Title |
Name of Author/Faculty |
Name of Journal |
Month,Year |
ISSN No. |
“Pre dicting Open Source Software Component Reusability Level Using Object Oriented Metrics By Taguchi Approach” |
Ramesh Chandra Poonia |
International Journal of Software Engineering and Knowledge Engineering (IJSEKE), World Scientific |
2021 |
1793-6403 |
"TAAWUN: A Decision Fusion and Feature Specific Road Detection Approach for Connected Autonomous Vehicles"", Mobile Networks and Applications" |
Furqan Alam, Rashid Mehmood, Iyad Katib, Saleh M. Altowaijri and Aiiad Albeshri |
Mobile Networks and Applications, Springer |
2019 |
10.1007/ s11036-019-01319-2 |
“Securing Software during Requirements Elicitation Phase: Metrics Perspective” |
Dr. Chitreshh Banerjee |
International Journal of Modern Computer Science (IJMCS) |
2016 |
2370-7868 |
“Water” Use it wisely WSN- Irrigation System (WSN-IS) for Smart Home Garden" |
Dr. Ramesh C. Poonia |
Recent Patents on Engineering, Bentham Science |
2018 |
1872-2121 |
A Comparative Analysis of Various Vulnerabilities Occur in Google Chrome. Published in Scopus Indexed, Springer AISC Series |
Dr. Swapnesh Taterh |
International Conference on Soft Computing: Theories and Applications, SoCTA 2016, Jaipur, India, |
2016 |
2194-5357 |
A Comparative Study of Web Service Testing Tools for Functional Requirements |
Dr.Manju Kaushik |
International Journal of Latest Technology in Engineering, Management and Applied Science |
2014 |
2278-2540 |
A comparative study on the application of text mining in cybersecurity |
Dr. Manju Kaushik |
Recent Advances in Computer Science and Communications |
2022 |
26662558 |
A Comparison between Traditional and Component based Software Development process Model |
Dr.Manju Kaushik |
Journal of Computer and Mathematical Sciences |
2012 |
2319 - 8133 |
A Deep Neural Network based Model for Named Entity Recognition for Hindi Language |
Dr. Ramesh C. Poonia |
Neural Computing and Applications (NCAA), Springer Nature |
2020 |
0941-0643 |
A Design and Implementation Framework of Congestion Control Algorithm Module in the Network Simulator 3 (NS -3) |
Dr. Swapnesh Taterh |
International Journal of Computing and Applications. |
2017 |
0973-5704 |
A Design and Implementation framework of Congestion Control Algorithm Module in the Network Simulator 3 (NS-3) |
Dr. Girish Paliwal |
International Journal of Computing and Applications |
2018 |
0973-5704 |
A dynamic window-size based segmentation technique to detect driver entry and exit from a car |
Dr. Swapnesh Taterh |
Journal of King Saud University - Computer and Information Sciences |
2022 |
13191578 |
A Feature Selection-Based K-NN Model for Fast Software Defect Prediction |
Awotunde J.B., Misra S., Adeniyi A.E., Abiodun M.K., Kaushik M., Lawrence M.O. |
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
2022 |
3029743 |
A GA-QMR: Genetic Algorithm oriented MANET QoS Multicast Routing |
Dr. Ramesh C. Poonia |
Recent Patents on Computer Science, Bentham Science |
2018 |
1874-4796 |
A Hybrid Feature Selection Gradient Recurrent Neural Network (HFSGRNN) Model for Rainfall Prediction in India Regions |
Dr. B. Suresh |
International Journal of Intelligent Engineering and Systems |
2024 |
2185310X |
A New Approach to Solve Cattaneo-Hristov Diffusion Model and Fractional Diffusion Equations with Hilfer-Prabhakar Derivative |
Dr. Yudhveer Singh |
AIMS Mathematics |
2019 |
2473-6988 |
A new family of Distribution with application on two real datasets on survival problem |
Dr. Yudhveer Singh |
Science & Technology Asia |
2020 |
2586-9027 |
A New M Model: A New Paradigm |
Dr.Manju Kaushik |
SHARE Journal of Multidisciplinary Research and Studies |
2012 |
0976-4712 |
A Novel Family of Distribution with Application in Engineering Problems: A Simulation Study |
Dr. Yudhveer Singh |
Journal of Computational Analysis and Applications |
2024 |
15211398 |
A Performance Evaluation of Routing Protocols for Vehicular Ad-hoc Networks with Swarm Intelligence |
Dr. Ramesh C. Poonia |
International Journal of System Assurance Engineering and Management |
2017 |
0975-6809 |
A Proposed Model for Three Way Authentication in Cloud Computing for Sensitive Information |
Dr.Manju Kaushik |
International Journal of Advanced Research in Computer Science and Software Engineering (IJARCSSE) |
2014 |
2277-128X |
A Prototype Model for Decision Support System of NPK Fertilization |
Dr. Ramesh C. Poonia |
Journal of Statistics & Management Systems, Taylor & Francis |
2018 |
0972-0510 |
A public domain dataset to recognize driver entry into and exit from a car using smartphone sensors |
Dr. Swapnesh Taterh |
International Journal of System Assurance Engineering and Management |
2021 |
9756809 |
A Review Paper on Effort Estimation and Model Based Regression Testing with SOA |
Dr.Manju Kaushik |
International Journal of Computer Science and Mobile Computing (IJCSMC) |
2014 |
2320-088X |
A Review Study of Modified Swarm Intelligence: Particle Swarm Optimization, Firefly, Bat and Gray Wolf Optimizer Algorithms |
