Folgen
Dr. Rajesh Kumar Shrivastava
Dr. Rajesh Kumar Shrivastava
Bennett University, Greater Noida
Bestätigte E-Mail-Adresse bei bennett.edu.in - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Attack detection and forensics using honeypot in IoT environment
RK Shrivastava, B Bashir, C Hota
Distributed Computing and Internet Technology: 15th International Conference …, 2019
522019
Modified AODV Protocol to Prevent Black Hole Attack in Mobile Ad-hoc Network
R Sharma, R Shrivastava
International Journal of Computer Science and Network Security (IJCSNS) 14 …, 2014
212014
Energy consumption using traffic models for MANET routing protocols
S Dubey, R Shrivastava
International Journal of Smart Sensors and Ad Hoc Networks (IJSSAN) 1, 2011
162011
Protection against code exploitation using ROP and check-summing in IoT environment
R Shrivastava, C Hota, P Shrivastava
2017 5th International Conference on Information and Communication …, 2017
132017
New improved algorithm for mining privacy—preserving frequent itemsets
R Shrivastava, R Awasthy, B Solanki
Int J Comp Sci Inform 1, 1-7, 2011
132011
Securing Internet of Things devices against code tampering attacks using Return Oriented Programming
RK Shrivastava, SP Singh, MK Hasan, S Islam, S Abdullah, AHM Aman
Computer Communications 193, 38-46, 2022
112022
A scenario based approach for gateway discovery using Manet routing protocol
RK Saluja, R Shrivastava
2012 International Conference on Computer Communication and Informatics, 1-6, 2012
112012
Tamper-resistant code using optimal rop gadgets for iot devices
C Hota, RK Shrivastava, S Shipra
2017 13th International Wireless Communications and Mobile Computing …, 2017
102017
Prevention of security threats in IEEE 802.16 standards
R Srivastava, DK Mehto
International Journal of Soft Computing and Engineering (IJSCE) 1 (4), 103-108, 2011
102011
Preventing data tampering in IoT networks
RK Shrivastava, S Mishra, VE Archana, C Hota
2019 IEEE International Conference on Advanced Networks and …, 2019
82019
Network based Security model using Symmetric Key Cryptography (AES 256–Rijndael Algorithm) with Public Key Exchange Protocol (Diffie-Hellman Key Exchange Protocol)
NK Jharbade, R Shrivastava
IJCSNS International Journal of Computer Science and Network Security 12 (8 …, 2012
82012
Game theory based modified naïve-bayes algorithm to detect DoS attacks using Honeypot
RK Shrivastava, S Ramakrishna, C Hota
2019 IEEE 16th India Council International Conference (INDICON), 1-4, 2019
72019
Analysis of Secure Mobile Agent System
R Shrivastava, P Mehta
International Journal of Soft Computing and Engineering (IJSCE) ISSN, 2231-2307, 2012
72012
Code tamper-proofing using dynamic canaries
RK Shrivastava, KJ Concessao, C Hota
2019 25th Asia-Pacific Conference on Communications (APCC), 238-243, 2019
52019
Profile-guided code identification and hardening using return oriented programming
RK Shrivastava, C Hota
Journal of Information Security and Applications 48, 102364, 2019
52019
Resilient complex event processing in iot using side-channel information
RK Shrivastava, S Mishra, S Barua, C Hota
Proceedings of the 10th International Conference on Security of Information …, 2017
42017
An enhanced authentication mechanism for IEEE 802.16 (e) mobile WiMAX
DK Mehto, R Srivastava
International Journal of Soft Computing and Engineering 1 (4), 98-102, 2011
42011
Efficient question answering in chatbot using TF-IDF and cosine similarity
R Shrivastava, A Pujahari, SP Singh, T Bhowmik
Innovations in Information and Communication Technologies: Proceedings of …, 2022
32022
Performance Evaluation of Extended Aodv Using Different Scenarios
R Shrivastava, RK Saluja
International Journal of Smart Sensors and Ad Hoc Networks (IJSSAN) ISSN, 2012
32012
Securing Mobile Agent and Reducing Overhead Using Dummy and Monitoring Mobile Agents
R Shrivastava
International Journal of Managment, IT and Engineering 2 (4), 296-303, 2012
32012
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20