A hybrid genetic algorithm for the minimum energy broadcast problem in wireless ad hoc networks A Singh, WN Bhukya Applied Soft Computing 11 (1), 667-674, 2011 | 41 | 2011 |
Multi-stage Multi-secret sharing scheme for hierarchical access structure WN Abdul Basit, N Chaitanya Kumar, V Ch Venkaiah, Salman Abdul Moiz, Appala ... 2017 International Conference on Computing, Communication and Automation …, 2017 | 33 | 2017 |
Masquerade Detection in Linux Systems WN Bhukya, S Kumar, A Negi | 23* | |
A rule based approach to group recommender systems V Padmanabhan, SK Seemala, WN Bhukya Multi-disciplinary Trends in Artificial Intelligence: 5th International …, 2011 | 11 | 2011 |
A study of effectiveness in masquerade detection WN Bhukya, GS Kumar, A Negi TENCON 2006-2006 IEEE Region 10 Conference, 1-4, 2006 | 9 | 2006 |
Layered security architecture for masquerade attack detection H Saljooghinejad, WN Bhukya Data and Applications Security and Privacy XXVI: 26th Annual IFIP WG 11.3 …, 2012 | 6 | 2012 |
Investigative behavior profiling with one class SVM for computer forensics WN Bhukya, SK Banothu Multi-disciplinary Trends in Artificial Intelligence: 5th International …, 2011 | 6 | 2011 |
An evolutionary approach to multi-point relays selection in mobile ad hoc networks A Singh, WN Bhukya International Conference on Pattern Recognition and Machine Intelligence …, 2019 | 4 | 2019 |
Secret sharing scheme based on Latin squares P Ashwini, VC Venkaiah, WN Bhukya Journal of Discrete Mathematical Sciences and Cryptography, 1-15, 2021 | 3 | 2021 |
Forensic Analysis on QEMU N Chandra Shekar, WN Bhukya International Conference on Computational Intelligence and Information …, 2011 | 3 | 2011 |
Reasoning about dnssec KR Babu, V Padmanabhan, WN Bhukya Multi-disciplinary Trends in Artificial Intelligence: 5th International …, 2011 | 3 | 2011 |
Multi application user profiling for masquerade attack detection H Saljooghinejad, WN Rathore Advances in Computing and Communications: First International Conference …, 2011 | 2 | 2011 |
An effective heuristic for construction of all-to-all minimum power broadcast trees in wireless networks WN Bhukya, A Singh 2014 International Conference on Advances in Computing, Communications and …, 2014 | 1 | 2014 |
p-shrink: A Heuristic for Improving Minimum All-to-All Power Broadcast Trees in Wireless Networks WN Bhukya, A Singh Proceedings of Ninth International Conference on Wireless Communication and …, 2014 | 1 | 2014 |
A study on energy issues in construction of all-to-all minimum power broadcast (A2A MPB) trees in wireless networks WN Bhukya, A Singh 2013 International Conference on Advances in Computing, Communications and …, 2013 | 1 | 2013 |
An energy efficient security provisioning scheme for TinySec in wireless sensor networks WN Bhukya, Y Gavali, A Negi, A Singh TENCON 2008-2008 IEEE Region 10 Conference, 1-4, 2008 | 1 | 2008 |
Content Based Network Representational Learning for Movie Recommendation (CNMovieRec) NR Kota, V Padmanabhan, WN Bhukya International Conference on Multi-disciplinary Trends in Artificial …, 2023 | | 2023 |
Check for updates CBN Representational, NR Kota, WN Bhukya Multi-disciplinary Trends in Artificial Intelligence: 16th International …, 2023 | | 2023 |
GUI-Based User Profiling for Masquerade Detection in Linux Systems WN Bhukya, S Kumar, A Negi | | |