BOOKS
[B6] N. Meghanathan (author and editor), Strategic Innovations and Interdisciplinary Perspectives in Telecommunications and Networking, 15 chapters (348 pages), IGI Global Publishers, Hershey, PA, USA, February 2019, ISBN: 9781522581888.
[B5] N. Meghanathan (author), Centrality Metrics for Complex Network Analysis: Emerging Research and Opportunities, 7 chapters (183 pages), IGI Global Publishers, Hershey, PA, USA, April 2018, ISBN: 9781522538028.
[B4] N. Meghanathan (editor), Graph Theoretic Approaches for Analyzing Large-Scale Social Networks, 17 chapters (355 pages), IGI Global Publishers, Hershey, PA, USA, July 2017, ISBN: 9781522528142.
[B3] N. Meghanathan (editor), Advanced Methods for Complex Network Analysis, 17 chapters (427 pages), IGI Global Publishers, Hershey, PA, USA, April 2016, ISBN: 9781466699649.
[B2] N. Meghanathan (author and editor), Recent Advances in Ad Hoc Networks Research, 10 chapters (234 pages), Nova Publishers, New York, USA, August 2014, ISBN: 978-1-63321-337-1.
[B1] N. Meghanathan (author and editor) and Y. B. Reddy (author and editor), Cognitive Radio Technology Applications for Wireless and Mobile Ad hoc Networks, 15 chapters (370 pages), IGI Global Publishers, Hershey, PA, USA, June 2013, ISBN: 978-1-46664-221-8.
BOOK CHAPTERS
[BC23] Y. Wu and N. Meghanathan, "A Hybrid Approach for Urban Crime Analysis: Combining Machine Learning and Network Science," in Artificial Intelligence driven Forensics, Iyengar, S. S., Furton, K. G., Mohanty, P., and Chaudhary, N. K. Eds. Springer Nature, 2025, Chapter 13, pp. 181-196.
[BC22] N. Meghanathan, "Canonical Correlation Analysis and Exploratory Factory Analysis of the Four Major Centrality Metrics," in Big Data, Data Mining and Data Science, Dimitoglou, G., Deligiannidis, L., R. Arabnia, H. and P. Tafti, A. Eds. De Gruyter, 2024, Chapter 4, pp. 51-71.
[BC21] N. Meghanathan, "Binary Search Approach for Largest Cascade Capacity of Complex Network," Chapter 150, pp. 2500-2513, Encyclopedia of Data Science and Machine Learning, Editor: John Wang, IGI, June 2022.
[BC20] N. Meghanathan and M. Terrell, "Design of a Secure Framework for Session Mobility as a Service in Cloud Computing Environment," Chapter 27, pp. 475-490, Computer and Network Security Essentials, Editor: Kevin Daimi, Springer, 2018.
[BC19] N. Meghanathan, "Biometrics for User Authentication," Chapter 18, pp. 317-335, Computer and Network Security Essentials, Editor: Kevin Daimi, Springer, 2018.
[BC18] N. Meghanathan, "A Graph Intersection-based Algorithm to Determine Maximum Lifetime Communication Topologies for Cognitive Radio Ad hoc Networks," Chapter 567, Encyclopedia of Information Science and Technology, Editor: Mehdi Khosrow-Pour, IGI Global, 2017.
[BC17] N. Meghanathan, "Clique Size and Centrality Metrics for Analysis of Real-World Network Graphs," Chapter 565, Encyclopedia of Information Science and Technology, Editor: Mehdi Khosrow-Pour, IGI Global, 2017.
[BC16] N. Meghanathan, "Centralized and Distributed Algorithms for Stable Communication Topologies in Cognitive Radio Ad hoc Networks," Chapter 6, pp. 153-182, Spectrum Access and Management for Cognitive Radio Networks, Editor: Mohammad A. Matin, Springer, 2017.
[BC15] N. Meghanathan, "Diameter-Aggregation Delay Tradeoff for Data Gathering Trees in Wireless Sensor Networks," Chapter 10, pp. 239-255, Handbook of Research on Wireless Sensor Network Trends, Technologies, and Applications, Editor: Narendra Kumar Kamila, IGI Global, July 2016.
[BC14] N. Meghanathan, "Eigenvector Centrality-Based Mobile Target Tracking in Wireless Sensor Networks," Chapter 16, pp. 394-411, Handbook of Research on Wireless Sensor Network Trends, Technologies, and Applications, Editor: Narendra Kumar Kamila, IGI Global, July 2016.
[BC13] N. Meghanathan, "Impact of the Structure of the Data Gathering Trees on Node Lifetime and Network Lifetime in Wireless Sensor Networks," Chapter 7, pp. 192-204, Handbook of Research on Advanced Wireless Sensor Network Applications, Protocols, and Architectures, Editors: Niranjan Ray and Ashok Turuk, IGI Global, July 2016.
