default search action
Gulshan Kumar
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j78]Archana Chhabra, Rahul Saha, Gulshan Kumar, Tai-Hoon Kim:
Navigating the Maze: Exploring Blockchain Privacy and Its Information Retrieval. IEEE Access 12: 32089-32110 (2024) - [j77]Amandeep Verma, Rahul Saha, Gulshan Kumar, Mauro Conti, Tai-Hoon Kim:
PREVIR: Fortifying Vehicular Networks Against Denial of Service Attacks. IEEE Access 12: 48301-48320 (2024) - [j76]Rekha Goyat, Gulshan Kumar, Rahul Saha, Mauro Conti, Reji Thomas, Tai-Hoon Kim:
RAPCOL: a range-free power efficient cooperative localization with heterogeneous devices for industrial internet-of-things. Clust. Comput. 27(3): 2691-2713 (2024) - [j75]Rekha Goyat, Gulshan Kumar, Rahul Saha, Mauro Conti:
Pribadi: A decentralized privacy-preserving authentication in wireless multimedia sensor networks for smart cities. Clust. Comput. 27(4): 4823-4839 (2024) - [j74]Archana Chhabra, Rahul Saha, Gulshan Kumar:
PRIBANI: a privacy-ensured framework for blockchain transactions with information retrieval. Clust. Comput. 27(6): 8189-8206 (2024) - [j73]PLS Jayalaxmi, Manali Chakraborty, Rahul Saha, Gulshan Kumar, Mauro Conti:
MADESANT: malware detection and severity analysis in industrial environments. Clust. Comput. 27(8): 11347-11367 (2024) - [j72]Ankush Manocha, Munish Bhatia, Gulshan Kumar:
Smart monitoring solution for dengue infection control: A digital twin-inspired approach. Comput. Methods Programs Biomed. 257: 108459 (2024) - [j71]Amandeep Verma, Rahul Saha, Gulshan Kumar, Mauro Conti:
PETRAK: A solution against DDoS attacks in vehicular networks. Comput. Commun. 221: 142-154 (2024) - [j70]Hamed Alqahtani, Gulshan Kumar:
Machine learning for enhancing transportation security: A comprehensive analysis of electric and flying vehicle systems. Eng. Appl. Artif. Intell. 129: 107667 (2024) - [j69]Hamed Alqahtani, Gulshan Kumar:
Advances in artificial intelligence for detecting algorithmically generated domains: Current trends and future prospects. Eng. Appl. Artif. Intell. 138: 109410 (2024) - [j68]Gulshan Kumar, Rahul Saha, Mauro Conti, Tannishtha Devgun, Reji Thomas:
GREPHRO: Nature-inspired optimization duo for Internet-of-Things. Internet Things 25: 101067 (2024) - [j67]Khalid Mahmood, Mohammad S. Obaidat, Salman Shamshad, Mohammed J. F. Alenazi, Gulshan Kumar, Mohammad Hossein Anisi, Mauro Conti:
Cost-Effective Authenticated Solution (CAS) for 6G-Enabled Artificial Intelligence of Medical Things (AIoMT). IEEE Internet Things J. 11(13): 23977-23984 (2024) - [j66]Rahul Saha, Gulshan Kumar, Mauro Conti, Tannishtha Devgun, Joel J. P. C. Rodrigues:
AALMOND: Decentralized Adaptive Access Control of Multiparty Data Sharing in Industrial Networks. IEEE Internet Things J. 11(15): 26104-26117 (2024) - [j65]Amandeep Verma, Rahul Saha, Gulshan Kumar, Mauro Conti, Joel J. P. C. Rodrigues:
VAIDANSHH: Adaptive DDoS detection for heterogeneous hosts in vehicular environments. Veh. Commun. 48: 100787 (2024) - 2023
- [j64]Ankush Manocha, Gulshan Kumar, Munish Bhatia:
IoT Analytics-inspired Real-time Monitoring for Early Prediction of COVID-19 Symptoms. Comput. J. 66(1): 144-159 (2023) - [j63]Gulshan Kumar, Rahul Saha, Mauro Conti, Tannishtha Devgun, Rekha Goyat, Joel J. P. C. Rodrigues:
COUNT: Blockchain framework for resource accountability in e-healthcare. Comput. Commun. 209: 249-259 (2023) - [j62]PLS Jayalaxmi, Rahul Saha, Gulshan Kumar, Mamoun Alazab, Mauro Conti, Xiaochun Cheng:
PIGNUS: A Deep Learning model for IDS in industrial internet-of-things. Comput. Secur. 132: 103315 (2023) - [j61]Irfan Ahmad Rather, Gulshan Kumar, Rahul Saha:
