\/span><b style=\"font-size: 13px; line-height: 20.8px;\">N. Meghanathan<\/b><span style=\"font-size: 13px; line-height: 20.8px;\">, &#8220;<\/span><span style=\"font-size: 13px; line-height: 20.8px;\">Diameter-Aggregation Delay Tradeoff for Data Gathering Trees in Wireless Sensor Networks<\/span><span style=\"font-size: 13px; line-height: 20.8px;\">,&#8221; Chapter 10, pp. 237-253,\u00a0<\/span><em style=\"font-size: 13px; line-height: 20.8px;\">Handbook of Research on Wireless Sensor Network Trends, Technologies, and Applications<\/em><i style=\"font-size: 13px; line-height: 20.8px;\">,\u00a0<\/i><span style=\"font-size: 13px; line-height: 20.8px;\">Editor: Narendra Kumar Kamila,\u00a0IGI Global, July\u00a02016.\u00a0<\/span><span style=\"line-height: 20.8px; font-size: 14px;\"><a href=\"http:\/\/www.igi-global.com\/chapter\/diameter-aggregation-delay-tradeoff-for-data-gathering-trees-in-wireless-sensor-networks\/162385\" target=\"_blank\" rel=\"noopener noreferrer\">Link<\/a><\/span><\/p>\n<p><span style=\"font-size: 13px; line-height: 20.7999992370605px;\">[19]<\/span><sup style=\"line-height: 20.8px;\">II<\/sup><span style=\"font-size: 13px; line-height: 20.8px;\">\u00a0<\/span><b style=\"font-size: 13px; line-height: 20.8px;\">N. Meghanathan<\/b><span style=\"font-size: 13px; line-height: 20.8px;\">, &#8220;<\/span>Eigenvector Centrality-Based Mobile Target Tracking in Wireless Sensor Networks<span style=\"font-size: 13px; line-height: 20.8px;\">,&#8221; Chapter 16, pp. 394-411, <\/span><em>Handbook of Research on Wireless Sensor Network Trends, Technologies, and Applications<\/em><i style=\"font-size: 13px; line-height: 20.8px;\">,\u00a0<\/i><span style=\"font-size: 13px; line-height: 20.8px;\">Editor: Narendra Kumar Kamila,\u00a0IGI Global, July\u00a02016.\u00a0<\/span><span style=\"font-size: 14px;\"><a href=\"http:\/\/www.igi-global.com\/chapter\/eigenvector-centrality-based-mobile-target-tracking-in-wireless-sensor-networks\/162392\" target=\"_blank\" rel=\"noopener noreferrer\">Link<\/a><\/span><\/p>\n<p><span style=\"font-size: 13px; line-height: 20.7999992370605px;\">[18]<\/span><sup style=\"line-height: 20.8px;\">II<\/sup><span style=\"font-size: 13px; line-height: 20.8px;\">\u00a0<\/span><b style=\"font-size: 13px; line-height: 20.8px;\">N. Meghanathan<\/b><span style=\"font-size: 13px; line-height: 20.8px;\">, &#8220;<\/span>Impact of the Structure of the Data Gathering Trees on Node Lifetime and Network Lifetime in Wireless Sensor Networks<span style=\"font-size: 13px; line-height: 20.8px;\">,&#8221; Chapter 7, pp. 192-204,\u00a0<\/span><em>Handbook of Research on Advanced Wireless Sensor Network Applications, Protocols, and Architectures<\/em><i style=\"font-size: 13px; line-height: 20.8px;\">,\u00a0<\/i><span style=\"font-size: 13px; line-height: 20.8px;\">Editors: Niranjan Ray and Ashok Turuk, IGI Global, July\u00a02016.\u00a0<\/span><span style=\"font-size: 14px;\"><a href=\"http:\/\/www.igi-global.com\/book\/handbook-research-advanced-wireless-sensor\/147014\" target=\"_blank\" rel=\"noopener noreferrer\">Link<\/a><\/span><\/p>\n<p><span style=\"font-size: 13px; line-height: 20.7999992370605px;\">[17]<\/span><sup style=\"line-height: 20.7999992370605px;\">II<\/sup><span style=\"font-size: 13px; line-height: 20.7999992370605px;\">\u00a0<\/span><b style=\"font-size: 13px; line-height: 20.7999992370605px;\">N. Meghanathan<\/b><span style=\"font-size: 13px; line-height: 20.7999992370605px;\">, &#8220;<\/span>Distributed Data Gathering Algorithms for Mobile Sensor Networks<span style=\"font-size: 13px; line-height: 20.7999992370605px;\">,&#8221; Chapter 13, pp. 329-359, <\/span><em>Emerging Communication Technologies Based on Wireless Sensor Networks: Current Research and Future Applications<\/em><i style=\"font-size: 13px; line-height: 20.7999992370605px;\">, <\/i><span style=\"font-size: 13px; line-height: 20.7999992370605px;\">Editors: <\/span>Mubashir Husain Rehmani and Al-Sakib Khan Pathan<span style=\"font-size: 13px; line-height: 20.7999992370605px;\">, CRC Press, April 2016.