关注
Vrinda Tokekar
Vrinda Tokekar
IET, Devi Ahilya University, Indore (India)
在 ietdavv.edu.in 的电子邮件经过验证
标题
引用次数
引用次数
年份
Mitigating the effects of Black hole attacks on AODV routing protocol in mobile ad hoc networks
AK Jain, V Tokekar
2015 International Conference on Pervasive Computing (ICPC), 1-6, 2015
702015
Prominence of mapreduce in big data processing
S Pandey, V Tokekar
2014 Fourth International Conference on Communication Systems and Network …, 2014
692014
Security enhancement in MANETs using fuzzy-based trust computation against black hole attacks
AK Jain, V Tokekar, S Shrivastava
Information and Communication Technology: Proceedings of ICICT 2016, 39-47, 2018
372018
Classification of denial of service attacks in mobile ad hoc networks
AK Jain, V Tokekar
2011 International Conference on Computational Intelligence and …, 2011
362011
Discovering context of labeled text documents using context similarity coefficient
A Kulkarni, V Tokekar, P Kulkarni
Procedia computer science 49, 118-127, 2015
232015
Analysis of batcing policy in view of user reneging in VOD system
V Tokekar, AK Ramani, S Tokekar
2005 Annual IEEE India Conference-Indicon, 399-403, 2005
232005
Identifying context of text documents using Naïve Bayes classification and Apriori association rule mining
AR Kulkarni, V Tokekar, P Kulkarni
2012 CSI sixth international conference on software engineering (CONSEG), 1-4, 2012
192012
Detection and avoidance of integrated attacks on MANET using trusted hyperbolic AODV routing protocol
AK Jain, V Tokekar, U Singh
Journal of Mobile Computing, Communications & Mobile Networks 3 (2), 21-34, 2016
162016
Performance analysis of MC-CDMA system
M Jangalwa, V Tokekar
2012 1st International Conference on Recent Advances in Information …, 2012
152012
An approach for surveillance using wireless sensor networks (WSN)
BA Khan, M Sharif, M Raza, T Umer, K Hussain, AU Khan
Journal of Information & Communication Technology 1 (2), 35-42, 2007
152007
Bayesian network based trust model with time window for pure P2P computing systems
J Dubey, V Tokekar
2014 IEEE Global Conference on Wireless Computing & Networking (GCWCN), 219-223, 2014
142014
A novel approach for detecting DDoS attack in MANET
D Gautam, V Tokekar
Materials Today: Proceedings 29, 674-677, 2020
122020
Performance analysis of Selective Mapping and clipping based multicarrier-CDMA system with and without MIMO technique
M Jangalwa, V Tokekar
AEU-International Journal of Electronics and Communications 101, 62-68, 2019
82019
Identification of efficient peers in P2P computing system for real time applications
J Dubey, V Tokekar
arXiv preprint arXiv:1212.3074, 2012
72012
Performance studies of networked video-on-demand systems
V Tokekar, AK Ramani, S Tokekar
Proceedings. 14th International Conference on Computer Communications and …, 2005
72005
A quantitative model for the evaluation of reengineering risk in infrastructure perspective of legacy system
EA Rajavat, V Tokekar
2012 CSI Sixth International Conference on Software Engineering (CONSEG), 1-8, 2012
62012
ReeRisk–A Decisional Risk Engineering Framework for Legacy System Rejuvenation through Reengineering
A Rajavat, V Tokekar
Computer Networks and Information Technologies: Second International …, 2011
62011
Port scanning based model to detect Malicious TCP traffic and mitigate its impact in SDN
J Patil, V Tokekar, A Rajan, A Rawat
2021 2nd International Conference on Secure Cyber Computing and …, 2021
52021
An approach to analyze the impact of DDOS attack on mobile cloud computing
D Gautam, V Tokekar
2017 International Conference on Information, Communication, Instrumentation …, 2017
52017
Performance of MIMO MC-CDMA system with PSK modulation technique
M Jangalwa, V Tokekar
2016 3rd International Conference on Signal Processing and Integrated …, 2016
52016
系统目前无法执行此操作,请稍后再试。
文章 1–20