Analysis of brute force attack using TG—Dataset T Gautam, A Jain 2015 SAI Intelligent Systems Conference (IntelliSys), 984-988, 2015 | 29 | 2015 |
Opportunistic network routing protocols: challenges, implementation and evaluation T Gautam, A Dev 2019 9th International Conference on Cloud Computing, Data Science …, 2019 | 6 | 2019 |
Drone: A systematic review of uav technologies T Gautam, R Johari International Conference on Computing, Communications, and Cyber-Security …, 2022 | 3 | 2022 |
AN APPROACH FOR DETECTING PASSWORD PATTERN IN DICTIONARY ATTACK T Gautam, U Singh | 1 | 2022 |
Improving Packet Queues Using Selective Epidemic Routing Protocol in Opportunistic Networks (SERPO) T Gautam, A Dev Advances in Computing and Data Sciences: 4th International Conference …, 2020 | 1 | 2020 |
Drone: A Systematic Review of UAV Technologies Check for updates T Gautam, R Johari Proceedings of Fourth International Conference on Computing, Communications …, 2023 | | 2023 |
Performance assessment of OppNet routing protocols with real world mobility traces T Gautam, R Johari Intelligent Decision Technologies 16 (2), 337-355, 2022 | | 2022 |
Feature Extraction of Real-World Traces Using K Means Clustering In OppNet R Johari, T Gautam | | 2021 |
Intelligent Routing Using Time Series: CF – Prophet T Gautam International Journal of Future Generation Communication and Networking 12 …, 2019 | | 2019 |
Identity—Based Encryption T Gautam, A Thakkar, N Pathak Emerging Security Algorithms and Techniques, 159-181, 2019 | | 2019 |
Attribute-Based Encryption T Gautam, A Thakkar, N Pathak Emerging Security Algorithms and Techniques, 183-195, 2019 | | 2019 |