Internet of things: Evolution, concerns and security challenges P Malhotra, Y Singh, P Anand, DK Bangotra, PK Singh, WC Hong Sensors 21 (5), 1809, 2021 | 101 | 2021 |
IoT Vulnerability Assessment for Sustainable Computing: Threats, Current Solutions, and Open Challenges NK POOJA ANAND, YASHWANT SINGH, ARVIND SELWAL, MAMOUN ALAZAB ,, SUDEEP TANWAR IEEE Access 8, 168825-168853, 2020 | 71 | 2020 |
Model driven architecture: A perspective Y Singh, M Sood 2009 IEEE International Advance Computing Conference, 1644-1652, 2009 | 68 | 2009 |
A systematic survey on internet of things: Energy efficiency and interoperability perspective B Rana, Y Singh, PK Singh Transactions on Emerging Telecommunications Technologies 32 (8), e4166, 2021 | 58 | 2021 |
Intelligent transport system: A progressive review A Zear, PK Singh, Y Singh Jaypee University of Information Technology, Solan, HP, 2016 | 51 | 2016 |
Detection of forest fires using machine learning technique: A perspective A Kansal, Y Singh, N Kumar, V Mohindru 2015 third international conference on image information processing (ICIIP …, 2015 | 46 | 2015 |
IoVT: internet of vulnerable things? Threat architecture, attack surfaces, and vulnerabilities in internet of things and its applications towards smart Grids P Anand, Y Singh, A Selwal, PK Singh, RA Felseghi, MS Raboaca Energies 13 (18), 4813, 2020 | 45 | 2020 |
An intelligent opportunistic routing algorithm for wireless sensor networks and its application towards e-healthcare DK Bangotra, Y Singh, A Selwal, N Kumar, PK Singh, WC Hong Sensors 20 (14), 3887, 2020 | 45 | 2020 |
Distributed event detection in wireless sensor networks for forest fires Y Singh, S Saha, U Chugh, C Gupta 2013 UKSim 15th international conference on computer modelling and …, 2013 | 45 | 2013 |
Springer International Publishing: Cham PK Singh, AK Kar, Y Singh, MH Kolekar, S Tanwar Switzerland, 2020 | 33 | 2020 |
Reauthentication scheme for mobile wireless sensor networks V Mohindru, R Bhatt, Y Singh Sustainable Computing: Informatics and Systems 23, 158-166, 2019 | 31 | 2019 |
TEXTURE PROFILE PARAMETERS OF COOKED FRANKFURTER EMULSIONS AS INFLUENCED BY COOKING TREATMENT 2 Y Singh, JL Blaisdell, FL Herum, K Stevens, V Cahill Journal of texture studies 16 (2), 169-177, 1985 | 31 | 1985 |
Models and Transformations in MDA Y Singh, M Sood 2009 First International Conference on Computational Intelligence …, 2009 | 30 | 2009 |
Routing protocols in wireless sensor networks N Kumar, Y Singh Handbook of research on advanced wireless sensor network applications …, 2017 | 29 | 2017 |
Node authentication algorithm for securing static wireless sensor networks from node clone attack V Mohindru, Y Singh International Journal of information and computer security 10 (2-3), 129-148, 2018 | 27 | 2018 |
Trust and packet load balancing based secure opportunistic routing protocol for WSN N Kumar, Y Singh 2017 4th International conference on signal processing, computing and …, 2017 | 24 | 2017 |
A trust based secure intelligent opportunistic routing protocol for wireless sensor networks DK Bangotra, Y Singh, A Selwal, N Kumar, PK Singh Wireless Personal Communications 127 (2), 1045-1066, 2022 | 23 | 2022 |
Botnet detection using machine learning S Haq, Y Singh 2018 Fifth International Conference on Parallel, Distributed and Grid …, 2018 | 23 | 2018 |
The impact of the computational independent model for enterprise information system development Y Singh, M Sood Jaypee University of Information Technology, Solan, HP, 2010 | 20 | 2010 |
Hybrid cryptography algorithm for securing wireless sensor networks from Node Clone Attack V Mohindru, Y Singh, R Bhatt Recent Advances in Electrical & Electronic Engineering (Formerly Recent …, 2020 | 19 | 2020 |