Follow
Dr Vimal Kumar
Dr Vimal Kumar
Galgotias University, Greater Noida, Uttar Pradesh, India
Verified email at galgotiasuniversity.edu.in
Title
Cited by
Cited by
Year
An adaptive approach for detection of blackhole attack in mobile ad hoc network
V Kumar, R Kumar
Procedia Computer Science 48, 472-479, 2015
1042015
Detection of phishing attack using visual cryptography in ad hoc network
V Kumar, R Kumar
2015 International Conference on Communications and Signal Processing (ICCSP …, 2015
282015
Detection and prevention of phishing attack using dynamic watermarking
AP Singh, V Kumar, SS Sengar, M Wairiya
International Conference on Advances in Information Technology and Mobile …, 2011
282011
Prevention of wormhole attack using identity based signature scheme in MANET
D Sharma, V Kumar, R Kumar
Computational Intelligence in Data Mining—Volume 2, 475-485, 2016
272016
Rank Based Two Stage Semi-Supervised Deep Learning Model for X-Ray Images Classification: AN APPROACH TOWARD TAGGING UNLABELED MEDICAL DATASET
PK Mall, V Narayan, S Srivastava, M Sabarwal, V Kumar, S Awasthi, ...
Journal of Scientific & Industrial Research (JSIR) 82 (08), 818-830, 2023
152023
Prevention of Blackhole Attack in MANET using Certificateless Signature Scheme
V Kumar, M Shankar, AM Tripathi, V Yadav, AK Rai, U Khan, M Rahul
Journal of Scientific & Industrial Research 81 (10), 1061-1072, 2022
152022
An optimal authentication protocol using certificateless ID-based signature in MANET
V Kumar, R Kumar
International Symposium on Security in Computing and Communication, 110-121, 2015
152015
Proposed framework for dealing COVID-19 pandemic using blockchain technology
M Gupta, V Kumar, V Yadav, RK Singh, M Sadim
NISCAIR-CSIR, India, 2021
142021
A cooperative black hole node detection and mitigation approach for MANETs
V Kumar, R Kumar
International Conference for Information Technology and Communications, 171-183, 2015
132015
Virtual Mouse Control Using Hand Class Gesture
VK Sharma, V Kumar, M Iqbal, S Tawara, V Jayaswal
vol 7, 454-458, 0
13*
Student’s Perception towards Mobile learning using Interned Enabled Mobile devices during COVID-19
P Gupta, V Kumar, V Yadav
EAI Endorsed Transactions on Industrial Networks and Intelligent Systems 8 …, 2021
112021
Revealing the demonstration of blockchain and implementing scope in covid-19 outbreak
M Gupta, V Kumar
EAI Endorsed Transactions on Scalable Information Systems 8 (29), e2, 2021
112021
Layered framework for mobile forensics analysis
M Goel, V Kumar
Proceedings of 2nd international conference on advanced computing and …, 2019
112019
A grid-based approach to prolong lifetime of WSNs using fuzzy logic
AK Mishra, R Kumar, V Kumar, J Singh
Advances in computational intelligence, 11-22, 2017
112017
An efficient password authenticated key exchange protocol for WLAN and WiMAX
AK Rai, V Kumar, S Mishra
Proceedings of the International Conference & Workshop on Emerging Trends in …, 2011
102011
Architecture of an IoT-based Women Safety System
V Tyagi, S Arora, S Gupta, VK Sharma, V Kumar
Architecture 29 (5), 3670-3676, 2020
92020
Strong password based EAP-TLS authentication protocol for WiMAX
AK Rai, V Kumar, S Mishra
Anjani K. Rai et al./(IJCSE) International Journal on Computer Science and …, 2010
92010
Krishi Portal: Web Based Farmer Help Assistance
M Iqbal, V Kumar, VK Sharma
International Journal of Advanced Science and Technology 29, 4783-4786, 2007
92007
Study of Coronavirus Disease (COVID-19) Outbreak in India
V Deshwal, V Kumar
The Open Nursing Journal 15 (1), 2021
82021
Prevention of blackhole attack using certificateless signature (CLS) scheme in MANET
V Kumar, R Kumar
Security Solutions for Hyperconnectivity and the Internet of Things, 130-150, 2017
82017
The system can't perform the operation now. Try again later.
Articles 1–20