Survey on evolutionary computation tech techniques and its application in different fields R Devi, E Barlaskar, O Devi, S Medhi, R Shimray International Journal on Information Theory (IJIT) 3 (3), 73-82, 2014 | 12 | 2014 |
Survey on Real Time Security Mechanisms in Network Forensics BB Hazarika, SP Medhi International Journal of Computer Applications 151 (2), 2016 | 9 | 2016 |
REALIZING DIGITAL FORENSICS AS A BIG DATA CHALLENGE D Das, U Shaw, SP Medhi 4th International Conference on “Computing for Sustainable Global …, 2017 | 8 | 2017 |
Blackhole attack on MANET and its effects A Singh, KP Kalita, SP Medhi Proceedings of the 5th International Conference on Computing for Sustainable …, 2018 | 6 | 2018 |
Social Network Forensics: Survey and Challenges U Shaw, D Das, SP Medhi International Journal of Computer Science and Information Security 14 (11), 310, 2016 | 6 | 2016 |
Design and Development of Grid Enabled, G2PU Accelerated Java Application (Protein Sequence Study) for Grid Performance Analysis S Sinha, SP Medhi, GC Hazarika Procedia Computer Science 70, 769-777, 2015 | 2 | 2015 |
Black Hole Attacks on MANETS and its Effects SPM Abhilash Singh, Kausthav Pratim Kalita 12th INDIACom IEEE Conference, 5th International Conference on “Computing …, 2018 | | 2018 |
A study on feature extraction for face recognition using Self Organizing Maps N Choudhur, R Mandal, SP Medhi ADBU Journal of Engineering Technology 4, 2016 | | 2016 |
Linguistic Grammar Approach to Textual Steganography U Shaw, SP Medhi | | |
A Competence Based Load Balancing Algorithm for HPC Enabled Bioinformatics Application SP Medhi, S Sinha, YJ Singh, J Singh | | |