Comparative Study of OLSR, DSDV, AODV, DSR and ZRP Routing Protocols Under Blackhole Attack in Mobile Ad Hoc Network A Singh, G Singh, M Singh Intelligent Communication, Control and Devices, 443-453, 2018 | 33 | 2018 |
Detection of Malicious Node in Wireless Sensor Network based on Data Mining M Singh, G Mehta, C Vaid, P Oberoi International Conference on Computing Sciences, ICCS 2012, 291-294, 2012 | 19 | 2012 |
Detection of black hole in Wireless Sensor Network based on Data Mining G Kaur, M Singh Confluence The Next Generation Information Technology Summit (Confluence …, 2014 | 8 | 2014 |
Research on the Application of Web Mining Technique Based on XML for Unstructured Web Data Using LINQ P Kaur, R Garg, R Singh, M Singh Advanced Materials Research 403, 1062-1067, 2012 | 8 | 2012 |
Detecting Cyber Crime by Analyzing Users Data S Vashisht, M Kaur, R Sapra, M Singh International Journal of Computer Technology and Applications 3 (3), 1029-1033, 2012 | 3 | 2012 |
A Data Mining Approach for Saving Service Selection R Sapra, Sheveta, M Singh International Journal of Computer Technology & Applications 3 (3), 1105-1109, 2012 | 1 | 2012 |
A Comparative Evaluation of Mining Techniques to Detect Malicious Node in Wireless Sensor Networks M Singh, N Kaur, A Kaur, G Pushkarna International Journal of Cyber Warfare and Terrorism (IJCWT) 7 (2), 42-53, 2017 | | 2017 |
DETECTION OF BLACK HOLE NODE IN WIRELESS SENSOR NETWORKS USING DSR PROTOCOL N Kaur, A Kaur, M Singh, G Pushkarna Far East Journal of Electronics and Communications · 3, 519-536, 2016 | | 2016 |
Sensor Integrated RFID based Postal Letter Tracking System A Kaur, N Kaur, M Singh, G Pushkarna International Journal of Control Theory and Applications 9 (11), 5455-5466, 2016 | | 2016 |
Behavior Analysis of the user based on the data to detect the cyber crime Sheveta, R Sapra, M Singh 8th International Conference on Upcoming Trends in IT, 2012 | | 2012 |
Saving Service Selection using Data Mining R Sapra, Sheveta, M Singh 8th International Conference on Upcoming Trends in IT, 2012 | | 2012 |
Dynamic Traffic Light Sequence Control with Violation Detection Using RFID H Singh, M Singh | | 2012 |
A Fuzzy Clustering Based approach for Finding Fault Prone Modules in Open Source Software Systems S Parvinder, S, M Mehta, S Mandeep International conference on Network Communication and Computer 2011 IEEE …, 2011 | | 2011 |
Detection of Wormhole Attack in Wireless Sensor Network R Garg, M Singh International Conference on Computational Intelligence Applications, 2011 | | 2011 |