Performance comparison of reed solomon code and BCH code over rayleigh fading channel FR Lone, A Puri, S Kumar arXiv preprint arXiv:1307.6930, 2013 | 33 | 2013 |
An improved method of detecting spoofed attack in wireless LAN S Goel, S Kumar 2009 First International Conference on Networks & Communications, 104-108, 2009 | 16 | 2009 |
Comparative Analysis of Reed Solomon Codes and BCH Codes in the Presence of AWGN Channel A Puri, S Kumar International Journal of Information and Computing Technology 3 (3), 2013 | 6 | 2013 |
Machine learning based rate adaptation in DASH to improve quality of experience AR Bhat, SK Bhadu 2017 IEEE International Conference on Smart Technologies and Management for …, 2017 | 4 | 2017 |
Intrusion detection system in Software defined Network using machine learning approach-Survey P Vaid, SK Bhadu, RM Vaid 2021 6th International Conference on Communication and Electronics Systems …, 2021 | 3 | 2021 |
Light-Fidelity: Next Generation Wireless Networks-A Survey S Kumar, S Arora 2019 International Conference on Smart Systems and Inventive Technology …, 2019 | 3 | 2019 |
Classification of COVID-19 on Chest X-Ray Images Using Deep Learning Model with Histogram Equalization and Lung Segmentation K Verma, G Sikka, A Swaraj, S Kumar, A Kumar SN Computer Science 5 (4), 379, 2024 | 2 | 2024 |
Network Intrusion Detection System Using Machine Learning S Kumar, P Pathak, K Agrawal, V Goswami, A Mahindru International Conference on Emerging Trends and Technologies on Intelligent …, 2023 | 2 | 2023 |
Software-Defined Networking: A Survey S Hangloo, S Kumar Computer Networks, 2018 | 2 | 2018 |
Error Control Codes: A Novel Solution for Secret Key Generation and Key Refreshment Problem A Puri, S Kumar arXiv preprint arXiv:1406.0090, 2014 | 1 | 2014 |
Twitter Profile Analysis using Bidirectional LSTM Networks S Kalonia, A Khurana, S Kumar, A Saxena Emerging Trends in IoT and Computing Technologies, 357-361, 2024 | | 2024 |
Malware Classification Using Machine Learning Models S kumar, Shersingh, S kumar, K verma | | 2024 |
Feature Selection-Based Machine Learning Model for Malware Detection LJ Haji, S Kumar International Conference on Machine Learning, Deep Learning and …, 2023 | | 2023 |
Review on Machine Learning Based Malware Detection L Javaid, S Kumar Research Cell: An International Journal of Engineering Sciences, 72-79, 2023 | | 2023 |
Enabling Real-Time Vehicle-to-Vehicle (V2V) Communication for Intelligent Transportation System (ITS) K Verma, A Kumar, LM de Sales, S Kumar, AK Sharma, N Singh Optical and Wireless Technologies: Proceedings of OWT 2021, 217-229, 2022 | | 2022 |
Software Defined Network Firewall: A Survey N Pathania, S Kumar | | 2021 |
A Survey on Software-Defined Networks (SDN) Firewall S Kour, S Kumar | | 2018 |
A Survey on Machine Learning: Concept, Algorithms, and Applications S Hangloo, S Kour, S Kumar | | 2017 |
Simulation of AODV under Multiple Blackhole and Grayhole Attack in MANETS D Khajuria, S Kumar International Journal of Computer Applications 93 (10), 14-18, 2014 | | 2014 |
Sudesh kumar. 2014. Detecting multiple Blackhole and Grayhole attacks in MANETS by modifying AODV D Khajuria IOSR Journal of Computer Engineering (IOSR-JCE) 16 (2), 126-133, 2014 | | 2014 |