\u00a0<\/span><a style=\"font-size: 14px; line-height: 20.8px;\" href=\"https:\/\/www.crcpress.com\/Emerging-Communication-Technologies-Based-on-Wireless-Sensor-Networks-Current\/Rehmani-Pathan\/p\/book\/9781498724852\" target=\"_blank\" rel=\"noopener noreferrer\">Link<\/a><\/p>\n<p><span style=\"font-size: 13px; line-height: 20.8px;\">[16]<\/span><sup style=\"line-height: 20.8px;\">II<\/sup><span style=\"font-size: 13px; line-height: 20.8px;\">\u00a0<\/span><b style=\"font-size: 13px; line-height: 20.8px;\">N. Meghanathan<\/b><span style=\"font-size: 13px; line-height: 20.8px;\">, &#8220;A Pairwise Key Distribution Mechanism and Distributed Trust Evaluation Model for Secure Data Aggregation in Mobile Sensor Networks,&#8221; Chapter 12, pp. 299-328,\u00a0<\/span><em style=\"font-size: 13px; line-height: 20.8px;\">Emerging Communication Technologies Based on Wireless Sensor Networks: Current Research and Future Applications<\/em><i style=\"font-size: 13px; line-height: 20.8px;\">,\u00a0<\/i><span style=\"font-size: 13px; line-height: 20.8px;\">Editors:\u00a0<\/span><span style=\"font-size: 13px; line-height: 20.8px;\">Mubashir Husain Rehmani and Al-Sakib Khan Pathan, CRC Press, April 2016.\u00a0<\/span><span style=\"font-size: 14px;\"><a href=\"https:\/\/www.crcpress.com\/Emerging-Communication-Technologies-Based-on-Wireless-Sensor-Networks-Current\/Rehmani-Pathan\/p\/book\/9781498724852\" target=\"_blank\" rel=\"noopener noreferrer\">Link<\/a><\/span><\/p>\n<p><span style=\"line-height: 1.6em;\">[15]<\/span><sup style=\"line-height: 1.6em;\">IV<\/sup> <b style=\"line-height: 1.6em;\"> N. Meghanathan<\/b><span style=\"line-height: 1.6em;\">, &#8220;Virtualization as The Catalyst for Cloud Computing,&#8221; Chapter 105, pp. 304-320, <\/span><i style=\"line-height: 1.6em;\">Encyclopedia of Information Science and Technology, Third Edition<\/i><span style=\"line-height: 1.6em;\">, Editor: Mehdi Khosrow-Pour, ISBN: 1466658886, DOI: 10.4018\/978-1-4666-5888-2, IGI Global Publishers, Hershey, PA, USA, July 2014.<\/span><\/p>\n<p>[14]<sup>I<\/sup> <b> N. Meghanathan<\/b>, &#8220;A Simulation-Based Comparison Study of Connected Dominating Sets for Mobile Ad hoc Networks under Different Mobility Models,&#8221; Chapter 1, <i>Recent Advances in Ad Hoc Networks Research<\/i>, Editor: N. Meghanathan, ISBN: 978-1-63321-337-1, Nova Publishers, USA, 3rd Quarter 2014. <a href=\"https:\/\/www.novapublishers.com\/catalog\/product_info.php?products_id=50389\" target=\"_blank\" rel=\"noopener noreferrer\">Book Link<\/a><\/p>\n<p>[13]<sup>I<\/sup> <b> N. Meghanathan<\/b>, &#8220;A Performance Comparison of Zone-Disjoint and Node-Disjoint Multi-Path Routing with Single-Path Routing for Mobile Ad hoc Networks,&#8221; Chapter 2, <i>Recent Advances in Ad Hoc Networks Research<\/i>, Editor: N. Meghanathan, ISBN: 978-1-63321-337-1, Nova Publishers, USA, 3rd Quarter 2014. <a href=\"https:\/\/www.novapublishers.com\/catalog\/product_info.php?products_id=50389\" target=\"_blank\" rel=\"noopener noreferrer\">Book Link<\/a><\/p>\n<p>[12]<sup>IV<\/sup> <b> N. Meghanathan<\/b>, &#8220;A Secure Data Aggregation Framework for Wireless Mobile Sensor Networks,&#8221; Chapter 5, <i>Recent Advances in Ad Hoc Networks Research<\/i>, Editor: N. Meghanathan, ISBN: 978-1-63321-337-1, Nova Publishers, USA, 3rd Quarter 2014. <a href=\"https:\/\/www.novapublishers.com\/catalog\/product_info.php?products_id=50389\" target=\"_blank\" rel=\"noopener noreferrer\">Book Link<\/a><\/p>\n<p>[11]<sup>II<\/sup> <b> N. Meghanathan<\/b>, &#8220;Data Gathering Algorithms and Sink Mobility Models for Wireless Sensor Networks,&#8221; Chapter 8, pp. 123-151, <i>Multidisciplinary Perspectives on Telecommunications, Wireless Systems, and Mobile Computing<\/i>, Editor: W. Hu, ISBN: 1466647159, DOI: 10.4018\/978-1-4666-4715-2.ch008, IGI Global Publishers, Hershey, PA, USA, 2014. <a href=\"http:\/\/www.igi-global.com\/book\/multidisciplinary-perspectives-telecommunications-wireless-systems\/78245\" target=\"_blank\" rel=\"noopener noreferrer\">Book Link<\/a><\/p>\n<p>[10]<sup>I<\/sup> <b> N. Meghanathan<\/b>, &#8220;Algorithms to