关注
Sudesh Kumar
Sudesh Kumar
在 smvdu.ac.in 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Performance comparison of reed solomon code and BCH code over rayleigh fading channel
FR Lone, A Puri, S Kumar
arXiv preprint arXiv:1307.6930, 2013
332013
An improved method of detecting spoofed attack in wireless LAN
S Goel, S Kumar
2009 First International Conference on Networks & Communications, 104-108, 2009
162009
Comparative Analysis of Reed Solomon Codes and BCH Codes in the Presence of AWGN Channel
A Puri, S Kumar
International Journal of Information and Computing Technology 3 (3), 2013
62013
Machine learning based rate adaptation in DASH to improve quality of experience
AR Bhat, SK Bhadu
2017 IEEE International Conference on Smart Technologies and Management for …, 2017
42017
Intrusion detection system in Software defined Network using machine learning approach-Survey
P Vaid, SK Bhadu, RM Vaid
2021 6th International Conference on Communication and Electronics Systems …, 2021
32021
Light-Fidelity: Next Generation Wireless Networks-A Survey
S Kumar, S Arora
2019 International Conference on Smart Systems and Inventive Technology …, 2019
32019
Classification of COVID-19 on Chest X-Ray Images Using Deep Learning Model with Histogram Equalization and Lung Segmentation
K Verma, G Sikka, A Swaraj, S Kumar, A Kumar
SN Computer Science 5 (4), 379, 2024
22024
Network Intrusion Detection System Using Machine Learning
S Kumar, P Pathak, K Agrawal, V Goswami, A Mahindru
International Conference on Emerging Trends and Technologies on Intelligent …, 2023
22023
Software-Defined Networking: A Survey
S Hangloo, S Kumar
Computer Networks, 2018
22018
Error Control Codes: A Novel Solution for Secret Key Generation and Key Refreshment Problem
A Puri, S Kumar
arXiv preprint arXiv:1406.0090, 2014
12014
Twitter Profile Analysis using Bidirectional LSTM Networks
S Kalonia, A Khurana, S Kumar, A Saxena
Emerging Trends in IoT and Computing Technologies, 357-361, 2024
2024
Malware Classification Using Machine Learning Models
S kumar, Shersingh, S kumar, K verma
2024
Feature Selection-Based Machine Learning Model for Malware Detection
LJ Haji, S Kumar
International Conference on Machine Learning, Deep Learning and …, 2023
2023
Review on Machine Learning Based Malware Detection
L Javaid, S Kumar
Research Cell: An International Journal of Engineering Sciences, 72-79, 2023
2023
Enabling Real-Time Vehicle-to-Vehicle (V2V) Communication for Intelligent Transportation System (ITS)
K Verma, A Kumar, LM de Sales, S Kumar, AK Sharma, N Singh
Optical and Wireless Technologies: Proceedings of OWT 2021, 217-229, 2022
2022
Software Defined Network Firewall: A Survey
N Pathania, S Kumar
2021
A Survey on Software-Defined Networks (SDN) Firewall
S Kour, S Kumar
2018
A Survey on Machine Learning: Concept, Algorithms, and Applications
S Hangloo, S Kour, S Kumar
2017
Simulation of AODV under Multiple Blackhole and Grayhole Attack in MANETS
D Khajuria, S Kumar
International Journal of Computer Applications 93 (10), 14-18, 2014
2014
Sudesh kumar. 2014. Detecting multiple Blackhole and Grayhole attacks in MANETS by modifying AODV
D Khajuria
IOSR Journal of Computer Engineering (IOSR-JCE) 16 (2), 126-133, 2014
2014
系统目前无法执行此操作,请稍后再试。
文章 1–20