A review on: detection and prevention of wormhole attacks in MANET Y Gohil, S Sakhreliya, S Menaria International Journal of Scientific and Research Publications 3 (2), 1-6, 2013 | 10 | 2013 |
Comparative study of distributed intrusion detection in ad-hoc networks S Menaria, S Valiveti, K Kotecha International Journal of Computer Applications 8 (9), 11-16, 2010 | 10 | 2010 |
Multi agent-based distributed data mining RB Prajapati, S Menaria International Journal of Advanced Research in Computer Engineering …, 2012 | 4 | 2012 |
An Improvement in AOMDV with Randomization PA Darji, S Menaria International Journal of Computer Technology and Applications 3 (3), 2012 | 3 | 2012 |
A Review on Broadcasting Schemes for Emergency Messages in VANET ADS Menaria Int.J.Computer Technology & Applications 3 (6), 2022-2026, 2012 | 2* | 2012 |
Multipath Extension of AODV to improve End to End Delay sumitra menaria Swati K. Vekariya Int.J.Computer Technology & Applications 3 (3), 1172-1178, 2012 | 2 | 2012 |
Attack generating and its implication on Ad Hoc Networks S Menaria, S Valiveti, K Kotecha 2011 International Conference on Emerging Trends in Networks and Computer …, 2011 | 2 | 2011 |
SECURE IMAGE DATA BY THREE STAGES OF ENCRYPTION USING BLOCK BASED TRANSFORMATION SM GAYATHRI D Indian Streams Research Journal 3 (5), 2013 | 1 | 2013 |
Finding Near Duplicates using Categorical Approach J Japee, S Menaria | | 2015 |
A DETAILED STUDY ON PERFORMANCE OPTIMIZATION OF CLUSTERING ON GPU SM VIJAL D. PATEL Golden Research Thoughts Journal, 2013 | | 2013 |
Energy Efficient Intrusion Detection System in Mobile Ad-Hoc Network HB Tandel, MS Menaria | | |