Determine Stable Connected Dominating Sets for Mobile Ad hoc Networks,&#8221; Chapter 9, pp. 249-274, <i>Wireless Communications and Networking: Theory and Practice<\/i>, Editor: M. Matin, ISBN: 1466651709, DOI: 10.4018\/978-1-4666-5170-8.ch009, IGI Global Publishers, Hershey, PA, USA, February 2014. <a href=\"http:\/\/www.igi-global.com\/chapter\/algorithms-to-determine-stable-connected-dominating-sets-for-mobile-ad-hoc-networks\/97847\" target=\"_blank\" rel=\"noopener noreferrer\">Book Chapter Link<\/a><\/p>\n<p>[9]<sup>III<\/sup> <b> N. Meghanathan<\/b> and P. Mumford, &#8220;Graph Intersection-based Benchmarking Algorithm for Maximum Stability Data Gathering Trees in Wireless Mobile Sensor Networks,&#8221; Chapter 17, pp. 433-458, <i>Wireless Communications and Networking: Theory and Practice<\/i>, Editor: M. Matin, ISBN: 1466651709, DOI: 10.4018\/978-1-4666-5170-8.ch017, IGI Global Publishers, Hershey, PA, USA, February 2014. <a href=\"http:\/\/www.igi-global.com\/chapter\/graph-intersection-based-benchmarking-algorithm-for-maximum-stability-data-gathering-trees-in-wireless-mobile-sensor-networks\/97855\" target=\"_blank\" rel=\"noopener noreferrer\">Book Chapter Link<\/a><\/p>\n<p>[8]<sup>IV<\/sup> <b> N. Meghanathan<\/b>, &#8220;Network Security: Attacks and Controls,&#8221; Chapter 11, pp. 174-203, <i>Network Security Technologies: Design and Applications<\/i>, Editors: A. Amine, O. Ait Mohamed and B. Benatallah, ISBN: 1466647892, IGI Global Publishers, Hershey, PA, USA, November 2013. <a href=\"http:\/\/www.igi-global.com\/book\/network-security-technologies\/78264\" target=\"_blank\" rel=\"noopener noreferrer\">Book Chapter Link<\/a><\/p>\n<p>[7]<sup>I<\/sup> <b> N. Meghanathan<\/b>, &#8220;Introduction to Cognitive Radio Networks: Communication Protocols and Security Issues,&#8221; Chapter 1, pp. 1-30, <i>Cognitive Radio Technology Applications for Wireless and Mobile Ad hoc Networks<\/i>, Editors: N. Meghanathan and Y. B. Reddy, ISBN: TBA, IGI Global Publishers, Hershey, PA, USA, June 2013. <a href=\"http:\/\/www.igi-global.com\/publish\/call-for-papers\/call-details\/417\" target=\"_blank\" rel=\"noopener noreferrer\">Book Chapter Link<\/a><\/p>\n<p>[6]<sup>II<\/sup> <b> N. Meghanathan<\/b>, &#8220;Data Gathering Algorithms for Wireless Sensor Networks,&#8221; Chapter 13: pp. 353-376, <i>Wireless Sensor Networks: Current Status and Future Trends<\/i>, Editors: S. Khan, A-S. Khan Pathan and N. A. Alrajeh, ISBN: 978-1-4665-0606-0, CRC Press, Taylor &amp; Francis Group, USA, 2012. <a href=\"http:\/\/www.crcpress.com\/product\/isbn\/9781466506060\" target=\"_blank\" rel=\"noopener noreferrer\">Book Link<\/a><\/p>\n<p>[5]<sup>I<\/sup> <b> N. Meghanathan<\/b>, &#8220;Topology-based Classification of Multicast Routing Protocols for Mobile Ad hoc Networks,&#8221; Chapter 7: pp. 116-143, <i>Technological Advancements and Applications in Mobile Ad hoc Networks: Research Trends <\/i>, Editor: Kamaljit Lakhtaria, ISBN: 978-1-4666-0321-9, IGI Global Publishers, Hershey, PA, USA, 2012. <a href=\"http:\/\/www.igi-global.com\/book\/technological-advancements-applications-mobile-hoc\/59721#table-of-contents\" target=\"_blank\" rel=\"noopener noreferrer\">Book Chapter Link<\/a><\/p>\n<p>[4]<sup>IV<\/sup> <b> N. Meghanathan<\/b> and A. R. Geoghegan, &#8220;A Case Study on Testing for Software Security: Static Code Analysis of a File Reader Program Developed in Java,&#8221; Chapter 5: pp. 89-112, Advanced Automated Software Testing: Frameworks for Refined Practice, Editor: Izzat Alsmadi, ISBN: 978-1-4666-0089-8, 270 pages, IGI Global Publishers, Hershey, PA, USA, 2011. <b>[Publication as part of the NSF CCLI\/TUES Grant] <\/b> <a href=\"http:\/\/www.igi-global.com\/book\/advanced-automated-software-testing\/56028#table-of-contents\" target=\"_blank\" rel=\"noopener noreferrer\">Book Chapter Link<\/a><\/p>\n<p>[3]<sup>III<\/sup> <b> N. Meghanathan<\/b>, &#8220;Applications of Graph Theory Algorithms in Mobile Ad hoc Networks,&#8221; Chapter 4: pp. 98-125, Mobile Computing Techniques in Emerging Markets: Systems, Applications and Services, Editors: