M-government–mobile technology for e-government M Kumar, OP Sinha International conference on e-government, India, 294-301, 2007 | 132 | 2007 |
Intrusion Detection System using decision tree algorithm M Kumar, M Hanumanthappa, TVS Kumar 2012 IEEE 14th international conference on communication technology, 629-634, 2012 | 112 | 2012 |
Post-quantum cryptography Algorithm's standardization and performance analysis M Kumar Array 15, 100242, 2022 | 72 | 2022 |
Distributed intrusion detection system using blockchain and cloud computing infrastructure M Kumar, AK Singh 2020 4th international conference on trends in electronics and informatics …, 2020 | 65 | 2020 |
Crime Investigation and Criminal Network Analysis Using Archive Call Detail Records M Kumar 2016 Eighth International Conference on Advanced Computing (ICoAC), Chennai …, 2017 | 41 | 2017 |
Scalable intrusion detection systems log analysis using cloud computing infrastructure M Kumar, M.,Hanumanthappa Computational Intelligence and Computing Research (ICCIC), 2013 IEEE …, 2013 | 40* | 2013 |
Secure Log Storage Using Blockchain and Cloud Infrastructure TVSK Manish Kumar, Ashish Kumar Singh 2018 9th International Conference on Computing, Communication and Networking …, 2018 | 33 | 2018 |
Security issues in m-government M Kumar, M Hanumanthappa, BL Reddy International Journal of Electronic Security and Digital Forensics 1 (4 …, 2008 | 26 | 2008 |
Scalable malware detection system using big data and distributed machine learning approach M Kumar Soft Computing 26 (8), 3987-4003, 2022 | 20 | 2022 |
Intrusion Detection System-False Positive Alert Reduction Technique M Kumar, M Hanumanthappa, TVS Kumar | 19 | 2011 |
Encrypted traffic and IPsec challenges for intrusion detection system M Kumar, M Hanumanthappa, TV Suresh Kumar Proceedings of International Conference on Advances in Computing, 721-727, 2012 | 17 | 2012 |
Scalable malware detection system using distributed deep learning M Kumar Cybernetics and Systems 54 (5), 619-647, 2023 | 15 | 2023 |
Solid state drive forensics analysis—Challenges and recommendations M Kumar Concurrency and Computation: Practice and Experience 33 (24), e6442, 2021 | 12 | 2021 |
Intrusion detection system for grid computing using SNORT M Kumar, M Hanumanthappa, TVS Kumar Computing, Communication and Applications (ICCCA), 2012 International …, 2012 | 12 | 2012 |
Secure Mobile Based Voting System M Kumar, TVS Kumar, M Hanumanthappa, DE Geetha Emerging Technologies in E-Government, 0 | 12* | |
Intrusion detection system using stream data mining and drift detection method M Kumar, M Hanumanthappa 2013 Fourth International Conference on Computing, Communications and …, 2013 | 9 | 2013 |
Design model for energy trading on blockchain K Kumari, M Mrunalini, M Kumar, V Talasila, PK Dixit 2019 4th International Conference on Electrical, Electronics, Communication …, 2019 | 5 | 2019 |
Mobile phone forensics-a systematic approach, tools, techniques and challenges M Kumar International Journal of Electronic Security and Digital Forensics 13 (1), 64-87, 2021 | 4 | 2021 |
Use of AADHAAR biometrie database for crime investigation—opportunity and challenges M Kumar, M Hanumanthappa, TVS Kumar 2017 International Conference on Innovations in Information, Embedded and …, 2017 | 4 | 2017 |
Self tuning ids for changing environment M Kumar, M Hanumanthappa 2014 International Conference on Computational Intelligence and …, 2014 | 4 | 2014 |