Mitigating the effects of Black hole attacks on AODV routing protocol in mobile ad hoc networks AK Jain, V Tokekar 2015 International Conference on Pervasive Computing (ICPC), 1-6, 2015 | 70 | 2015 |
Prominence of mapreduce in big data processing S Pandey, V Tokekar 2014 Fourth International Conference on Communication Systems and Network …, 2014 | 69 | 2014 |
Security enhancement in MANETs using fuzzy-based trust computation against black hole attacks AK Jain, V Tokekar, S Shrivastava Information and Communication Technology: Proceedings of ICICT 2016, 39-47, 2018 | 37 | 2018 |
Classification of denial of service attacks in mobile ad hoc networks AK Jain, V Tokekar 2011 International Conference on Computational Intelligence and …, 2011 | 36 | 2011 |
Discovering context of labeled text documents using context similarity coefficient A Kulkarni, V Tokekar, P Kulkarni Procedia computer science 49, 118-127, 2015 | 23 | 2015 |
Analysis of batcing policy in view of user reneging in VOD system V Tokekar, AK Ramani, S Tokekar 2005 Annual IEEE India Conference-Indicon, 399-403, 2005 | 23 | 2005 |
Identifying context of text documents using Naïve Bayes classification and Apriori association rule mining AR Kulkarni, V Tokekar, P Kulkarni 2012 CSI sixth international conference on software engineering (CONSEG), 1-4, 2012 | 19 | 2012 |
Detection and avoidance of integrated attacks on MANET using trusted hyperbolic AODV routing protocol AK Jain, V Tokekar, U Singh Journal of Mobile Computing, Communications & Mobile Networks 3 (2), 21-34, 2016 | 16 | 2016 |
Performance analysis of MC-CDMA system M Jangalwa, V Tokekar 2012 1st International Conference on Recent Advances in Information …, 2012 | 15 | 2012 |
An approach for surveillance using wireless sensor networks (WSN) BA Khan, M Sharif, M Raza, T Umer, K Hussain, AU Khan Journal of Information & Communication Technology 1 (2), 35-42, 2007 | 15 | 2007 |
Bayesian network based trust model with time window for pure P2P computing systems J Dubey, V Tokekar 2014 IEEE Global Conference on Wireless Computing & Networking (GCWCN), 219-223, 2014 | 14 | 2014 |
A novel approach for detecting DDoS attack in MANET D Gautam, V Tokekar Materials Today: Proceedings 29, 674-677, 2020 | 12 | 2020 |
Performance analysis of Selective Mapping and clipping based multicarrier-CDMA system with and without MIMO technique M Jangalwa, V Tokekar AEU-International Journal of Electronics and Communications 101, 62-68, 2019 | 8 | 2019 |
Identification of efficient peers in P2P computing system for real time applications J Dubey, V Tokekar arXiv preprint arXiv:1212.3074, 2012 | 7 | 2012 |
Performance studies of networked video-on-demand systems V Tokekar, AK Ramani, S Tokekar Proceedings. 14th International Conference on Computer Communications and …, 2005 | 7 | 2005 |
A quantitative model for the evaluation of reengineering risk in infrastructure perspective of legacy system EA Rajavat, V Tokekar 2012 CSI Sixth International Conference on Software Engineering (CONSEG), 1-8, 2012 | 6 | 2012 |
ReeRisk–A Decisional Risk Engineering Framework for Legacy System Rejuvenation through Reengineering A Rajavat, V Tokekar Computer Networks and Information Technologies: Second International …, 2011 | 6 | 2011 |
Port scanning based model to detect Malicious TCP traffic and mitigate its impact in SDN J Patil, V Tokekar, A Rajan, A Rawat 2021 2nd International Conference on Secure Cyber Computing and …, 2021 | 5 | 2021 |
An approach to analyze the impact of DDOS attack on mobile cloud computing D Gautam, V Tokekar 2017 International Conference on Information, Communication, Instrumentation …, 2017 | 5 | 2017 |
Performance of MIMO MC-CDMA system with PSK modulation technique M Jangalwa, V Tokekar 2016 3rd International Conference on Signal Processing and Integrated …, 2016 | 5 | 2016 |