An analysis of Security Attacks found in Mobile Ad hoc Network KCPSSDNG [2] Umesh Kumar Singh International Journal of Advanced Research in Computer Science 5 (5), 34-39, 2014 | 25 | 2014 |
On Mechanism to Prevent Cooperative Black Hole Atta ck in Mobile Ad Hoc Networks JPKCP Umesh Kumar Singh International Journal of Scientific Research in Com puter Science …, 2015 | 14* | 2015 |
Study and analysis of MAC protocols design approach for wireless sensor networks UK Singh, KC Phuleriya, L Laddhani International Journal of Advanced Research in Computer Science and Software …, 2012 | 10 | 2012 |
Exploration of Wireless Sensor Networks Technology and development UK Singh, KC Phuleriya, K Bunkar, S Bhumarkar International Journal of Emerging Trends & Technology in Computer Science …, 2012 | 5 | 2012 |
Real Time Data Communication Medium access control (RCMAC) Protocol for Wireless Sensor Networks (WSNs) UK Singh, KC Phuleriya, RJ Yadav International Journal of Emerging Technology and Advanced Engineering 2 (5 …, 2012 | 4 | 2012 |
SCAODV: A Protocol to Prevent Black Hole Attacks in Mobile Ad Hoc Networks S Sharma, UK Singh, KC Phuleriya, DN Goswami International Journal of Computer Science & Communication 6 (2), 36-41, 2015 | 3 | 2015 |
A Comparative study of Collaborative Attacks on Mobile Ad-Hoc Networks UK Singh, K Phuleria, S Sharma, DN Goswami International Journal of Emerging Technology and Advanced Engineering 4 (8 …, 2014 | 3* | 2014 |
A Comparative study of Collaborative Attacks on Mobile Ad-Hoc Networks KPSSDNG Umesh Kumar Singh International Journal of Emerging Technology and Advanced Engineering 4 (8 …, 2014 | 3* | 2014 |
Wireless Sensor Networks: Comparative Study and Analysis of Mac Protocols UK Singh, KC Phuleriya, R Sunhare International Journal of Computer Networking, Wireless and Mobile …, 2014 | 3 | 2014 |
On Protocols to Prevent Black Hole Attacks in Mobile Ad Hoc Networks KC Phuleriya International Journal of Electronics Communication and Computer Engineering …, 2015 | 2 | 2015 |
Study and Analysis of Session Security on Web Based Applications KCPRS Umesh Kumar Singh International Journal of Advanced Research in Computer Science and Software …, 2013 | 2* | 2013 |
An Analysis of MANET Routing Protocols with Effective Resource Management KCPLL Umesh Kumar Singh An Analysis of MANET Routing Protocols with Effective Resource Management 4 …, 2014 | | 2014 |
Research Methodology: Tools and Techniques KCP Sunil Singh Chandel, Umesh Kumar Singh S K Book Agency, 2013 | | 2013 |
Study and Analysis of Reliable MAC Protocols for Wireless Sensor Networks LL Kailash Chandra Phuleriya, Umesh Kumar Singh International Journal of Computer Science and Information Technologies …, 2012 | | 2012 |