A review on steganography and cryptography R Mishra, P Bhanodiya 2015 International Conference on Advances in Computer Engineering and …, 2015 | 85 | 2015 |
SCNTA: Monitoring of network availability and activity for identification of anomalies using machine learning approaches R Rawat, B Garg, K Pachlasiya, V Mahor, S Telang, M Chouhan, ... International Journal of Information Technology and Web Engineering (IJITWE …, 2022 | 67 | 2022 |
The Smart City Based on AI and Infrastructure: A New Mobility Concepts and Realities V Mahor, S Bijrothiya, R Mishra, R Rawat, A Soni Autonomous Vehicles Volume 1: Using Machine Intelligence, 277-295, 2022 | 24 | 2022 |
An edge based image steganography with compression and encryption R Mishra, A Mishra, P Bhanodiya 2015 International Conference on Computer, Communication and Control (IC4), 1-4, 2015 | 18 | 2015 |
ML Techniques for Attack and Anomaly Detection in Internet of Things Networks V Mahor, S Bijrothiya, R Mishra, R Rawat Autonomous Vehicles Volume 1: Using Machine Intelligence, 235-252, 2022 | 9 | 2022 |
An emerging technology: green computing R Mishra, S Jain, N Kurmi International Research Journal of Engineering and Technology, 2015 | 4 | 2015 |
Forecasting the Traits of Cyber Criminals Based on Case Studies N Bansod, DB Kamble, R Mishra, M Kuliha Dark Web Pattern Recognition and Crime Analysis Using Machine Intelligence …, 2022 | 1 | 2022 |
A Technique for Monitoring Cyber‐Attacks on Self‐Driving Automobiles‐Based VANET V Mahor, S Bijrothiya, R Mishra, R Rawat Autonomous Vehicles Volume 2: Smart Vehicles, 317-333, 2022 | | 2022 |
A Review on Edge Based Image Steganography D Dongre, R Mishra International Journal on Recent and Innovation Trends in Computing and …, 2014 | | 2014 |