DoS attacks in mobile ad hoc networks: A survey RH Jhaveri, SJ Patel, DC Jinwala 2012 second international conference on advanced computing & communication …, 2012 | 364 | 2012 |
Improving AODV protocol against blackhole attacks N Mistry, DC Jinwala, M Zaveri international multiconference of engineers and computer scientists 2 (6), 1-6, 2010 | 224 | 2010 |
A Clustering Approach for the l‐Diversity Model in Privacy Preserving Data Mining Using Fractional Calculus‐Bacterial Foraging Optimization Algorithm PR Bhaladhare, DC Jinwala Advances in Computer Engineering 2014 (1), 396529, 2014 | 201 | 2014 |
Resolving ambiguities in natural language software requirements: a comprehensive survey US Shah, DC Jinwala ACM SIGSOFT Software Engineering Notes 40 (5), 1-7, 2015 | 132 | 2015 |
A novel approach for grayhole and blackhole attacks in mobile ad hoc networks RH Jhaveri, SJ Patel, DC Jinwala 2012 Second International Conference on Advanced Computing & Communication …, 2012 | 102 | 2012 |
A comparative analysis of tools for verification of security protocols N Dalal, J Shah, K Hisaria, D Jinwala Int'l J. of Communications, Network and System Sciences 3 (10), 779, 2010 | 65 | 2010 |
Improving route discovery for AODV to prevent blackhole and grayhole attacks in MANETs RH Jhaveri, SJ Patel, DC Jinwala INFOCOMP Journal of Computer Science 11 (1), 1-12, 2012 | 55 | 2012 |
Novel Approaches for Privacy Preserving Data Mining in k-Anonymity Model. PR Bhaladhare, DC Jinwala J. Inf. Sci. Eng. 32 (1), 63-78, 2016 | 52 | 2016 |
Fully secure ciphertext policy attribute‐based encryption with constant length ciphertext and faster decryption N Doshi, DC Jinwala Security and Communication Networks 7 (11), 1988-2002, 2014 | 46 | 2014 |
FlexiSec: a configurable link layer security architecture for wireless sensor networks D Jinwala, D Patel, K Dasgupta arXiv preprint arXiv:1203.4697, 2012 | 46 | 2012 |
Experimenting with the novel approaches in text steganography S Dulera, D Jinwala, A Dasgupta arXiv preprint arXiv:1203.3644, 2012 | 42 | 2012 |
Hidden access structure ciphertext policy attribute based encryption with constant length ciphertext N Doshi, D Jinwala International Conference on Advanced Computing, Networking and Security, 515-523, 2011 | 40 | 2011 |
An efficient approach for privacy preserving distributed k-means clustering based on shamir’s secret sharing scheme S Patel, S Garasia, D Jinwala Trust Management VI: 6th IFIP WG 11.11 International Conference, IFIPTM 2012 …, 2012 | 38 | 2012 |
Prevention of wormhole attack in wireless sensor network DH Buch, D Jinwala arXiv preprint arXiv:1110.1928, 2011 | 37 | 2011 |
MOSAODV: solution to secure AODV against blackhole attack NH Mistry, DC Jinwala, MA Zaveri IJCNS) International Journal of Computer and Network Security 1 (3), 42-45, 2009 | 37 | 2009 |
A survey of simulators for P2P overlay networks with a case study of the P2P tree overlay using an event-driven simulator S Surati, DC Jinwala, S Garg Engineering Science and Technology, an International Journal 20 (2), 705-720, 2017 | 34 | 2017 |
A reputation‐based RPL protocol to detect selective forwarding attack in Internet of Things A Patel, D Jinwala International Journal of Communication Systems 35 (1), e5007, 2022 | 31 | 2022 |
Blackhole detection in 6LoWPAN based internet of things: an anomaly based approach HB Patel, DC Jinwala TENCON 2019-2019 IEEE Region 10 Conference (TENCON), 947-954, 2019 | 31 | 2019 |
An excursion to software development life cycle models: an old to ever-growing models US Shah, DC Jinwala, SJ Patel ACM SIGSOFT Software Engineering Notes 41 (1), 1-6, 2016 | 31 | 2016 |
Privacy preserving distributed k-means clustering in malicious model using zero knowledge proof S Patel, V Patel, D Jinwala Distributed Computing and Internet Technology: 9th International Conference …, 2013 | 31 | 2013 |