Detection of malicious attack in MANET a behavioral approach M Patel, S Sharma 2013 3rd IEEE International Advance Computing Conference (IACC), 388-393, 2013 | 82 | 2013 |
An improved network intrusion detection technique based on k-means clustering via Naïve bayes classification SK Sharma, P Pandey, SK Tiwari, MS Sisodia IEEE-International Conference on Advances In Engineering, Science and …, 2012 | 76 | 2012 |
Design and implementation of image encryption algorithm by using block based symmetric transformation algorithm (hyper image encryption algorithm) H Rathod, MS Sisodia, SK Sharma International Journal of Computer Technology and Electronics Engineering …, 2011 | 55 | 2011 |
A novel approach for detecting and eliminating cooperative black hole attack using advanced DRI table in Ad hoc Network R Jaiswal, S Sharma 2013 3rd IEEE International Advance Computing Conference (IACC), 499-504, 2013 | 46 | 2013 |
Improved energy efficient secure multipath AODV routing protocol for MANET HR Jain, SK Sharma 2014 International Conference on Advances in Engineering & Technology …, 2014 | 42 | 2014 |
Detection and prevention of flooding attack using SVM M Patel, S Sharma, D Sharan 2013 International conference on communication systems and network …, 2013 | 34 | 2013 |
Enhanced SHA-192 algorithm with larger bit difference G Gupta, S Sharma 2013 International Conference on Communication Systems and Network …, 2013 | 20 | 2013 |
Network intrusion detection by using supervised and unsupervised machine learning techniques: a survey A Jain, S Sharma, MS Sisodia International Journal of Computer Technology and Electronics Engineering 1 …, 2011 | 13 | 2011 |
Queue length based load balancing technique using with AOMDV protocol in MANET A Shukla, S Sharma International Journal of Scientific & Engineering Research 4 (10), 506-511, 2013 | 12 | 2013 |
Review study of routing protocols and versatile challenges of MANET N Chaurasia, S Sharma, D Soni International Journal 1 (2), 150-157, 2012 | 10 | 2012 |
A review and comparative study of block based symmetric transformation algorithm for image encryption H Rathod, MS Sisodia, SK Sharma International Journal of Computer Technology and Electronics Engineering …, 2011 | 9 | 2011 |
Review of Machine Learning methods for Identification of Cyberbullying in Social Media N Singh, SK Sharma 2021 International Conference on Artificial Intelligence and Smart Systems …, 2021 | 8 | 2021 |
Aquasome: A Novel Drug Delivery Approach Using Nanocrystaline Biomaterial S Sharma, A Gupta, H Niranjan, M Goyal Current Research in Pharmaceutical Sciences, 16-21, 2012 | 8 | 2012 |
An efficient automated multi-modal cyberbullying detection using decision fusion classifier on social media platforms NM Singh, SK Sharma Multimedia Tools and Applications 83 (7), 20507-20535, 2024 | 7 | 2024 |
Identification of node behavior for Mobile Ad-hoc Network K Choure, S Sharma International Journal of Advanced Computer Research (IJACR) 2, 2012 | 5 | 2012 |
Relative cluster entropy based wormhole detection using AOMDV in adhoc network R Jaiswal, S Sharma 2012 Fourth International Conference on Computational Intelligence and …, 2012 | 5 | 2012 |
Detection and prevention of Routing Attacks in MANET using AODV M Patel, S Sharma International Journal of Advanced Research in Computer Science and …, 2012 | 5 | 2012 |
Mathematical Modelling and Deep Learning: Innovations in E-Commerce Sentiment Analysis AS Awate, SK Sharma Mathematical Modelling 27 (1), 2024 | 4 | 2024 |
Reversible data hiding by utilizing AES encryption and LZW compression AK Joshi, S Sharma Proceedings of International Conference on Recent Advancement on Computer …, 2018 | 4 | 2018 |
Network intrusion detection by using feature reduction technique FL Lawrence, SK Sharma, MS Sisodia International Journal of Advanced Research in Computer Science and …, 2012 | 4 | 2012 |