A survey on successors of LEACH protocol SK Singh, P Kumar, JP Singh IEEE Access 5, 4298-4328, 2017 | 468 | 2017 |
A comprehensive survey on trajectory schemes for data collection using mobile elements in WSNs SK Singh, P Kumar Journal of Ambient Intelligence and Humanized Computing, 1-22, 2019 | 64 | 2019 |
An Energy Efficient Protocol to Mitigate Hot Spot Problem Using Unequal Clustering in WSN SK Singh, P Kumar, JP Singh Wireless Personal Communications, 1-29, 2018 | 53 | 2018 |
Localization in three-dimensional wireless sensor networks: a survey J Kumari, P Kumar, SK Singh The Journal of Supercomputing, 1-44, 2019 | 49 | 2019 |
Detecting Malicious DNS over HTTPS Traffic Using Machine Learning SK Singh, PK Roy 2020 International Conference on Innovation and Intelligence for Informatics …, 2020 | 36 | 2020 |
Scheme for Assigning Security Automatically for Real-Time Wireless Nodes via ARSA R Duvvuru, SK Singh, GN Rao, A Kote, BB Krishna, MV Raju International Conference on Heterogeneous Networking for Quality …, 2013 | 22 | 2013 |
Performance impact of TCP and UDP on the Mobility Models and Routing Protocols in MANET SK Singh, R Duvvuru, JP Singh Intelligent Computing, Networking, and Informatics, 895-901, 2014 | 21 | 2014 |
Improvizing Security levels in WLAN via Novel BSPS R Duvvuru, PJ Rao, SK Singh Emerging Trends in Communication, Control, Signal Processing & Computing …, 2013 | 19 | 2013 |
Energy Conservation Through Data Prediction in Wireless Sensor Networks G Krishna, SK Singh, JP Singh, P Kumar 3rd International Conference on Internet of Things and Connected …, 2018 | 18 | 2018 |
An energy efficient routing using multi-hop intra clustering technique in WSNs SK Singh, P Kumar, JP Singh, M Alryalat TENCON 2017 - IEEE Region 10 Conference, 381-386, 2017 | 18 | 2017 |
An energy efficient Odd-Even round number based data collection using mules in WSNs SK Singh, P Kumar, JP Singh Wireless Communications, Signal Processing and Networking (WiSPNET …, 2016 | 18 | 2016 |
Enhanced Security levels of BSPS in WLAN R Duvvuru, SK Singh, PJ Rao, A Sinha International Journal of Computer Applications 84 (2), 2013 | 16 | 2013 |
Lightweight encryption for privacy protection of data transmission in cyber physical systems D Tiwari, B Mondal, SK Singh, D Koundal Cluster Computing, 1-15, 2022 | 15 | 2022 |
A highly secure steganography scheme for secure communication B Mondal, SK Singh Proceedings., International Conference of Computation and Communication …, 2013 | 14 | 2013 |
Enhanced Security Against Volumetric DDoS Attacks Using Adversarial Machine Learning J Shroff, R Walambe, SK Singh, K Kotecha Wireless Communications and Mobile Computing 2022 (5757164), 1-10, 2022 | 13 | 2022 |
TCP and UDP-based performance evaluation of proactive and reactive routing protocols using mobility models in MANETS SK Singh, R Duvvuru, JP Singh International Journal of Information and Communication Technology 7 (6), 632-644, 2015 | 13 | 2015 |
Localization in Wireless Sensor Networks Using Soft Computing Approach SK Singh, P Kumar, JP Singh International Journal of Information Security and Privacy (IJISP) 11 (3), 42-53, 2017 | 10 | 2017 |
Source location privacy using data mules in Wireless Sensor Networks JP Singh, PK Roy, SK Singh, P Kumar Region 10 Conference (TENCON), 2016 IEEE, 2743-2747, 2016 | 9 | 2016 |
A load balancing virtual level routing (LBVLR) using mobile mule for large sensor networks SK Singh, P Kumar The Journal of Supercomputing, 1-34, 2019 | 8 | 2019 |
Congestion Control technique using Intelligent traffic and Vanet SK Singh, R Duvvuru, SS Thakur arXiv preprint arXiv:1311.4036, 2013 | 7 | 2013 |