Comparison of proactive and reactive routing protocols in mobile adhoc network using routing protocol property BD Shivahare, C Wahi, S Shivhare International Journal of Emerging Technology and Advanced Engineering 2 (3 …, 2012 | 94 | 2012 |
Hindi digits recognition system on speech data collected in different natural noise environments B Saxena, C Wahi International Conference on Computer Science, Engineering and Information …, 2015 | 15 | 2015 |
On the philosophy of statistical bounds: A case study on a determinant algorithm S Chakraborty, C Wahi, SK Sourabh, LR Saraswati, A Mukherjee Journal of Modern Mathematics and Statistics 1 (1-4), 15-23, 2007 | 8 | 2007 |
Effect of scalability and mobility on on-demand routing protocols in a mobile Ad-hoc network C Wahi, SK Sonbhadra, S Chakraverty, V Bhattacharjee Lecture Notes on Software Engineering 1 (1), 12, 2013 | 6 | 2013 |
A trust-based secure AODV routing scheme for MANET C Wahi, S Chakraverty, V Bhattacherjee International Journal of Ad Hoc and Ubiquitous Computing 38 (4), 231-247, 2021 | 4 | 2021 |
Performance Evaluation of AODV with and without Black Hole Attack in MANETs CW Devottam Gaurav International Journal on Recent and Innovation Trends in Computing and …, 2016 | 4* | 2016 |
Security analysis of routing protocols for wireless sensor networks C John, C Wahi International Journal of Applied Engineering Research 11 (6), 4235-4242, 2016 | 4 | 2016 |
Current State of Art of Energy Efficient PEGASIS Routing protocols in WSNs SKS Priyanka Kalkandha, Charu Wahi, Seema Sharma International Journal of Advanced Research in Computer Science and Software …, 2015 | 3 | 2015 |
Ensemble Learning Based Intrusion Detection for Wireless Sensor Network Environment. V Kumar, C Wahi, BB Sagar, M Manjul International Journal of Performability Engineering 20 (9), 2024 | | 2024 |
Current Taxonomy of Trust based Secure Routing in MANETs SC Charu Wahi, Vandana Bhattacherjee Journal of Advanced Research in Dynamical & Control Systems 11 (04), 2019 | | 2019 |
Secured AODV to prevent Single and Collaborative Black Hole Attack in MANETs C Wahi International Journal of Innovative Technology and Exploring Engineering 8 …, 2019 | | 2019 |
A Survey of the Various Identity-based Encryption Techniques in Wireless Sensor Networks SS Shrishty Gautam, Charu Wahi International Journal of Advanced Research in Computer and Communication …, 2017 | | 2017 |
Vulnerabilities of Routing Protocols in Wireless Sensor Networks CW Celia John International Journal of Advanced Research in Computer and Communication …, 2016 | | 2016 |
Quality of Service based Routing in Mobile Ad hoc Network – A Review C Spriha Johari International Journal of Scientific & Engineering Research 6 (3), 591-595, 2015 | | 2015 |
Blackhole Prevention Algorithms for AODV in Mobile Ad Hoc Network – A Review CW Devottam Gaurav International Journal of Scientific & Engineering Research 6 (3), 445-450, 2015 | | 2015 |
Survey of Security Issues in Routing of Mobile Ad Hoc Networks SKS Charu Wahi International Journal of Computer Networking, Wireless and Mobile …, 2014 | | 2014 |
Performance evaluation of routing protocols with variation in node speed for mobile ad-hoc networks CW Sanjay K Sonbhadra International Journal of Computer Networking, Wireless and Mobile …, 2013 | | 2013 |
Mobile Ad Hoc Network Routing Protocols: A Comparative Study SKS Charu Wahi International Journal of Ad-Hoc, Sensor & Ubiquitous Computing 3 (2), 2012 | | 2012 |
PERFORMANCE EVALUATION OF ROUTING PROTOCOLS WITH VARIATION IN NODE SPEED FOR MOBILE AD-HOC NETWORKS SK Sonbhadra, C Wahi Education, 2006 | | 2006 |
A Survey of the Various Identity-based Encryption Techniques in Wireless Sensor Networks S Gautam, C Wahi, S Sharma | | |