Detection of DDOS attacks using source IP based entropy J Singh, M Sachdeva, K Kumar vol 3, 201-210, 2013 | 21 | 2013 |
Experimental analysis of distributed routing algorithms in ad hoc mobile networks J Singh, M Bhardwaj, A Sharma Procedia Computer Science 57, 1411-1416, 2015 | 5 | 2015 |
Honey Bee Optimization based Zone Divided Wireless Sensor Network N Rani, J Singh International Journal of Engineering Research 5 (04), 2016 | 1 | 2016 |
Progressive Impairment of Immune Reserves in Different Stages of Cirrhosis And in Sepsis S Sukriti, JS Singh, AK Choudhury, S Das, M Premkumar, C Bihari, ... HEPATOLOGY 66, 362A-363A, 2017 | | 2017 |
Performance Evaluation of Sensor Node Scalability on Reactive Modified I-Leach Protocol J Singh, J Singh | | 2015 |
Enhance Security Issues Using Data Cipher Algorithm In Cloud J Singh, R Rana JCSE International Journal of Computer-Science and Engineering Open Access, 2014 | | 2014 |
Whither pure science in India: a survey of graduate physics students of a representative University of Delhi college K Kumar, P Arun, J Singh Current Science 99 (9), 1196-1207, 2010 | | 2010 |
Evaluation of MANET Routing Protocols using OMNeT+ C Jain, J Singh | | |
Anomaly Based Detection of DDoS Attacks: A Review G Kumar, J Singh, M Sachdeva, K Kumar | | |
IMPLEMENTATION OF OLSR IN MANET USING OMNETPP B Kumar, J Singh | | |
Enhancement of SZRP Hybrid Routing Protocol Using OPNET Simulator GS Jatana, J Singh | | |
A Comprehensive Survey on Data Mining Techniques to Extent Intrusion Detection System S Gupta, J Singh | | |
Implementation of Quadratic Sieve Method For Integer Factorization In RSA Cryptosystem R Rana, J Singh, J Singh | | |