Wireless sensor networks: An overview on its security threats K Sharma, MK Ghose IJCA, Special Issue on “Mobile Ad-hoc Networks” MANETs 1495, 42-45, 2010 | 207 | 2010 |
An improved Hybrid Quantum-Inspired Genetic Algorithm (HQIGA) for scheduling of real-time task in multiprocessor system D Konar, S Bhattacharyya, K Sharma, S Sharma, SR Pradhan Applied Soft Computing 53, 296-307, 2017 | 89 | 2017 |
An energy efficient extended leach (eee leach) M Sharma, K Sharma 2012 International Conference on Communication Systems and Network …, 2012 | 85 | 2012 |
A comparative study of various security approaches used in wireless sensor networks K Sharma, MK Ghose, D Kumar, RPK Singh, VK Pandey International Journal of Advanced Science and Technology 17, 2010 | 79 | 2010 |
Performance comparison of reactive routing protocols of MANETs using group mobility model SR Biradar, HHD Sarma, K Sharma, SK Sarkar, C Puttamadappa 2009 International Conference on Signal Processing Systems, 192-195, 2009 | 58 | 2009 |
Cross layer security framework for wireless sensor networks K Sharma, MK Ghose International Journal of Security and Its Applications 5 (1), 39-52, 2011 | 38 | 2011 |
A multi-objective quantum-inspired genetic algorithm (Mo-QIGA) for real-time tasks scheduling in multiprocessor environment D Konar, K Sharma, V Sarogi, S Bhattacharyya Procedia computer science 131, 591-599, 2018 | 31 | 2018 |
Energy conservation in wireless sensor networks by exploiting inter-node data similarity metrics S Dhimal, K Sharma International Journal of Energy, Information and Communications 6 (2), 23-32, 2015 | 28 | 2015 |
Security model for hierarchical clustered wireless sensor networks K Sharma, MK Ghose International Journal of Computer Science and Security (IJCSS) 5 (1), 85-97, 2011 | 24 | 2011 |
Complete security framework for wireless sensor networks K Sharma, MK Ghose arXiv preprint arXiv:0908.0122, 2009 | 24 | 2009 |
Moving object detection and segmentation using frame differencing and summing technique G Thapa, K Sharma, MK Ghose International Journal of Computer Applications 102 (7), 20-25, 2014 | 22 | 2014 |
Cluster head rotation in wireless sensor network: a simplified approach S Pradhan, K Sharma group 4 (1), 2016 | 21 | 2016 |
Early detection of depression and treatment response prediction using machine learning: a review P Kharel, K Sharma, S Dhimal, S Sharma 2019 Second International Conference on Advanced Computational and …, 2019 | 17 | 2019 |
A survey on hierarchical clustering algorithm for wireless sensor networks N Pradhan, K Sharma, VK Singh International journal of computer applications 134 (4), 30-35, 2016 | 16 | 2016 |
Enhancing COVID-19 Safety: Exploring YOLOv8 Object Detection for Accurate Face Mask Classification S Tamang, B Sen, A Pradhan, K Sharma, VK Singh International Journal of Intelligent Systems and Applications in Engineering …, 2023 | 14 | 2023 |
A trust-based intrusion detection system for mitigating blackhole attacks in MANET B Sen, MG Meitei, K Sharma, MK Ghose, S Sinha Advanced Computational and Communication Paradigms, 765-775, 2018 | 14 | 2018 |
Comparative Analysis of routing protocols in ad-hoc networks K Sharma, N Mittal, P Rathi International Journal of Advanced Science and Technology 69, 1-12, 2014 | 13 | 2014 |
Power-efficient routing & increased yield approach for WSNs K Sharma, AS Rathor, SR Biradar, MK Ghose arXiv preprint arXiv:1009.0630, 2010 | 13 | 2010 |
A comparative study on dynamic scheduling of real-time tasks in multiprocessor system using genetic algorithms SR Pradhan, S Sharma, D Konar, K Sharma International Journal of Computer Applications 120 (20), 2015 | 11 | 2015 |
Mitigating black hole attacks in MANETs using a trust-based threshold mechanism B Sen, MG Meitei, K Sharma, MK Ghose, S Sinha International Journal of Applied Engineering Research 13 (7), 5458-5463, 2018 | 9 | 2018 |