A. V. Senthil Kumar and Hakikur Rehman, ISBN: 978-1-4666-0080-5, IGI Global Publishers, Hershey, PA, USA, 2011. <b>[Publication as part of the NSF REU Grant] <\/b> <a href=\"http:\/\/www.igi-global.com\/chapter\/applications-graph-theory-algorithms-mobile\/62193\" target=\"_blank\" rel=\"noopener noreferrer\"> Book Chapter Link<\/a><\/p>\n<p>[2]<sup>I<\/sup> <b> N. Meghanathan<\/b>, &#8220;A Location Prediction Based Routing Protocol and its Extensions for Multicast and Multi-path Routing in Mobile Ad hoc Networks,&#8221; Chapter 12: pp. 217-242, <i>Mobile Ad-Hoc Networks: Protocol Design<\/i>, Editor: Xin Wang, ISBN: 978-953-307-402-3, 656 pages, In-Tech Education and Publishing, Vienna, Austria, November 2010.<a href=\"http:\/\/www.intechopen.com\/books\/mobile-ad-hoc-networks-protocol-design\" target=\"_blank\" rel=\"noopener noreferrer\"> Book Link<\/a><\/p>\n<p>[1]<sup>I<\/sup> <b> N. Meghanathan<\/b>, &#8220;Greedy Algorithms to Determine Stable Paths and Trees in Mobile Ad hoc Networks,&#8221; Chapter 14: pp. 253 &#8211; 272, <i>Advances in Greedy Algorithms<\/i>, Editor: Witold Bednorz, ISBN: 978-953-7619-27-5, 586 pages, In-Tech Education and Publishing, Vienna, Austria, November 2008.<a href=\"http:\/\/www.intechopen.com\/books\/greedy_algorithms\" target=\"_blank\" rel=\"noopener noreferrer\"> Book Link<\/a><\/p>\n<h3><u><a name=\"Abstracts\"><\/a>Peer-reviewed Abstract\/Poster Publications and Presentations<\/u><\/h3>\n<p><span style=\"font-size: 13px; line-height: 20.8px;\">[37]<\/span><sup style=\"line-height: 20.8px;\">III<\/sup><span style=\"font-size: 13px; line-height: 20.8px;\">\u00a0<\/span><b style=\"font-size: 13px; line-height: 20.8px;\">N. Meghanathan<\/b><span style=\"font-size: 13px; line-height: 20.8px;\">, &#8220;Breadth First Search-based Efficient Algorithm for Betweenness Centrality,&#8221;\u00a0<\/span><i style=\"font-size: 13px; line-height: 20.8px;\">Proceedings of the ACM-Mid Southeast Conference<\/i><span style=\"font-size: 13px; line-height: 20.8px;\">, p. 68, Gatlinburg, TN, November\u00a02015.<\/span><\/p>\n<p><span style=\"font-size: 13px; line-height: 20.8px;\">[36]<\/span><sup style=\"line-height: 20.8px;\">III<\/sup><span style=\"font-size: 13px; line-height: 20.8px;\">\u00a0<\/span><b style=\"font-size: 13px; line-height: 20.8px;\">N. Meghanathan<\/b><span style=\"font-size: 13px; line-height: 20.8px;\">, &#8220;Community Detection using Betweenness Centrality and Eigenvector Centrality,&#8221;\u00a0<\/span><i style=\"font-size: 13px; line-height: 20.8px;\">Proceedings of the ACM-Mid Southeast Conference<\/i><span style=\"font-size: 13px; line-height: 20.8px;\">, p. 70, Gatlinburg, TN, November\u00a02015.<\/span><\/p>\n<p>[35]<sup>IV<\/sup> <b>N. Meghanathan<\/b>, &#8220;Design of an Algorithms for Bioinformatics Course for Computer Science Majors,&#8221; <i>Proceedings of the 79th Annual Meeting of the Mississippi Academy of Sciences<\/i>, vol. 60, no. 1, p. 131, Hattiesburg, MS, February 2015. <!--a href=\"..\/docs\/Abstracts\/2014_Proceedings-abstract-2.pdf\" target=\"_blank\"&gt;PDF&lt;\/a--><\/p>\n<p>[34]<sup>I<\/sup> <b>N. Meghanathan<\/b>, &#8220;A Local Spectrum Knowledge-based Routing Protocol for Cognitive Radio Ad hoc Networks,&#8221; <i>Proceedings of the ACM-Mid Southeast Conference<\/i>, p. 75, Gatlinburg, TN, November 2014. <a href=\"..\/docs\/Abstracts\/2014_Proceedings-abstract-2.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a><\/p>\n<p>[33]<sup>IV<\/sup> <b>N. Meghanathan<\/b>, &#8220;A Greedy Algorithm to Determine the Longest Suffix Prefix Overlap of two DNA Strings,&#8221; <i>Proceedings of the ACM-Mid Southeast Conference<\/i>, p.74, Gatlinburg, TN, November 2014. <a href=\"..\/docs\/Abstracts\/2014_Proceedings-abstract-1.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a><\/p>\n<p>[32]<sup>IV<\/sup> <b>N. Meghanathan<\/b>, &#8220;Dynamic Access Control Models for Cross-domain Authentication in Cloud Computing Environments,&#8221; <i>Proceedings of the ACM-Mid Southeast Conference<\/i>, p. 74, Gatlinburg, TN, November 2013. <a href=\"..