[BC12] N. Meghanathan, "Distributed Data Gathering Algorithms for Mobile Sensor Networks," Chapter 13, pp. 329-359, Emerging Communication Technologies Based on Wireless Sensor Networks: Current Research and Future Applications, Editors: Mubashir Husain Rehmani and Al-Sakib Khan Pathan, CRC Press, April 2016.
[BC11] N. Meghanathan, "A Pairwise Key Distribution Mechanism and Distributed Trust Evaluation Model for Secure Data Aggregation in Mobile Sensor Networks," Chapter 12, pp. 299-328, Emerging Communication Technologies Based on Wireless Sensor Networks: Current Research and Future Applications, Editors: Mubashir Husain Rehmani and Al-Sakib Khan Pathan, CRC Press, April 2016.
[BC10] N. Meghanathan, "Virtualization as The Catalyst for Cloud Computing," Chapter 105, pp. 304-320, Encyclopedia of Information Science and Technology, Third Edition, Editor: Mehdi Khosrow-Pour, ISBN: 1466658886, DOI: 10.4018/978-1-4666-5888-2, IGI Global Publishers, Hershey, PA, USA, July 2014.
[BC9] N. Meghanathan, "Algorithms to Determine Stable Connected Dominating Sets for Mobile Ad hoc Networks," Chapter 9, pp. 249-274,Wireless Communications and Networking: Theory and Practice, Editor: M. Matin, ISBN: 1466651709, DOI: 10.4018/978-1-4666-5170-8.ch009, IGI Global Publishers, Hershey, PA, USA, February 2014.
[BC8] N. Meghanathan and P. Mumford, "Graph Intersection-based Benchmarking Algorithm for Maximum Stability Data Gathering Trees in Wireless Mobile Sensor Networks," Chapter 17, pp. 433-458, Wireless Communications and Networking: Theory and Practice, Editor: M. Matin, ISBN: 1466651709, DOI: 10.4018/978-1-4666-5170-8.ch017, IGI Global Publishers, Hershey, PA, USA, February 2014.
[BC7] N. Meghanathan, "Network Security: Attacks and Controls," Chapter 11, pp. 174-203, Network Security Technologies: Design and Applications, Editors: A. Amine, O. Ait Mohamed and B. Benatallah, ISBN: 1466647892, IGI Global Publishers, Hershey, PA, USA, November 2013.
[BC6] N. Meghanathan, “Data Gathering Algorithms for Wireless Sensor Networks,” Chapter 13: pp. 353-376, Wireless Sensor Networks: Current Status and Future Trends, Editors: S. Khan, A-S. Khan Pathan and N. A. Alrajeh, ISBN: 978-1-4665-0606-0, CRC Press, Taylor & Francis Group, USA, November 2012.
[BC5] N. Meghanathan, “Topology-based Classification of Multicast Routing Protocols for Mobile Ad hoc Networks,” Chapter 7: pp. 116-143, Technological Advancements and Applications in Mobile Ad hoc Networks: Research Trends, Editor: Kamaljit Lakhtaria, ISBN: 978-1-4666-0321-9, IGI Global Publishers, Hershey, PA, USA, March 2012.
[BC4] N. Meghanathan and A. R. Geoghegan, “A Case Study on Testing for Software Security: Static Code Analysis of a File Reader Program Developed in Java,” Chapter 5: pp. 89-112, Advanced Automated Software Testing: Frameworks for Refined Practice, Editor: Izzat Alsmadi, ISBN: 978-1-4666-0089-8, 270 pages, IGI Global Publishers, Hershey, PA, USA, January 2012. [Publication as part of the NSF CCLI/TUES Grant]
[BC3] N. Meghanathan, “Applications of Graph Theory Algorithms in Mobile Ad hoc Networks,” Chapter 4: pp. 98-125, Mobile Computing Techniques in Emerging Markets: Systems, Applications and Services, Editors: A. V. Senthil Kumar and Hakikur Rehman, 358 pages, IGI Global Publishers, Hershey, PA, USA, January 2012.
[BC2] N. Meghanathan, “A Location Prediction Based Routing Protocol and its Extensions for Multicast and Multi-path Routing in Mobile Ad hoc Networks,” Chapter 12: pp. 217-242, Mobile Ad-Hoc Networks: Protocol Design, Editor: Xin Wang, ISBN: 978-953-307-402-3, 656 pages, In-Tech Education and Publishing, Vienna, Austria, January 2011.
[BC1] N. Meghanathan, “Greedy Algorithms to Determine Stable Paths and Trees in Mobile Ad hoc Networks,” Chapter 14: pp. 253-272, Advances in Greedy Algorithms, Editor: Witold Bednorz, ISBN: 978-953-7619-27-5, 586 pages, In-Tech Education and Publishing, Vienna, Austria, November 2008.