The recent trends in cyber security: A review J Kaur, KR Ramkumar Journal of King Saud University-Computer and Information Sciences 34 (8 …, 2022 | 134 | 2022 |
Internet attacks and intrusion detection system: A review of the literature R Singh, H Kumar, RK Singla, RR Ketti Online Information Review 41 (2), 171-184, 2017 | 97 | 2017 |
An efficient quantum computing technique for cracking RSA using Shor’s algorithm V Bhatia, KR Ramkumar 2020 IEEE 5th international conference on computing communication and …, 2020 | 87 | 2020 |
A comparative analysis on applications tools and techniques of DEEP learning S Sharma, KR Ramkumar J. Crit. Rev. 7 (15), 1542-1550, 2020 | 50 | 2020 |
A design implementation and comparative analysis of advanced encryption standard (AES) algorithm on FPGA K Kumar, KR Ramkumar, A Kaur 2020 8th International Conference on Reliability, Infocom Technologies and …, 2020 | 49 | 2020 |
A lightweight AES algorithm implementation for encrypting voice messages using field programmable gate arrays K Kumar, KR Ramkumar, A Kaur Journal of King Saud University-Computer and Information Sciences 34 (6 …, 2022 | 41 | 2022 |
Machine learning techniques and implementation of different ML algorithms S Singh, KR Ramkumar, A Kukkar 2021 2nd Global Conference for Advancement in Technology (GCAT), 1-6, 2021 | 34 | 2021 |
A detailed analysis of data consistency concepts in data exchange formats (JSON & XML) G Goyal, K Singh, KR Ramkumar 2017 International Conference on Computing, Communication and Automation …, 2017 | 32 | 2017 |
A comparative study on various intrusion detection techniques using machine learning and neural network V Bhatia, S Choudhary, KR Ramkumar 2020 8th International Conference on Reliability, Infocom Technologies and …, 2020 | 31 | 2020 |
A design of power-efficient AES algorithm on Artix-7 FPGA for green communication K Kumar, A Kaur, KR Ramkumar, A Shrivastava, V Moyal, Y Kumar 2021 International Conference on Technological Advancements and Innovations …, 2021 | 30 | 2021 |
A survey and comparative analysis of the various routing protocols of Internet of Things S Agnihotri, KR Ramkumar International Journal of Pervasive Computing and Communications 13 (3), 264-281, 2017 | 27 | 2017 |
A survey on hardware implementation of cryptographic algorithms using field programmable gate array K Kumar, KR Ramkumar, A Kaur, S Choudhary 2020 IEEE 9th International Conference on Communication Systems and Network …, 2020 | 25 | 2020 |
A survey on nist selected third round candidates for post quantum cryptography T Hasija, KR Ramkumar, A Kaur, S Mittal, B Singh 2022 7th International Conference on Communication and Electronics Systems …, 2022 | 24 | 2022 |
A comprehensive review on the vehicular ad-hoc networks TK Bhatia, RK Ramachandran, R Doss, L Pan 2020 8th International Conference on Reliability, Infocom Technologies and …, 2020 | 20 | 2020 |
Credit card fraud detection using machine and deep learning techniques S Sharma, A Kataria, JK Sandhu, KR Ramkumar 2022 3rd international conference for emerging technology (INCET), 1-7, 2022 | 19 | 2022 |
Post-quantum cryptography: A solution to the challenges of classical encryption algorithms S Sharma, KR Ramkumar, A Kaur, T Hasija, S Mittal, B Singh Modern Electronics Devices and Communication Systems: Select Proceedings of …, 2023 | 18 | 2023 |
A review of simulators used for VANETs: The case-study of vehicular mobility generators TK Bhatia, RK Ramachandran, R Doss, L Pan 2020 7th international conference on signal processing and integrated …, 2020 | 17 | 2020 |
A survey on ACO based multipath routing algorithms for ad hoc networks I Sharma, KR Ramkumar International Journal of Pervasive Computing and Communications 13 (4), 370-385, 2017 | 17 | 2017 |
A survey on performance analysis of different architectures of AES algorithm on FPGA T Hasija, A Kaur, KR Ramkumar, S Sharma, S Mittal, B Singh Modern Electronics Devices and Communication Systems: Select Proceedings of …, 2023 | 15 | 2023 |
Security gaps assessment of smart grid based SCADA systems AW Mir, R Ketti Ramachandran Information & Computer Security 27 (3), 434-452, 2019 | 15 | 2019 |