Dr. Ramesh C. Poonia |
Journal of Recent Patents on Computer Science, Bentham Science |
2020 |
2666-2566 |
A Review Study of Modified Swarm Intelligence: Particle Swarm Optimization, Firefly, Bat and Gray Wolf Optimizer Algorithms |
Dr. Yudhveer Singh |
Recent Advances in Computer Science and Communications |
2020 |
1874-4796 |
A Scenario of Smart City Traffic Management System using Wireless Sensor Network |
Dr. Swapnesh Taterh |
International Journal of Advanced Engineering, Management and Science. |
2018 |
9788193575901 |
A statistical analysis of COVID-19 using Gaussian and probabilistic model |
Nayak S.R., Arora V., Sinha U., Poonia R.C. |
Journal of Interdisciplinary Mathematics |
2021 |
9720502 |
A Study And Analysis For Congestion Control Model Using Bbr In Wireless Networks Scenario |
Dr. Girish Paliwal |
International Journal of Engineering Applied Sciences and Technology |
2018 |
2455-2143 |
A Study And Analysis For Congestion Control Model Using BBR In Wireless Networks Scenario |
Dr. Swapnesh Taterh |
International Journal of Engineering Applied Sciences and Technology |
2018 |
2455-2143 |
A study and analysis of various existing implementation framework related to enterprise resource planning |
Dr. Swapnesh Taterh |
International Journal of Electrical, Electronics and Computers |
2017 |
2456-2319 |
A study and analysis of various existing implementation framework related to enterprise resource planning. |
Dr. Swapnesh Taterh |
International Journal of Electrical, Electronics and Computers |
2012 |
2456-2319 |
A Study of testing techniques for Web Applications |
Dr.Manju Kaushik |
International Journal of Science, Engineering and Technology Research (IJSETR) |
2013 |
2278-7798 |
A study on various attacks of TCP/IP and security challenges in MANET layer architecture. Published in Scopus Indexed Springer, |
Dr. Swapnesh Taterh |
4th International Conference on Soft Computing for Problem Solving, SocProS 2014, Silchar, India, |
2014 |
2194-5357 |
A Topology Based Routing Protocols Comparative Analysis for MANETs |
Dr. Girish Paliwal |
International Journal of Advanced Engineering Research and Science |
2016 |
2456-1908 |
A Two Way Synchronized Quantum Channel Quantum Key Distribution Protocol |
Dr. Ramesh C. Poonia |
Recent Patents on Computer Science, Bentham Science |
2018 |
1874-4796 |
A unified study of the inverse Laplace transform of Aleph-Function involving general Class of polynomial and their associated properties |
Dr. Yudhveer Singh |
International Journal of Creative Research and Thought, |
2018 |
2320-2882 |
A Vigorous Chaotic Function Based Image Authentication Structure |
Amit Kumar Singh |
Journal of Physics: Conference Series |
2021 |
1854 (2021) 012039 |
An Application of Incomplete I-Functions with Two Variables to Solve the Nonlinear Differential Equations Using S-Function |
Dr. Yudhveer Singh |
J. Computational Analysis and Applications |
2023 |
1572-9206 |
An Efficient Method for Securing the e-payment System : Money Pad |
Dr. Swapnesh Taterh |
International Journal of Computing and Applications |
2019 |
0973-5704 |
An Efficient Tactic to Analyzing and Evaluation of Malware Dump File Using Volatility Tool |
Amit Kumar Singh |
SN Computer Science |
2023 |
2662995X |
An Enhanced Algorithm of Congestion Control for Transport Layer in Wireless Ad Hoc Network |
Dr. Swapnesh Taterh |
International Journal of Emerging Technology and Innovative Research |
2019 |
2349-5162 |
An enhanced quantum key distribution protocol for security authentication |
Dr. Ramesh C. Poonia |
Journal of Discrete Mathematical Sciences and Cryptography, Taylor & Francis |
2019 |
0972-0529 |
An era of Micro Irrigation – A priority driven approach to enhance the optimum utilization of Water and a way towards “intelligent farming” |
Dr. Ramesh C. Poonia |
Recent Patents on Computer Science, Bentham Science |
2018 |
1874-4796 |
An Experimental analysis of Parent Teacher Scale Involvement with help of K Mean Clustering Technique using Matlab |
Dr.Manju Kaushik |
International Journal of Advance Research in Computer Science and Management Studies (IJARCSMS) |
2014 |
2347-1778 |
An improved chaotic-based African buffalo optimisation algorithm |
Dr. Ramesh C. Poonia |
International Journal of Innovative Computing and Applications, Inderscience |
2019 |
1751-6498 |
An Improved Chaotic-Based African Buffalo Optimization Algorithm |
Dr. Yudhveer Singh |
International Journal of Innovative Computing and Applications |
2019 |
1751-6498 |
An Improvised Software Security Awareness Model |
Dr. Chitreshh Banerjee |
International Journal of Information, Communication and Computing Technology (IJICCT) |
2013 |
2347-7202 |
An open-source MP + CNN + BiLSTM model-based hybrid model for recognizing sign language on smartphones |
Dr.Manju Kaushik |
International Journal of System Assurance Engineering and Management |
2024 |
9756809 |
Analysis of Vulnerabilities Threat Attack over Network Architecture |
