Shiho Kim, and Rakesh Shrestha, “Automotive Cyber Security Introduction, Challenges, and Standardization”, Book, Springer Singapore, pp. 216, 2020. DOI: 10.1007/978-981-15-8053-6.
Rakesh Shrestha and Shiho Kim, "Integration of IoT, Blockchain and Homomorphic Encryption: Research Issues and Challenges" in Advances in Computers, ADCOM: Role of Blockchain Technology in IoT Applications, Elsevier, volume 115, pp. 293-331, 2019.
A. Mishra, R. Shrestha, S. Kim, N. S. Rajput, “Blockchain For Intelligent Gas Monitoring In Smart City Scenario”, Book Chapter, Springer 2020.
Ojha, Gopal, Rohit Kumar, Rojeena Bajracharya, and Rakesh Shrestha. "Distributed Ledger Technology: Use Cases, Design, and Implementation Issues." In Security and Privacy in Cyberspace, pp. 115-135. Springer, Singapore, 2022.
Gautam, Rishabh, Rakesh Shrestha, Shruti Mishra, and Jitendra Kumar Singh. "Blockchain Enabled Vehicle Anti-theft System." In Security and Privacy in Cyberspace, pp. 209-226. Springer, Singapore, 2022.
R. Shrestha, R. Bajracharya and S. Kim, "6G Enabled Unmanned Aerial Vehicle Traffic Management: A Perspective," in IEEE Access, vol. 9, pp. 91119-91136, 2021.
Bajracharya, R., Shrestha, R., Jung, H., & Shin, H. (2022). Neutral Host Technology: The Future of Mobile Network Operators. IEEE Access.
R. Bajracharya, R. Shrestha, and H. Jung, “Bandit Approach for Fair and Efficient Coexistence of NR-U in Unlicensed Band” IEEE Transactions on Vehicular Technology, 2022 [under revision]
R. Bajracharya, R. Shrestha, S. A. Hassan, K. Konstantin and H. Jung, "Dynamic Pricing for Intelligent Transportation System in the 6G Unlicensed Band," in IEEE Transactions on Intelligent Transportation Systems, doi: 10.1109/TITS.2021.3120015.
Rojeena Bajracharya, Rakesh Shrestha, Syed Ali Hassan, Kostromitin Konstantin and Haejoon Jung, “Dynamic Pricing for Intelligent Transportation System in the 6G Unlicensed Band”, IEEE Transactions on Intelligent Transportation Systems, October 2021. (Accepted)
Rojeena Bajracharya, Rakesh Shrestha, Syed Ali Hassan, Haejoon Jung, Rafay Iqbal Ansari and Mohsen Guizani, “Unlocking Unlicensed Band Potential to Enable URLLC in Cloud Robotics for Ubiquitous IoT”, IEEE Networks, July 2021.
Shrestha R, Omidkar A, Roudi SA, Abbas R, Kim S. Machine-Learning-Enabled Intrusion Detection System for Cellular Connected UAV Networks. Electronics. 2021; 10(13):1549.
Rakesh Shrestha, Inseon Oh and Shiho Kim, A Survey on Operation Concept, Advancements, and Challenging Issues of Urban Air Traffic Management, Front. Future Transp. - Transportation Systems Modeling, 2021.
Rakesh Shrestha, Seung Yeob Nam, Rojeena Bajracharya, and Shiho Kim, "Evolution of V2X Communication and Integration of Blockchain for Security Enhancements," Electronics, vol. 9, no. 9, article No. 1338, Aug. 2020. [SCI/E Indexed, Impact Factor = 2.412]
Narayan Khatri, Rakesh Shrestha, Seung Yeob Nam, "Security Issues with In-Vehicle Networks, and Enhanced Countermeasures Based on Blockchain" Electronics, vol. 9, no. 9, article No. 1338, Aug. 2021. [SCI/E Indexed, Impact Factor = 2.412]
Bajracharya, R.; Shrestha, R.; Jung, H. Future Is Unlicensed: Private 5G Unlicensed Network for Connecting Industries of Future. Sensors 2020, 20, 2774. [SCI/E Indexed, Impact Factor = 3.275].
