Follow
Vijay Kumar Jha
Vijay Kumar Jha
Verified email at bitmesra.ac.in - Homepage
Title
Cited by
Cited by
Year
Security vulnerabilities, attacks and countermeasures in wireless sensor networks at various layers of OSI reference model: A survey
P Sinha, VK Jha, AK Rai, B Bhushan
2017 International Conference on Signal Processing and Communication (ICSPC …, 2017
1312017
Literature review on ERP implementation challenges
S Ranjan, VK Jha, P Pal
International Journal of Business Information Systems 21 (3), 388-402, 2016
1152016
Multibiometric fusion strategy and its applications: A review
SKS Modak, VK Jha
Information Fusion 49, 174-204, 2019
652019
Data mining in intrusion detection: a comparative study of methods, types and data sets
C Azad, VK Jha
Journal of IJITCS 5 (8), 75-90, 2013
552013
Fuzzy min–max neural network and particle swarm optimization based intrusion detection system
C Azad, VK Jha
Microsystem Technologies 23, 907-918, 2017
482017
Application of emerging technologies in ERP implementation in Indian manufacturing enterprises: an exploratory analysis of strategic benefits
S Ranjan, VK Jha, P Pal
The International Journal of Advanced Manufacturing Technology 88, 369-380, 2017
472017
Crop suitability and fertilizers recommendation using data mining techniques
A Chougule, VK Jha, D Mukhopadhyay
Progress in Advanced Computing and Intelligent Engineering: Proceedings of …, 2019
462019
Genetic algorithm to solve the problem of small disjunct in the decision tree based intrusion detection system
C Azad, VK Jha
International Journal of Computer Network and Information Security 7 (8), 56, 2015
302015
Data mining based hybrid intrusion detection system
C Azad, VK Jha
Indian Journal of Science and Technology, 781-789, 2014
252014
Critical success factors in ERP implementation in Indian manufacturing enterprises: an exploratory analysis
S Ranjan, VK Jha, P Pal
International Journal of Business Information Systems 28 (4), 404-424, 2018
222018
Using IoT for integrated pest management
A Chougule, VK Jha, D Mukhopadhyay
2016 International Conference on Internet of Things and Applications (IOTA …, 2016
222016
Design and analysis of data mining based prediction model forparkinson’s disease
C Azad, S Jain, VK Jha
Issues 1 (1), 181-189, 2013
202013
Secure key-distribution in IoT cloud networks
SR Moharana, VK Jha, A Satpathy, SK Addya, AK Turuk, B Majhi
2017 Third International Conference on Sensing, Signal Processing and …, 2017
182017
An improved query optimization process in big data using ACO-GA algorithm and HDFS map reduce technique
D Kumar, VK Jha
Distributed and Parallel Databases 39, 79-96, 2021
162021
A strategic and sustainable multi-criteria decision making framework for ERP selection in OEM
S Ranjan, VK Jha, P Pal
International Journal of Applied Engineering Research 11 (3), 1916-1926, 2016
142016
A novel fuzzy min-max neural network and genetic algorithm-based intrusion detection system
C Azad, VK Jha
Proceedings of the Second International Conference on Computer and …, 2016
132016
Decision tree and genetic algorithm based intrusion detection system
C Azad, VK Jha
Proceeding of the second international conference on microelectronics …, 2019
112019
Adaptive ontology construction method for crop pest management
A Chougule, VK Jha, D Mukhopadhyay
Proceedings of the International Conference on Data Engineering and …, 2017
112017
AgroKanti: location-aware decision support system for forecasting of pests and diseases in grapes
A Chougule, VK Jha, D Mukhopadhyay
Information Systems Design and Intelligent Applications: Proceedings of …, 2016
112016
A Review on Credit Card Fraud Detection Techniques
R Jha, VK Abhaya, Jha
International Journal of Engineering Research & Technology 3 (4), 2014
11*2014
The system can't perform the operation now. Try again later.
Articles 1–20