Facial expression detection techniques: based on Viola and Jones algorithm and principal component analysis S Agrawal, P Khatri 2015 Fifth International Conference on Advanced Computing & Communication …, 2015 | 92 | 2015 |
Performance study of ad-hoc reactive routing protocols P Khatri, M Rajput, A Shastri, K Solanki Journal of Computer Science 6 (10), 1159, 2010 | 52 | 2010 |
Hiding sensitive association rules without altering the support of sensitive item (s) D Jain, P Khatri, R Soni, BK Chaurasia Advances in Computer Science and Information Technology. Networks and …, 2012 | 44 | 2012 |
Comparison of ad-hoc reactive routing protocols using opnet modeler M Rajput, P Khatri, A Shastri, K Solanki 2010 International Conference on Computer Information Systems and Industrial …, 2010 | 41 | 2010 |
Efficient power aware AODV routing protocol in MANET C Mafirabadza, TTT Makausi, P Khatri Proceedings of the International Conference on Advances in Information …, 2016 | 27 | 2016 |
IoT forensics: A review on current trends, approaches and foreseen challenges G Surange, P Khatri 2021 8th International Conference on Computing for Sustainable Global …, 2021 | 23 | 2021 |
Performance analysis of leach based approaches for large area coverage in wireless sensor network M Rajput, SK Sharma, P Khatri 2017 International Conference on Information, Communication, Instrumentation …, 2017 | 18 | 2017 |
Fingerprint watermarking and steganography for ATM transaction using LSB-RSA and 3-DWT algorithm M Garg, S Gupta, P Khatri 2015 International Conference on Communication Networks (ICCN), 246-251, 2015 | 16 | 2015 |
Global host allocation policy for virtual machine in cloud computing M Kumar, AK Yadav, P Khatri, RS Raw International Journal of Information Technology 10, 279-287, 2018 | 15 | 2018 |
Using identity and trust with key management for achieving security in Ad hoc Networks P Khatri 2014 IEEE International Advance Computing Conference (IACC), 271-275, 2014 | 15 | 2014 |
Integrated intelligent IOT forensic framework for data acquisition through open-source tools G Surange, P Khatri International Journal of Information Technology 14 (6), 3011-3018, 2022 | 12 | 2022 |
Energy analysis of AODV routing protocol in MANET C Mafirabadza, P Khatri 2016 International Conference on Communication and Signal Processing (ICCSP …, 2016 | 12 | 2016 |
Trust evaluation in wireless ad hoc networks using fuzzy system P Khatri, S Tapaswi, UP Verma Proceedings of the CUBE International Information Technology Conference, 779-783, 2012 | 12 | 2012 |
Digital forensic analysis of Facebook app in virtual environment AK Agrawal, A Sharma, P Khatri 2019 6th International Conference on Computing for Sustainable Global …, 2019 | 10 | 2019 |
Forensic Analysis of a Virtual Android Phone A Sharma, AK Agrawal, B Kumar, P Khatri International Conference on Communication, Networks and Computing, 286-297, 2018 | 10 | 2018 |
Comparative study of mobile forensic tools AK Agrawal, P Khatri, SR Sinha Advances in Data and Information Sciences: Proceedings of ICDIS-2017, Volume …, 2018 | 9 | 2018 |
Facial expression recognition techniques: a survey S Agrawal, P Khatri, S Gupta ITM University. Gwalior, India, 2014 | 8 | 2014 |
Fuzzy based trust management for wireless ad hoc networks P Khatri, S Tapaswi, UP Verma 2010 International Conference on Computer and Communication Technology …, 2010 | 8 | 2010 |
Energy aware routing protocol over leach on wireless sensor network R Goyal, S Gupta, P Khatri 2016 International Conference on Computing, Communication and Automation …, 2016 | 7 | 2016 |
Residual energy based multipath routing protocol (REBM) in wireless sensor network R Singh, S Kant, P Khatri International Conference on Computing, Communication & Automation, 420-426, 2015 | 6 | 2015 |