Follow
Arun Kumar
Arun Kumar
Centre for Advanced Studeis
Verified email at cas.res.in
Title
Cited by
Cited by
Year
Survey on steganography methods (text, image, audio, video, protocol and network steganography)
P Johri, A Mishra, S Das, A Kumar
2016 3rd International Conference on Computing for Sustainable Global …, 2016
292016
Review paper on text and audio steganography using GA
P Johri, A Kumar
International Conference on Computing, Communication & Automation, 190-192, 2015
182015
Security framework using Hadoop for big data
P Johri, A Kumar, S Das, S Arora
2017 International Conference on Computing, Communication and Automation …, 2017
102017
Intrusion detection and prevention using RNN in WSN
AK Ashok Yadav
Inventive Computation and Information Technologies,Proceedings of ICICIT 2021, 2022
92022
Emerging trends in energy efficient routing protocols
H Agrawal, P Johri, A Kumar
International Conference on Computing, Communication & Automation, 523-528, 2015
92015
Cataract Detection using Deep Learning Model on Digital Camera Images
R Chaudhary, A Kumar
2022 IEEE International Conference on Cybernetics and Computational …, 2022
82022
An improved approach towards biometric face recognition using artificial neural network
S Srivastava, A Kumar, A Singh, S Prakash, A Kumar
Multimedia Tools and Applications 81 (6), 8471-8497, 2022
82022
Event‐driven data alteration detection using block‐chain
S Srivastava, Mohit, A Kumar, SK Jha, P Dixit, S Prakash
Security and Privacy 4 (2), e146, 2021
72021
Credit card fraud detection system using machine learning technique
A Maurya, A Kumar
2022 IEEE International Conference on Cybernetics and Computational …, 2022
62022
Modified DSR, an energy conserving approach to DSR protocol in MANET
NM Upadhyay, K Gaurav, A Kumar
2014 International Conference on Communication and Signal Processing, 1146-1149, 2014
52014
A Security Scheme for Mobile Ad-hoc Network with Reduced Routing Overhead
TK Mishra, B Singh, A Kumar
International Journal of Advanced Research in Computer Science and Software …, 2013
52013
PCP Framework to Expose Malware in Devices
R Nigam, RK Pathak, A Kumar, S Prakash
2020 International Conference on Electronics and Sustainable Communication …, 2020
42020
String Matching Algorithm Based Filter for Preventing SQL Injection and XSS Attacks
AK Yadav, A Kumar
Inventive Computation and Information Technologies: Proceedings of ICICIT …, 2022
32022
Using a Blend of Brassard and Benett 84 & Elliptic Curve Digital Signature for Secure Cloud Data Communication
V Srivastava, RK Pathak, A Kumar, S Prakash
2020 International Conference on Electronics and Sustainable Communication …, 2020
32020
Handling Secure Healthcare Data Streaming using R2E Algorithm
U Kumar, RK Pathak, A Kumar
2020 International Conference on Electronics and Sustainable Communication …, 2020
32020
EEMD-CNN based Method for Compound Fault Diagnosis of Bearing
A Singh, A Kumar
2022 IEEE International Conference on Cybernetics and Computational …, 2022
22022
Traffic Privacy Study on Internet of Things-Smart Home Applications
S Ansari, A Kumar
2021 9th International Conference on Cyber and IT Service Management (CITSM …, 2021
22021
An enhanced efficient broadcasting scheme for video-on-demand system in mobile ad hoc networks
A Kumar, DK Lobiyal
2010 INTERNATIONAL CONFERENCE ON COMMUNICATION CONTROL AND COMPUTING …, 2010
22010
Intrusion Detection using Dense Neural Network in Network System
A Doherey, A Singh, A Kumar
2022 IEEE International Conference on Cybernetics and Computational …, 2022
12022
An Efficient Approach Toward Security of Web Application Using SQL Attack Detection and Prevention Technique
AK Vishal Bharati
Inventive Computation and Information Technologies, Proceedings of ICICIT 2021, 2022
12022
The system can't perform the operation now. Try again later.
Articles 1–20