Comparison of reactive and proactive routing protocols for different mobility conditions in WSN K Tripathi, M Pandey, S Verma Proceedings of the 2011 International Conference on communication, computing …, 2011 | 42 | 2011 |
Internet of things-based e-health care: Key challenges and recommended solutions for future GH Sai, K Tripathi, AK Tyagi Proceedings of Third International Conference on Computing, Communications …, 2022 | 37 | 2022 |
Extended TLS security and defensive algorithm in openflow SDN S Midha, K Triptahi 2019 9th International Conference on Cloud Computing, Data Science …, 2019 | 36 | 2019 |
Combining the advantages of radiomic features based feature extraction and hyper parameters tuned RERNN using LOA for breast cancer classification S Subasree, NK Sakthivel, K Tripathi, D Agarwal, AK Tyagi Biomedical Signal Processing and Control 72, 103354, 2022 | 27 | 2022 |
Trust value based algorithm to identify and defense gray-hole and black-hole attack present in MANET using clustering method NJK Patel, K Tripathi International Journal of Scientific Research in Science, Engineering and …, 2018 | 26 | 2018 |
Design, implementation, and controlling of a humanoid robot K Somisetti, K Tripathi, JK Verma 2020 International Conference on Computational Performance Evaluation (ComPE …, 2020 | 25 | 2020 |
Extended security in heterogeneous distributed SDN architecture S Midha, K Tripathi International Conference on Advanced Communication and Computational …, 2019 | 25 | 2019 |
Remotely triggered blackhole routing in SDN for Handling DoS S Midha, K Tripathi Proceedings of International Conference on IoT Inclusive Life (ICIIL 2019 …, 2020 | 23 | 2020 |
Cloud deep down—SWOT analysis S Midha, G Kaur, K Tripathi 2017 2nd International Conference on Telecommunication and Networks (TEL-NET …, 2017 | 22 | 2017 |
A Framework for Structural Damage detection system in automobiles for flexible Insurance claim using IOT and Machine Learning D Agarwal, K Tripathi 2022 International Mobile and Embedded Technology Conference (MECON), 5-8, 2022 | 20 | 2022 |
Practical Implications of Using Dockers on Virtualized SDN. S Midha, K Tripathi, MK Sharma Webology 18 (SI01), 312-330, 2021 | 19 | 2021 |
Identifying and improving the malicious behavior of rushing and blackhole attacks using proposed IDSAODV protocol PN Ranchhodbhai, K Tripathi International Journal of Recent Technology and Engineering 8 (3), 6554-6562, 2019 | 18 | 2019 |
Review of Detection of Packets Inspection and Attacks in Network Security SK Jajula, K Tripathi, SB Bajaj Emerging Technologies in Data Mining and Information Security: Proceedings …, 2022 | 17 | 2022 |
Analysis of Anomaly detection of Malware using KNN S Rani, K Tripathi, Y Arora, A Kumar 2022 2nd International Conference on Innovative Practices in Technology and …, 2022 | 17 | 2022 |
Machine learning aided malware detection for secure and smart manufacturing: a comprehensive analysis of the state of the art S Rani, K Tripathi, A Kumar International Journal on Interactive Design and Manufacturing (IJIDeM), 1-28, 2023 | 14 | 2023 |
Ethical Hacking: Importance, Controversies and Scope in the Future G Vishnuram, K Tripathi, AK Tyagi 2022 International Conference on Computer Communication and Informatics …, 2022 | 14 | 2022 |
Performance of DSDV protocol over sensor networks K Tripathi, T Agarwal, SD Dixit Int. J. Next Gener. Netw 2, 53-59, 2010 | 14 | 2010 |
Design and implementation of an intrusion detection system using MLP-NN for MANET I Mapanga, V Kumar, W Makondo, T Kushboo, P Kadebu, W Chanda 2017 IST-Africa Week Conference (IST-Africa), 1-12, 2017 | 13 | 2017 |
Manju M Jain, K Tripathi, A Jatain Gundimeda, A, 945-950, 2023 | 11 | 2023 |
A Machine Learning Approach to Analyze Cloud Computing Attacks S Rani, K Tripathi, Y Arora, A Kumar 2022 5th International Conference on Contemporary Computing and Informatics …, 2022 | 10 | 2022 |