Comparative analysis of machine learning algorithms for intrusion detection V Pai, ND Adesh IOP Conference Series: Materials Science and Engineering 1013 (1), 012038, 2021 | 19 | 2021 |
6LoWPAN—Performance analysis on low power networks Nikshepa, V Pai, UKK Shenoy International Conference on Computer Networks and Communication Technologies …, 2019 | 16 | 2019 |
Survey on IoT Security Issues and Security Protocols VP Nikshepa International Journal of Computer Applications 180 (42), 16-21, 2018 | 6 | 2018 |
Energy efficient clustering routing protocol based on LEACH for WSN S Bhat, V Pai, PV Kallapur International Journal of Computer Applications 120 (13), 2015 | 6 | 2015 |
Use of Machine Learning and Random OverSampling in Stroke Prediction S Kini, SN Pai, S Kolekar, V Pai, R Balasubramani 2022 International Conference on Artificial Intelligence and Data …, 2022 | 5 | 2022 |
Practice-based, clinical trial of a silorane-based composite resin system in posterior teeth N Malhotra, ST Somashekar, K Mala, V Pai, R Shenoy South African Dental Journal 68 (8), 358-363, 2013 | 4 | 2013 |
Performance evaluation of various algorithms that affect fault detection in wireless sensor network S Sajan, SJ Chacko, V Pai, BHK Pai 2020 Fourth International conference on inventive systems and control (ICISC …, 2020 | 2 | 2020 |
Survey On Media Access Control Protocols In Wireless Sensor Network CH Roopitha, V Pai 2020 Fourth International Conference on Inventive Systems and Control (ICISC …, 2020 | 2 | 2020 |
A Review: Intrusion Detection Systems in Remote Sensor Network RC Rebello, V Pai, K Pai 2019 International Conference on Smart Systems and Inventive Technology …, 2019 | 2 | 2019 |
Cluster based routing protocol using rendezvous agent SAN Shaha, V Pai, UKK Shenoy 2017 International Conference on Energy, Communication, Data Analytics and …, 2017 | 2 | 2017 |
Comparison of wireless routing protocols over FTP traffic in mobile and non mobile nodes SAN Shaha, V Pai, UKK Shenoy 2017 International Conference on Intelligent Computing, Instrumentation and …, 2017 | 2 | 2017 |
Current trends in detection and mitigation of denial of service attacks-a survey S Shishira, V Pai, K Manamohan Int. J. Comput. Appl, 2014 | 2 | 2014 |
Analysis of Routing Protocol for Low Power and Lossy Networks Attack Behavior on the Internet of Things V Pai, AS Rao, KP DS, KP BH 2022 International Conference on Artificial Intelligence and Data …, 2022 | 1 | 2022 |
A Survey of Block Cluster-Based Routing Schemes in Wireless Sensor Network V Pai, NJ Tellis Inventive Computation Technologies 4, 183-190, 2020 | 1 | 2020 |
RESTful Web Services MV Pai, S Asnika International Journal of Advanced Information Science and Technology (IJAIST …, 2014 | 1 | 2014 |
Pneumonia and Bone Fracture Detection Using CNN V Pai, TM Das, SF Sayed, VS Dsa, N Siddhi, S Kini 2023 7th International Conference on Computation System and Information …, 2023 | | 2023 |
Analysis of Routing Protocol for Low Power and Lossy Networks Attack Behavior on the Internet of Things Vasudeva Pai, Abhishek S Rao, Krishna Prasad D S, Devidas, Karthik Pai B H 2022 International Conference on Artificial Intelligence and Data …, 2023 | | 2023 |
An Intelligent Behavior-Based System to Recognize and Detect the Malware Variants Based on Their Characteristics Using Machine Learning Techniques Vasudeva Pai, Abhishek S Rao, Devidas, B Prapthi Communications in Computer and Information Science 1797, 2023 | | 2023 |
Effective Parallel Approach to Enhance the Performance of Cloth Simulation Model for Real-Time Applications Abhishek Rao, Devidas Bhat, Vasudeva Pai, D Deepak, Nagesh Shenoy Research Advances in Network Technologies, 2023 | | 2023 |
An Intelligent Behavior-Based System to Recognize and Detect the Malware Variants Based on Their Characteristics Using Machine Learning Techniques V Pai, AS Rao, Devidas, B Prapthi International Conference on Advanced Network Technologies and Intelligent …, 2022 | | 2022 |