\/docs\/Abstracts\/2013_ACMMid-SE-Proceedings-abstract.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a><\/p>\n<p>[31]<sup>IV<\/sup> <b>N. Meghanathan<\/b>, &#8220;Attack Trees for Threat\/Risk Analysis of Software Security,&#8221; <i>Journal of the Mississippi Academy of Sciences<\/i>, vol. 64, no. 1, p. 112, January 2013. <a href=\"http:\/\/msacad.org\/journal\/2013\/jan_2-5-13_final.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a> <b>[Publication as part of the NSF CCLI\/TUES Grant]<\/b><\/p>\n<p>[30]<sup>IV<\/sup> <b>N. Meghanathan<\/b>, &#8220;Workshop: Incorporating Aspects of Systems and Software Security in Software Engineering Projects,&#8221; <i>Journal of the Mississippi Academy of Sciences<\/i>, vol. 64, no. 1, p. 113, January 2013. <a href=\"http:\/\/msacad.org\/journal\/2013\/jan_2-5-13_final.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a> <b>[Publication as part of the NSF CCLI\/TUES Grant]<\/b><\/p>\n<p>[29]<sup>IV<\/sup> A. Overton, <b>N. Meghanathan<\/b> and R. Isokpehi, &#8220;A Binary Code-based Finite State Machine Model to Determine Ancestor-Descendant Relationships in Directed Acyclic Graphs,&#8221; <i>Proceedings of the ACM-Mid Southeast Conference<\/i>, p. 49, Gatlinburg, TN, November 2012. <a href=\"..\/docs\/Abstracts\/Andrew-2012-ACM-Midsoutheast-Abstract.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a> <b>[Publication as part of the NSF REU and MS EPSCoR Grants]<\/b><\/p>\n<p>[28]<sup>IV<\/sup> S. Thumma and <b>N. Meghanathan<\/b>, &#8220;Secure Software Design and Development Incorporating Role-based Access Control, Cryptographic Storage and Validation, and Parameterized SQL Statements,&#8221; <i>Proceedings of the ACM-Mid Southeast Conference<\/i>, p. 57, Gatlinburg, TN, November 2012. <a href=\"..\/docs\/Abstracts\/Sandeep-2012-ACM-Midsoutheast-Abstract.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a> <b>[Publication as part of the NSF CCLI\/TUES Grant]<\/b><\/p>\n<p>[27]<sup>IV<\/sup> M. Bailey and <b>N. Meghanathan<\/b>, &#8220;Implementation of a Virtual Network for Cloud Computing,&#8221; <i>Proceedings of the ACM-Mid Southeast Conference<\/i>, p. 63, Gatlinburg, TN, November 2012. <a href=\"..\/docs\/Abstracts\/Markus-2012-ACM-Midsoutheast-Abstract.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a><b>[Publication as part of the NSF REU Grant]<\/b><\/p>\n<p>[26]<sup>IV<\/sup> <b>N. Meghanathan<\/b>, &#8220;Information Hiding through Cover Generation using Context-Free Grammar,&#8221; <i>Journal of the Mississippi Academy of Sciences<\/i>, vol. 63, no. 1, p. 127, January 2012. <a href=\"..\/docs\/Abstracts\/MAS-2012-Abstracts.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a> <b>[Publication as part of the NSF CCLI\/TUES Grant]<\/b><\/p>\n<p>[25]<sup>IV<\/sup> B. Chess, P. Fly, A. Moncrief, J. White, H. Kim and <b>N. Meghanathan<\/b>, &#8220;A Secure Online Student-Advisor Appointment Management and Registration System,&#8221; <i>Journal of the Mississippi Academy of Sciences<\/i>, vol. 57, no. 1, p. 127, January 2012. <a href=\"..\/docs\/Abstracts\/MAS-2012-Abstracts.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a> <b>[Publication as part of the NSF CCLI\/TUES Grant]<\/b><\/p>\n<p>[24]<sup>IV<\/sup> J. Bouldin, J. Etheredge, J. Harris, H. Kim and <b>N. Meghanathan<\/b>, &#8220;Simulation of a Secure Touch-Screen Kiosk System for Amusement Park Planning,&#8221; <i>Journal of the Mississippi Academy of Sciences<\/i>, vol. 57, no. 1, p. 127, January 2012. <a href=\"..\/docs\/Abstracts\/MAS-2012-Abstracts.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a> <b>[Publication as part of the NSF CCLI\/TUES Grant]<\/b><\/p>\n<p>[23]<sup>IV<\/sup> A. Komilov and <b> N. Meghanathan<\/b>, &#8220;Development of a Web-based Application to Remotely Access the Computer Network Systems and Security Research and Education Modules at Jackson State University,&#8221; <i> Proceedings of the ACM-Mid Southeast Conference<\/i>, Gatlinburg, TN, November 2011. <b>[Publication as part of the NSF CCLI\/TUES Grant]<\/b><\/p>\n<p>[22]<sup>IV<\/sup> <b>N. Meghanathan<\/b> and R. Isokpehi, &#8220;A Cross-Reference Data Mining Study of the Universal Stress Protein Datasets of Viridiplantae,&#8221; presented at <i>The 8th Annual Conference of the Mid-South Computational Biology and Bioinformatics Society (MCBIOS 2011)<\/i>, College Station, TX, USA, April 1-2, 2011. <a href=\"..