关注
Kaushik Adhikary
Kaushik Adhikary
JIS University
在 jisuniversity.ac.in 的电子邮件经过验证
标题
引用次数
引用次数
年份
Hybrid algorithm to detect DDoS attacks in VANETs
K Adhikary, S Bhushan, S Kumar, K Dutta
Wireless Personal Communications 114 (4), 3613-3634, 2020
652020
Evaluating the performance of various SVM kernel functions based on basic features extracted from KDDCUP'99 dataset by random forest method for detecting DDoS attacks
K Adhikary, S Bhushan, S Kumar, K Dutta
Wireless Personal Communications, 1-19, 2022
112022
Decision tree and neural network based hybrid algorithm for detecting and preventing DDoS attacks in VANETS
K Adhikary, S Bhushan, S Kumar, K Dutta
International Journal of Innovative Technology and Exploring Engineering 5 …, 2020
92020
Recent techniques used for preventing DOS attacks in VANETs
K Adhikary, S Bhushan
2017 International Conference on Computing, Communication and Automation …, 2017
82017
Evaluating the impact of DDoS attacks in vehicular ad-hoc networks
K Adhikary, S Bhushan, S Kumar, K Dutta
International Journal of Security and Privacy in Pervasive Computing (IJSPPC …, 2020
62020
A Survey on Despeckling Methods
D Sood, A Kaur, K Adhikary
International Journal of Emerging Technology and Advanced Engineering 3 (7), 2013
52013
WiMAX Propagations
R Kumar, K Adhikary, R Vaid
Int. J. Comput. Sci. Eng. Technol 1 (8), 480-483, 2011
42011
Feature extraction and classification technique in neural network
K Adhikary, A Kuma
International Journal of Computer Applications 35 (3), 29-35, 2011
42011
Evaluating the performance of various machine learning algorithms for detecting DDOS attacks in vanets
K Adhikary, S Bhushan, S Kumar, K Dutta
International Journal of Control Automation 12 (5), 478-486, 2019
32019
An Automatic Method to Inspect Discontinuities in Textile
K Kaur, N Gupta, K Adhikary
International Journal of Computer Science Engineering & Technology 1 (8), 2011
22011
Survey on Architecture of Peer-to-Peer Network
K Adhikary, A Bindal, G Kaur
International Journal of Computer Technology and Applications 2 (6), 3089-3096, 2011
22011
Securing Bandwidth Request Messages in Wimax
K Adhikary, R Kumar, A Kumar
International Journal of Computer Applications 975, 8887, 2011
12011
VERSIONS OF 802.16
R Kumar, K Adhikary, MR Vaid
J. Comp. ech. Appl. 2 (5), 1290-1296, 2011
12011
Behavioral Analysis of a Proposed Reputation System for Peer-to-Peer Network
S Bagga, C Jain, K Adhikary
International Journal of Computer Applications 66 (23), 2013
2013
Efficient Hybrid Techniques to Detect and Prevent Distributed Denial of Service Attacks in Vehicular Ad Hoc Networks
K Adhikary
Kapurthala, 0
Authentication Mechanism for Bandwidth Request Messages in Wi-MAX
MR Vaid, K Adhikary, R Kumar
系统目前无法执行此操作,请稍后再试。
文章 1–16