Dr. Swapnesh Taterh |
International Journal of Emerging Technology and Innovative Research |
2018 |
2349-5162 |
Analytic Solutions of Fractional Differential Equation Associated with RLC Electrical Circuit |
Dr. Yudhveer Singh |
Journal of Statistics and Management System |
2018 |
2169-0014 |
Analytical solution of generalized space-time fractional advection-dispersion equation via coupling of Sumudu and Fourier transforms |
Dr. Yudhveer Singh |
Frontiers in Physics |
2019 |
2296-424X |
Android for Non Mobile Devices |
Dr. Swapnesh Taterh |
Journal of Computing Technologies |
2014 |
2278-3814 |
Aneka As PAAS (Cloud Computing) |
Dr. Girish Paliwal |
Journal for Computing Technologies |
2012 |
2278-3814 |
Architecture and Algorithm for Data Fusion of Heterogeneous Multi Source Information in Internet of Things (IoT) Paradigm |
Furqan Alam, Reda Salama, and Iyad Katib |
KAU journal of Computer Science |
2014 |
10.4197/Comp.5-2 |
ARTIFICIAL INTELLIGENCE (Al) |
Dr. Manju Kaushik |
Research Notes on Computing and Communication Sciences: Intelligent System Algorithms and Applications in Science and Technology |
2022 |
9781000406825, 9781774630211 |
Attack Penetration System for SQL Injection |
Dr.Manju Kaushik |
International Journal of Advanced Computer Research (IJACR) |
2014 |
2277-7970 |
Automated soil prediction using bag-of-features and chaotic spider monkey optimization algorithm |
Kumar S., Sharma B., Sharma V.K., Poonia R.C. |
Evolutionary Intelligence |
2021 |
18645909 |
Automated Soil Prediction using Bag-of-Features and Chaotic Spider Monkey Optimization Algorithm |
Dr. Ramesh C. Poonia |
Evolutionary Intelligence, Springer |
2018 |
1864-5917 |
Automatic detection of fake news using recurrent neural network— Long short-term memory |
Dr. B. Suresh |
Journal of Autonomous Intelligence |
2024 |
26305046 |
Automatic detection of fake news using recurrent neural network—Long short-term memory |
Dr. Shalini, A.K |
Journal of Autonomous Intelligence |
2024 |
26305046 |
Availability Analysis for Embedded System with N-Version Programming using Fuzzy Approach |
Dr.Manju Kaushik |
International Journal of Software Engineering, Technology and Applications |
2015 |
2053-2474 |
Behavioral biometric authentication on smartphone using keystroke dynamics |
Dr. Manju Kaushik |
Journal of Discrete Mathematical Sciences and Cryptography |
2023 |
2169-0065 |
Bio-Inspired Algorithms for Prey Model Optimization |
Ashish Kumar Rastogi |
Proceedings of 2nd International Conference on Innovative Practices in Technology and Management, ICIPTM 2022 |
2022 |
978-166546643-1 |
Boundary Detection to Segment the Pectoral Muscle From Digital mammogrames Images |
Mr. Sameer Saxena |
International Journal of Engineering and Advanced Technology |
2020 |
2249-8958 |
Boundary Detection to Segment the Pectoral Muscle from Digital Mammograms Images |
Dr. Yudhveer Singh |
International Journal of Engineering and Advanced Technology |
2020 |
2249-8958 |
Brain to Brain Communication: Without any Interface images, thoughts can be exchanged between minds |
Dr.Manju Kaushik |
International Journal of Computer Science & Engineering Technology (IJCSET) |
2012 |
2229-3345 |
Bridging Approaches to Reduce the Gap Between Classical and Quantum Computing |
Dr. Ramesh C. Poonia |
Journal of Information and Optimization Sciences, Taylor & Francis |
2016 |
0252-2667 |
Case Study on WSN Based Smart Home Garden with Priority Driven Approach |
Dr. Ramesh C. Poonia |
Journal of Cases on Information Technology (JCIT), IGI Global |
2017 |
1548-7717 |
Certain Unified Integrals Associated with Product of the General Class of Polynomials and Incomplete I-Functions |
Dr. Yudhveer Singh |
International Journal of Applied and Computational Mathematics |
2022 |
23495103 |
Challenges to Big Data Security and Privacy |
Dr.Manju Kaushik |
International Journal of Computer Science And Information Technologies (IJCSIT) |
2014 |
0975-9646 |
Comparative analysis between different edge detection techniques on mammogram images using PSNR and MSE |
Dr. Sameer Saxena, Dr. Yudhveer Singh |
Journal of Information and Optimization Sciences |
2022 |
0252-2667 |
Comparative Analysis of the Vulnerabilities Occurring in the Web Browser |
Dr. Swapnesh Taterh |
International Journal of Modern Computer Science & Applications |
2014 |
2321-2632 |
Comparative Analysis of the Vulnerabilities Occurring in the Web Browser |
Dr. Swapnesh Taterh |
International Journal of Modern Computer Science & Applications |
2014 |
2321-2632 |
Comparative Study of K-Means and Hierarchical Clustering Techniques |
Dr.Manju Kaushik |
International Journal of Software & Hardware Research in Engineering (IJSHRE) |
2014 |
2347-4890 |
Comparative study of object oriented measures for internal quality aManju Kaushik, Bhawana Mathur,ttributes of class diagrams |
Dr.Manju Kaushik |
Afro Asian Journals Science & Technology |
2015 |
2349-4964 |
Comparative Study of Supervised Machine Learning Algorithms for Healthcare Dataset Using Orange |
