Internet of things: Evolution, concerns and security challenges P Malhotra, Y Singh, P Anand, DK Bangotra, PK Singh, WC Hong Sensors 21 (5), 1809, 2021 | 169 | 2021 |
Morphogenesis of the testis in goat. Y Singh, DN Sharma, LD Dhingra | 153 | 1979 |
IoT Vulnerability Assessment for Sustainable Computing: Threats, Current Solutions, and Open Challenges NK POOJA ANAND, YASHWANT SINGH, ARVIND SELWAL, MAMOUN ALAZAB ,, SUDEEP TANWAR IEEE Access 8, 168825-168853, 2020 | 115 | 2020 |
Tongue papillae in goat: A scanning electron‐microscopic study P Kumar, S Kumar, Y Singh Anatomia, Histologia, Embryologia 27 (6), 355-357, 1998 | 104 | 1998 |
A systematic survey on internet of things: Energy efficiency and interoperability perspective B Rana, Y Singh, PK Singh Transactions on Emerging Telecommunications Technologies 32 (8), e4166, 2021 | 90 | 2021 |
Model driven architecture: A perspective Y Singh, M Sood 2009 IEEE International Advance Computing Conference, 1644-1652, 2009 | 74 | 2009 |
IoVT: internet of vulnerable things? Threat architecture, attack surfaces, and vulnerabilities in internet of things and its applications towards smart Grids P Anand, Y Singh, A Selwal, PK Singh, RA Felseghi, MS Raboaca Energies 13 (18), 4813, 2020 | 67 | 2020 |
Detection of forest fires using machine learning technique: A perspective A Kansal, Y Singh, N Kumar, V Mohindru 2015 third international conference on image information processing (ICIIP …, 2015 | 62 | 2015 |
Intelligent transport system: A progressive review A Zear, PK Singh, Y Singh Jaypee University of Information Technology, Solan, HP, 2016 | 61 | 2016 |
An intelligent opportunistic routing algorithm for wireless sensor networks and its application towards e-healthcare DK Bangotra, Y Singh, A Selwal, N Kumar, PK Singh, WC Hong Sensors 20 (14), 3887, 2020 | 58 | 2020 |
Reauthentication scheme for mobile wireless sensor networks V Mohindru, R Bhatt, Y Singh Sustainable Computing: Informatics and Systems 23, 158-166, 2019 | 53 | 2019 |
Distributed event detection in wireless sensor networks for forest fires Y Singh, S Saha, U Chugh, C Gupta 2013 UKSim 15th international conference on computer modelling and …, 2013 | 48 | 2013 |
Springer: Cham P Singh, A Abraham, A Kaklauskas, TP Hong Switzerland, 2022 | 46 | 2022 |
Node authentication algorithm for securing static wireless sensor networks from node clone attack V Mohindru, Y Singh International Journal of information and computer security 10 (2-3), 129-148, 2018 | 40 | 2018 |
A trust based secure intelligent opportunistic routing protocol for wireless sensor networks DK Bangotra, Y Singh, A Selwal, N Kumar, PK Singh Wireless Personal Communications 127 (2), 1045-1066, 2022 | 37 | 2022 |
Hybrid cryptography algorithm for securing wireless sensor networks from Node Clone Attack V Mohindru, Y Singh, R Bhatt Recent Advances in Electrical & Electronic Engineering (Formerly Recent …, 2020 | 35 | 2020 |
Routing protocols in wireless sensor networks N Kumar, Y Singh Handbook of research on advanced wireless sensor network applications …, 2017 | 34 | 2017 |
[Retracted] An Improved Deep Belief Network IDS on IoT‐Based Network for Traffic Systems R Malik, Y Singh, ZA Sheikh, P Anand, PK Singh, TC Workneh Journal of Advanced Transportation 2022 (1), 7892130, 2022 | 33 | 2022 |
Securing wireless sensor networks from node clone attack: a lightweight message authentication algorithm V Mohindru, Y Singh, R Bhatt International Journal of Information and Computer Security 12 (2-3), 217-233, 2020 | 33 | 2020 |
Botnet detection using machine learning S Haq, Y Singh 2018 Fifth International Conference on Parallel, Distributed and Grid …, 2018 | 33 | 2018 |