Study and capacity evaluation of SISO, MISO and MIMO RF wireless communication systems K Sengar, N Rani, A Singhal, D Sharma, S Verma, T Singh arXiv preprint arXiv:1403.7774, 2014 | 56 | 2014 |
A Heterogeneous Wireless Network integrating Smartphones, WLANs and VANET to enhance On-road Surveillance and Security TS V.K. Remya 4th International Conference on Reliability, Infocom Technologies and …, 2016 | 7 | 2016 |
Speckle reducing filtering for ultrasound images A Kapoor, T Singh Int. J. Eng. Trends Technol.(IJETT) 37 (5), 2016 | 6 | 2016 |
Securing internet of things in 5G using audio steganography T Singh, S Verma, V Parashar Smart Trends in Information Technology and Computer Communications: First …, 2016 | 5 | 2016 |
A Study on Intrusion Detection in Wireless Networks by Using Genetic Algorithm Applications S Singh, RS Kushwah 2014 International Conference on Computational Intelligence and …, 2014 | 5 | 2014 |
M-commerce: Evaluation of the technology drawbacks TS Aneet Shilpa George 4th International Conference on Reliability, Infocom Technologies and …, 2015 | 4 | 2015 |
A Survey on Security Issue in Mobile AD-HOC Network and Solutions M Kumar, T Singh International Journal of Computer Sciences and Engineering 2 (3), 71-75, 2014 | 3 | 2014 |
Securing networks using Quantum Cryptography K Chaudhuri, T Singh 2015 4th International Conference on Reliability, Infocom Technologies and …, 2015 | 2 | 2015 |
Automated multilevel defence model to investigate packets for web interface S Verma, T Singh 2012 Ninth International Conference on Wireless and Optical Communications …, 2012 | 2 | 2012 |
Multilevel Defense Model to Secure Large Organization Using Effective Network Management strategy and Honeypots TS Seema Verma 3rd International Conference on Future Computer and Communication (ICFCC 2011), 2011 | 2* | 2011 |
Vulnerability assessment of web servers using honey pots: perspectives, ethical issues, legal implications S Verma, T Singh International Journal of Computer Applications 72 (22), 2013 | 1 | 2013 |
The Cost-Benefit Analysis of Vulnerability of Web Server Through Investigation S Verma, T Singh Emerging Research in Computing, Information, Communication and Applications …, 2016 | | 2016 |
The Cost-Benefit Analysis of Vulnerability of Web Server Through Investigation TS Seema Verma Springer 2, 585-597, 2015 | | 2015 |
An Integrated Predictive Model of Population Serum 25 (OH) D for Application in Strategy Development for Vitamin D Deficiency Prevention K Cashman, T Singh, M Kiely The FASEB Journal 29, 253.7, 2015 | | 2015 |
Mitigating XSS Attacks TS Abhishek Bhatia, Himanshu, Seema verma ICRITO 2013, 2013 | | 2013 |
Improved Real Time Analysis for Securing Web Server T Singh IN Patent App. 100/DEL/2,012, 2012 | | 2012 |
Intrusion detection and Response using Honeypots SVT Singh Centre of Converging Technologies, University of Rajasthan, 2011 | | 2011 |
Intrusion Detection and Response for web Interface using Honeypots TS Seema Verma International Journal of Computational Intelligence and Information Security …, 2011 | | 2011 |
IMPROVED DESIGN OF RAKE TRANSRECEIVER FOR THE 3G CDMA WIRELESS COMMUNICATION SYSTEM T Singh IN Patent App. 732/DEL/2,009, 2010 | | 2010 |
Adaptation for "Wireless Communications: Principles And Practice, 2/E" R Theodore S. Prentice Hall PTR, 2010 | | 2010 |