\/docs\/Abstracts\/MCBIOS-2011-Abstracts.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a> <b>[Publication as part of the NSF MS EPSCoR Grant]<\/b><\/p>\n<p>[21]<sup>IV<\/sup> <b>N. Meghanathan<\/b> and R. Isokpehi, &#8220;On the Variations in the Cytotoxicity of Gold Nanoparticles of Different Shapes,&#8221; presented at <i>The 8th Annual Conference of the Mid-South Computational Biology and Bioinformatics Society (MCBIOS 2011)<\/i>, College Station, TX, USA, April 1-2, 2011. <a href=\"..\/docs\/Abstracts\/MCBIOS-2011-Abstracts.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PDF<\/a> <b>[Publication as part of the NSF MS EPSCoR Grant]<\/b><\/p>\n<p>[20]<sup>IV<\/sup> P. Fly, <b>N. Meghanathan<\/b> and R. Isokpehi, &#8220;Implementation of the Binary Coding Scheme to Test for Ancestor-Descendant Relationships in K-ary Trees,&#8221; <i>The 8th Annual Conference of the Mid-South Computational Biology and Bioinformatics Society (MCBIOS 2011)<\/i>, College Station, TX, USA, April 1-2, 2011. <b>[Publication as part of the NSF MS EPSCoR Grant]<\/b><\/p>\n<p>[19]<sup>IV<\/sup> J. Bouldin, S. Thumma, A. R. Geoghegan, M. Challagundla and <b>N. Meghanathan<\/b>, &#8220;A Preliminary Design of a Virtual Security Laboratory for Information Systems and Software Engineering Projects,&#8221; <i> Journal of the Mississippi Academy of Sciences<\/i>, vol. 56, no. 1, p. 100, February 2011.<b>[Publication as part of the NSF CCLI\/TUES Grant] <\/b><\/p>\n<p>[18]<sup>III<\/sup> P. Fly, <b>N. Meghanathan<\/b> and R. Isokpehi, &#8220;Use of Binary Codes to Determine Ancestor-Descendant Relationships in K-ary Trees,&#8221; <i> Journal of the Mississippi Academy of Sciences<\/i>, vol. 56, no. 1, p. 102, February 2011. <b>[Publication as part of the NSF MS EPSCoR Grant]<\/b><\/p>\n<p>[17]<sup>IV<\/sup> M. Challagundla, J. Bouldin, A. R. Geoghegan, <b>N. Meghanathan<\/b> and H. Kim, &#8220;Role of Misuse Case Diagrams in Analyzing the Security Requirements of a Software Engineering Project,&#8221; <i> Journal of the Mississippi Academy of Sciences<\/i>, vol. 56, no. 1, p. 103, February 2011. <b>[Publication as part of the NSF CCLI\/TUES Grant] <\/b><\/p>\n<p>[16]<sup>II<\/sup> B. Torres, Q. Pang, G. Skelton, S. Bridges and <b> N. Meghanathan <\/b>, &#8220;Integration of an RFID Reader to a Wireless Sensor Network and the Use of it to Identify an Individual Carrying RFID Tags,&#8221; abstract presented at the <i> SACNAS (Society for Advancement of Chicanos and Native Americans in Science) National Conference<\/i>, September 30 &#8211; October 3, 2010; poster presented at the <i> 2010 AGMUS Research Symposium <\/i>, September 10-11, 2010. <b>[Publication as part of the NSF REU Grant]<\/b><\/p>\n<p>[15]<sup>IV<\/sup> N. Kostyuk, <b> N. Meghanathan<\/b>, R. Isokpehi and H. H. P. Cohly, &#8220;Functional Status of Organ Systems in Mitral Valve Prolapse,&#8221; poster presented at the <i> Jackson Heart Study 2010 Scientific Conference<\/i>, September 23-24, 2010.<\/p>\n<p>[14]<sup>IV<\/sup> <b> N. Meghanathan<\/b>, N. Kostyuk, H. H. P. Cohly and R. D. Isokpehi, &#8220;A Clustering Model for English Language Anxiety in Non-Native Speakers,&#8221; Proceedings of <i>The 7th Annual Conference of the Mid-South Computational Biology and Bioinformatics Society (MCBIOS 2010)<\/i>, p. 34, Jonesboro, AR, USA, February 2010. <b>[Publication as part of the NSF MS EPSCoR Grant]<\/b><\/p>\n<p>[13]<sup>IV<\/sup> <b> N. Meghanathan<\/b>, N. Kostyuk, H. H. P. Cohly and R. D. Isokpehi, &#8220;Quadrant-Based Modeling for Assessing Functional State of Human Organ Systems,&#8221; Proceedings of <i>The 7th Annual Conference of the Mid-South Computational Biology and Bioinformatics Society (MCBIOS 2010)<\/i>, p. 98, Jonesboro, AR, USA, February 2010. <b>[Publication as part of the NSF MS EPSCoR Grant]<\/b><\/p>\n<p>[12]<sup>I<\/sup> <b>N. Meghanathan<\/b> and S. Gorla, &#8220;On the Probability of k-Connectivity in Mobile Ad hoc Networks,&#8221; <i> Journal of the Mississippi Academy of Sciences<\/i>, vol. 55, no. 1, p. 112, February 2010.