Dr. Manju Khari
Dr. Manju Khari
Jawaharlal Nehru University, New Delhi-67
Verified email at aiactr.ac.in
Cited by
Cited by
Collaborative handshaking approaches between internet of computing and internet of things towards a smart world: a review from 2009–2017
S Jha, R Kumar, JM Chatterjee, M Khari
Telecommunication Systems 70 (4), 617-634, 2019
Securing data in Internet of Things (IoT) using cryptography and steganography techniques
M Khari, AK Garg, AH Gandomi, R Gupta, R Patan, B Balusamy
IEEE Transactions on Systems, Man, and Cybernetics: Systems 50 (1), 73-80, 2019
Defining Malicious Behavior of a Node and its Defensive Techniques in Ad Hoc Networks
R Saini, M Khari
Journal of Smart Sensors and Adhoc Networks (IJSSAN) 1, 18-21, 2011
Neutrosophic soft set decision making for stock trending analysis
S Jha, R Kumar, JM Chatterjee, M Khari, N Yadav, F Smarandache
Evolving Systems 10 (4), 621-627, 2019
Enhanced resource allocation in mobile edge computing using reinforcement learning based MOACO algorithm for IIOT
S Vimal, M Khari, N Dey, RG Crespo, YH Robinson
Computer Communications 151, 355-364, 2020
ARM–AMO: an efficient association rule mining algorithm based on animal migration optimization
F Chiclana, R Kumar, M Mittal, M Khari, JM Chatterjee, SW Baik
Knowledge-Based Systems 154, 68-80, 2018
Gesture Recognition of RGB and RGB-D Static Images Using Convolutional Neural Networks.
M Khari, AK Garg, RG Crespo, E Verd˙
International Journal of Interactive Multimedia & Artificial Intelligence 5 (7), 2019
Comparison of six prioritization techniques for software requirements
M Khari, N Kumar
Journal of Global Research in Computer Science 4 (1), 38-43, 2013
Heuristic search-based approach for automated test data generation: a survey
R Malhotra, M Khari
International Journal of Bio-Inspired Computation 5 (1), 1-18, 2013
A review on key management schemes in MANET
R Dalal, Y Singh, M Khari
International Journal of Distributed and Parallel Systems 3 (4), 165, 2012
Empirical study of software defect prediction: a systematic mapping
LH Son, N Pritam, M Khari, R Kumar, PTM Phuong, PH Thong
Symmetry 11 (2), 212, 2019
Different ways to achieve Trust in MANET
R Dalal, M Khari, Y Singh
International Journal on AdHoc Networking Systems (IJANS) 2 (2), 53-64, 2012
An extensive evaluation of search-based software testing: a review
M Khari, P Kumar
Soft Computing 23 (6), 1933-1946, 2019
Energy enhancement using Multiobjective Ant colony optimization with Double Q learning algorithm for IoT based cognitive radio networks
S Vimal, M Khari, RG Crespo, L Kalaivani, N Dey, M Kaliappan
Computer Communications 154, 481-490, 2020
Optimized test suites for automated testing using different optimization techniques
M Khari, P Kumar, D Burgos, RG Crespo
Soft Computing 22 (24), 8341-8352, 2018
Biometric iris recognition using radial basis function neural network
M Dua, R Gupta, M Khari, RG Crespo
Soft Computing 23 (22), 11801-11815, 2019
Internet of Things: Proposed security aspects for digitizing the world
M Khari, M Kumar, S Vij, P Pandey
2016 3rd International Conference on Computing for Sustainable Globalá…, 2016
A Deep Learning Model Based on Multi-Objective Particle Swarm Optimization for Scene Classification in Unmanned Aerial Vehicles
A Rajagopal, GP Joshi, A Ramachandran, RT Subhalakshmi, M Khari, ...
IEEE Access 8, 135383-135393, 2020
An evolutionary SVM model for DDOS attack detection in software defined networks
KS Sahoo, BK Tripathy, K Naik, S Ramasubbareddy, B Balusamy, M Khari, ...
IEEE Access 8, 132502-132513, 2020
Assessment of code smell for predicting class change proneness using machine learning
N Pritam, M Khari, R Kumar, S Jha, I Priyadarshini, M Abdel-Basset, ...
IEEE Access 7, 37414-37425, 2019
The system can't perform the operation now. Try again later.
Articles 1–20