关注
Jigyasu Dubey
Jigyasu Dubey
Shri Vaishnav Institute of Information Technology, SVVV, indore
在 svvv.edu.in 的电子邮件经过验证
标题
引用次数
引用次数
年份
A survey on phishing attacks
KR Sahu, J Dubey
International Journal of Computer Applications 88 (10), 2014
332014
KBB: A hybrid method for intrusion detection
S Dubey, J Dubey
2015 International Conference on Computer, Communication and Control (IC4), 1-6, 2015
322015
Opinion based trusted AODV routing protocol for MANET
R Hinge, J Dubey
Proceedings of the Second International Conference on Information and …, 2016
182016
Bayesian network based trust model with time window for pure P2P computing systems
J Dubey, V Tokekar
2014 IEEE Global Conference on Wireless Computing & Networking (GCWCN), 219-223, 2014
142014
Mobile ad hoc network performance improvement using strategical RED
JK Patel, J Dubey
2012 Ninth International Conference on Wireless and Optical Communications …, 2012
102012
Restaurant recommendation system based on novel approach using k-means and Naïve Bayes classifiers
S Joshi, J Dubey
Proceedings of the Global AI Congress 2019, 609-620, 2020
92020
Identification of efficient peers in P2P computing system for real time applications
J Dubey, V Tokekar
arXiv preprint arXiv:1212.3074, 2012
72012
Identification of Reliable Peer Groups in Peer-to-Peer Computing Systems
VT Jigyasu Dubey
Lecture Notes of the Institute for Computer Sciences, Social Informatics and …, 2012
5*2012
Identification of Efficient Peers in P2P Computing Systems for Real Time Applications
DVT Jigyasu Dubey
International Journal of Peer to Peer Networks (IJP2P) 3, 01-11, 2010
5*2010
Identification of Efficient Peers in P2P Computing Systems for Real Time Applications
DVT Jigyasu Dubey
International Journal of Peer to Peer Networks (IJP2P) 3, 01-11, 2010
5*2010
A hybrid approach for dynamic intrusion detection, enhancement of performance and security in MANET
D Patidar, J Dubey
Proceedings of the Second International Conference on Information and …, 2016
42016
A Survey of Internet of Things node’s transactions Secure through Blockchain Technology
M Arse, J Dubey
International Journal of Computer Applications 175 (25), 33-37, 2020
32020
Energy aware routing technique for improving network: An analysis and performance
A Dubey, J Dube
2016 International Conference on ICT in Business Industry & Government …, 2016
32016
An Efficient Methodological Study for Optimization of Negative Association Rule Mining
P Vyas, J Dubey
IJCA, ICRTITCS 3, 27-31, 2013
32013
P2PCS-A Pure Peer-to-Peer Computing System for Large Scale Computation Problems
J Dubey, V Tokekar
2011 International Conference on Computational Intelligence and …, 2011
32011
Development of the player satisfaction scale-a factor analytic study
V Dumblekar, J Dubey, U Dhar
International Simulation and Gaming Association Conference, 147-160, 2021
22021
A framework for pure Peer-to-Peer computing system
J Dubey, V Tokekar
2012 Ninth International Conference on Wireless and Optical Communications …, 2012
22012
Gaming, Simulation and Innovations: Challenges and Opportunities: 52nd International Simulation and Gaming Association Conference, ISAGA 2021, Indore, India, September 6–10 …
U Dhar, J Dubey, V Dumblekar, S Meijer, H Lukosch
Springer Nature, 2022
12022
A Study of Blockchain for Secure Smart Contract
J Sharma, J Dubey
Inventive Systems and Control: Proceedings of ICISC 2021, 591-598, 2021
12021
Study of state of arts methods for event extraction
N Chaturvedi, J Dubey
Proceedings of International Conference on Advances in Computer Engineering …, 2021
12021
系统目前无法执行此操作,请稍后再试。
文章 1–20