<\/p>\n<p>[11]<sup>IV<\/sup> N. Kostyuk, R. Rajnarayanan, R. Isokpehi, <b> N. Meghanathan <\/b>, T. Bell and H. H. P. Cohly, &#8220;Non-invasive, Real-Time, Mobile Biometrics Device: Pilot Evaluation Studies,&#8221; Proceedings of <i> The 7th Annual Conference of the Mid-South Computational Biology and Bioinformatics Society (MCBIOS 2010)<\/i>, p. 87, Jonesboro, AR, USA, February 2010.<\/p>\n<p>[10]<sup>I<\/sup> J. Miller and <b> N. Meghanathan<\/b>, &#8220;Determining Maximum Vehicular Flow for City Evacuation Planning,&#8221; abstract poster presented at the Winter Simulation Conference, Austin, TX, December 2009. <b>[Publication as part of the NSF REU Grant]<\/b><\/p>\n<p>[9]<sup>I<\/sup> D. Thomas, E. S. Addison and <b> N. Meghanathan<\/b>, &#8220;Development of the Multicast Flow Oriented Routing Protocol for Mobile Ad hoc Networks,&#8221; <i> Proceedings of the ACM-Mid Southeast Conference<\/i>, p. 30, Gatlinburg, TN, November 2009. <b>[Publication as part of the NSF REU Grant]<\/b><\/p>\n<p>[8]<sup>II<\/sup> J. Henderson and <b>N. Meghanathan<\/b>, &#8220;An Energy-aware Grid-Cluster Based Data Gathering Protocol for Wireless Sensor Networks,&#8221; <i> Proceedings of the ACM-Mid Southeast Conference<\/i>, p. 36, Gatlinburg, TN, November 2009. <b>[Publication as part of the NSF REU Grant]<\/b><\/p>\n<p>[7]<sup>IV<\/sup> P. Fly and <b> N. Meghanathan<\/b>, &#8220;Implementation of Binary Tree Structures using Binary Codes,&#8221; <i> Proceedings of the ACM-Mid Southeast Conference<\/i>, p. 50, Gatlinburg, TN, November 2009.<\/p>\n<p>[6]<sup>I<\/sup> M. C. Matthews and <b>N. Meghanathan<\/b>, &#8220;Probability of Connectivity in a Grid Network of Wireless Nodes,&#8221; <i> Proceedings of the HBCU-UP 2009 Conference<\/i>, p. A76, # 112, Washington DC, USA, October-November 2009.<\/p>\n<p><span style=\"font-size: 14px;\"><span style=\"line-height: 20.7999992370605px;\">[5]<sup>IV<\/sup> T.\u00a0Oyeleye, R. D. Isokpehi, N. Meghanathan, H.\u00a0H. P. Cohly and T. Pei<span style=\"line-height: 20.7999992370605px;\">, &#8220;Bioinformatics Tools Categorizer,&#8221;\u00a0<\/span><i style=\"font-size: 13px; line-height: 20.7999992370605px;\">Proceedings of the <\/i><em>Sixth International Symposium on Recent Advances in Environmental Health Research<\/em><span style=\"line-height: 20.7999992370605px;\">, PA-48, Jackson, MS,\u00a0USA, September 2<\/span><\/span><span style=\"line-height: 20.7999992370605px;\">009.\u00a0<\/span><a href=\"http:\/\/ehr.cset.jsums.edu\/6cd\/StudentPdf\/Students%20Abstracts%2048.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Link<\/a> <\/span><\/p>\n<p>[4]<sup>IV<\/sup> S. Allam and <b>N. Meghanathan<\/b>, &#8220;Development of an Automated Web-based Faculty Performance Evaluation Instrument,&#8221; <i> Journal of the Mississippi Academy of Sciences<\/i>, vol. 54, no. 1, p. 88, February 2009.<\/p>\n<p>[3]<sup>III<\/sup> <b>N. Meghanathan<\/b>, &#8220;Digital Medical Image Indexing using Attributed Relational Graph and Rectangular Tree,&#8221; <i> Proceedings of the ACM Mid-Southeast Conference<\/i>, p. 70, Gatlinburg, TN, November 20 &#8211; 21, 2008.<\/p>\n<p>[2]<sup>I<\/sup> <b>N. Meghanathan<\/b> and K. Mudunuri, &#8220;Simulation-based Analysis of the Bandwidth Usage and Number of Hops per Receiver for Mobile Ad Hoc Network Multicast Routing Protocols,&#8221; <i> Journal of the Mississippi Academy of Sciences<\/i>, vol. 53, no. 1, p. 98, January 2008.<\/p>\n<p>[1]<sup>I<\/sup> <b>N. Meghanathan<\/b>, &#8220;An Algorithm to Determine the Sequence of Stable Multicast Trees in Mobile Ad Hoc Networks,&#8221; <i>Journal of the Mississippi Academy of Sciences<\/i>, vol. 51, no. 1, p. 92, February 2006.<\/p>\n<h3><u><a name=\"PublicationProfile\"><\/a>Peer-reviewed Publication Profile of Natarajan Meghanathan<\/u><\/h3>\n<table border=\"1\">\n<tbody>\n<tr>\n<th><span style=\"font-size: 12px; font-weight: normal;\">No.