Performance Analysis and Simulation of Rain Attenuation Models at 12–40 GHz Band for an Earth Space Path over Indian Cities PP R.C.Joshi Procedia Computer Science 79 (2016), 801-808, 2016 | 21 | 2016 |
FPGA IMPLEMENTATION OF DES USING PIPELINING CONCEPT WITH SKEW CORE KEY-SCHEDULING. V Patel, RC Joshi, AK Saxena Journal of Theoretical & Applied Information Technology 5 (3), 2009 | 20 | 2009 |
An Integrated Approach for Jammer Detection using Software Defined Radio RCJ Ronak Bhojani Procedia Computer Science 79 (2016), 809-816, 2016 | 18 | 2016 |
Smart Grid Sensor Monitoring Based on Deep Learning Technique with Control System Management in Fault Detection A Awasthi, TR Mahesh, R Joshi, AK Pandey, R Saxena, S Goswami International Journal of Communication Networks and Information Security 14 …, 2022 | 13 | 2022 |
Congestion control in communication networks using discrete sliding mode control RC Joshi, VK Thakar Proceedings of the 31st Chinese Control Conference, 5553-5557, 2012 | 13 | 2012 |
Effective framework for prediction of disease outcome using medical datasets: clustering and classification BM Patil, RC Joshi, D Toshniwal International Journal of Computational Intelligence Studies 1 (3), 273-290, 2010 | 13 | 2010 |
Personal secret information based authentication towards preventing phishing attacks G Varshney, RC Joshi, A Sardana Advances in Computing and Information Technology: Proceedings of the Second …, 2012 | 12 | 2012 |
Autonomous dynamic honeypot routing mechanism for mitigating DDoS attacks in DMZ A Sardana, RC Joshi 2008 16th IEEE International Conference on Networks, 1-7, 2008 | 11 | 2008 |
Cliniqa: A machine intelligence based clinical question answering system MAH Zahid, A Mittal, RC Joshi, G Atluri arXiv preprint arXiv:1805.05927, 2018 | 10 | 2018 |
Vmprotector: Malign process detection for protecting virtual machines in cloud environment P Mishra, A Negi, ES Pilli, RC Joshi Advances in Computing and Data Sciences: Third International Conference …, 2019 | 9 | 2019 |
Dual-level attack detection and characterization for networks under DDoS A Sardana, RC Joshi 2010 International Conference on Availability, Reliability and Security, 9-16, 2010 | 9 | 2010 |
Global cluster cooperation strategy in mobile ad hoc networks N Chauhan, LK Awasthi, N Chand, RC Joshi, M Misra International Journal of Computer Science and Engineering 2 (7), 2268-2273, 2010 | 9 | 2010 |
Energy efficient cache invalidation in a mobile environment N Chand, RC Joshi, M Misra Journal of Digital Information Management 3 (2), 119, 2005 | 9 | 2005 |
Security perspectives of various IoT cloud platforms: a review & case study P Mishra, S Kumar, U Garg, ES Pilli, RC Joshi 2021 International Conference on Computing, Communication, and Intelligent …, 2021 | 8 | 2021 |
A broker based framework for federated Cloud environment SS Chauhan¹, ES Pilli, RC Joshi 2016 international conference on emerging trends in communication …, 2016 | 8 | 2016 |
Network forensic tools RC Joshi, ES Pilli, RC Joshi, ES Pilli Fundamentals of Network Forensics: A Research Perspective, 71-93, 2016 | 8 | 2016 |
An IP traceback model for network forensics ES Pilli, RC Joshi, R Niyogi Digital Forensics and Cyber Crime: Second International ICST Conference …, 2011 | 8 | 2011 |
Energy efficient cooperative caching in mobile ad hoc networks N Chauhan, LK Awasthi, N Chand, RC Joshi, M Misra International Journal of Applied Engineering Research 1 (3), 360, 2010 | 8 | 2010 |
Voltage scaling–a novel approach for crosstalk reduction in global VLSI interconnects BK Kaushik, S Sarkar, RP Agarwal, RC Joshi Microelectronics international 24 (1), 40-45, 2007 | 8 | 2007 |
Survey of scaling platforms for deep neural networks AA Ratnaparkhi, E Pilli, RC Joshi 2016 International Conference on Emerging Trends in Communication …, 2016 | 7 | 2016 |