A Survey on Machine Learning Techniques for Intrusion Detection Systems J Singh, MJ Nene International Journal of Advanced Research in Computer and Communication …, 2013 | 157 | 2013 |
Buried Object Detection and Analysis of GPR Images: Using Neural Network and Curve Fitting NP Singh, MJ Nene IEEE, Emerging Research Areas and 2013 International Conference on …, 2013 | 70 | 2013 |
A survey on types of machine learning techniques in intrusion prevention systems S Das, MJ Nene 2017 International Conference on Wireless Communications, Signal Processing …, 2017 | 59 | 2017 |
Node-level trust evaluation in wireless sensor networks SS Desai, MJ Nene IEEE Transactions on Information Forensics and Security 14 (8), 2139-2152, 2019 | 55 | 2019 |
A Survey on Latest DoS Attacks:Classification and Defense Mechanisms MJ Nene, Rajkumar International Journal of Innovative Research in Computer and Communication …, 2013 | 48* | 2013 |
Psychological, Social, and Cultural Aspects of Internet Addiction B Bozoglan, MJ Nene IGI Global, 2017 | 47 | 2017 |
Employability of blockchain technology in defence applications A Sudhan, MJ Nene 2017 International Conference on Intelligent Sustainable Systems (ICISS …, 2017 | 46 | 2017 |
One time pad generation using quantum superposition states G Upadhyay, MJ Nene 2016 IEEE International Conference on Recent Trends in Electronics …, 2016 | 42 | 2016 |
Data Leakage Prevention for Data in Transit using Artificial Intelligence and Encryption Techniques M Ghouse, MJ Nene, C VembuSelvi 2019 International Conference on Advances in Computing, Communication and …, 2019 | 37 | 2019 |
Algorithm for Autonomous Reorganization of Mobile Wireless Camera Sensor Networks to Improve Coverage MJ Nene, RS Deodhar, LM Patnaik IEEE SENSORS JOURNAL, VOL. 15, NO. 8, AUGUST 2015 15 (8), 4428-4441, 2015 | 30 | 2015 |
A Security Framework for Military Application on Infrastructure Based Wireless Sensor Network S Roy, MJ Nene IEEE International Conference on Research in Computational Intelligence and …, 2015 | 29 | 2015 |
Quantum Computing: An Entanglement Measurement M Gupta, MJ Nene IEEE International Conference on Advent Trends in Multidisciplinary Research …, 2021 | 27 | 2021 |
Two‐factor authentication using biometric based quantum operations MK Sharma, MJ Nene Security and Privacy 3 (3), e102, 2020 | 24 | 2020 |
Enhanced Machine Learning using Quantum Computing A Jhanwar, MJ Nene 2021 Second International Conference on Electronics and Sustainable …, 2021 | 22 | 2021 |
Peer Selection Techniques for Enhanced Transaction Propagation in Bitcoin Peer-to-Peer Network A Sudhan, MJ Nene 2018 Second International Conference on Intelligent Computing and Control …, 2018 | 22 | 2018 |
Multihop Trust Evaluation using Memory integrity in Wireless Sensor Networks SS Desai, MJ Nene IEEE Transactions on Information Forensics and Security, doi: 10.1109/TIFS …, 2021 | 21 | 2021 |
Survey of Flocking Algorithms in Multi-agent Systems A Barve, MJ Nene International Journal of Computer Science Issues 10 (6(2)), 110-117, 2013 | 21 | 2013 |
Pauli Matrix based Quantum Communication Protocol P Nema, MJ Nene IEEE International Conference on Advent Trends in Multidisciplinary Research …, 2021 | 20 | 2021 |
Self Organizing Localization Algorithm for Large Scale Underwater Sensor Network SS Naik, MJ Nene IEEE International Conference on Recent Advances in Computing and Software …, 2012 | 19 | 2012 |
Dual factor third‐party biometric‐based authentication scheme using quantum one time passwords MK Sharma, MJ Nene Wiley Journal Security Privacy, e-129, DOI: 10.1002/spy2.129, 2020 | 18 | 2020 |