Attack detection and forensics using honeypot in IoT environment RK Shrivastava, B Bashir, C Hota Distributed Computing and Internet Technology: 15th International Conference …, 2019 | 54 | 2019 |
Modified AODV Protocol to Prevent Black Hole Attack in Mobile Ad-hoc Network R Sharma, R Shrivastava International Journal of Computer Science and Network Security (IJCSNS) 14 …, 2014 | 21 | 2014 |
Energy consumption using traffic models for MANET routing protocols S Dubey, R Shrivastava International Journal of Smart Sensors and Ad Hoc Networks (IJSSAN) 1, 2011 | 16 | 2011 |
Securing Internet of Things devices against code tampering attacks using Return Oriented Programming RK Shrivastava, SP Singh, MK Hasan, S Islam, S Abdullah, AHM Aman Computer Communications 193, 38-46, 2022 | 14 | 2022 |
Protection against code exploitation using ROP and check-summing in IoT environment R Shrivastava, C Hota, P Shrivastava 2017 5th International Conference on Information and Communication …, 2017 | 13 | 2017 |
New improved algorithm for mining privacy—preserving frequent itemsets R Shrivastava, R Awasthy, B Solanki Int J Comp Sci Inform 1, 1-7, 2011 | 13 | 2011 |
A scenario based approach for gateway discovery using Manet routing protocol RK Saluja, R Shrivastava 2012 International Conference on Computer Communication and Informatics, 1-6, 2012 | 11 | 2012 |
Tamper-resistant code using optimal rop gadgets for iot devices C Hota, RK Shrivastava, S Shipra 2017 13th International Wireless Communications and Mobile Computing …, 2017 | 10 | 2017 |
Prevention of security threats in IEEE 802.16 standards R Srivastava, DK Mehto International Journal of Soft Computing and Engineering (IJSCE) 1 (4), 103-108, 2011 | 10 | 2011 |
Preventing data tampering in IoT networks RK Shrivastava, S Mishra, VE Archana, C Hota 2019 IEEE International Conference on Advanced Networks and …, 2019 | 9 | 2019 |
Game theory based modified naïve-bayes algorithm to detect DoS attacks using Honeypot RK Shrivastava, S Ramakrishna, C Hota 2019 IEEE 16th India Council International Conference (INDICON), 1-4, 2019 | 8 | 2019 |
Network based Security model using Symmetric Key Cryptography (AES 256–Rijndael Algorithm) with Public Key Exchange Protocol (Diffie-Hellman Key Exchange Protocol) NK Jharbade, R Shrivastava IJCSNS International Journal of Computer Science and Network Security 12 (8 …, 2012 | 8 | 2012 |
Analysis of Secure Mobile Agent System R Shrivastava, P Mehta International Journal of Soft Computing and Engineering (IJSCE) ISSN, 2231-2307, 2012 | 7 | 2012 |
Code tamper-proofing using dynamic canaries RK Shrivastava, KJ Concessao, C Hota 2019 25th Asia-Pacific Conference on Communications (APCC), 238-243, 2019 | 5 | 2019 |
Profile-guided code identification and hardening using return oriented programming RK Shrivastava, C Hota Journal of Information Security and Applications 48, 102364, 2019 | 5 | 2019 |
Efficient question answering in chatbot using TF-IDF and cosine similarity R Shrivastava, A Pujahari, SP Singh, T Bhowmik Innovations in Information and Communication Technologies: Proceedings of …, 2022 | 4 | 2022 |
Resilient complex event processing in iot using side-channel information RK Shrivastava, S Mishra, S Barua, C Hota Proceedings of the 10th International Conference on Security of Information …, 2017 | 4 | 2017 |
An enhanced authentication mechanism for IEEE 802.16 (e) mobile WiMAX DK Mehto, R Srivastava International Journal of Soft Computing and Engineering 1 (4), 98-102, 2011 | 4 | 2011 |
Performance Evaluation of Extended Aodv Using Different Scenarios R Shrivastava, RK Saluja International Journal of Smart Sensors and Ad Hoc Networks (IJSSAN) ISSN, 2012 | 3 | 2012 |
Securing Mobile Agent and Reducing Overhead Using Dummy and Monitoring Mobile Agents R Shrivastava International Journal of Managment, IT and Engineering 2 (4), 296-303, 2012 | 3 | 2012 |