Forest fire detection system using IoT and artificial neural network V Dubey, P Kumar, N Chauhan International Conference on Innovative Computing and Communications …, 2019 | 84 | 2019 |
An intelligent transportation systems architecture using wireless sensor networks V Katiyar, P Kumar, N Chand International Journal of Computer Applications 14 (2), 22-26, 2011 | 69 | 2011 |
Near field communication V Sharma, P Gusain, P Kumar Conference on Advances in Communication and Control Systems (CAC2S 2013 …, 2013 | 42 | 2013 |
Proactive approach for cooperative caching in mobile adhoc networks P Kumar, N Chauhan, LK Awasthi, N Chand International Journal of Computer Science Issues (IJCSI) 7 (3), 21, 2010 | 36 | 2010 |
Effective cache based policies in wireless sensor networks: A survey S Pant, N Chauhan, P Kumar International Journal of Computer Applications 11 (10), 0975-8887, 2010 | 34 | 2010 |
A survey on data dissemination techniques used in VANETs BB Dubey, N Chauhan, P Kumar International Journal of Computer Applications 10 (7), 5-10, 2010 | 29 | 2010 |
Issues and challenges related to privacy and security in healthcare using iot, fog, and cloud computing H Raj, M Kumar, P Kumar, A Singh, OP Verma Advanced Healthcare Systems: Empowering Physicians with IoT‐Enabled …, 2022 | 15 | 2022 |
Security Threats to Cloud Computing P Kumar, L Kumar International Journal of IT, Engineering and Applied Sciences Research …, 2013 | 15 | 2013 |
An optimized approach for secure data transmission using spread spectrum audio steganography, chaos theory, and social impact theory optimizer R Tanwar, K Singh, M Zamani, A Verma, P Kumar Journal of Computer Networks and Communications 2019, 2019 | 13 | 2019 |
Flood early detection system using internet of things and artificial neural networks A Subeesh, P Kumar, N Chauhan International Conference on Innovative Computing and Communications …, 2019 | 12 | 2019 |
Security framework for opportunistic networks P Kumar, N Chauhan, N Chand Progress in Intelligent Computing Techniques: Theory, Practice, and …, 2018 | 11 | 2018 |
Authentication with Privacy Preservation in Opportunistic Networks P Kumar, N Chauhan, N Chand IEEE International Conference on Inventive Communication and Computational …, 2017 | 11 | 2017 |
Energy efficient dynamic group caching in mobile ad hoc networks for improving data accessibility A Rao, P Kumar, N Chauhan 2012 International Conference on Recent Trends in Information Technology …, 2012 | 11 | 2012 |
Replica allocation techniques based on clusters for MANETs R Kumar, P Kumar International Conference on Emerging Trends in Computer and Electronics …, 2012 | 8 | 2012 |
Clustering based opportunistic traffic offloading technique for device-to-device communication P Kumar, N Chauhan, M Kumar, LK Awasthi International Journal of System Assurance Engineering and Management 14 …, 2023 | 7 | 2023 |
A comprehensive study on issues and challenges related to privacy and security in IoT N Chaurasia, P Kumar e-Prime-Advances in Electrical Engineering, Electronics and Energy, 100158, 2023 | 7 | 2023 |
A review of cooperative cache management techniques in MANETs P Kumar, N Chauhan International Journal of IT & Knowledge Management 3 (1), 2010 | 7 | 2010 |
Cbrm–cluster based replica management in mobile adhoc networks R Kumar, P Kumar, N Chauhan Advanced Computing, Networking and Security: International Conference …, 2012 | 6 | 2012 |
Security and privacy of sensitive data in cloud computing using RSA M Dhamodaran, E Punarselvam, SD Varshan, PD Kumar, C Saravanan, ... International Journal of Scientific Research in Science and Technology 8 (2 …, 2021 | 5 | 2021 |
Node activity based routing in opportunistic networks P Kumar, N Chauhan, N Chand Futuristic Trends in Network and Communication Technologies: First …, 2019 | 5 | 2019 |