A Survey on Black Hole Attacks and Comparative Analysis of Various IDS Schemes in MANET R Ahlawat, SK Chaturvedi International Journal of Computer Applications 80 (1), 2013 | 3 | 2013 |
Cloud Malicious Threat Detection By Features From Intelligent Water Drop Set And EBPN R Singh, PK Mannepalli International Journal of Advanced Research Engineering and Technology …, 2020 | 2 | 2020 |
Survey on Feature Reduction Techniques of Intrusion Detection System R Singh, PK Mannepalli (IJERCT) 2 (3), 0 | 2 | |
Cloud Malicious Threat Detection Using Convolution Filter and EBPNN R Singh, PK Mannepalli 2021 5th International Conference on Information Systems and Computer …, 2021 | 1 | 2021 |
AI-Enabled Internet of Medical Things in Healthcare R Singh, AA Ansari Heterogenous Computational Intelligence in Internet of Things, 89-105, 2024 | | 2024 |
Invasive Weed Optimization Algorithm Based Trained Neural Network for Cloud Malicious Threat Detection IEEE International Conference on Technology, Research, and Innovation for …, 2021 | | 2021 |
AI Ethics and Challenges in Healthcare R Singh, AA Ansari Handbook on Augmenting Telehealth Services, 93-104, 0 | | |