Cloud computing security: Amazon web service S Narula, A Jain 2015 Fifth International Conference on Advanced Computing & Communication …, 2015 | 93 | 2015 |
PE File-Based Malware Detection Using Machine Learning P Namita Proceedings of International Conference on Artificial Intelligence and …, 2020 | 69* | 2020 |
Botnet detection via mining of network traffic flow L Mathur, M Raheja, P Ahlawat Procedia computer science 132, 1668-1677, 2018 | 52 | 2018 |
Wireless Sensor Network application for water quality monitoring in India S Verma, P Ahlawat Computing and Communication Systems (NCCCS), 2012 National Conference on, 1-5, 2012 | 47 | 2012 |
A comprehensive survey of routing protocols in wireless sensor networks J Kumari 2015 2nd International Conference on Computing for Sustainable Global …, 2015 | 34 | 2015 |
Intrusion Detection using Machine Learning and Feature Selection PH Prabha I. J. Computer Network and Information Security, 43-52, 2019 | 32 | 2019 |
Security threats in cloud computing N Kajal, N Ikram International Conference on Computing, Communication & Automation, 691-694, 2015 | 24 | 2015 |
Communication Architecture for Underwater Wireless Sensor Network P Ahlawat, S Verma I. J. Computer Network and Information Security 7 (6), 67-74, 2015 | 16* | 2015 |
An Energy Efficient Routing Algorithm for Wireless Body Area Network P Ahlawat, J Kumari International Journal of Wireless and Microwave Technologies 5 (5), 56-62, 2015 | 11 | 2015 |
DCPM: an effective and robust approach for diabetes classification and prediction M kumari, P Ahlawat International Journal of Information Technology 13, 1079-1088, 2021 | 10 | 2021 |
A cluster based key management scheme for underwater wireless sensor networks S Verma International Journal of Computer Network and Information Security 7 (9), 54, 2015 | 10 | 2015 |
Survey Paper on Wireless Underground Positioning System Sapna Kataria Poonam Singh Prachi International Journal of Computer Applications 130, 1-4, 2015 | 8* | 2015 |
An effective ransomware detection approach in a cloud environment using volatile memory features Prachi, S Kumar Journal of Computer Virology and Hacking Techniques 18 (4), 407-424, 2022 | 7 | 2022 |
Mobile IP and comparison between mobile IPv4 and IPv6 N Jora Journal of Network Communications and Emerging Technologies (JNCET) 2 (1), 2015 | 7 | 2015 |
An effective malware detection method using hybrid feature selection and machine learning algorithms N Dabas, P Ahlawat, P Sharma Arabian Journal for Science and Engineering 48 (8), 9749-9767, 2023 | 6 | 2023 |
Survey for detection and analysis of android malware (s) through artificial intelligence techniques S Sharma, K Khanna, P Ahlawat Cyber Security and Digital Forensics: Proceedings of ICCSDF 2021, 321-337, 2022 | 5 | 2022 |
Usage of Machine Learning for Intrusion Detection in a Network Prachi International Journal of Computer Networks and Applications 3 (Issue 6), 139-147, 2016 | 5* | 2016 |
Target tracking in wireless sensor network P Chauhan, P Ahlawat International J. of Information & Computation Technology 4 (6), 643-648, 2014 | 5 | 2014 |
Intelligent information retrieval for reducing missed cancer and improving the healthcare system M Kumari, P Ahlawat International Journal of Information Retrieval Research (IJIRR) 12 (1), 1-25, 2022 | 4 | 2022 |
Target tracking technique in wireless sensor network S Sharma International Conference on Computing, Communication & Automation, 486-491, 2015 | 4 | 2015 |