Bhatnagar V., Poonia R.C. |
On Demand Routing Protocols for Vehicular Cloud Computing |
2021 |
23674512 |
Comparative study of various protocols of DDS |
Dr. Ramesh C. Poonia |
Journal of Statistics & Management Systems, Taylor & Francis |
2017 |
0972-0510 |
Comparing different classification techniques using Data mining tools |
Dr.Manju Kaushik |
Intenational Journal of Management, IT & Engineering , (IJMIE) UGC Indexed |
2018 |
2249-0558 |
Computable generalization of fractional kinetics equation with special functions |
Singh Y., Gill V., Singh J., Kumar D., Khan I. |
Journal of King Saud University - Science |
2021 |
10183647 |
Congestion Control Algorithm : Review and Analysis of structured wireless network. |
Dr. Swapnesh Taterh |
International Journal of Emerging Technology and Innovative Research |
2018 |
2349-5162 |
Congestion Control Algorithms Review and Analysis for Structured Wireless Network |
Dr. Girish Paliwal |
International Journal of Emerging Technologies and Innovative Research |
2018 |
2349-5162 |
Critical evaluation of Maintainability Parameters using code metrics |
Dr.Manju Kaushik |
International Journal of Computer Science and Information Security |
2016 |
1947-5500 |
Cyber Security Awareness Through Education: Problems and Prospects |
Dr. Chitreshh Banerjee |
IMPETUS an Interdisciplinary Research Journal |
2015 |
2278-0254 |
Cyber-Squatting: A Cyber Crime more than a Unethical Act |
Dr. Ramesh C. Poonia |
International Journal of Social Computing and Cyber-Physical Systems (IJSCCPS), Inderscience |
2019 |
2040-0721 |
Cybersecurity Technologies for Protecting Social Medical Data in Public Healthcare Environments |
Dr. Rakhi Mutha |
South Eastern European Journal of Public Health |
2024 |
21975248 |
Data Analysis of Students Marks with Descriptive Statistics |
Dr.Manju Kaushik |
International Journal on Recent and Innovation Trends in Computing and Communication (IJRITCC) |
2014 |
2321-8169 |
Data Analysis utilizing principal component analysis |
Dr.Manju Kaushik |
International journal of engineering research and technology. SCOPUS |
2018 |
0974-3154 |
Data Fusion and IoT for Smart Ubiquitous Environments: A Survey |
Furqan Alam, Rashid Mehmood, Iyad Katib, Nasser N. Albogami and Aiiad Albeshri |
IEEE ACCESS |
2017 |
10.1109/ |
Decision Support System in Precision Agriculture: Past Endeavours and Future Perspectives |
Dr. Ramesh C. Poonia |
The Subodh Journal of Recent Trends in Information Technology |
2017 |
0975-9875 |
Design a New Protocol and Comparison with B92 Protocol for Quantum Key Distribution |
Dr. Ramesh C. Poonia |
International Journal of Internet Protocol Technology (IJIPT), Inderscience |
2019 |
1743-8209 |
Design a new protocol for quantum key distribution |
Dr. Ramesh C. Poonia |
Journal of Information and Optimization Sciences, Taylor & Francis |
2017 |
0252-2667 |
DESIGN AN ALGORITHM FOR CONTINUOUS AUTHENTICATION ON SMARTPHONE THROUGH KEYSTROKE DYNAMICS AND TOUCH DYNAMICS |
Pragya Vaishnav |
Indian Journal of Computer Science and Engineering |
2022 |
0976-5166 |
Design and Analyze the Machine Learning Based Sarcasm Prediction Model for Social Media Context |
Dr. Sameer Saxena |
International Journal of Intelligent Systems and Applications in Engineering |
2023 |
2147-6799 |
Design Text Mining Classifier for Covid-19 by using the Machine Learning Techniques |
Dr. Sameer Saxena |
International Journal of Intelligent Systems and Applications in Engineering |
2023 |
2147-6799 |
Designing A Model for Fake News Detection in Social Media Using Machine Learning Techniques |
Dr. Sameer Saxena |
International Journal of Intelligent Systems and Applications in Engineering |
2023 |
2147-6799 |
Detection of sarcasm in tweets using hybrid machine learning method |
Dr. Bellamkonda Rajni and Dr, Sameer Saxena |
Journal of Autonomous Intelligence |
2024 |
26305046 |
Dimensionality Reduction Approach for High Dimensional Data using HGA based Bio Inspired Algorithm |
Dr. Swapnesh Taterh |
International Journal of Intelligent Systems and Applications in Engineering |
2023 |
2147-6799 |
Dual Security testing model for web application |
Dr.Manju Kaushik |
International Journal of Advanced Computer Science and Applications |
2016 |
2156-5570 |
Efficient Fine Tuned Trapezoidal Fuzzy-Based Model for Failure Mode Effect Analysis Risk Prioritization |
Dr. Swapnesh Taterh, Dr. Dilbag Singh |
IEEE Access |
2022 |
2169-3536 |
Empirical Analysis of Metrics Using UML Class Diagram |
Dr.Manju Kaushik |
International Journal of Advanced Computer Science and Applications |
2016 |
2156-5570 |
Energy aware Multipath location aided routing for Manet |
Dr.Manju Kaushik |
International Journal of Computer Science and Information Security |
2016 |
1947-5500 |
Enhance security system of E-governance |
Dr. Chitreshh Banerjee |
SGVU Journal of Engineering & Technology |
2013 |
2278-0181 |
Enhancing Public Healthcare Security: Integrating Cutting-Edge Technologies into Social Medical Systems |
Dr. Rakhi Mutha |
