High performance Vedic BCD multiplier and modified binary to BCD converter AK Mehta, M Gupta, V Jain, S Kumar 2013 Annual IEEE India Conference (INDICON), 1-6, 2013 | 17 | 2013 |
Static vulnerability analysis of docker images V Jain, B Singh, M Khenwar, M Sharma IOP Conference Series: Materials Science and Engineering 1131 (1), 012018, 2021 | 16 | 2021 |
Symmetric Key Encryption Technique: A Cellular Automata Based Approach D Parashar, S Roy, N Dey, V Jain, US Rawat Cyber Security: Proceedings of CSI 2018, 59-67, 2018 | 14 | 2018 |
Data model recommendations for real-time machine learning applications: a suggestive approach M Mahrishi, G Sharma, S Morwal, V Jain, M Kalla Machine Learning for Sustainable Development 9, 115, 2021 | 10 | 2021 |
A novel symmetric key encryption technique using Cellular Automata D Parashar, S Roy, V Jain 2015 International Conference on Green Computing and Internet of Things …, 2015 | 7 | 2015 |
Cryptanalytic JH and Blake Hash Function for Authentication and Proposed Work Over Blake-512 on C Language P Wadhwani, A Gaur, V Jain International Journal of Computer Science Engineering and Information …, 2014 | 6 | 2014 |
A novel framework for extracting geospatial information using SPARQL query and multiple header extraction sources P Malpani, P Bassi, M Mahrishi, V Jain Proceedings of the International Conference on Recent Cognizance in Wireless …, 2016 | 4 | 2016 |
Audit and analysis of docker tools for vulnerability detection and tasks execution in secure environment V Jain, B Singh, N Choudhary International Conference on Emerging Technologies in Computer Engineering …, 2022 | 2 | 2022 |
A Hybrid Model for Real-Time Docker Container Threat Detection and Vulnerability Analysis V Jain, B Singh, N Choudhary, PK Yadav International Journal of Intelligent Systems and Applications in Engineering …, 2023 | 1 | 2023 |
Analysis of Android Malware Detection Techniques in Deep Learning N Agrawal, V Jain, RK Ranjan | | 2020 |
A Rich Feature Extraction Model for Content Based Image Search G Kanak, R Shweta, M Mehul, J Vipin Research Magma, 2018 | | 2018 |
Principles of Programming Languages V Jain, D Sharma Genius Publications 8, 266, 2017 | | 2017 |
Information System & Security CM Choudhary, S Ranjan, V Jain Ashirwad Publications 3, 284, 2015 | | 2015 |
A New Approach for Secure Steganography Using Genetic Algorithm A Gaur, V Jain, SK Sharma NCETCE-2014, 2014 | | 2014 |
Performance Evaluation of AODV and DSDV Routing Protocols in Wireless Sensor Network Using Different Network Parameters VJ Sultan Saini International Journal of Advanced Research in Computer Science and Software …, 2014 | | 2014 |
MANET- Performance Analysis of AODV Protocol under Packet Dropping Behaviour of Existing Nodes V Jain International Journal of Engineering, Science, Humanities and Management 3, 1-6, 2014 | | 2014 |
Elevated Drop- An Efficient Drop Buffer Management Policy for DTN Routing Protocols V Jain, A Sharma, P Singh International Conference on “Recent Trends in Engineering Sciences (ICRTES …, 2014 | | 2014 |
SECURED STEGANOGRAPHY MODEL USING GENETIC ALGORITHM A GAUR, P WADHWANI, V JAIN International Journal of Computer Science Engineering and Information …, 2014 | | 2014 |
Impact of human factors in effort estimation using COCOMO-II M Gaur, TN Sharma, V Jain International Journal of Scientific and Engineering Research 5 (6), 2014 | | 2014 |
Cloud computing security: A phased approach D Singh, V Jain, SK Gupta International Journal of New Innovations in Engineering and Technology 2 (3 …, 2014 | | 2014 |