ES-ARP: an efficient and secure address resolution protocol M Ataullah, N Chauhan 2012 IEEE Students' Conference on Electrical, Electronics and Computer …, 2012 | 27 | 2012 |
A survey on improving the efficiency of different web structure mining algorithms P Chopra, M Ataullah International Journal of Engineering and Advanced Technology (IJEAT) 2 (2249 …, 2013 | 23 | 2013 |
Securing the wireless sensor network from denial of sleep attack by isolating the nodes S Kaur, M Ataullah International Journal of Computer Applications 103 (1), 2014 | 11 | 2014 |
Security from denial of sleep attack in wireless sensor network S Kaur, M Ataullah, M Garg Int. J. Comput. Technol 4 (2b), 419-425, 2013 | 10 | 2013 |
A Survey on Various Solutions of ARP Attacks I Ahmad, M Ataullah International Journal of Advanced Research in Computer Science and Software …, 2013 | 2 | 2013 |
Edge Computing Based Trustworthy Data Collection by Using Cryptography Technique from IoT G Sridhar, CSP Reddy, MLSS Reddy, K Sudheer, SH Tulla, M Ataullah International Journal of Early Childhood Special Education 14 (3), 3644-3654, 2022 | 1 | 2022 |
An efficient and secure solution for the problems of arp cache poisoning attacks M Ataullah, N Chauhan International Journal of Information and Communication Engineering 6 (8 …, 2012 | 1 | 2012 |
Exploring security and privacy enhancement technologies in the Internet of Things: A comprehensive review M Ataullah, N Chauhan Security and Privacy 7 (6), e448, 2024 | | 2024 |
Privacy and Data Usefulness Trade-off for Autonomic IoT Applications: A Framework M Ataullah, N Chauhan 2024 2nd International Conference on Computer, Communication and Control …, 2024 | | 2024 |
Dukandari : E-commerce websites & App BS Chahar, A Kumar, A Dhaka, M Ataullah Journal of Emerging Technologies and Innovative Research (JETIR) 9 (4), 381-388, 2022 | | 2022 |
Forensic Access To IoT Using Blockchain: A Framework A Thotapalli, M Ataullah International Conference on Innovative Computing & Communication (ICICC), 2021 | | 2021 |
Cloud Based Enhanced Cryptography Technique Y Ahuja, A Chaudhary, D Nagaraju, M Ataullah International Journal of All Research Education and Scientific Methods …, 2021 | | 2021 |
Enhanced Routing Protocol To Improve Data Transfer Rate and Qos In VANET P Joshi, M Ataullah Think India Journal 22 (16), 3500-3510, 2019 | | 2019 |
A REVIEW ON VARIOUS DATA TRANSMISSION PROTOCOLS IN VANET P Joshi, M Ataullah International Journal of Current Advanced Research 7 (3(I)), 11005-11010, 2018 | | 2018 |
The Analysis and Impact of Co2 Worldwide J Singh, M Ataullah International Journals of Advanced Research in Computer Science and …, 2017 | | 2017 |
A Survey on Architecture of Multimedia Communication over MANET using SIP Client Application NB Devi, M Ataullah International Journal of Advanced Research in Computer Science and Software …, 2016 | | 2016 |
Analysis on Various Methods to Detect ARP Cache Poisoning Attack NK Garcha, M Ataullah International Journal of Advanced Research in Computer Science and Software …, 2015 | | 2015 |
Improving Wireless Security with Enhancement in WPA2 Protocol S Rawat, M Ataullah International Journal of Applied Engineering Research (IJAER) 10 (15), 1630-1634, 2015 | | 2015 |
Increasing the Security of Wireless Network against Spoofed-Attacks A Joshi, M Ataullah International Journal of Applied Engineering Research (IJAER) 10 (55), 1635-1640, 2015 | | 2015 |
Multi-tier Graphical Password Authentication for Foolproof Login in Cloud Applications Shivangi, M Ataullah International journal of Science Technology & Management, 2015 | | 2015 |