Survey on steganography methods (text, image, audio, video, protocol and network steganography) P Johri, A Mishra, S Das, A Kumar 2016 3rd International Conference on Computing for Sustainable Global …, 2016 | 29 | 2016 |
Review paper on text and audio steganography using GA P Johri, A Kumar International Conference on Computing, Communication & Automation, 190-192, 2015 | 18 | 2015 |
Security framework using Hadoop for big data P Johri, A Kumar, S Das, S Arora 2017 International Conference on Computing, Communication and Automation …, 2017 | 10 | 2017 |
Intrusion detection and prevention using RNN in WSN AK Ashok Yadav Inventive Computation and Information Technologies,Proceedings of ICICIT 2021, 2022 | 9 | 2022 |
Emerging trends in energy efficient routing protocols H Agrawal, P Johri, A Kumar International Conference on Computing, Communication & Automation, 523-528, 2015 | 9 | 2015 |
Cataract Detection using Deep Learning Model on Digital Camera Images R Chaudhary, A Kumar 2022 IEEE International Conference on Cybernetics and Computational …, 2022 | 8 | 2022 |
An improved approach towards biometric face recognition using artificial neural network S Srivastava, A Kumar, A Singh, S Prakash, A Kumar Multimedia Tools and Applications 81 (6), 8471-8497, 2022 | 8 | 2022 |
Event‐driven data alteration detection using block‐chain S Srivastava, Mohit, A Kumar, SK Jha, P Dixit, S Prakash Security and Privacy 4 (2), e146, 2021 | 7 | 2021 |
Credit card fraud detection system using machine learning technique A Maurya, A Kumar 2022 IEEE International Conference on Cybernetics and Computational …, 2022 | 6 | 2022 |
Modified DSR, an energy conserving approach to DSR protocol in MANET NM Upadhyay, K Gaurav, A Kumar 2014 International Conference on Communication and Signal Processing, 1146-1149, 2014 | 5 | 2014 |
A Security Scheme for Mobile Ad-hoc Network with Reduced Routing Overhead TK Mishra, B Singh, A Kumar International Journal of Advanced Research in Computer Science and Software …, 2013 | 5 | 2013 |
PCP Framework to Expose Malware in Devices R Nigam, RK Pathak, A Kumar, S Prakash 2020 International Conference on Electronics and Sustainable Communication …, 2020 | 4 | 2020 |
String Matching Algorithm Based Filter for Preventing SQL Injection and XSS Attacks AK Yadav, A Kumar Inventive Computation and Information Technologies: Proceedings of ICICIT …, 2022 | 3 | 2022 |
Using a Blend of Brassard and Benett 84 & Elliptic Curve Digital Signature for Secure Cloud Data Communication V Srivastava, RK Pathak, A Kumar, S Prakash 2020 International Conference on Electronics and Sustainable Communication …, 2020 | 3 | 2020 |
Handling Secure Healthcare Data Streaming using R2E Algorithm U Kumar, RK Pathak, A Kumar 2020 International Conference on Electronics and Sustainable Communication …, 2020 | 3 | 2020 |
EEMD-CNN based Method for Compound Fault Diagnosis of Bearing A Singh, A Kumar 2022 IEEE International Conference on Cybernetics and Computational …, 2022 | 2 | 2022 |
Traffic Privacy Study on Internet of Things-Smart Home Applications S Ansari, A Kumar 2021 9th International Conference on Cyber and IT Service Management (CITSM …, 2021 | 2 | 2021 |
An enhanced efficient broadcasting scheme for video-on-demand system in mobile ad hoc networks A Kumar, DK Lobiyal 2010 INTERNATIONAL CONFERENCE ON COMMUNICATION CONTROL AND COMPUTING …, 2010 | 2 | 2010 |
Intrusion Detection using Dense Neural Network in Network System A Doherey, A Singh, A Kumar 2022 IEEE International Conference on Cybernetics and Computational …, 2022 | 1 | 2022 |
An Efficient Approach Toward Security of Web Application Using SQL Attack Detection and Prevention Technique AK Vishal Bharati Inventive Computation and Information Technologies, Proceedings of ICICIT 2021, 2022 | 1 | 2022 |