An optimized framework for energy-resource allocation in a cloud environment based on the whale optimization algorithm S Goyal, S Bhushan, Y Kumar, AHS Rana, MR Bhutta, MF Ijaz, Y Son Sensors 21 (5), 1583, 2021 | 80 | 2021 |
Hybrid algorithm to detect DDoS attacks in VANETs K Adhikary, S Bhushan, S Kumar, K Dutta Wireless Personal Communications 114 (4), 3613-3634, 2020 | 64 | 2020 |
An improved biometric fusion system of fingerprint and face using whale optimization T Kumar, S Bhushan, S Jangra International Journal of Advanced Computer Science and Applications 12 (1), 2021 | 31 | 2021 |
Fusion in multimodal biometric system: A review G Kaur, S Bhushan, D Singh Indian Journal of Science and Technology 10 (28), 1-10, 2017 | 24 | 2017 |
Content based image retrieval with enhanced privacy in cloud using apache spark S Easwaramoorthy, U Moorthy, CA Kumar, SB Bhushan, V Sadagopan Data Science Analytics and Applications: First International Conference …, 2018 | 21 | 2018 |
An enhanced digital image watermarking scheme for medical images using neural network, DWT and RSA S Nagpal, S Bhushan, M Mahajan International Journal of Modern Education and Computer Science 8 (4), 46, 2016 | 21 | 2016 |
Robust login authentication using time-based OTP through secure tunnel N Kaur, M Devgan, S Bhushan 2016 3rd International Conference on Computing for Sustainable Global …, 2016 | 14 | 2016 |
Innovations in the industrial Internet of Things (IIoT) and smart factory S Goundar, J Avanija, G Sunitha, KR Madhavi, SB Bhushan IGI Global, 2021 | 13 | 2021 |
Gait Recognition of human using SVM and BPNN classifiers A Joshi, S Bhushan, MJ Kaur International Journal of Computer Science and Mobile Computing 3 (1), 281-290, 2014 | 13 | 2014 |
Ann trained and WOA optimized feature-level fusion of iris and fingerprint T Kumar, S Bhushan, S Jangra Materials Today: Proceedings 51, 1-11, 2022 | 11 | 2022 |
Evaluating the performance of various SVM kernel functions based on basic features extracted from KDDCUP'99 dataset by random forest method for detecting DDoS attacks K Adhikary, S Bhushan, S Kumar, K Dutta Wireless Personal Communications, 1-19, 2022 | 10 | 2022 |
Hybrid encryption algorithm to detect clone node attack in wireless sensor network S Lalar, S Bhushan, M Surender Proceedings of the International Conference on Innovative Computing …, 2020 | 10 | 2020 |
Recent Trends in Sustainable Big Data Predictive Analytics: Past Contributions and Future Roadmap SM Basha, DS Rajput, SB Bhushan, RK Poluru, R Patan, R Manikandan, ... International Journal on Emerging Technologies 10 (2), 50-59, 2019 | 10 | 2019 |
Decision tree and neural network based hybrid algorithm for detecting and preventing DDoS attacks in VANETS K Adhikary, S Bhushan, S Kumar, K Dutta International Journal of Innovative Technology and Exploring Engineering 5 …, 2020 | 9 | 2020 |
An efficient tree-based clone detection scheme in wireless sensor network S Lalar, S Bhushan, Surender Journal of Information and Optimization Sciences 40 (5), 1003-1023, 2019 | 9 | 2019 |
Improved Human Identification using Finger Vein Images JK Sameer Sharma, Shashi Bhushan International Journal of Computer Science and Mobile Technology (IJCSMT) 3 …, 2014 | 9* | 2014 |
Recent techniques used for preventing DOS attacks in VANETs K Adhikary, S Bhushan 2017 International Conference on Computing, Communication and Automation …, 2017 | 8 | 2017 |
Effect of cervical insemination with frozen semen on fertility of Indian goat breed R Ranjan, AK Goel, SD Kharche, R Priyadharsini, N Ramachandran, ... Indian Journal of Animal Sciences 90 (4), 557-559, 2020 | 7 | 2020 |
A Secure Time-Stamp Based Concurrency Control Protocol for Distributed Databases MD Shashi Bhushan, R. B. Patel Journal of Computer Science 3 (7), 561-565, 2007 | 7 | 2007 |
Face Recognition with decision tree using SVM and SURF T Kumar, S Jangra, S Bhushan International Journal of control theory and applications 10 (15), 173-180, 2017 | 6 | 2017 |