COVID-19: A Framework for Effective Delivering of Online Classes During Lockdown D Pandey, GA Ogunmola, W Enbeyle, M Abdullahi, BK Pandey, ... Human Arenas, 2021 | 79 | 2021 |
Fuzzy Approach-Based Stable Energy-Efficient AODV Routing Protocol in Mobile Ad hoc Networks S Choudhary, V Narayan, M Faiz, S Pramanik Software Defined Networking for Ad Hoc Networks, 125-139, 2022 | 62 | 2022 |
FuzzyNet-Based Modelling Smart Traffic System in Smart Cities Using Deep Learning Models PK Mall, V Narayan, S Pramanik, S Srivastava, M Faiz, S Sriramulu, ... Handbook of Research on Data-Driven Mathematical Modeling in Smart Cities, 76-95, 2023 | 59 | 2023 |
A Novel Approach Using Steganography and Cryptography in Business Intelligence S Pramanik, R Ghosh, G Mangesh M, V Narayan, M Sinha, D Pandey, ... Integration Challenges for Analytics, Business Intelligence, and Data Mining …, 2021 | 53 | 2021 |
Utilizing Machine Learning and Deep Learning in Cybesecurity: An Innovative Approach K Dushyant, G Muskan, Annu, A Gupta, S Pramanik Cyber Security and Digital Forensics, 271-293, 2022 | 50 | 2022 |
Application of Bi-Orthogonal Wavelet Transform and Genetic Algorithm in Image Steganography S Pramanik, RP Singh, R Ghosh Multimedia Tools and Applications, 2020 | 49 | 2020 |
Big Data Architecture for Network Security R Bansal, Bijender, Jenipher, V. Nisha, Jain, M R., Dilip, Kumbhkar, ... Cyber Security and Network Security, 2022 | 44 | 2022 |
A Secured Image Steganography using Genetic Algorithm S Pramanik, SS Raja Advances in Mathematics: Scientific Journal 9 (7), 4533-4541, 2020 | 37 | 2020 |
Application of Machine Learning and Deep Learning in Cyber Security: An Innovative Approach D Kaushik, M Garg, Annu, A Gupta, S Pramanik An Interdisciplinary Approach to Modern Network Security, 2022 | 34 | 2022 |
An Effective Secured Privacy-Protecting Data Aggregation Method in IoT S Pramanik Achieving Full Realization and Mitigating the Challenges of the Internet of …, 2022 | 30 | 2022 |
A New Encrypted Method in Image Steganography S Pramanik, RP Singh, R Ghosh Indonesian Journal of Electrical Engineering and Computer Science 14 (3 …, 2019 | 30 | 2019 |
Application of Steganography in Symmetric Key Cryptography with Genetic Algorithm S Pramanik, SK Bandyopadhyay INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 10 (7), 1791-1799, 2013 | 29 | 2013 |
A Novel Approach for Web Mining Taxonomy for High-Performance Computing D Samanta, S Dutta, M Gouse Galety, S Pramanik Cyber Intelligence and Information Retrieval 291, 2021 | 28 | 2021 |
Modern Technique for Interactive Communication in LEACH-Based Ad Hoc Wireless Sensor Network R Anand, J Singh, D Pandey, BK Pandey, VK Nassa, S Pramanik Software Defined Networking for Ad Hoc Networks, 55-73, 2022 | 27 | 2022 |
Machine intelligence of pi from geometrical figures with variable parameters using SCILab A Mandal, S Dutta, S Pramanik Methodologies and Applications of Computational Statistics for Machine …, 2021 | 27 | 2021 |
Unsupervised Summarization Approach with Computational Statistics of Microblog Data A Bhattacharya, A Ghosal, AJ Obaid, S Krit, VK Shukla, K Mandal, ... Methodologies and Applications of Computational Statistics for Machine …, 2021 | 27 | 2021 |
Steganography using Improved LSB Approach and Asymmetric Cryptography S Pramanik, D Samanta, S Dutta, R Ghosh, M Ghonge, D Pandey 2020 IEEE International Conference on Advent Trends in Multidisciplinary …, 2021 | 27 | 2021 |
Image Steganography Using Wavelet Transform And Genetic Algorithm S Pramanik, SK Bandyopadhyay International Journal of Innovative Research in Advanced Engineering 1, 2014 | 27 | 2014 |
Hiding secret message in an Image S Pramanik, SK Bandyopadhyay International Journal of Innovative Science, Engineering & Technology 1 (3 …, 2014 | 23 | 2014 |
Security, Privacy, Risk, and Safety Toward 5G Green Network (5G-GN) D Pradhan, PK Sahu, NS Goje, HM Ghonge, Mangesh M., Tun, ... Cyber Security and Network Security, 2022 | 22 | 2022 |