Comparison of reactive and proactive routing protocols for different mobility conditions in WSN K Tripathi, M Pandey, S Verma Proceedings of the 2011 International Conference on communication, computing …, 2011 | 42 | 2011 |
Internet of Things-Based e-Health Care: Key Challenges and Recommended Solutions for Future GH Sai, K Tripathi, AK Tyagi Proceedings of Third International Conference on Computing, Communications …, 2022 | 34 | 2022 |
Extended TLS security and defensive algorithm in openflow SDN S Midha, K Triptahi 2019 9th International Conference on Cloud Computing, Data Science …, 2019 | 34 | 2019 |
Combining the advantages of radiomic features based feature extraction and hyper parameters tuned RERNN using LOA for breast cancer classification S Subasree, NK Sakthivel, K Tripathi, D Agarwal, AK Tyagi Biomedical Signal Processing and Control 72, 103354, 2022 | 25 | 2022 |
Extended security in heterogeneous distributed SDN architecture S Midha, K Tripathi International Conference on Advanced Communication and Computational …, 2019 | 24 | 2019 |
Design, implementation, and controlling of a humanoid robot K Somisetti, K Tripathi, JK Verma 2020 International Conference on Computational Performance Evaluation (ComPE …, 2020 | 23 | 2020 |
Trust value based algorithm to identify and defense gray-hole and black-hole attack present in MANET using clustering method NJK Patel, K Tripathi International Journal of Scientific Research in Science, Engineering and …, 2018 | 23 | 2018 |
Remotely triggered blackhole routing in SDN for Handling DoS S Midha, K Tripathi Proceedings of International Conference on IoT Inclusive Life (ICIIL 2019 …, 2020 | 22 | 2020 |
Cloud deep down—SWOT analysis S Midha, G Kaur, K Tripathi 2017 2nd International Conference on Telecommunication and Networks (TEL-NET …, 2017 | 21 | 2017 |
Practical Implications of Using Dockers on Virtualized SDN. S Midha, K Tripathi, MK Sharma Webology 18 (SI01), 312-330, 2021 | 19 | 2021 |
A Framework for Structural Damage detection system in automobiles for flexible Insurance claim using IOT and Machine Learning D Agarwal, K Tripathi 2022 International Mobile and Embedded Technology Conference (MECON), 5-8, 2022 | 18 | 2022 |
Identifying and improving the malicious behavior of rushing and blackhole attacks using proposed IDSAODV protocol PN Ranchhodbhai, K Tripathi International Journal of Recent Technology and Engineering 8 (3), 6554-6562, 2019 | 18 | 2019 |
Review of Detection of Packets Inspection and Attacks in Network Security SK Jajula, K Tripathi, SB Bajaj Emerging Technologies in Data Mining and Information Security: Proceedings …, 2022 | 16 | 2022 |
Performance of DSDV protocol over sensor networks K Tripathi, T Agarwal, SD Dixit Int. J. Next Gener. Netw 2, 53-59, 2010 | 14 | 2010 |
Design and implementation of an intrusion detection system using MLP-NN for MANET I Mapanga, V Kumar, W Makondo, T Kushboo, P Kadebu, W Chanda 2017 IST-Africa Week Conference (IST-Africa), 1-12, 2017 | 12 | 2017 |
Ethical Hacking: Importance, Controversies and Scope in the Future G Vishnuram, K Tripathi, AK Tyagi 2022 International Conference on Computer Communication and Informatics …, 2022 | 11 | 2022 |
Analysis of Anomaly detection of Malware using KNN S Rani, K Tripathi, Y Arora, A Kumar 2022 2nd International Conference on Innovative Practices in Technology and …, 2022 | 10 | 2022 |
Analysis of Black Hole Attack in MANET Based on Simulation through NS3.26 DKT Neelam Janak Kumar Patel1 International Journal on Recent and Innovation Trends in Computing and …, 2017 | 10 | 2017 |
Futuristic analysis of machine learning based routing protocols in wireless ad hoc networks S Kaushik, K Tripathi, R Gupta, P Mahajan 2021 Fourth international conference on computational intelligence and …, 2021 | 9 | 2021 |
An Inspection of MANET'S scenario using AODV, DSDV and DSR routing protocols S Singh, SB Bajaj, K Tripathi, N Aneja 2022 2nd International Conference on Innovative Practices in Technology and …, 2022 | 7 | 2022 |