Evaluation on malware analysis M Agrawal, H Singh, N Gour, MA Kumar International Journal of Computer Science and Information Technologies 5 (3 …, 2014 | 22 | 2014 |
Wireless communications implementation using blockchain as well as distributed type of IOT V Gunturu, V Bansal, M Sathe, A Kumar, A Gehlot, B Pant 2023 International Conference on Artificial Intelligence and Smart …, 2023 | 19 | 2023 |
Detecting cross-site scripting vulnerability and performance comparison using C-Time and E-Time U Chhajed, A Kumar International Journal of Advanced Computer Research 4 (2), 733, 2014 | 12 | 2014 |
A Machine Learning Approach to Analyze Cloud Computing Attacks S Rani, K Tripathi, Y Arora, A Kumar 2022 5th International Conference on Contemporary Computing and Informatics …, 2022 | 10 | 2022 |
A review on impersonation attack in mobile Ad-Hoc Network N Gour, M Agarwal, H Singh, A Kumar International Journal of Computer Trends and Technology (IJCTT) 8 (1), 2014 | 6 | 2014 |
Comparative analysis: Energy efficient multipath routing in wireless sensor network N Mishra, A Kumar International Journal of Computer Science and Mobile Computing 3 (9), 627-632, 2014 | 6 | 2014 |
Performance Analysis of Adaptive Approach for Congestion Control In Wireless Sensor Networks S Kumari, CS Lamba, A Kumar network 7, 4, 2017 | 5 | 2017 |
Analysis of an LSTM-based NOMA Detector Over Time Selective Nakagami-m Fading Channel Conditions R Shankar, JL Bangare, A Kumar, S Gupta, H Mehraj, SS Kulkarni Journal of telecommunications and information technology, 17-24, 2022 | 4 | 2022 |
A Critical Review on Detecting Cross-Site Scripting Vulnerability U Chhajed, A Kumar International Journal of Innovative Research in Science, Engineering and …, 2014 | 4 | 2014 |
Cognitive Radio Technique for Blockchain-based Vehicles with IoT S Veerraju, GSP Ghantasala, E Verma, A Kumar, SV Akram, K Pant 2022 5th International Conference on Contemporary Computing and Informatics …, 2022 | 2 | 2022 |
Efficient Detection and Prevention of Impersonation attack in MANET.” N Gour, A Kumar | 2 | 2014 |
FACE RECOGNITION USING PCA AND WAVELET TRANSFORM P Singhal, A Kumar Advances and Application in Mathematical Sciences 21 (5), 2795-2802, 2022 | 1 | 2022 |
OVERCOME LOAD BALANCING PROBLEM BY WEIGHT BASED SCHEME ON CLOUD NK Uparosiya, MA Kumar Journal of Data Acquisition and Processing 38 (2), 393, 2023 | | 2023 |
Normalization Approach For Malware Detection For Securing Internet Banking M Agrawal, A Kumar | | |
SECURITY OF VULNERABILITY TESTING USING MODELS U Chhajed, G Ojha, A Kumar | | |