A Survey on Machine Learning Techniques for Intrusion Detection Systems J Singh, MJ Nene International Journal of Advanced Research in Computer and Communication …, 2013 | 154 | 2013 |
Buried Object Detection and Analysis of GPR Images: Using Neural Network and Curve Fitting NP Singh, MJ Nene IEEE, Emerging Research Areas and 2013 International Conference on …, 2013 | 69 | 2013 |
A survey on types of machine learning techniques in intrusion prevention systems S Das, MJ Nene 2017 International Conference on Wireless Communications, Signal Processing …, 2017 | 59 | 2017 |
Node-level trust evaluation in wireless sensor networks SS Desai, MJ Nene IEEE Transactions on Information Forensics and Security 14 (8), 2139-2152, 2019 | 52 | 2019 |
Psychological, Social, and Cultural Aspects of Internet Addiction B Bozoglan, MJ Nene IGI Global, 2017 | 44 | 2017 |
Employability of blockchain technology in defence applications A Sudhan, MJ Nene 2017 International Conference on Intelligent Sustainable Systems (ICISS …, 2017 | 44 | 2017 |
A Survey on Latest DoS Attacks:Classification and Defense Mechanisms MJ Nene, Rajkumar International Journal of Innovative Research in Computer and Communication …, 2013 | 42* | 2013 |
One time pad generation using quantum superposition states G Upadhyay, MJ Nene 2016 IEEE International Conference on Recent Trends in Electronics …, 2016 | 40 | 2016 |
Data Leakage Prevention for Data in Transit using Artificial Intelligence and Encryption Techniques M Ghouse, MJ Nene, C VembuSelvi 2019 International Conference on Advances in Computing, Communication and …, 2019 | 31 | 2019 |
Algorithm for Autonomous Reorganization of Mobile Wireless Camera Sensor Networks to Improve Coverage MJ Nene, RS Deodhar, LM Patnaik IEEE SENSORS JOURNAL, VOL. 15, NO. 8, AUGUST 2015 15 (8), 4428-4441, 2015 | 30 | 2015 |
A Security Framework for Military Application on Infrastructure Based Wireless Sensor Network S Roy, MJ Nene IEEE International Conference on Research in Computational Intelligence and …, 2015 | 29 | 2015 |
Two‐factor authentication using biometric based quantum operations MK Sharma, MJ Nene Security and Privacy 3 (3), e102, 2020 | 24 | 2020 |
Quantum Computing: An Entanglement Measurement M Gupta, MJ Nene IEEE International Conference on Advent Trends in Multidisciplinary Research …, 2021 | 21 | 2021 |
Peer Selection Techniques for Enhanced Transaction Propagation in Bitcoin Peer-to-Peer Network A Sudhan, MJ Nene 2018 Second International Conference on Intelligent Computing and Control …, 2018 | 21 | 2018 |
Survey of Flocking Algorithms in Multi-agent Systems A Barve, MJ Nene International Journal of Computer Science Issues 10 (6(2)), 110-117, 2013 | 20 | 2013 |
Enhanced Machine Learning using Quantum Computing A Jhanwar, MJ Nene 2021 Second International Conference on Electronics and Sustainable …, 2021 | 19 | 2021 |
Multihop Trust Evaluation using Memory integrity in Wireless Sensor Networks SS Desai, MJ Nene IEEE Transactions on Information Forensics and Security, doi: 10.1109/TIFS …, 2021 | 19 | 2021 |
Self Organizing Localization Algorithm for Large Scale Underwater Sensor Network SS Naik, MJ Nene IEEE International Conference on Recent Advances in Computing and Software …, 2012 | 19 | 2012 |
Pauli Matrix based Quantum Communication Protocol P Nema, MJ Nene IEEE International Conference on Advent Trends in Multidisciplinary Research …, 2021 | 18 | 2021 |
RSS based detection and expulsion of malicious users from cooperative sensing in Cognitive Radios S Yadav, MJ Nene IEEE International Conf. Advance Computing Conference (IACC), 2013, 3rd …, 2013 | 18 | 2013 |