Rakesh Shrestha and Seung Yeob Nam, "Regional Blockchain for Vehicular Networks to Prevent 51% Attacks", in IEEE Access, 2019. [SCI/E Indexed, Impact Factor = 4.640]
Rojeena Bajracharya, Rakesh Shrestha and Sung Won Kim, "Q-learning Based Fair and Efficient Coexistence of LTE in Unlicensed Band", in MDPI Sensors, 2019. [SCI/E Indexed, Impact Factor = 3.275 ]
Rakesh Shrestha, Rojeena Bajracharya, and Seung Yeob Nam, “A New-Type of Blockchain for Secure Message Exchange in VANET”, in Digital Communication and Networks Journal, 2019. (Best Paper Award)
Rakesh Shrestha, Rojeena Bajracharya, and Seung Yeob Nam, “Challenges of Future VANET and Cloud-Based Approaches”, in Wireless Communications and Mobile Computing, Hindawi Journal, pp1-15, 2018. [SCI/E Indexed, Impact Factor = 1.819 ]
R. Bajracharya, R. Shrestha, R. Ali, A. Musaddiq, and S. W. Kim, “LWA in 5G: State-of-the-art architecture, opportunities, and research challenges,“IEEE Communications Magazine. [SCI/E Indexed, Impact Factor = 12.730]
Rojeena Bajracharya, Rakesh Shrestha and Sung Won Kim, “Admission Control Mechanism for LWA in 5G” in “MDPI sustainability”, vol. 10, no.6, pp. 1-13,Jun 2018. [SCI/E Indexed, Impact Factor = 2.592]
Rakesh Shrestha, and Seung Yeob Nam, “Trustworthy Event-Information Dissemination in Vehicular Ad-Hoc Networks”, in Mobile Information System Journal, Hindawi Journal, pp 1-16, Nov.2017. [SCI/E Indexed, Impact Factor = 1.508]
Rakesh Shrestha and Seung Yeob Nam, "Access Point Selection Mechanism to Circumvent Rogue Access Points Using Voting-based Query Procedure," IET Communications, vol. 8, no. 16, pp. 2943-2951, Nov. 2014. [SCI, Impact Factor = 2.100].
Rakesh Shrestha, Rojeena Bajracharya, Sirojiddin Djuraev, Seung Yeob Nam, and Kyu-Seek Sohn, "Performance Evaulation of Heterogeneous VANET Based On Simulation," Far East Journal of Electronics and Communications, vol. SV2, pp. 155-162, Sep. 2016. [Scopus]
Rojeena Bajracharya, Rakesh Shrestha, Y. B. Zikria and S. W. Kim, “LTE in the Unlicensed Spectrum: A Survey,” IETE Technical Review, vol. 35(1), pp. 78-90, November 2016. [SCI/E Indexed, Impact Factor = 1.845 ]
R. Bajracharya, R. Shrestha, R. Ali, and S. W. Kim, “Power Saving Scheme For Wi-Fi Access Points,” Far East Journal of Electronics and Communications, vol. 2, no. 2016, pp. 43-51, September 2016. [Scopus]
R. Bajracharya, R. Shrestha and S. W. Kim, "Impact of Contention based LAA on Wi-Fi Network ," Information ,vol. 20, no.2(A), pp.827-836, February 2017.
Rakesh Shrestha, Sirojiddin Djuraev, and Seung Yeob Nam, "Sybil Attack Detection in Vehicular Network Based On Received Signal Strength," The 3-rd International Conference on Connected Vehicles and Expo (ICCVE), Vienna, Austria, Nov. 2014.
Rakesh Shrestha, Rojeena Bajracharya, Sirojiddin Djuraev, and Seung Yeob Nam, "Performance Evaluation of Heterogeneous Vehicular Ad-Hoc Networks," International Conference on Advanced Computing, Communication and Information Sciences (ICACCI-2016), Cebu, Philippines, May. 27-29, 2016. (Best Paper Award).
Sirojiddin Juraev, Rakesh Shrestha, and Seung Yeob Nam, "Enhanced MR-ARP to Prevent ARP Cache Poisoning Attack in Wired Network," International Conference on Computer Networks and Information Technology, Bangkok, Thailand, June 2013.
R. Bajracharya, R. Shrestha, and S. W. Kim, "Performance Evaluation of Contention Based LTE and Wi-Fi Network in Unlicensed Band," The 2nd International Integrated (Web & Offline) Conference & Concert on Convergence (IICCC-2016), Saint Petersburg, Russia, August. 07-14, 2016. (Best Paper Award).
Bajracharya, R. Shrestha, R. Ali, and S. W. Kim, "Dynamic Switch-Off Technique for Energy Efficient 802.11 Access Network," International Conference on Advanced Computing, Communication and Information Science (ICACCI-2016), Cebu, Philippine, May. 27-29, 2016.
R. Bajracharya, R. Shrestha, Y. B. Zikria and S. W. Kim, "LTE or LAA: Choosing Network Mode for My Mobile Phone in 5G Network," in 2017 IEEE 85th Vehicular Technology Conference- VTC2017 (RAFNET), Sydney, Australia, June. 4-7, 2017.
Rakesh Shrestha, Dong-You Choi, Seung-Jo-Han, “A Novel Cross Layer Intrusion Detection System in MANET”, Advanced Information Networking and Applications, Perth, Australia 2010.
R. Shrestha, J. Y. Sung, S. D. Lee, P. Sik-Yun, D. Y. Choi and S. J. Han, "A Secure Intrusion Detection System with Authentication in Mobile Ad hoc Network," 2009 Pacific-Asia Conference on Circuits, Communications and Systems, Chengdu, 2009, pp. 759-762.
R. Bajracharya, R. Shrestha, S. W. Kim, "LWA: The Best use of Unlicensed Band," In Proc. of International Conference on Advanced Computing, Communication and Information Science (ICACCI-2017), Daegu, Korea, May. 19-20, 2017.
