关注
ajay.kumar .
ajay.kumar .
在 jecrcu.edu.in 的电子邮件经过验证
标题
引用次数
引用次数
年份
Evaluation on malware analysis
M Agrawal, H Singh, N Gour, MA Kumar
International Journal of Computer Science and Information Technologies 5 (3 …, 2014
222014
Wireless communications implementation using blockchain as well as distributed type of IOT
V Gunturu, V Bansal, M Sathe, A Kumar, A Gehlot, B Pant
2023 International Conference on Artificial Intelligence and Smart …, 2023
192023
Detecting cross-site scripting vulnerability and performance comparison using C-Time and E-Time
U Chhajed, A Kumar
International Journal of Advanced Computer Research 4 (2), 733, 2014
122014
A Machine Learning Approach to Analyze Cloud Computing Attacks
S Rani, K Tripathi, Y Arora, A Kumar
2022 5th International Conference on Contemporary Computing and Informatics …, 2022
102022
A review on impersonation attack in mobile Ad-Hoc Network
N Gour, M Agarwal, H Singh, A Kumar
International Journal of Computer Trends and Technology (IJCTT) 8 (1), 2014
62014
Comparative analysis: Energy efficient multipath routing in wireless sensor network
N Mishra, A Kumar
International Journal of Computer Science and Mobile Computing 3 (9), 627-632, 2014
62014
Performance Analysis of Adaptive Approach for Congestion Control In Wireless Sensor Networks
S Kumari, CS Lamba, A Kumar
network 7, 4, 2017
52017
Analysis of an LSTM-based NOMA Detector Over Time Selective Nakagami-m Fading Channel Conditions
R Shankar, JL Bangare, A Kumar, S Gupta, H Mehraj, SS Kulkarni
Journal of telecommunications and information technology, 17-24, 2022
42022
A Critical Review on Detecting Cross-Site Scripting Vulnerability
U Chhajed, A Kumar
International Journal of Innovative Research in Science, Engineering and …, 2014
42014
Cognitive Radio Technique for Blockchain-based Vehicles with IoT
S Veerraju, GSP Ghantasala, E Verma, A Kumar, SV Akram, K Pant
2022 5th International Conference on Contemporary Computing and Informatics …, 2022
22022
Efficient Detection and Prevention of Impersonation attack in MANET.”
N Gour, A Kumar
22014
FACE RECOGNITION USING PCA AND WAVELET TRANSFORM
P Singhal, A Kumar
Advances and Application in Mathematical Sciences 21 (5), 2795-2802, 2022
12022
OVERCOME LOAD BALANCING PROBLEM BY WEIGHT BASED SCHEME ON CLOUD
NK Uparosiya, MA Kumar
Journal of Data Acquisition and Processing 38 (2), 393, 2023
2023
Normalization Approach For Malware Detection For Securing Internet Banking
M Agrawal, A Kumar
SECURITY OF VULNERABILITY TESTING USING MODELS
U Chhajed, G Ojha, A Kumar
系统目前无法执行此操作,请稍后再试。
文章 1–15