An adaptive approach for detection of blackhole attack in mobile ad hoc network V Kumar, R Kumar Procedia Computer Science 48, 472-479, 2015 | 97 | 2015 |
Prevention of wormhole attack using identity based signature scheme in MANET D Sharma, V Kumar, R Kumar Computational Intelligence in Data Mining—Volume 2, 475-485, 2016 | 29 | 2016 |
Detection and prevention of phishing attack using dynamic watermarking AP Singh, V Kumar, SS Sengar, M Wairiya International Conference on Advances in Information Technology and Mobile …, 2011 | 29 | 2011 |
Detection of phishing attack using visual cryptography in ad hoc network V Kumar, R Kumar 2015 International Conference on Communications and Signal Processing (ICCSP …, 2015 | 21 | 2015 |
Rank Based Two Stage Semi-Supervised Deep Learning Model for X-Ray Images Classification: AN APPROACH TOWARD TAGGING UNLABELED MEDICAL DATASET PK Mall, V Narayan, S Srivastava, M Sabarwal, V Kumar, S Awasthi, ... Journal of Scientific & Industrial Research (JSIR) 82 (08), 818-830, 2023 | 15 | 2023 |
Proposed framework for dealing COVID-19 pandemic using blockchain technology M Gupta, V Kumar, V Yadav, RK Singh, M Sadim NISCAIR-CSIR, India, 2021 | 15 | 2021 |
A comparison between nonlinear mapping and high-resolution image V Narayan, S Srivastava, M Faiz, V Kumar, S Awasthi Computational Intelligence in the Industry 4.0, 153-160, 2024 | 14 | 2024 |
Layered framework for mobile forensics analysis M Goel, V Kumar Proceedings of 2nd international conference on advanced computing and …, 2019 | 14 | 2019 |
Architecture of an IoT-based Women Safety System V Tyagi, S Arora, S Gupta, VK Sharma, V Kumar Architecture 29 (5), 3670-3676, 2020 | 13 | 2020 |
Revealing the demonstration of blockchain and implementing scope in covid-19 outbreak M Gupta, V Kumar EAI Endorsed Transactions on Scalable Information Systems 8 (29), e2, 2021 | 12 | 2021 |
Virtual Mouse Control Using Hand Class Gesture VK Sharma, V Kumar, M Iqbal, S Tawara, V Jayaswal vol 7, 454-458, 0 | 12* | |
A theoretical analysis of simple retrieval engine V Narayan, S Srivastava, PK Mall, V Kumar, S Awasthi Computational Intelligence in the Industry 4.0, 240-248, 2024 | 11 | 2024 |
A grid-based approach to prolong lifetime of WSNs using fuzzy logic AK Mishra, R Kumar, V Kumar, J Singh Advances in computational intelligence, 11-22, 2017 | 11 | 2017 |
Study of Coronavirus Disease (COVID-19) Outbreak in India V Deshwal, V Kumar The Open Nursing Journal 15 (1), 2021 | 10 | 2021 |
An efficient password authenticated key exchange protocol for WLAN and WiMAX AK Rai, V Kumar, S Mishra Proceedings of the International Conference & Workshop on Emerging Trends in …, 2011 | 10 | 2011 |
Student’s Perception towards Mobile learning using Interned Enabled Mobile devices during COVID-19 P Gupta, V Kumar, V Yadav EAI Endorsed Transactions on Industrial Networks and Intelligent Systems 8 …, 2021 | 9 | 2021 |
An optimal authentication protocol using certificateless ID-based signature in MANET V Kumar, R Kumar International Symposium on Security in Computing and Communication, 110-121, 2015 | 9 | 2015 |
Strong password based EAP-TLS authentication protocol for WiMAX AK Rai, V Kumar, S Mishra Anjani K. Rai et al./(IJCSE) International Journal on Computer Science and …, 2010 | 9 | 2010 |
Krishi Portal: Web Based Farmer Help Assistance M Iqbal, V Kumar, VK Sharma International Journal of Advanced Science and Technology 29, 4783-4786, 2007 | 9 | 2007 |
Prevention of Blackhole Attack in MANET using Certificateless Signature Scheme V Kumar, M Shankar, AM Tripathi, V Yadav, AK Rai, U Khan, M Rahul Journal of Scientific & Industrial Research 81 (10), 1061-1072, 2022 | 8 | 2022 |