Hybrid approach for detecting ddos attacks in software defined networks G Kaur, P Gupta 2019 Twelfth International Conference on Contemporary Computing (IC3), 1-6, 2019 | 31 | 2019 |
Evolution of mobile communication network: From 1G to 5G D Prinima, DJ Pruthi Int. J. Innov. Res. Comput. Commun. Eng 4 (4), 224, 2016 | 18 | 2016 |
Analysis of prediction techniques based on classification and regression P Sagar, P Prinima, I Indu International Journal of Computer Applications 163 (7), 47-51, 2017 | 14 | 2017 |
An ROI-based robust video steganography technique using SVD in wavelet domain U Pilania, R Tanwar, P Gupta Open Computer Science 12 (1), 1-16, 2022 | 12 | 2022 |
A forecasting method with efficient selection of variables in multivariate data sets P Sagar, P Gupta, I Kashyap International Journal of Information Technology 13, 1039-1046, 2021 | 12 | 2021 |
Analysis and implementation of IWT-SVD scheme for video steganography U Pilania, P Gupta Micro-Electronics and Telecommunication Engineering: Proceedings of 3rd …, 2020 | 9 | 2020 |
Design strategies for aodv implementation in linux P Gupta, RK Tuteja International Journal of Advanced Computer Science and Applications 1 (6), 2010 | 9 | 2010 |
IN VITRO STUDIES ON THE TUBERCULOSTATIC ACTIVITY OF CYANO‐ALIPHATIC ACID HYDRAZIDES AND RELATED COMPOUNDS. PART I SL Mukherjee, J Naha, S Raymahasaya, SL Laskar, PR Gupta Journal of Pharmacy and Pharmacology 7 (1), 35-38, 1955 | 9 | 1955 |
A novel prediction algorithm for multivariate data sets P Sagar, P Gupta, R Tanwar Decision Making: Applications in Management and Engineering 4 (2), 225-240, 2021 | 6 | 2021 |
Bayesian inferences in generalized Lindley shared frailty model with left censored bivariate data S Tyagi, A Pandey, DD Hanagal, P Gupta Advance Research Trends in Statistics and Data Science, 137-157, 2021 | 6 | 2021 |
Implementation of Dual security through DSA and audio Steganography N Taneja, P Gupta 2015 International Conference on Green Computing and Internet of Things …, 2015 | 6 | 2015 |
A proposed optimized steganography technique using ROI, IWT and SVD U Pilania, P Gupta International Journal of Information Systems & Management Science, Forthcoming, 2019 | 5 | 2019 |
Detection of distributed denial of service attacks for IoT-based healthcare systems G Kaur, P Gupta Computer Assisted Methods in Engineering and Science 30 (2), 167-186, 2023 | 4 | 2023 |
A roadmap of steganography tools: conventional to modern U Pilania, R Tanwar, P Gupta, T Choudhury Spatial Information Research, 1-14, 2021 | 4 | 2021 |
LabVIEW Based Speed Control of DC Motor Using PID Controller D Kumar, M Hussain, SV Tyagi, PR Gupta, P Salim International Journal of Electrical and Electronics Research 3 (2), 293-298, 2015 | 4 | 2015 |
Classifier for DDoS attack detection in software defined networks G Kaur, P Gupta Internet of Things in Business Transformation: Developing an Engineering and …, 2021 | 3 | 2021 |
Proposed Optimization Technique to detect DDOS Attacks on Software Defined Networks G Kaur, P Gupta International Journal of Information Systems & Management Science 2 (2), 2019 | 3 | 2019 |
Prediction technique for time series data sets using regression models P Sagar, P Gupta, I Kashyap Advanced Informatics for Computing Research: Second International Conference …, 2019 | 3 | 2019 |
A Novel Ensemble Earthquake Prediction Method (EEPM) by Combining Parameters and Precursors S Mukherjee, P Gupta, P Sagar, N Varshney, M Chhetri Journal of Sensors 2022 (1), 5321530, 2022 | 2 | 2022 |
Performance Analysis of Open-Source Image Steganography Tools U Pilania, R Tanwar, P Gupta Journal of Engineering and Applied Sciences 8 (1), 2021 | 2 | 2021 |