关注
Mandeep Singh
Mandeep Singh
IT
在 pstcl.org 的电子邮件经过验证
标题
引用次数
引用次数
年份
Comparative Study of OLSR, DSDV, AODV, DSR and ZRP Routing Protocols Under Blackhole Attack in Mobile Ad Hoc Network
A Singh, G Singh, M Singh
Intelligent Communication, Control and Devices, 443-453, 2018
332018
Detection of Malicious Node in Wireless Sensor Network based on Data Mining
M Singh, G Mehta, C Vaid, P Oberoi
International Conference on Computing Sciences, ICCS 2012, 291-294, 2012
192012
Detection of black hole in Wireless Sensor Network based on Data Mining
G Kaur, M Singh
Confluence The Next Generation Information Technology Summit (Confluence …, 2014
82014
Research on the Application of Web Mining Technique Based on XML for Unstructured Web Data Using LINQ
P Kaur, R Garg, R Singh, M Singh
Advanced Materials Research 403, 1062-1067, 2012
82012
Detecting Cyber Crime by Analyzing Users Data
S Vashisht, M Kaur, R Sapra, M Singh
International Journal of Computer Technology and Applications 3 (3), 1029-1033, 2012
32012
A Data Mining Approach for Saving Service Selection
R Sapra, Sheveta, M Singh
International Journal of Computer Technology & Applications 3 (3), 1105-1109, 2012
12012
A Comparative Evaluation of Mining Techniques to Detect Malicious Node in Wireless Sensor Networks
M Singh, N Kaur, A Kaur, G Pushkarna
International Journal of Cyber Warfare and Terrorism (IJCWT) 7 (2), 42-53, 2017
2017
DETECTION OF BLACK HOLE NODE IN WIRELESS SENSOR NETWORKS USING DSR PROTOCOL
N Kaur, A Kaur, M Singh, G Pushkarna
Far East Journal of Electronics and Communications · 3, 519-536, 2016
2016
Sensor Integrated RFID based Postal Letter Tracking System
A Kaur, N Kaur, M Singh, G Pushkarna
International Journal of Control Theory and Applications 9 (11), 5455-5466, 2016
2016
Behavior Analysis of the user based on the data to detect the cyber crime
Sheveta, R Sapra, M Singh
8th International Conference on Upcoming Trends in IT, 2012
2012
Saving Service Selection using Data Mining
R Sapra, Sheveta, M Singh
8th International Conference on Upcoming Trends in IT, 2012
2012
Dynamic Traffic Light Sequence Control with Violation Detection Using RFID
H Singh, M Singh
2012
A Fuzzy Clustering Based approach for Finding Fault Prone Modules in Open Source Software Systems
S Parvinder, S, M Mehta, S Mandeep
International conference on Network Communication and Computer 2011 IEEE …, 2011
2011
Detection of Wormhole Attack in Wireless Sensor Network
R Garg, M Singh
International Conference on Computational Intelligence Applications, 2011
2011
系统目前无法执行此操作,请稍后再试。
文章 1–14