关注
Ashish Kumar Jain
Ashish Kumar Jain
Associate Professor, Computer Engineering Deptt, IET DAVV, Indore
在 ietdavv.edu.in 的电子邮件经过验证
标题
引用次数
引用次数
年份
Mitigating the effects of Black hole attacks on AODV routing protocol in mobile ad hoc networks
AK Jain, V Tokekar
2015 International Conference on Pervasive Computing (ICPC), 1-6, 2015
722015
Detection and Avoidance of Unified Attacks on MANET using Trusted Secure AODV Routing Protocol
M Samvatsar, A Sharma, AK Jain
IEEE, 2016
55*2016
Security Enhancement in MANETs Using Fuzzy-Based Trust Computation Against Black Hole Attacks
SS Ashish Kumar Jain, Vrinda Tokekar
Advances in Intelligent Systems and Computing book series (AISC, volume 625 …, 2017
37*2017
Classification of denial of service attacks in mobile ad hoc networks
AK Jain, V Tokekar
2011 International Conference on Computational Intelligence and …, 2011
362011
Support Vector Machine through Detecting Packet Dropping Misbehaving Nodes in MANET
US Ravi Parihar, Ashish Jain
International Conference on Electronics, Communication and Aerospace …, 2017
32*2017
Detection and Avoidance of Integrated Attacks on MANET using Trusted Hyperbolic AODV Routing Protocol
JAK Vrinda Tokekar
Journal of Mobile Computing, Communications & Mobile Networks 3 (2), 21-34, 2016
162016
Security enhancement of AODV routing protocol in mobile ad hoc network
AK Jain, A Choorasiya
2017 2nd International Conference on Communication and Electronics Systems …, 2017
122017
wormhole attack in mobile ad hoc networks
shweta shah madhu sharma, ashish jain
Colossal Data Analysis and Networking (CDAN), Symposium, 1-4, 2016
12*2016
TRUST-BASED SOLUTION FOR WORMHOLE ATTACKS IN MOBILE AD HOC NETWORKS
RV Ashish Kumar Jain
Global Journal of Multidisciplinary Studies 4 (12), 84-90, 2015
12*2015
Mitigation for Jelly Fish Attack on MANET
S Shah, M Sharma, A Jain
i-manager's Journal on Mobile Applications & Technologies 21 (41), 19-26, 2015
92015
Trust based model for mobile ad-hoc network in Internet of Things
U Singh, M Shukla, AK Jain, M Patsariya, R Itare, S Yadav
Inventive Computation Technologies 4, 827-839, 2020
42020
Security Enhancement of AODV Protocol using Fuzzy based Trust Computation in Mobile Ad Hoc Networks
AKJ V Tokekar
Oriental Journal of Computer Science & Technology 10 (1), 2017
32017
Age Estimation from Facial Image:A Survey
RP Chandra Prakash Patidar, Pooja Patidar, Ashish Kumar Jain, Jagdish Raikwal
International Journal of Scientific Research & Engineering Trends 6 (6 …, 2020
2020
A System and Method for Detecting Malicious Activities in Computing Network
CPPMS Ashish Kumar Jain, Manjeet Kumar Soni
IN Patent E-12/493/2020/MUM,, 2020
2020
Plant Health Assessment and Analysis of Disease using Deep Learning Technique
RPAP Ashish Kumar Jain, C.P. Patidar
International Journal of Science, Engineering and Technology 8 (5), 1-5, 2020
2020
A Smart Helmet
MAK Mr. Upendra Singh, Mr. Mukul Shukla, Prof Sunita Verma, Dr. Lalit Putohit
IN Patent App. 202,021,008,333, 2020
2020
Review of Network Intrusion Detection Systems
AKJCPP Manjeet Kumar Soni
International Journal of Scientific & Technology Research (IJSTR) 9 (2), 2020
2020
Investigation of Crop Leaf Disease using Machine Learning and Image Processing Techniques
APRP C.P. Patidar, Ashish Kumar Jain
International Journal of Science, Engineering and Technology 8 (5), 2020
2020
Trust Management in mobile ad hoc networks : A Survey
NV ashish kumar jain
International Conference on Electronics, Communication & Aerospace …, 2017
2017
A Review Paper on Colored Petri Nets and their application in Protocol Verification.
AJ Richa Agarwal
International Journal of Research in Computer and Communication Technology 2 (8), 2013
2013
系统目前无法执行此操作,请稍后再试。
文章 1–20