Importance of aho-corasick string matching algorithm in real world applications S Hasib, M Motwani, A Saxena international journal of computer science and information technologies 4 (3 …, 2013 | 28 | 2013 |
Application of feature extraction technique: A review MM Sahu, A Saxena, M Manoria International Journal of Computer Science and Information Technologies 4 …, 2015 | 18 | 2015 |
Comparative Analysis of VM Scheduling Algorithms in Cloud Environment P Himthani, A Saxena, M Manoria International Journal of Computer Applications 120 (6), 1-6, 2015 | 16 | 2015 |
Intrusion detection system on KDDCup99 dataset: a survey S Rathore, A Saxena, M Manoria International Journal of Computer Science and Information Technologies 6 (4 …, 2015 | 10 | 2015 |
Anti-Spam Methodologies: A Comparative Study S Hasib, M Motwani, A Saxena IJCSIT) International Journal of Computer Science and Information …, 2012 | 8 | 2012 |
Monitoring wireless sensor network using android based smartphone application S Tembekar, A Saxena IOSR J. Comput. Eng 16, 53-57, 2014 | 7 | 2014 |
Detection and Prevention of Selfish Node in MANET using Innovative Brain Mapping Function: Theoretical Model A Gupta, A Saxena International Journal of Computer Applications 57 (12), 17-20, 2012 | 7 | 2012 |
Analysis of Selfish and Malicious Nodes on DSR Based Ocean Protocol in MANET A Saxena, JL Rana International Journal of Computing Science and Communication Technologies 3 …, 2010 | 7 | 2010 |
Comparison of AOMDV Routing Protocol under IEEE802. 11 and TDMA Mac Layer Protocol AK Shrivastava, A Vidwans, A Saxena 2013 5th International Conference and Computational Intelligence and …, 2013 | 6 | 2013 |
Enhanced thinning based finger print recognition P Mishra, AK Shrivastava, A Saxena International Journal of Computer Networks & Communications (IJCNC) 2 (2), 33, 2013 | 6 | 2013 |
Serial and parallel bayesian spam filtering using Aho-Corasick and PFAC S Haseeb, M Motwani, A Saxena International Journal of Computer Applications 74 (17), 2013 | 6 | 2013 |
A hybrid data model for prediction of disaster using data mining approaches A Singh, A Saxena International Journal of Engineering Trends and Technology (IJETT) 41 (7), 2016 | 4 | 2016 |
An Efficient Data Sharing in Public Cloud using two way Authentication & Encryption R Sharma, A Saxena, M Manoria International Journal of Computer Science and Information Technologies …, 2015 | 4 | 2015 |
A review on energy efficient routing in wireless sensor networks R Tiwari, A Saxena Journal of engineering trends and technology 19, 29-34, 2015 | 4 | 2015 |
An Improved Image Fusion Technique based on Texture Feature Optimization using Wavelet Transform and Particle of Swarm Optimization (POS) P Malviya, A Saxena International Journal of Computer Applications 101 (6), 2014 | 4 | 2014 |
Security Domain, Threats, Privacy issues in the Internet of Things (IoT): A Survey S Singh, K Singh, A Saxena 2020 Fourth International Conference on I-SMAC (IoT in Social, Mobile …, 2020 | 3 | 2020 |
Detecting input validation attacks in web application S Khan, A Saxena International Journal of Computer Applications 109 (6), 2015 | 3 | 2015 |
An effective signcryption based authentication for security in cloud computing RS Dangi, A Saxena, M Manoria Int J Comput Sci Inf Technol 6 (6), 5284-5288, 2015 | 3 | 2015 |
An enhanced integrated solution for identification and elimination of wormhole attack in MANET K Raghuwanshi, A Saxena, M Manoria International Journal of Computer Applications 110 (7), 2015 | 3 | 2015 |
The Efficient AODV routing protocol in MANET R Soni, A Saxena, A Shrivasta International Journal of Application or Innovation in Engineering …, 2013 | 3 | 2013 |