<\/span><\/th>\n<th><span style=\"font-size: 12px; font-weight: normal;\">Research Area<\/span><\/th>\n<th><span style=\"font-size: 12px; font-weight: normal;\">Journal Papers<\/span><\/th>\n<th><span style=\"font-size: 12px; font-weight: normal;\">Conference Papers<\/span><\/th>\n<th><span style=\"font-size: 12px; font-weight: normal;\">Abstracts<\/span><\/th>\n<th><span style=\"font-size: 12px; font-weight: normal;\">\u00a0\u00a0Book Chapters<\/span><\/th>\n<th><span style=\"font-size: 12px; font-weight: normal;\">Books\/Videos<\/span><\/th>\n<\/tr>\n<tr>\n<td><span style=\"font-size: 12px;\">I<\/span><\/td>\n<td><span style=\"font-size: 12px;\">Wireless Ad hoc Networks<\/span><\/td>\n<td><span style=\"font-size: 12px;\">36<\/span><\/td>\n<td><span style=\"font-size: 12px;\">44<\/span><\/td>\n<td><span style=\"font-size: 12px;\">7<\/span><\/td>\n<td><span style=\"font-size: 12px;\">8<\/span><\/td>\n<td><span style=\"font-size: 12px;\">3<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-size: 12px;\">II<\/span><\/td>\n<td><span style=\"font-size: 12px;\">Wireless Sensor Networks<\/span><\/td>\n<td><span style=\"font-size: 12px;\">23<\/span><\/td>\n<td><span style=\"font-size: 12px;\">13<\/span><\/td>\n<td><span style=\"font-size: 12px;\">2<\/span><\/td>\n<td><span style=\"font-size: 12px;\">7<\/span><\/td>\n<td><span style=\"font-size: 12px;\">0<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-size: 12px;\">III<\/span><\/td>\n<td><span style=\"font-size: 12px;\">Network Science and Graph Theory<\/span><\/td>\n<td><span style=\"font-size: 12px;\">44<\/span><\/td>\n<td><span style=\"font-size: 12px;\">21<\/span><\/td>\n<td><span style=\"font-size: 12px;\">2<\/span><\/td>\n<td><span style=\"font-size: 12px;\">6<\/span><\/td>\n<td><span style=\"font-size: 12px;\">4<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-size: 12px;\">IV<\/span><\/td>\n<td><span style=\"font-size: 12px;\">Other Areas: Binformatics, Cyber Security<\/span><\/td>\n<td><span style=\"font-size: 12px;\">4<\/span><\/td>\n<td><span style=\"font-size: 12px;\">15<\/span><\/td>\n<td><span style=\"font-size: 12px;\">26<\/span><\/td>\n<td><span style=\"font-size: 12px;\">6<\/span><\/td>\n<td><span style=\"font-size: 12px;\">2<\/span><\/td>\n<\/tr>\n<tr>\n<td><\/td>\n<td><span style=\"font-size: 12px;\">Total Publications <\/span><\/td>\n<td><span style=\"font-size: 12px;\">107<\/span><\/td>\n<td><span style=\"font-size: 12px;\">93<\/span><\/td>\n<td><span style=\"font-size: 12px;\">37<\/span><\/td>\n<td><span style=\"font-size: 12px;\">27<\/span><\/td>\n<td><span style=\"font-size: 12px;\">9<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Areas of Research Interests Wireless Ad hoc NetworksI, \u00a0 Sensor NetworksII, \u00a0 Network Science and Graph TheoryIII, \u00a0\u00a0 Other Areas (incl. Bioinformatics, Cyber Security)IV Peer-reviewed Journal Papers Peer-reviewed Conference Papers Books\/Videos Book Chapters Abstracts and Poster Presentations Publication Profile Peer-reviewed Journals [107]III N. Meghanathan, \u201cA Comprehensive Analysis of the Correlation between Maximal Clique Size and [&hellip;]<\/p>\n","protected":false},"author":168,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.jsums.edu\/nmeghanathan\/wp-json\/wp\/v2\/pages\/38"}],"collection":[{"href":"https:\/\/www.jsums.edu\/nmeghanathan\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.jsums.edu\/nmeghanathan\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.jsums.edu\/nmeghanathan\/wp-json\/wp\/v2\/users\/168"}],"replies":[{"embeddable":true,"href":"https:\/\/www.jsums.edu\/nmeghanathan\/wp-json\/wp\/v2\/comments?post=38"}],"version-history":[{"count":5,"href":"https:\/\/www.jsums.edu\/nmeghanathan\/wp-json\/wp\/v2\/pages\/38\/revisions"}],"predecessor-version":[{"id":3494,"href":"https:\/\/www.jsums.edu\/nmeghanathan\/wp-json\/wp\/v2\/pages\/38\/revisions\/3494"}],"wp:attachment":[{"href":"https:\/\/www.jsums.edu\/nmeghanathan\/wp-json\/wp\/v2\/media?parent=38"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}