关注
Charu Wahi
Charu Wahi
在 bitmesra.ac.in 的电子邮件经过验证
标题
引用次数
引用次数
年份
Comparison of proactive and reactive routing protocols in mobile adhoc network using routing protocol property
BD Shivahare, C Wahi, S Shivhare
International Journal of Emerging Technology and Advanced Engineering 2 (3 …, 2012
942012
Hindi digits recognition system on speech data collected in different natural noise environments
B Saxena, C Wahi
International Conference on Computer Science, Engineering and Information …, 2015
152015
On the philosophy of statistical bounds: A case study on a determinant algorithm
S Chakraborty, C Wahi, SK Sourabh, LR Saraswati, A Mukherjee
Journal of Modern Mathematics and Statistics 1 (1-4), 15-23, 2007
82007
Effect of scalability and mobility on on-demand routing protocols in a mobile Ad-hoc network
C Wahi, SK Sonbhadra, S Chakraverty, V Bhattacharjee
Lecture Notes on Software Engineering 1 (1), 12, 2013
62013
A trust-based secure AODV routing scheme for MANET
C Wahi, S Chakraverty, V Bhattacherjee
International Journal of Ad Hoc and Ubiquitous Computing 38 (4), 231-247, 2021
42021
Performance Evaluation of AODV with and without Black Hole Attack in MANETs
CW Devottam Gaurav
International Journal on Recent and Innovation Trends in Computing and …, 2016
4*2016
Security analysis of routing protocols for wireless sensor networks
C John, C Wahi
International Journal of Applied Engineering Research 11 (6), 4235-4242, 2016
42016
Current State of Art of Energy Efficient PEGASIS Routing protocols in WSNs
SKS Priyanka Kalkandha, Charu Wahi, Seema Sharma
International Journal of Advanced Research in Computer Science and Software …, 2015
32015
Ensemble Learning Based Intrusion Detection for Wireless Sensor Network Environment.
V Kumar, C Wahi, BB Sagar, M Manjul
International Journal of Performability Engineering 20 (9), 2024
2024
Current Taxonomy of Trust based Secure Routing in MANETs
SC Charu Wahi, Vandana Bhattacherjee
Journal of Advanced Research in Dynamical & Control Systems 11 (04), 2019
2019
Secured AODV to prevent Single and Collaborative Black Hole Attack in MANETs
C Wahi
International Journal of Innovative Technology and Exploring Engineering 8 …, 2019
2019
A Survey of the Various Identity-based Encryption Techniques in Wireless Sensor Networks
SS Shrishty Gautam, Charu Wahi
International Journal of Advanced Research in Computer and Communication …, 2017
2017
Vulnerabilities of Routing Protocols in Wireless Sensor Networks
CW Celia John
International Journal of Advanced Research in Computer and Communication …, 2016
2016
Quality of Service based Routing in Mobile Ad hoc Network – A Review
C Spriha Johari
International Journal of Scientific & Engineering Research 6 (3), 591-595, 2015
2015
Blackhole Prevention Algorithms for AODV in Mobile Ad Hoc Network – A Review
CW Devottam Gaurav
International Journal of Scientific & Engineering Research 6 (3), 445-450, 2015
2015
Survey of Security Issues in Routing of Mobile Ad Hoc Networks
SKS Charu Wahi
International Journal of Computer Networking, Wireless and Mobile …, 2014
2014
Performance evaluation of routing protocols with variation in node speed for mobile ad-hoc networks
CW Sanjay K Sonbhadra
International Journal of Computer Networking, Wireless and Mobile …, 2013
2013
Mobile Ad Hoc Network Routing Protocols: A Comparative Study
SKS Charu Wahi
International Journal of Ad-Hoc, Sensor & Ubiquitous Computing 3 (2), 2012
2012
PERFORMANCE EVALUATION OF ROUTING PROTOCOLS WITH VARIATION IN NODE SPEED FOR MOBILE AD-HOC NETWORKS
SK Sonbhadra, C Wahi
Education, 2006
2006
A Survey of the Various Identity-based Encryption Techniques in Wireless Sensor Networks
S Gautam, C Wahi, S Sharma
系统目前无法执行此操作,请稍后再试。
文章 1–20