South Eastern European Journal of Public Health |
2024 |
21975248 |
Estimating Influence of Threat using Misuse Case Oriented Quality Requirements (MCOQR) Metrics: Security Requirements Engineering Perspective |
Dr. Chitreshh Banerjee |
International Journal of Hybrid Intelligence Systems (IJHIS), IOS Press, MIRS Lab, USA |
2017 |
1875-8819 |
Evaluating the Relevance of Prevailing Software Metrics to Address Issue of Security Implementation in SDLC |
Dr. Chitreshh Banerjee |
International Journal of Advanced Studies in Computer Science and Engineering (IJASCSE) |
2014 |
2278-7917 |
Evaluation and Analysis of Soft Computing Techniques for Grid Connected Photo Voltaic System to Enhance Power Quality Issues |
Pragathi B., Poonia R.C., Polaiah B., Nayak D.K. |
Journal of Electrical Engineering and Technology |
2021 |
19750102 |
Fast and Efficient Recovery of Root Node Failure in Spanning Tree Routing Protocol |
Dr. Ramesh C. Poonia |
Recent Patents on Computer Science, Bentham Science |
2018 |
1874-4796 |
Finite Sum Representation of Partial Derivatives of Multivariable Incomplete Aleph Functions |
Dr. Yudhveer Singh |
Journal of Computational Analysis and Applications |
2024 |
15211398 |
Fractional Order Mathematical Modelling for Studying the Impact on the Emergence of Pollution and Biodiversity Pertaining to Incomplete Aleph Functions |
Dr. Rahul Sharma and Dr. Yudhveer Singh |
Progress in Fractional Differentiation and Applications |
2024 |
23569336 |
Fractional Order Mathematical Modelling for Studying the Impact on the Emergence of Pollution and Biodiversity Pertaining to Incomplete Aleph Functions |
Dr. Yudveer Singh |
Progress in Fractional Differentiation and Applications |
2024 |
23569336 |
Gesture based interaction NUI: An Overview |
Dr.Manju Kaushik |
International Journal of Engineering Trends and Technology (IJETT) |
2014 |
2231-5381 |
Gesture image segmentation with Otsu’s method based on noise adaptive angle threshold |
Dr. Ramesh C. Poonia |
Multimedia Tools and Applications, Springer |
2020 |
13807501 |
HDFRMAH: design of a high-density feature representation model for multidomain analysis of human health issues |
Dr. Rakhi Mutha |
Soft Computing |
2023 |
1433-7479 |
HDLP: air quality modeling with hybrid deep learning approaches and particle swam optimization |
Dr. Chitresh Banerjee |
Innovations in Systems and Software Engineering |
2024 |
1614-5054 |
HDLP: air quality modeling with hybrid deep learning approaches and particle swam optimization |
Dr. Chitreshh Banerjee |
Innovations in Systems and Software Engineering |
2024 |
16145046 |
Hybrid AODV: An Efficient Routing Protocol for Manet Using MFR and Firefly Optimization Technique |
Goyal A., Sharma V.K., Kumar S., Poonia R.C. |
Journal of Interconnection Networks |
2021 |
2192659 |
Hybrid GA-mSVM: Dimensionality reduction using hybrid genetic algorithm and modified support vector machine classifier |
Prof Swapnesh Taterh |
Journal of Autonomous Intelligence |
2024 |
2630-5046 |
Identifying Security Needs in Requirements Elicitation Phase - MCOQR Metrics Framework Perspective |
Dr. Chitreshh Banerjee |
International Journal of Modern Computer Science and Applications (IJMCSA) |
2017 |
2321-2632 |
Impact analysis to detect and mitigate Distributed Denial of Service attacks with Ryu-SDN controller: A comparative analysis of 4 different machine learning classification algorithms. |
Honey Gocher |
SN Computer Science |
2023 |
2662995X |
Impact of Dense Network in MANET Routing Protocols AODV and DSDV Comparative Analysis Through NS3. Published in Scopus Indexed, Springer AISC Series, |
Dr. Swapnesh Taterh |
International Conference on Soft Computing: Theories and Applications, SoCTA 2016, Jaipur, India |
2016 |
2194-5357 |
Impact of Net Neutrality Regulations and Its Future Implications: Global Perspective |
Dr. Chitreshh Banerjee |
IMPETUS an Interdisciplinary Research Journal |
2016 |
2278-0254 |
Implementing Navigational Aspect of Specific Testing Process Model |
Dr.Manju Kaushik |
International Journal of Computer Science and Information Security |
2016 |
1947-5500 |
Improved African Buffalo Optimization Algorithm using Chaotic and Chaotic-Levy flight |
Dr. Yudhveer Singh |
International Journal of Engineering & Technology |
2018 |
2227-524X |
Integration of traffic and network simulators for vehicular ad-hoc networks |
Dr. Ramesh C. Poonia |
Journal of Information and Optimization Sciences, Taylor & Francis |
2018 |
0252-2667 |
Internet of things-based virtual private social networks on a text messaging strategy on mobile platforms |
Dr. Annamalai, A |
International Journal of Electronic Security and Digital Forensics |
2024 |
1751911X |
IResponse: An AI and IoT-enabled framework for autonomous COVID-19 pandemic management |
Alam F., Almaghthawi A., Katib I., Albeshri A., Mehmood R. |
Sustainability (Switzerland) |
2021 |
20711050 |
IResponse: An AI and IoT-enabled framework for autonomous COVID-19 pandemic management |
Furqan Alam |
Sustainability (Switzerland) |
