Cloud computing security: Amazon web service S Narula, A Jain 2015 Fifth International Conference on Advanced Computing & Communication …, 2015 | 111 | 2015 |
Botnet detection via mining of network traffic flow L Mathur, M Raheja, P Ahlawat Procedia computer science 132, 1668-1677, 2018 | 57 | 2018 |
Intrusion Detection using Machine Learning and Feature Selection PH Prabha I. J. Computer Network and Information Security, 43-52, 2019 | 48 | 2019 |
Wireless Sensor Network application for water quality monitoring in India S Verma, P Ahlawat Computing and Communication Systems (NCCCS), 2012 National Conference on, 1-5, 2012 | 47 | 2012 |
A comprehensive survey of routing protocols in wireless sensor networks J Kumari 2015 2nd International Conference on Computing for Sustainable Global …, 2015 | 33 | 2015 |
Security threats in cloud computing N Kajal, N Ikram International Conference on Computing, Communication & Automation, 691-694, 2015 | 24 | 2015 |
Communication architecture for underwater wireless sensor network S Verma International Journal of Computer Network and Information Security 7 (6), 67, 2015 | 18 | 2015 |
DCPM: an effective and robust approach for diabetes classification and prediction M kumari, P Ahlawat International Journal of Information Technology 13, 1079-1088, 2021 | 15 | 2021 |
An effective malware detection method using hybrid feature selection and machine learning algorithms N Dabas, P Ahlawat, P Sharma Arabian Journal for Science and Engineering 48 (8), 9749-9767, 2023 | 14 | 2023 |
A cluster based key management scheme for underwater wireless sensor networks S Verma International Journal of Computer Network and Information Security 7 (9), 54, 2015 | 13 | 2015 |
An Energy Efficient Routing Algorithm for Wireless Body Area Network P Ahlawat, J Kumari International Journal of Wireless and Microwave Technologies 5 (5), 56-62, 2015 | 11 | 2015 |
An effective ransomware detection approach in a cloud environment using volatile memory features Prachi, S Kumar Journal of Computer Virology and Hacking Techniques 18 (4), 407-424, 2022 | 10 | 2022 |
Mobile IP and comparison between mobile IPv4 and IPv6 N Jora Journal of Network Communications and Emerging Technologies (JNCET) 2 (1), 2015 | 9 | 2015 |
Survey paper on wireless underground positioning system S Kataria, P Singh, P Ahlawat International Journal of Computer Applications 975, 8887, 2015 | 8 | 2015 |
Target tracking in wireless sensor network P Chauhan, P Ahlawat International J. of Information & Computation Technology 4 (6), 643-648, 2014 | 7 | 2014 |
MalAnalyser: An effective and efficient Windows malware detection method based on API call sequences N Dabas, P Sharma Expert Systems with Applications 230, 120756, 2023 | 6 | 2023 |
Survey for detection and analysis of android malware (s) through artificial intelligence techniques S Sharma, K Khanna, P Ahlawat Cyber Security and Digital Forensics: Proceedings of ICCSDF 2021, 321-337, 2022 | 6 | 2022 |
Usage of machine learning for intrusion detection in a network P Chaudhary International Journal of Computer Networks and Applications 3 (6), 139-147, 2016 | 5 | 2016 |
Intelligent information retrieval for reducing missed cancer and improving the healthcare system M Kumari, P Ahlawat International Journal of Information Retrieval Research (IJIRR) 12 (1), 1-25, 2022 | 4 | 2022 |
Target tracking technique in wireless sensor network S Sharma International Conference on Computing, Communication & Automation, 486-491, 2015 | 4 | 2015 |