Hybrid algorithm to detect DDoS attacks in VANETs K Adhikary, S Bhushan, S Kumar, K Dutta Wireless Personal Communications 114 (4), 3613-3634, 2020 | 58 | 2020 |
Evaluating the performance of various SVM kernel functions based on basic features extracted from KDDCUP'99 dataset by random forest method for detecting DDoS attacks K Adhikary, S Bhushan, S Kumar, K Dutta Wireless Personal Communications, 1-19, 2022 | 8 | 2022 |
Decision tree and neural network based hybrid algorithm for detecting and preventing ddos attacks in VANETS K Adhikary, S Bhushan, S Kumar, K Dutta International Journal of Innovative Technology and Exploring Engineering 5 …, 2020 | 8 | 2020 |
Recent techniques used for preventing DOS attacks in VANETs K Adhikary, S Bhushan 2017 International Conference on Computing, Communication and Automation …, 2017 | 6 | 2017 |
A Survey on Despeckling Methods D Sood, A Kaur, K Adhikary International Journal of Emerging Technology and Advanced Engineering 3 (7), 2013 | 4 | 2013 |
WiMAX Propagations R Kumar, K Adhikary, R Vaid Int. J. Comput. Sci. Eng. Technol 1 (8), 480-483, 2011 | 4 | 2011 |
Feature extraction and classification technique in neural network K Adhikary, A Kuma International Journal of Computer Applications 35 (3), 29-35, 2011 | 4 | 2011 |
Evaluating the Impact of DDoS Attacks in Vehicular Ad-Hoc Networks K Adhikary, S Bhushan, S Kumar, K Dutta International Journal of Security and Privacy in Pervasive Computing (IJSPPC …, 2020 | 3 | 2020 |
EVALUATING THE PERFORMANCE OF VARIOUS MACHINE LEARNING ALGORITHMS FOR DETECTING DDoS ATTACKS IN VANETS A Kaushik, B Shashi, K Sunil, D Kamlesh International Journal of Control And Automation 12 (5), 478-486, 2019 | 2 | 2019 |
Performance of ber in new alluvial zone of West Bengal. SS Kumar, S Kundu, P Nandi, S Shekhar, RT Adhikary, B Ghosh, P Dutta | 2 | 2017 |
An Automatic Method to Inspect Discontinuities in Textile K Kaur, N Gupta, K Adhikary International Journal of Computer Science Engineering & Technology 1 (8), 2011 | 2 | 2011 |
Survey on Architecture of Peer-to-Peer Network K Adhikary, A Bindal, G Kaur International Journal of Computer Technology and Applications 2 (6), 3089-3096, 2011 | 2 | 2011 |
VERSIONS OF 802.16 R Kumar, K Adhikary, MR Vaid J. Comp. ech. Appl. 2 (5), 1290-1296, 2011 | 1 | 2011 |
Securing Bandwidth Request Messages in Wimax K Adhikary, R Kumar, A Kumar International Journal of Computer Applications 975, 8887, 2011 | 1 | 2011 |
A Taxonomy of Data Management Issues in Mobile Cloud Computing AS Bhatia, V Mehan, K Adhikary | | 2014 |
Sunaina Bagga Chetan Jain K Adhikary | | 2013 |
Behavioral Analysis of a Proposed Reputation System for Peer-to-Peer Network S Bagga, C Jain, K Adhikary International Journal of Computer Applications 66 (23), 2013 | | 2013 |
A Verification Mechanism for Signature Using ANN K Adhikary, A Kumar Digital Image Processing, 1198-1201, 2011 | | 2011 |
Kaushik Adhikary A Kumar | | 2011 |
Kaushik Adhikary Rajinder Kumar A Kumar | | 2011 |