2021 |
2071-1050 |
IT Security Practices in an Organisation: Balancing Technology and Management Perspective |
Dr. Chitreshh Banerjee |
IMPETUS an Interdisciplinary Research Journal |
2013 |
2278-0254 |
Key Distribution Using Graphs for Secret Sharing |
Malhotra R., Chandramowliswaran N. |
Turkish World Mathematical Society Journal of Applied and Engineering Mathematics |
2021 |
21461147 |
Map Matching Algorithm: Curve Simplification for Frechet Distance Computing and Precise Navigation on Road Network using RTKLIB |
Dr. Ramesh C. Poonia |
Cluster Computing: The Journal of Networks, Software Tools and Applications, Springer |
2018 |
1386-7857 |
Map Matching Algorithm: Trajectory and Sequential Map Analysis on Road Network |
Dr. Ramesh C. Poonia |
EAI Endorsed Transactions on Industrial Networks and Intelligent Systems |
2018 |
2410-0218 |
Mathematical Analysis of Streptococcus Suis Infection in Pig-Human Population by Riemann-Liouville’s Fractional Operator |
Dr. Mishra M.N. |
Progress in Fractional Differentiation and Applications |
2024 |
23569336 |
Measuring Software Security using MACOQR (Misuse and Abuse Case Oriented Quality Requirements) Metrics: Attacker’s Perspective |
Dr. Chitreshh Banerjee |
International Journal of Emerging Trends & Technology in Computer Science (IJETTCS) |
2014 |
2278-6856 |
Measuring Software Security using MACOQR (Misuse and Abuse Case Oriented Quality Requirements) Metrics: Defensive Perspective |
Dr. Chitreshh Banerjee |
International Journal of Computer Applications (IJCA) |
2014 |
0975-8887 |
Modified differential evolution algorithm for solving minimum spanning tree |
Dr. Ramesh C. Poonia |
Journal of Information and Optimization Sciences, Taylor & Francis |
2020 |
0252-2667 |
MPCITL: design of an efficient multimodal engine for Pre-emptive identification of CKD via incremental transfer learning on clinical data samples |
Dr. Rakhi Mutha |
Soft Computing |
2023 |
1433-7479 |
Natural User Interfaces: Trend in Virtual Interaction |
Dr.Manju Kaushik |
International Journal of latest technology in engineering management & applied sciences |
2014 |
2278-2540 |
New e-Government Model System: A Real Convenience for India |
Dr. Chitreshh Banerjee |
OORJA-The Journal of Management and IT |
2008 |
0974-7869 |
New Networking Era: Software Defined Networking |
Furqan Alam, Iyad Katib, Ahmed Alzahrani |
International Journal of Advanced Research in Computer Science and Software Engineering |
2013 |
2277-128X |
On the Certain Properties and Results of Incomplete Generalized Hypergeometric Functions with Matrix Argument |
Dr. Yudhveer Singh |
Journal of Computational Analysis and Applications |
2024 |
15211398 |
On the Elzaki transform and its application in fractional free electron laser equation |
Dr. Yudhveer Singh |
Acta Univ. Sapientiae Mathematica |
2019 |
2066-7752 |
Ontology of XSS Vulnerabilities and its Detection Using XENOTIX Framework plus Prevention |
Dr. Swapnesh Taterh |
International Journal of Advanced Engineering, Management and Science. Rajasthan Science Congress |
2018 |
9788193575901 |
Optimum utilization of natural resources for home garden using wireless sensor networks |
Dr. Ramesh C. Poonia |
Journal of Information and Optimization Sciences, Taylor & Francis |
2017 |
0252-2667 |
Performance Evaluation of Epidemic Routing Protocol for Delay Tolerant Network Based on Node Movement Model |
Dr. Ramesh C. Poonia |
International Journal of Innovative Technology and Exploring Engineering (IJITEE) |
2019 |
2278-3075 |
Performance Optimization in Big Data Predictive Analytics |
Dr.Manju Kaushik |
International Journal of Advance Research in Computer and Software Engineering (IJARCSSE) |
2014 |
2277-128X |
Practical Aspects of Smart Gardening System Based on Priority Driven Scheduling to Utilize Resources at Optimum Level |
Dr. Ramesh C. Poonia |
ICIC Express Letters, Part B: Applications An International Journal of Research and Surveys, IEEE |
2018 |
2185-2766 |
Prediction of Software Reliability using Bio Inspired Soft Computing Techniques |
Dr. Ramesh C. Poonia |
Journal of Medical Systems, Springer |
2018 |
0148-5598 |
Problems and Prospects of Big Data: Security Aspects |
Dr. Chitreshh Banerjee |
IMPETUS an Interdisciplinary Research Journal |
2015 |
2278-0254 |
Qualitative analysis of 2019-nCoV mathematical model via an efficient computational technique |
Devi A., Jakhar M., Singh Y. |
Journal of Interdisciplinary Mathematics |
2021 |
9720502 |
Real-time healthcare monitoring system through haversine distance calculation-based global positioning system |
Dr. Baptist L.J |
International Journal of Medical Engineering and Informatics |
2024 |
17550653 |
Realistic Analysis of Reactive Routing Protocols for Rajiv Chowk [NCR] Flyove |
Dr. Ramesh C. Poonia |
International Journal of Sensors, Wireless Communications and Control, Bentham Science |
2020 |
2210-3287 |
Realistic analysis of reactive routing protocols of vanets for rajiv chowk [ncr] flyover |
Mahajan A.N., Poonia R.C., Sharma S. |
