Mitigating the effects of Black hole attacks on AODV routing protocol in mobile ad hoc networks AK Jain, V Tokekar 2015 International Conference on Pervasive Computing (ICPC), 1-6, 2015 | 72 | 2015 |
Detection and Avoidance of Unified Attacks on MANET using Trusted Secure AODV Routing Protocol M Samvatsar, A Sharma, AK Jain IEEE, 2016 | 54* | 2016 |
Security Enhancement in MANETs Using Fuzzy-Based Trust Computation Against Black Hole Attacks SS Ashish Kumar Jain, Vrinda Tokekar Advances in Intelligent Systems and Computing book series (AISC, volume 625 …, 2017 | 38* | 2017 |
Classification of denial of service attacks in mobile ad hoc networks AK Jain, V Tokekar 2011 International Conference on Computational Intelligence and …, 2011 | 38 | 2011 |
Support Vector Machine through Detecting Packet Dropping Misbehaving Nodes in MANET US Ravi Parihar, Ashish Jain International Conference on Electronics, Communication and Aerospace …, 2017 | 33* | 2017 |
Security enhancement of AODV routing protocol in mobile ad hoc network AK Jain, A Choorasiya 2017 2nd International Conference on Communication and Electronics Systems …, 2017 | 19 | 2017 |
Detection and Avoidance of Integrated Attacks on MANET using Trusted Hyperbolic AODV Routing Protocol JAK Vrinda Tokekar Journal of Mobile Computing, Communications & Mobile Networks 3 (2), 21-34, 2016 | 16 | 2016 |
TRUST-BASED SOLUTION FOR WORMHOLE ATTACKS IN MOBILE AD HOC NETWORKS RV Ashish Kumar Jain Global Journal of Multidisciplinary Studies 4 (12), 84-90, 2015 | 14* | 2015 |
wormhole attack in mobile ad hoc networks shweta shah madhu sharma, ashish jain Colossal Data Analysis and Networking (CDAN), Symposium, 1-4, 2016 | 12* | 2016 |
Mitigation for Jelly Fish Attack on MANET S Shah, M Sharma, A Jain i-manager's Journal on Mobile Applications & Technologies 21 (41), 19-26, 2015 | 9 | 2015 |
Trust based model for mobile ad-hoc network in Internet of Things U Singh, M Shukla, AK Jain, M Patsariya, R Itare, S Yadav Inventive Computation Technologies 4, 827-839, 2020 | 4 | 2020 |
Security Enhancement of AODV Protocol using Fuzzy based Trust Computation in Mobile Ad Hoc Networks AKJ V Tokekar Oriental Journal of Computer Science & Technology 10 (1), 2017 | 3 | 2017 |
Age Estimation from Facial Image:A Survey RP Chandra Prakash Patidar, Pooja Patidar, Ashish Kumar Jain, Jagdish Raikwal International Journal of Scientific Research & Engineering Trends 6 (6 …, 2020 | | 2020 |
A System and Method for Detecting Malicious Activities in Computing Network CPPMS Ashish Kumar Jain, Manjeet Kumar Soni IN Patent E-12/493/2020/MUM,, 2020 | | 2020 |
Plant Health Assessment and Analysis of Disease using Deep Learning Technique RPAP Ashish Kumar Jain, C.P. Patidar International Journal of Science, Engineering and Technology 8 (5), 1-5, 2020 | | 2020 |
A Smart Helmet MAK Mr. Upendra Singh, Mr. Mukul Shukla, Prof Sunita Verma, Dr. Lalit Putohit IN Patent App. 202,021,008,333, 2020 | | 2020 |
Review of Network Intrusion Detection Systems AKJCPP Manjeet Kumar Soni International Journal of Scientific & Technology Research (IJSTR) 9 (2), 2020 | | 2020 |
Investigation of Crop Leaf Disease using Machine Learning and Image Processing Techniques APRP C.P. Patidar, Ashish Kumar Jain International Journal of Science, Engineering and Technology 8 (5), 2020 | | 2020 |
Trust Management in mobile ad hoc networks : A Survey NV ashish kumar jain International Conference on Electronics, Communication & Aerospace …, 2017 | | 2017 |
A Review Paper on Colored Petri Nets and their application in Protocol Verification. AJ Richa Agarwal International Journal of Research in Computer and Communication Technology 2 (8), 2013 | | 2013 |