Rojeena Bajracharya, Rakesh Shrestha, Sung Won Kim, “Licensed Assisted Access in 5G: Mode Selection”,12th International Workshop on Emerging ICT 2018, Nov 4-6, Daegu, South Korea.
Rakesh Shrestha, Rojeena Bajracharya, and Seung Yeob Nam, “Centralized Approach for Trustworthy Message Dissemination in VANET”, in IEEE/IFIP Network Operations and Management Symposium, Taipei, Taiwan, April 23-27 2018.
Rakesh Shrestha, Rojeena Bajracharya, and Seung Yeob Nam, “Blockchain-based Message Dissemination in VANET”, in IEEE ICCCS conference, Kathmandu, Nepal, October 25-27, 2018.
Rakesh Shrestha, Rojeena Bajracharya, Seung Yeob Nam and Shiho Kim, "Homomorphic Encryption for Future Intelligent and Autonomous Mobility:Survey and Perspective", 2019 IEEE Transportation Electrification Conference and EXPO Asia-Pacific, Jeju, South Korea.
R. Bajracharya, R. Shrestha, Y. A. Qadri and S. W. Kim, " Q-learning Based Fair Coexistence of C-V2X and 802.11p at 5.9GHz, Proceedings of 2019 IEMEK Symposium on Embedded Technology, May 30-31,2019, Jeju, South Korea.
. Rakesh Shrestha and Rojeena Bajracharya, “SmartCare: A Blockchain-based Smart Healthcare for Hospitals” Proceedings of 9th International Conference on Advanced Computing, Communication, and Information Sciences (ICACCI-2019), Dec 13,2019, Seoul, South Korea.
16. Gopal Ojha, Rohit Kumar, Rakesh Shrestha, “Smart Vault : Trustless Vault using IOT”,Proceedings of 9th International Conference on Advanced Computing, Communication, and Information Sciences (ICACCI-2019), Dec 13,2019, Seoul, South Korea.
1. R. Bajracharya, R. Shrestha, Y. A. Qadri and S. W. Kim, "Apparatus and method for adjusting duty cycle for coexistence of heterogeneous networks and recording medium for performing the method ", Republic of Korea Intellectual Property Office, South Korea, Reg. no. 10-2179791 on 2020. 11. 11.
Rakesh Shrestha, Sang-Duk Lee, Dong-You Choi, Seung-Jo-Han, Seong-Joo Lee, “A Secure Intrusion Detection System for Mobile Ad-Hoc Networks”, The Journal of The Korea Institute of Maritime Information & Communication Sciences, Vol. 13 No.1, January 2009, pp. 87-94.
Rakesh Shrestha, Sang-Duk Lee, Dong-You Choi, Seung-Jo-Han, “Detecting Jamming Attacks in MANET”, The Journal of the Korea Institute of Maritime Information & Communication Sciences, Vol. 13, No. 3, March 2009, pp. 482-488.
Rakesh Shrestha, Dong-You Choi, Seung-Jo-Han, “An Intrusion Detection System with Authentication approach in Mobile Ad-hoc Networks”, Journal of The Korea Institute of Information Security and Cryptology.
Rakesh Shrestha, Young Min Jeon, and Seung Yeob Nam, “Application of Blockchain Technique in Vehicular Networks for Secure Message Dissemination,” in the 27th Joint Conference on Communications and Information (JCCI), Busan, South Korea, April 26-28th, 2017.
Rakesh Shrestha, Kyu-jin Park, Kwang-chae Park, Dong-You Choi, Seung-Jo-Han “An Effective Intrusion Detection System for Mobile Ad-Hoc Network” The Korea Institute of Maritime Information & Communication Sciences Conference, Chosun University Gwangju, South korea, Vol 12, No.1, May 2008, pp.271-276.
Rakesh Shrestha, Kyung-heon Han, Dong-You Choi, Seung-Jo-Han, Sei-Seung Park, “An Approach for the Analysis of Jamming Attacks in MANET”, ITS conference, Seoul, November, 2008, pp. 585-589.
Rakesh Shrestha, Kyung-heon Han, Jong-yeop Sung, Kyu-jin Park, Dong-You Choi, Seung-Jo-Han, “An Intrusion Detection System in Mobile Ad-Hoc Networks with Enhanced Cross Layer Features”, KICS conference, Suncheon University, May 2009, pp. 264-268. (Best paper Award).
Djuraev Sirojiddin, Rakesh Shrestha, and Seung Yeob Nam, "Efficient Wi-Fi Jamming based on Partial Overlapping of Channels," KICS winter conference, Jan. 2018.
A. Mishra, R. Shrestha, S. Kim, “Normalized Difference based Intelligent Gas Monitoring” in the proceedings of 27thKorean Conference on Semiconductor (KCS), Seoul, 2020.
These papers are allowed for citation with proper citation format.
Disclaimer: These papers are made available as a means to ensure timely dissemination of scholarly and technical work on a non-commercial basis. Copyright and all rights therein are maintained by the authors or by other copyright holders, notwithstanding that they have offered their works here electronically. It is understood that all persons copying this information will adhere to the terms and constraints invoked by each author's copyright.