Machine learning based intrusion detection systems for IoT applications A Verma, V Ranga Wireless Personal Communications 111 (4), 2287-2310, 2020 | 290 | 2020 |
Security of RPL based 6LoWPAN Networks in the Internet of Things: A Review A Verma, V Ranga IEEE Sensors Journal 20 (11), 5666-5690, 2020 | 146 | 2020 |
Statistical analysis of CIDDS-001 dataset for network intrusion detection systems using distance-based machine learning A Verma, V Ranga Procedia Computer Science 125, 709-716, 2018 | 137 | 2018 |
Software-defined networking-based DDoS defense mechanisms R Swami, M Dave, V Ranga ACM Computing Surveys (CSUR) 52 (2), 1-36, 2019 | 134 | 2019 |
ELNIDS: Ensemble learning based network intrusion detection system for RPL based Internet of Things A Verma, V Ranga 2019 4th International conference on Internet of Things: Smart innovation …, 2019 | 114 | 2019 |
Multi-Robot Coordination Analysis, Taxonomy, Challenges and Future Scope JK Verma, V Ranga Journal of Intelligent & Robotic Systems, 2021 | 98 | 2021 |
Voting extreme learning machine based distributed denial of service attack detection in cloud computing GS Kushwah, V Ranga Journal of Information Security and Applications 53, 102532, 2020 | 93 | 2020 |
Intelligent traffic management system for prioritizing emergency vehicles in a smart city L Sumi, V Ranga International Journal of Engineering 31 (2), 278-283, 2018 | 84 | 2018 |
API features individualizing of web services: REST and SOAP A Soni, V Ranga International Journal of Innovative Technology and Exploring Engineering 8 …, 2019 | 82 | 2019 |
Evaluation of network intrusion detection systems for RPL based 6LoWPAN networks in IoT A Verma, V Ranga Wireless Personal Communications 108, 1571-1594, 2019 | 70 | 2019 |
Cyber-physical security for IoT networks: a comprehensive review on traditional, blockchain and artificial intelligence based key-security A Attkan, V Ranga Complex & Intelligent Systems 8 (4), 3559-3591, 2022 | 69 | 2022 |
Attack and intrusion detection in cloud computing using an ensemble learning approach P Singh, V Ranga International Journal of Information Technology 13 (2), 565-571, 2021 | 61 | 2021 |
Mitigation of DIS flooding attacks in RPL‐based 6LoWPAN networks A Verma, V Ranga Transactions on emerging telecommunications technologies 31 (2), e3802, 2020 | 61 | 2020 |
Optimized extreme learning machine for detecting DDoS attacks in cloud computing GS Kushwah, V Ranga Computers & Security, 2021 | 60 | 2021 |
Network partitioning recovery mechanisms in WSANs: a survey V Ranga, M Dave, AK Verma Wireless personal communications 72, 857-917, 2013 | 55 | 2013 |
Sentiment analysis of the Uri terror attack using Twitter P Garg, H Garg, V Ranga 2017 International conference on computing, communication and automation …, 2017 | 54 | 2017 |
Sensor enabled Internet of Things for smart cities L Sumi, V Ranga 2016 fourth international conference on parallel, distributed and grid …, 2016 | 53 | 2016 |
On evaluation of network intrusion detection systems: Statistical analysis of CIDDS-001 dataset using machine learning techniques A Verma, V Ranga Authorea Preprints, 2023 | 48 | 2023 |
American sign language fingerspelling using hybrid discrete wavelet transform-gabor filter and convolutional neural network V Ranga, N Yadav, P Garg Journal of Engineering Science and Technology 13 (9), 2655-2669, 2018 | 45 | 2018 |
A hybrid timer based single node failure recovery approach for WSANs V Ranga, M Dave, AK Verma Wireless personal communications 77, 2155-2182, 2014 | 37 | 2014 |