MANET routing protocols and wormhole attack against AODV RH Jhaveri, AD Patel, JD Parmar, BI Shah International Journal of Computer Science and Network Security 10 (4), 12-18, 2010 | 157 | 2010 |
A Comprehensive Survey: Ransomware Attacks - Prevention, Monitoring and Damage Control J Tailor, AD Patel International Journal of Research and Scintific Innovation 4 (VIS), 116-121, 2017 | 76 | 2017 |
Sensor-based activity recognition in the context of ambient assisted living systems: A review A Patel, J Shah Journal of Ambient Intelligence and Smart Environments 11 (4), 301-322, 2019 | 53 | 2019 |
Performance analysis of supervised machine learning algorithms to recognize human activity in ambient assisted living environment AD Patel, JH Shah 2019 IEEE 16th India council international conference (INDICON), 1-4, 2019 | 23 | 2019 |
A malicious activity monitoring mechanism to detect and prevent ransomware A Patel, J Tailor Computer Fraud & Security 2020 (1), 2020 | 21 | 2020 |
Real-time human behaviour monitoring using hybrid ambient assisted living framework A Patel, J Shah Journal of Reliable Intelligent Environments, 1-12, 2020 | 18 | 2020 |
Comprehensive study of various DoS attacks and defense approaches in MANETs RH Jhaveri, AD Patel, KJ Dangarwala 2012 International Conference on Emerging Trends in Science, Engineering and …, 2012 | 15 | 2012 |
Wireless sensor network-theoretical findings and applications A Patel, R Jhaveri, K Dangarwala International Journal of Computer Applications 63 (10), 2013 | 13 | 2013 |
A Trust Based Solution for Detection of Network Layer Attacks in Sensor Networks BD Patel, AD Patel Micro-Electronics and Telecommunication Engineering (ICMETE), IEEE 2016 …, 2016 | 11 | 2016 |
Ambient Assisted Living System: The Scope of Research and Development JH Shah, AD Patel EECCMC 2018, 2018 | 7 | 2018 |
Smart Ecosystem to Facilitate the Elderly in Ambient Assisted Living A Patel, J Shah Proceedings of International Conference on Recent Trends in Machine Learning …, 2021 | 6 | 2021 |
Matlab Implementation of Multiuser Code Division Multiple Access‖ AA Patel, AD Patel Journal of telecommunications 7 (2), 40-45, 2011 | 6 | 2011 |
Priority-based approach to mitigate selfish misbehaviour in delay tolerant network A Patel, D Bhadra International Journal of Communication Networks and Distributed Systems 26 …, 2021 | 4 | 2021 |
Energy Efficient Routing Protocols for Wireless Sensor Networks: A Survey HA Soni, AD Patel Advances in Computer Science and Information Technology (ACSIT) 2 (7), 7-12, 2015 | 4 | 2015 |
Hierarchical routing protocols in wireless sensor network D Patel Bhoomika, D Patel Ashish International Journal of Computer Technology & Applications 6 (5), 847-851, 2015 | 4 | 2015 |
Graph based Approach and Clustering of Patterns (GACP) for Sequential Pattern Mining P Ashish, AAP International Journal on Computer Science and Engineering (IJCSE) 3 (4 …, 2011 | 4* | 2011 |
Towards enhancing the health standards of elderly: role of ambient sensors and user perspective A Patel, J Shah International Journal of Engineering Systems Modelling and Simulation 13 (1 …, 2022 | 3 | 2022 |
Secure data aggregation using homomorpic encryption in wireless sensor networks: A survey SS Maksud, AD Patel Advances in Computer Science and Information Technology (ACSIT) 2 (7), 13-20, 2015 | 3 | 2015 |
Comprehensive Survey on Security Problems and Key Technologies of the Internet of Things (IOT) J Tailor, AD Patel International Journal of Research and Scientific Innovation 4 (VIS), 107-110, 2017 | 2 | 2017 |
Transfer Learning for Audio Waveform to Guitar Chord Spectrograms Using the Convolution Neural Network Y Jadhav, A Patel, RH Jhaveri, R Raut Mobile Information Systems 2022 (1), 8544765, 2022 | 1 | 2022 |