Smart farming–IoT in agriculture R Dagar, S Som, SK Khatri 2018 International Conference on Inventive Research in Computing …, 2018 | 286 | 2018 |
Predicting students academic performance using support vector machine I Burman, S Som 2019 Amity international conference on artificial intelligence (AICAI), 756-759, 2019 | 77 | 2019 |
A reliability based variant of AODV in MANETs: proposal, analysis and comparison S Tyagi, S Som, QP Rana Procedia Computer Science 79, 903-911, 2016 | 40 | 2016 |
Trust based dynamic multicast group routing ensuring reliability for ubiquitous environment in MANETs S Tyagi, S Som, QP Rana International Journal of Ambient Computing and Intelligence (IJACI) 8 (1), 70-97, 2017 | 33 | 2017 |
Applications and usage of visual cryptography: A review A Pandey, S Som 2016 5th International Conference on Reliability, Infocom Technologies and …, 2016 | 30 | 2016 |
Key based bit level genetic cryptographic technique (KBGCT) S Som, NS Chatterjee, JK Mandal 2011 7th International Conference on Information Assurance and Security (IAS …, 2011 | 22 | 2011 |
Study of different cryptographic technique and challenges in future A Bhardwaj, S Som 2016 International Conference on Innovation and Challenges in Cyber Security …, 2016 | 18 | 2016 |
Anti social comment classification based on kNN algorithm N Chandra, SK Khatri, S Som 2017 6th International Conference on Reliability, Infocom Technologies and …, 2017 | 16 | 2017 |
Cryptographic technique using substitution through circular path followed by genetic function S Som, M Banerjee International Journal of Computer Applications (IJCA), 2013 | 16 | 2013 |
Statistical analysis of student feedback system using Cronbach's alpha and Utility Measurement Process S Som, R Majumdar, M Ghosh, C Malkani 2017 International Conference on Infocom Technologies and Unmanned Systems …, 2017 | 14 | 2017 |
Security and privacy challenges: Internet of things S Nath, S Som Indian Journal of Science and Technology, 2017 | 14 | 2017 |
Predictive analysis of machine learning algorithms for breast cancer diagnosis M Arora, S Som, A Rana 2020 8th International Conference on Reliability, Infocom Technologies and …, 2020 | 12 | 2020 |
Cryptography encryption technique using circular bit rotation in binary field D Pradhan, S Som, A Rana 2020 8th International Conference on Reliability, Infocom Technologies and …, 2020 | 12 | 2020 |
Security solutions for physical layer of IoT S Chowdhary, S Som, V Tuli, SK Khatri 2017 International Conference on Infocom Technologies and Unmanned Systems …, 2017 | 12 | 2017 |
Session Key Based Manipulated Iteration Encryption Technique (SKBMIET) S Som, D Mitra, J Haldar 2008 International Conference on Advanced Computer Theory and Engineering …, 2008 | 12 | 2008 |
Cyberbullying detection using recursive neural network through offline repository N Chandra, SK Khatri, S Som 2018 7th International Conference on Reliability, Infocom Technologies and …, 2018 | 11 | 2018 |
Advance persistant threat and cyber spying-the big picture, its tools, attack vectors and countermeasures D Bhatnagar, S Som, SK Khatri 2019 Amity International Conference on Artificial Intelligence (AICAI), 828-839, 2019 | 10 | 2019 |
Business models leveraging IoT and cognitive computing N Chandra, SK Khatri, S Som 2019 Amity International Conference on Artificial Intelligence (AICAI), 796-800, 2019 | 10 | 2019 |
Neural networks in medical and healthcare SS Kumar, KA Kumar International Journal of Innovation and Research Development 2 (8), 241-44, 2013 | 10 | 2013 |
Lca approach for image encryption based on chaos to secure multimedia data in iot S Nath, S Som, M Negi 2019 4th International Conference on Information Systems and Computer …, 2019 | 9 | 2019 |