A study on various attacks of tcp/ip and security challenges in manet layer architecture G Paliwal, AP Mudgal, S Taterh Proceedings of Fourth International Conference on Soft Computing for Problem …, 2015 | 18 | 2015 |
Hybrid approach of image encryption using DNA cryptography and TF Hill Cipher Algorithm RK Jangid, N Mohmmad, A Didel, S Taterh 2014 International Conference on Communication and Signal Processing, 934-938, 2014 | 18 | 2014 |
A dynamic window-size based segmentation technique to detect driver entry and exit from a car A Hirawat, S Taterh, TK Sharma Journal of King Saud University-Computer and Information Sciences 34 (10 …, 2022 | 16 | 2022 |
Performance analysis of ad hoc on-demand distance vector routing protocol for mobile ad hoc networks S Taterh, Y Meena, G Paliwal Computational Network Application Tools for Performance Management, 235-245, 2020 | 14 | 2020 |
Impact of dense network in MANET routing protocols AODV and DSDV comparative analysis through NS3 G Paliwal, S Taterh Soft Computing: Theories and Applications: Proceedings of SoCTA 2016, Volume …, 2018 | 12 | 2018 |
A topology based routing protocols comparative analysis for manets G Paliwal, S Taterh International Journal of Advanced Engineering Research and Science 3 (3), 258851, 2016 | 9 | 2016 |
Software-defined networking: An evolving network architecture—programmability and security perspective NM Kaliyamurthy, S Taterh, S Shanmugasundaram, A Saxena, ... Security and Communication Networks 2021, 1-7, 2021 | 7 | 2021 |
A public domain dataset to recognize driver entry into and exit from a car using smartphone sensors A Hirawat, S Taterh, TK Sharma International Journal of System Assurance Engineering and Management, 1-8, 2021 | 7 | 2021 |
Risk based ERP Implementation framework for Higher Education Institutions R Subramanian, S Taterh International Journal of Pure and Applied Mathematics 119 (12), 16211-16221, 2018 | 7 | 2018 |
Study and comparative analysis of various image spamming techniques J Kumar, S Taterh, D Kamnthania Soft Computing: Theories and Applications: Proceedings of SoCTA 2016, Volume …, 2018 | 6 | 2018 |
Threat Modeling and Security Pattern used in Design Phase of Secure Software Development life Cycle PDSKS Mr. Swapnesh Taterh,Prof(Dr.)K.P Yadav International Journal of Advanced Research in Computer Science and Software …, 2012 | 5 | 2012 |
Vulnerability of SDN network architecture and proposed countermeasures on enhancing security NM Kaliyamurthy, S Taterh, S Suresh International Journal of Recent Technology and Engineering (IJRTE) 8 (4 …, 2019 | 4 | 2019 |
Efficient Fine Tuned Trapezoidal Fuzzy-Based Model for Failure Mode Effect Analysis Risk Prioritization R Subramanian, S Taterh, D Singh, HN Lee IEEE Access 10, 50037-50046, 2022 | 3 | 2022 |
Playback protection in HTTP live streaming A Parashar, S Taterh 2016 International Conference on Emerging Trends in Engineering, Technology …, 2016 | 3 | 2016 |
Fake News Detection using Machine Learning: A Review G Priyanshi, T Swapnesh, S Ankit International Journal of Advanced Engineering, Management and Science 7 (3), 2021 | 2* | 2021 |
Comparative Study of the Ultrasonic and Infrared Person Counter A Saxena, S Taterh, N Saxena Soft Computing: Theories and Applications: Proceedings of SoCTA 2019, 1081-1092, 2020 | 2 | 2020 |
A new effective TCP-CC algorithm performance analysis (NS3) G Paliwal, KP Sharma, S Taterh, S Varshney 2019 4th International Conference on Information Systems and Computer …, 2019 | 2 | 2019 |
Simulation windows size quadric increase congestion control algorithm implementation using NS3 in wired computer networks scenario [J] G Paliwal, S Taterh Int J Comput Sci Eng 6 (6), 480-485, 2018 | 2 | 2018 |
A Comparative Analysis of Various Vulnerabilities Occur in Google Chrome S Manhas, S Taterh Soft Computing: Theories and Applications: Proceedings of SoCTA 2016, Volume …, 2018 | 2 | 2018 |
A study and analysis of various existing implementation framework related to enterprise resource planning S Taterh International Journal of Electrical, Electronics and Computers (EEC Journal …, 2017 | 2 | 2017 |