Threshold cryptography based data security in cloud computing SK Saroj, SK Chauhan, AK Sharma, S Vats 2015 IEEE International Conference on Computational Intelligence …, 2015 | 49 | 2015 |
Sybil attack prevention and detection in vehicular ad hoc network AK Sharma, SK Saroj, SK Chauhan, SK Saini 2016 International Conference on Computing, Communication and Automation …, 2016 | 34 | 2016 |
A novel CPU scheduling with variable time quantum based on mean difference of burst time SK Saroj, AK Sharma, SK Chauhan 2016 International Conference on Computing, Communication and Automation …, 2016 | 14 | 2016 |
Distributed intrusion detection system for wireless sensor networks AK Sharma, SK Saroj, P Kumar IOSR Journal of Computer Engineering 14 (1), 61-70, 2013 | 8 | 2013 |
Measuring the Efficiency of LPWAN in Disaster Logistics System N Rastogi, AK Sharma International Conference on Artificial Intelligence and Sustainable …, 2022 | 2 | 2022 |
Cyber attack Detection Using Machine Learning Techniques RK Dubey, N Dandotiya, A Sharma, S Mishra, SK Gupta 2023 IEEE International Conference on ICT in Business Industry & Government …, 2024 | 1 | 2024 |
Design Partition in an Active to Imbalanced Excitation/Inhibition Hippocampus Neural Arrange RK Dubey, A Sharma, S Mishra, S Sharma 2023 IEEE International Conference on ICT in Business Industry & Government …, 2024 | 1 | 2024 |
Automatic Train Overpass Using Camera and Load Sensors and Obstacle Detection AK Sharma, RK Dubey, S Mishra, S Sharma 2024 2nd International Conference on Disruptive Technologies (ICDT), 279-283, 2024 | | 2024 |
COVID-19 Outbreak India Conditions Analysis and Prediction Using Machine Learning Aravendra Kumar Sharma, Ratnesh Kumar Dubey, Pragya Goswami, Rakesh Prasad ... Journal of Electrical Systems 20 (3), 4254-4262, 2024 | | 2024 |
Scalability Analysis of AODV Routing Protocol in varying Network Parameters AK Sharma | | 2018 |
Secure Access to Outsourced Databases SK Chauhan, AK Sharma | | |