关注
RL Ujjwal
RL Ujjwal
未知所在单位机构
在 ipu.ac.in 的电子邮件经过验证
标题
引用次数
年份
A Comprehensive Review of IoT-Based IDS Using Intelligence Technique
R Singh, RL Ujjwal
Advances in Data and Information Sciences: Proceedings of ICDIS 2022, 117-130, 2022
12022
A walkthrough of name data networking: Architecture, functionalities, operations and open issues
VP Singh, RL Ujjwal
Sustainable Computing: Informatics and Systems 28, 100419, 2020
162020
Adaptive Congestion Controller for ABR Traffic in ATM Network
RL Ujjwal, CS Rai, N Prakash
Wireless personal communications 70, 759-768, 2013
12013
Adaptive Resource Allocation in OFDMA System: A Review
R L Ujjwal, C S Rai, N Prakash
International Journal of Computer Applications 114 (16), 21-24, 2015
2015
BiDuR: Big data analysis in UAF using R-voting system
K Varshney, R Johari, RL Ujjwal
2017 6th International Conference on Reliability, Infocom Technologies and …, 2017
42017
CAVEAT: credit card vulnerability exhibition and authentication tool
I Jain, R Johari, RL Ujjwal
Security in Computing and Communications: Second International Symposium …, 2014
142014
Fair adaptive resource allocation algorithm for heterogeneous users in OFDMA system
RL Ujjwal, CS Rai, N Prakash
2014 International Conference on Signal Processing and Integrated Networks …, 2014
52014
Feature Selection Methods for IoT Intrusion Detection System: Comparative Study
R Singh, RL Ujjwal
Computational Intelligence: Select Proceedings of InCITe 2022, 227-236, 2023
12023
FEATURE SELECTION USING BIO-INSPIRED OPTIMIZATION FOR IOT INTRUSION DETECTION AND PREVENTION SYSTEM.
R Singh, RL Ujjwal
International Journal on Information Technologies & Security 15 (3), 2023
2023
Gini impurity based NDN cache pollution attack defence mechanism
VP Singh, RL Ujjwal
Journal of Information and Optimization Sciences 41 (6), 1353-1363, 2020
72020
Hybridized bio-inspired intrusion detection system for Internet of Things
R Singh, RL Ujjwal
Frontiers in Big Data 6, 1081466, 2023
22023
Intrusion Detection System based on Chaotic Opposition for IoT Network
R Singh, RL Ujjwal
International journal of electrical and computer engineering systems 15 (2 …, 2024
2024
LsSQLIDP: Literature survey on SQL injection detection and prevention techniques
K Varshney, RL Ujjwal
Journal of Statistics and Management Systems 22 (2), 257-269, 2019
92019
Mitigating congestion in wireless sensor networks through clustering and queue assistance: a survey
SL Yadav, RL Ujjwal
Journal of Intelligent Manufacturing 32 (8), 2083-2098, 2021
142021
Name Data Networking for Interplanetary Internet: An Architectural Perspective
R Kumari, RL Ujjwal
International Journal of Research in Advent Technology 7 (5), 436-441, 2019
22019
NDN content poisoning attack mitigation using fuzzy-reputation based trust
VP Singh, RL Ujjwal
Innovations in Cyber Physical Systems: Select Proceedings of ICICPS 2020 …, 2021
22021
Novel framework for secured bulk creation of virtual machine in IaaS platform
K Varshney, RL Ujjwal
Software Quality Journal 30 (2), 513-549, 2022
2022
Performance analysis of MD5, DES and AES encryption algorithms for credit card application
R Johari, I Jain, RL Ujjwal
International Conference on Modeling and computing (ICMC–2014), 2014
72014
Privacy attack modeling and risk assessment method for name data networking
VP Singh, RL Ujjwal
Advances in Computer Communication and Computational Sciences: Proceedings …, 2019
72019
Remote online voting systemusing Aneka platform
K Varshney, R Johari, RL Ujjwal
2018 7th International Conference on Reliability, Infocom Technologies and …, 2018
22018
系统目前无法执行此操作,请稍后再试。
文章 1–20