追蹤
Dr Vimal Kumar
Dr Vimal Kumar
Galgotias University, Greater Noida, Uttar Pradesh, India
在 galgotiasuniversity.edu.in 的電子郵件地址已通過驗證
標題
引用次數
引用次數
年份
An adaptive approach for detection of blackhole attack in mobile ad hoc network
V Kumar, R Kumar
Procedia Computer Science 48, 472-479, 2015
972015
Prevention of wormhole attack using identity based signature scheme in MANET
D Sharma, V Kumar, R Kumar
Computational Intelligence in Data Mining—Volume 2, 475-485, 2016
292016
Detection and prevention of phishing attack using dynamic watermarking
AP Singh, V Kumar, SS Sengar, M Wairiya
International Conference on Advances in Information Technology and Mobile …, 2011
292011
Detection of phishing attack using visual cryptography in ad hoc network
V Kumar, R Kumar
2015 International Conference on Communications and Signal Processing (ICCSP …, 2015
212015
Rank Based Two Stage Semi-Supervised Deep Learning Model for X-Ray Images Classification: AN APPROACH TOWARD TAGGING UNLABELED MEDICAL DATASET
PK Mall, V Narayan, S Srivastava, M Sabarwal, V Kumar, S Awasthi, ...
Journal of Scientific & Industrial Research (JSIR) 82 (08), 818-830, 2023
152023
Proposed framework for dealing COVID-19 pandemic using blockchain technology
M Gupta, V Kumar, V Yadav, RK Singh, M Sadim
NISCAIR-CSIR, India, 2021
152021
A comparison between nonlinear mapping and high-resolution image
V Narayan, S Srivastava, M Faiz, V Kumar, S Awasthi
Computational Intelligence in the Industry 4.0, 153-160, 2024
142024
Layered framework for mobile forensics analysis
M Goel, V Kumar
Proceedings of 2nd international conference on advanced computing and …, 2019
142019
Architecture of an IoT-based Women Safety System
V Tyagi, S Arora, S Gupta, VK Sharma, V Kumar
Architecture 29 (5), 3670-3676, 2020
132020
Revealing the demonstration of blockchain and implementing scope in covid-19 outbreak
M Gupta, V Kumar
EAI Endorsed Transactions on Scalable Information Systems 8 (29), e2, 2021
122021
Virtual Mouse Control Using Hand Class Gesture
VK Sharma, V Kumar, M Iqbal, S Tawara, V Jayaswal
vol 7, 454-458, 0
12*
A theoretical analysis of simple retrieval engine
V Narayan, S Srivastava, PK Mall, V Kumar, S Awasthi
Computational Intelligence in the Industry 4.0, 240-248, 2024
112024
A grid-based approach to prolong lifetime of WSNs using fuzzy logic
AK Mishra, R Kumar, V Kumar, J Singh
Advances in computational intelligence, 11-22, 2017
112017
Study of Coronavirus Disease (COVID-19) Outbreak in India
V Deshwal, V Kumar
The Open Nursing Journal 15 (1), 2021
102021
An efficient password authenticated key exchange protocol for WLAN and WiMAX
AK Rai, V Kumar, S Mishra
Proceedings of the International Conference & Workshop on Emerging Trends in …, 2011
102011
Student’s Perception towards Mobile learning using Interned Enabled Mobile devices during COVID-19
P Gupta, V Kumar, V Yadav
EAI Endorsed Transactions on Industrial Networks and Intelligent Systems 8 …, 2021
92021
An optimal authentication protocol using certificateless ID-based signature in MANET
V Kumar, R Kumar
International Symposium on Security in Computing and Communication, 110-121, 2015
92015
Strong password based EAP-TLS authentication protocol for WiMAX
AK Rai, V Kumar, S Mishra
Anjani K. Rai et al./(IJCSE) International Journal on Computer Science and …, 2010
92010
Krishi Portal: Web Based Farmer Help Assistance
M Iqbal, V Kumar, VK Sharma
International Journal of Advanced Science and Technology 29, 4783-4786, 2007
92007
Prevention of Blackhole Attack in MANET using Certificateless Signature Scheme
V Kumar, M Shankar, AM Tripathi, V Yadav, AK Rai, U Khan, M Rahul
Journal of Scientific & Industrial Research 81 (10), 1061-1072, 2022
82022
系統目前無法執行作業,請稍後再試。
文章 1–20