International Journal of Sensors, Wireless Communications and Control |
2021 |
22103279 |
Recent Advances in Risk Analysis and Management (RAM) |
Dr. Chitreshh Banerjee |
International Journal of Advanced Computer Technology (IJACT) |
2014 |
2320-0790 |
Reducing Delays in Congestion Control Algorithm using Enhanced Network Boarder Patrol (ENBP), |
Mr. Sameer Saxena |
International Journal of Modern Electronics and Communication Engineering (IJMECE) |
2017 |
2321-2152 |
Relative study of steering protocols in delay tolerant network |
Dr. Ramesh C. Poonia |
Journal of Statistics & Management Systems, Taylor & Francis |
2017 |
0972-0510 |
Reliability Analysis of Software with Three Types of Errors and Imperfect Debugging using Markov Model |
Dr.Manju Kaushik |
International Journal of Computer Applications in Technology |
2017 |
1741-5047 |
Reliability Anlysis of an Embedded System with Multiple Vacations and Standby |
Dr.Manju Kaushik |
Intenational Journal of Reliability and Applications |
2015 |
1479-3903 |
Reliability Characterization for Embedded System with N-Version Programming |
Dr.Manju Kaushik |
National Conference on Synergetic Trends in engineering and Technology, International Journal of Engineering and Technical Research |
2014 |
2321-0869 |
Research on Security Requirements Engineering: Problems and Prospects |
Dr. Chitreshh Banerjee |
MATRIX Academic International Online Journal of Engineering and Technology (MAIOJET) |
2015 |
2348-3326 |
Research on Software Security Awareness: Problems and Prospects |
Dr. Chitreshh Banerjee |
ACM SIGSOFT SEN |
2010 |
0163-5948 |
Reusability concept using an “M” Component Based Model |
Dr.Manju Kaushik |
International Journal of Science, Engineering and Technology Research (IJSETR) |
2013 |
2278-7798 |
Risk based ERP Implementation framework for Higher Education Institutions |
Dr. Swapnesh Taterh |
International Journal of Pure and Applied Mathematics |
2019 |
1314-3395 |
Risk based ERP implementation framework for higher education institutions |
Dr. Swapnesh Taterh |
Journal of Biology and Today’s World |
2018 |
2322-3308 |
Role of Technology in Education: A 21st Century Approach |
Dr. Chitreshh Banerjee |
Journal of Commerce and Information Technology |
2008 |
0972-9550 |
Secure Authentication in WLAN Using Modified Four-Way Handshake Protocol |
Manoj Diwakar |
Lecture Notes in Electrical Engineering |
2022 |
18761100 |
Secured-KDS: Secret key distribution and authentication scheme for resource-constrained devices |
Manickam S., Rehman S.U. |
IET Networks |
2022 |
20474954 |
Security Across Software Development Life-Cycle |
Dr. Swapnesh Taterh |
International Journal of Research Review in Engineering Science and Technology |
2011 |
2278- 6643 |
Security attacks intrusions for wireless and wimax network |
Dr. Swapnesh Taterh |
International Journal of Advanced Engineering, Management and Science.Rajasthan Science Congress |
2018 |
9788193575901 |
Security Requirement Elicitation Phase of Secure Software Development Life Cycle |
Dr. Swapnesh Taterh |
International Journal of Research Review in Engineering, Science and Technology. |
2011 |
2278-6643. |
Security Threats of Social Networking Sites: An Analytical Approach |
Dr. Chitreshh Banerjee |
International Journal of Enhanced Research in Management & Computer Applications (IJERMCA) |
2014 |
2319-7471 |
Security through Cloud Computing (ANEKA) |
Dr. Girish Paliwal |
International Conference on Technical Executive Innovation in Computing and Communication |
2012 |
WO-ISBN |
Selection of optimized features for fusion of palm print and finger knuckle-based person authentication |
Dr. Ramesh C. Poonia |
Expert Systems Journal, Wiley |
2020 |
1468-0394 |
Sentiment analysis and classification of COVID-19 tweets using machine learning classifier |
Dr. Lakshmi, C.S |
Journal of Autonomous Intelligence |
2024 |
26305046 |
Simulation Based Efficient Analysis of Radio Propagation Model using On-demand Routing Protocols in the Indian Automotive Networks |
Dr. Ramesh C. Poonia |
Int. J. Autonomous and Adaptive Communications Systems(IJAACS), Inderscience |
2018 |
1754-8640 |
Simulation of BB84 and proposed protocol for quantum key distribution |
Dr. Ramesh C. Poonia |
Journal of Statistics & Management Systems, Taylor & Francis |
2018 |
0972-0510 |
Simulation Windows Size Quadric Increase Congestion Control Algorithm Implementation using NS3 in Wired Computer Networks Scenario |
Dr. Girish Paliwal |
International Journal of Computer Sciences and Engineering |
2018 |
2347-2693 |
Sixth Sense Technology-Advanced & Recent Technology in the field of comm. & computing |
Dr.Manju Kaushik |
SHARE Journal of Multidisciplinary Research and Studies |
2011 |
0976-4712 |
Software Defined Networking – Imposed Security measures over Vulnerable threats and attacks |
Dr. Swapnesh Taterh |
International Journal of Advanced Engineering, Management and Science. |
2018 |
9788193575901 |
Software Defined Networking – Imposed Security Measures over Vulnerable Threats and Attacks |
