Hybrid algorithm to detect DDoS attacks in VANETs K Adhikary, S Bhushan, S Kumar, K Dutta Wireless Personal Communications 114 (4), 3613-3634, 2020 | 65 | 2020 |
Evaluating the performance of various SVM kernel functions based on basic features extracted from KDDCUP'99 dataset by random forest method for detecting DDoS attacks K Adhikary, S Bhushan, S Kumar, K Dutta Wireless Personal Communications, 1-19, 2022 | 11 | 2022 |
Decision tree and neural network based hybrid algorithm for detecting and preventing DDoS attacks in VANETS K Adhikary, S Bhushan, S Kumar, K Dutta International Journal of Innovative Technology and Exploring Engineering 5 …, 2020 | 9 | 2020 |
Recent techniques used for preventing DOS attacks in VANETs K Adhikary, S Bhushan 2017 International Conference on Computing, Communication and Automation …, 2017 | 8 | 2017 |
Evaluating the impact of DDoS attacks in vehicular ad-hoc networks K Adhikary, S Bhushan, S Kumar, K Dutta International Journal of Security and Privacy in Pervasive Computing (IJSPPC …, 2020 | 6 | 2020 |
A Survey on Despeckling Methods D Sood, A Kaur, K Adhikary International Journal of Emerging Technology and Advanced Engineering 3 (7), 2013 | 5 | 2013 |
WiMAX Propagations R Kumar, K Adhikary, R Vaid Int. J. Comput. Sci. Eng. Technol 1 (8), 480-483, 2011 | 4 | 2011 |
Feature extraction and classification technique in neural network K Adhikary, A Kuma International Journal of Computer Applications 35 (3), 29-35, 2011 | 4 | 2011 |
Evaluating the performance of various machine learning algorithms for detecting DDOS attacks in vanets K Adhikary, S Bhushan, S Kumar, K Dutta International Journal of Control Automation 12 (5), 478-486, 2019 | 3 | 2019 |
An Automatic Method to Inspect Discontinuities in Textile K Kaur, N Gupta, K Adhikary International Journal of Computer Science Engineering & Technology 1 (8), 2011 | 2 | 2011 |
Survey on Architecture of Peer-to-Peer Network K Adhikary, A Bindal, G Kaur International Journal of Computer Technology and Applications 2 (6), 3089-3096, 2011 | 2 | 2011 |
Securing Bandwidth Request Messages in Wimax K Adhikary, R Kumar, A Kumar International Journal of Computer Applications 975, 8887, 2011 | 1 | 2011 |
VERSIONS OF 802.16 R Kumar, K Adhikary, MR Vaid J. Comp. ech. Appl. 2 (5), 1290-1296, 2011 | 1 | 2011 |
Behavioral Analysis of a Proposed Reputation System for Peer-to-Peer Network S Bagga, C Jain, K Adhikary International Journal of Computer Applications 66 (23), 2013 | | 2013 |
Efficient Hybrid Techniques to Detect and Prevent Distributed Denial of Service Attacks in Vehicular Ad Hoc Networks K Adhikary Kapurthala, 0 | | |
Authentication Mechanism for Bandwidth Request Messages in Wi-MAX MR Vaid, K Adhikary, R Kumar | | |