Detection of Cyber Crime on Social Media using Random Forest Algorithm T Arora, M Sharma, SK Khatri 2019 2nd International Conference on Power Energy, Environment and …, 2019 | 19 | 2019 |
Security Against Cyber Attacks in Food Industry MS A Khursheed, M Kumar International Conference on Sustainable Computing Techniques in Engineering …, 2016 | 12* | 2016 |
A RESEARCH SURVEY: RFID SECURITY & PRIVACY ISSUE M Sharma, DPC Agrawal Computer Science, pp. 255–261 …, 2013 | 4 | 2013 |
Scope and Challenges of IoT and Blockchain Integration S Shree, M Sharma Evolving Networking Technologies: Developments and Future Directions, 21-39, 2023 | 3 | 2023 |
Client-Side Verification Framework for Offline Architecture of IoT B Bansal, M Sharma 2019 3rd International conference on Electronics, Communication and …, 2019 | 3 | 2019 |
Solar-Powered Portable Charger Using IoT-Based Technique M Sharma, A Chauhan Smart IoT for Research and Industry, 179-188, 2022 | 2 | 2022 |
Smart Device Challenges and Security Channels P Singh, M Sharma Innovations in Computer Science and Engineering: Proceedings of 7th ICICSE …, 2020 | 2 | 2020 |
E-Mail Security Framework Through Various Virus Encryption Techniques AP BHATT, M SHARMA 2019 International Conference on Intelligent Computing and Control Systems …, 2019 | 2 | 2019 |
Communication Enhancement Using Socket Pro-gramming M Sharma, P Soni International Journal of Modern Engineering Research (IJMER) 1 (1), 162-165, 2011 | 2* | 2011 |
Framework to Enhance the Reachability of AI Techniques in Medical U Gaur, M Sharma Image Processing and Capsule Networks: ICIPCN 2020, 359-365, 2021 | 1 | 2021 |
Less Energy Consumption Framework for Fog Computing With IoT P Rana, M Sharma 2019 2nd International Conference on Power Energy, Environment and …, 2019 | 1 | 2019 |
The IoT Challenges, Solution Framework And Implementation PSM Thulal, A, Mitta EAI Endorsed Trans IoT 9 (3), e4, 2023 | | 2023 |
Comprehensive Study For Design in DataWarehouse Using UML M Mudgal, PS Metkewar, M Sharma I J C T A 20 (9), 399-402, 2016 | | 2016 |
Comparative Security and Privacy Analysis of RFID communication System M Sharma, DK saxsena, DPC Agrawal I J C T A, , 2016 9 (20), 69-74, 2016 | | 2016 |
Algorithm for Encryption and Decryption based on Elliptic Curve Cryptography and Caesar Cipher M Sharma, Y Anand IJETEE 11 (2), 138-141, 2015 | | 2015 |
Comparative Study of Information Retrieval Techniques Based on Cloud Computing S Bhutani, M Sharma AIIT-EPH, 2014 | | 2014 |
A Model on the Working of Virtual Machines in Various Environments H Srivastava, M Sharma AIIT,EPH, 2014 | | 2014 |
Comaprative Analysis of Network Congestion Control Techniques in MANET V Khurana, M Sharma International Journal of Scientific Research and Education 2 (6), 941-947, 2014 | | 2014 |
ECC Implementation for Secured RFID Communication M Sharma, PC Agrawal IJCSEE 2 (Issue 1), 50-54, 2014 | | 2014 |
A Probabilistic Data Association Filtering (PDAF) based Tracking Approach to Detect Maneuvering Target PP Singh, RB Agnihotri, M Sharma | | 2013 |