Dr. Swapnesh Taterh |
IGI- International Journal of Applied Metaheuristic Computing IJAMC |
2015 |
26711920 |
Software Security Awareness Framework: Management Perspective |
Dr. Chitreshh Banerjee |
IMPETUS an Interdisciplinary Research Journal |
2013 |
2278-0254 |
Software Security in Requirements Engineering Phase - MCOQR Metrics Framework Perspective |
Dr. Chitreshh Banerjee |
International Journal of Modern Computer Science (IJMCS) |
2017 |
2370-7868 |
Software Security Rules: SDLC Perspective |
Dr. Chitreshh Banerjee |
International Journal of Computer Science and Information Security |
2009 |
1947-5500 |
Software-Defined Networking: An Evolving Network Architecture - Programmability and Security Perspective |
Kaliyamurthy N.M., Taterh S., Shanmugasundaram S., Saxena A., Cheikhrouhou O., Ben Elhadj H. |
Security and Communication Networks |
2021 |
19390114 |
Source redundancy management and host intrusion detection in wireless sensor networks |
Singh V., Sharma G., Poonia R.C., Trivedi N.K., Raja L. |
Recent Advances in Computer Science and Communications |
2021 |
26662558 |
Spectrum management techniques for elastic optical networks: A survey |
Sahar Talebi Furqan Alam Iyad Katib Mohamed Khamis Reda Salama George N.Rouskas |
Optical Switching and Networking, Elsevier |
2014 |
10.1016/ j.osn. |
Speed of Things (SoT): Evolution of Isolation-to-Intermingle (I2I) Technology Transition towards Internet of things |
Dr. Ramesh C. Poonia |
Recent Patents on Computer Science, Bentham Science |
2019 |
1874-4796 |
SQL Injection Attack Detection and Prevention Methods: A Critical Review |
Dr.Manju Kaushik |
International Journal of innovative research in science engineering and technology |
2014 |
2319-8753 |
State of the Art and Gap Analysis of Precision Agriculture: A Case Study of Indian Farmers |
Dr. Ramesh C. Poonia |
International Journal of Agricultural and Environmental Information Systems (IJAEIS), IGI Global |
2019 |
1947-3192 |
Study and Comparative Analysis of Various Image Spamming Techniques. Published in Scopus Indexed, Springer AISC Series, |
Dr. Swapnesh Taterh |
International Conference on Soft Computing: Theories and Applications, SoCTA 2016, Jaipur, India, |
2016 |
2194-5357 |
Suicidal ideation prediction in twitter data using machine learning techniques |
Dr. Ramesh C. Poonia |
Journal of Interdisciplinary Mathematics, Taylor & Francis |
2020 |
0972-0502 |
Sustainable Development in Agriculture: Past and Present Scenario of Indian Agriculture |
Vaibhav Bhatnagar |
Research Anthology on Strategies for Achieving Agricultural Sustainability |
2022 |
9781668453537, 9781668453520 |
The impact on security due to the vulnerabilities existing in the network a strategic approach towards security |
Dr. Swapnesh Taterh |
International Journal of Advanced Engineering, Management and Science |
2017 |
2454-1311 |
The impact on security due to the vulnerabilities existing in the network a strategic approach towards security |
Dr. Swapnesh Taterh |
International Journal of Advanced Engineering, Management and Science |
2012 |
2454-1311 |
The role and issue of clustering techniques in designing maintainable object oriented system |
Dr.Manju Kaushik |
International Journal of Computer Science and Software Engineering |
2014 |
2409-4285 |
Threat Modeling and Security Pattern used in Design Phase of Secure Software Development life Cycle |
Dr. Swapnesh Taterh |
International Journal of Advanced Research in Computer Science and Software Engineering. |
2013 |
2277 128X |
Transmit Range Adjustment Using Artificial Intelligence for Enhancement of Location Privacy and Data Security in Service Location Protocol of VANET |
Shivkant Kaushik |
Wireless Communications and Mobile Computing |
2022 |
15308669 |
Understanding Software Defined Networking: A Study on the existing software defined networking technologies and its security impact |
Dr. Swapnesh Taterh |
Journal of Convergence Computing |
2018 |
2048-9137 |
Use Case and Misuse Case in Eliciting Security Requirements - MCOQR Metrics Framework Perspective |
Dr. Chitreshh Banerjee |
International Journal of Modern Electronics and Communication Engineering (IJMECE) |
2017 |
2321-2152 |
UTiLearn: A Personalised Ubiquitous Teaching and Learning System for Smart Societies |
Rashid Mehmood Furqan Alam Nasser N. Albogami Iyad Katib Aiiad Albeshri Saleh M. Altowaijri |
IEEE ACCESS |
2017 |
10.1109/2017.266884 |
Various Techniques Used For Emotion Detection from Speech |
Dr. Swapnesh Taterh |
International Journal of Emerging Technology and Innovative Research |
2019 |
2349-5162 |
Various Techniques Used For Emotion Detection from Speech |
Dr. Swapnesh Taterh |
International Journal of Emerging Technology and Innovative Research |
2019 |
2349-5162 |
Viability Analysis of Two Ray Ground and Nakagami Model for Vehicular Ad-Hoc Networks |
Dr. Ramesh C. Poonia |
International Journal of Applied Evolutionary Computation (IJAEC), IGI Global |
2017 |
1942-3594 |