Improved aquila optimization-based parameter evaluation framework and meta-heuristic algorithm in radio-over-fiber SpatialMux multi-input multi-output long-term evolution system. Int. J. Commun. Syst. 36(9) (2023) - [j60]Sandeep Kumar Arora, Gulshan Kumar, Mustapha Hedabou, El Mehdi Amhoud, Celestine Iwendi:
Blockchain-inspired lightweight trust-based system in vehicular networks. Int. J. Netw. Manag. 33(5) (2023) - [j59]Rekha Goyat, Gulshan Kumar, Mauro Conti, Tannishtha Devgun, Rahul Saha, Reji Thomas:
BENIGREEN: Blockchain-Based Energy-Efficient Privacy-Preserving Scheme for Green IoT. IEEE Internet Things J. 10(18): 16480-16493 (2023) - [j58]Ankush Manocha, Gulshan Kumar, Munish Bhatia, Amit Sharma:
IoT-inspired machine learning-assisted sedentary behavior analysis in smart healthcare industry. J. Ambient Intell. Humaniz. Comput. 14(5): 5179-5192 (2023) - [j57]Rahul Saha, Gulshan Kumar, Tannishtha Devgun, William J. Buchanan, Reji Thomas, Mamoun Alazab, Tai-Hoon Kim, Joel J. P. C. Rodrigues:
A Blockchain Framework in Post-Quantum Decentralization. IEEE Trans. Serv. Comput. 16(1): 1-12 (2023) - [j56]Gulshan Kumar, Rahul Saha, Mauro Conti, Reji Thomas, Tannishtha Devgun, Joel J. P. C. Rodrigues:
Adaptive Intrusion Detection in Edge Computing Using Cerebellar Model Articulation Controller and Spline Fit. IEEE Trans. Serv. Comput. 16(2): 900-912 (2023) - [j55]Gulshan Kumar, Rajkumar Singh Rathore, Kutub Thakur, Ahmad S. Almadhor, Sardar Asad Ali Biabani, Subhash Chander:
Dynamic routing approach for enhancing source location privacy in wireless sensor networks. Wirel. Networks 29(6): 2591-2607 (2023) - [c13]Irfan Ahmad Rather, Gulshan Kumar, Rahul Saha, Tai-Hoon Kim:
Enhancement of Security in GFDM Using Ebola-Optimized Joint Secure Compressive Sensing Encryption and Symbol Scrambling Model. AICV 2023: 535-549 - [e1]Lalit Garg, Geetha Ganesan, Gulshan Kumar:
Joint Proceedings of the Workshop on Computer Vision and Machine Learning for Healthcare (CVMLH 2022) and the Workshop on Technological Innovations in Education and Knowledge Dissemination (WTEK 2022) Co-located with TOOTILL 100 - 6th International Conference on Computing Sciences (ICCS 2022), Hybrid Event, Chennai, India, April 22 - 24, 2022. CEUR Workshop Proceedings 3338, CEUR-WS.org 2023 [contents] - 2022
- [j54]PLS Jayalaxmi, Rahul Saha, Gulshan Kumar, Mauro Conti, Tai-Hoon Kim:
Machine and Deep Learning Solutions for Intrusion Detection and Prevention in IoTs: A Survey. IEEE Access 10: 121173-121192 (2022) - [j53]PLS Jayalaxmi, Rahul Saha, Gulshan Kumar, Tai-Hoon Kim:
Machine and deep learning amalgamation for feature extraction in Industrial Internet-of-Things. Comput. Electr. Eng. 97: 107610 (2022) - [j52]PLS Jayalaxmi, Gulshan Kumar, Rahul Saha, Mauro Conti, Tai-Hoon Kim, Reji Thomas:
DeBot: A deep learning-based model for bot detection in industrial internet-of-things. Comput. Electr. Eng. 102: 108214 (2022) - [j51]Hamed AlQahtani, Gulshan Kumar:
A deep learning-based intrusion detection system for in-vehicle networks. Comput. Electr. Eng. 104(Part): 108447 (2022) - [j50]Rahul Saha, Gulshan Kumar, Neeraj Kumar, Tai-Hoon Kim, Tannishtha Devgun, Reji Thomas, Ahmed Barnawi:
Internet of Things Framework for Oxygen Saturation Monitoring in COVID-19 Environment. IEEE Internet Things J. 9(5): 3631-3641 (2022) - [j49]Rekha Goyat, Gulshan Kumar, Mamoun Alazab, Mauro Conti, Mritunjay Kumar Rai, Reji Thomas, Rahul Saha, Tai-Hoon Kim:
Blockchain-Based Data Storage With Privacy and Authentication in Internet of Things. IEEE Internet Things J. 9(16): 14203-14215 (2022) - [j48]Mauro Conti, Gulshan Kumar, Pranav Nerurkar, Rahul Saha, Luigi Vigneri:
A survey on security challenges and solutions in the IOTA. J. Netw. Comput. Appl. 203: 103383 (2022) - [j47]Ashish Kumar, Rahul Saha, Mauro Conti, Gulshan Kumar, William J. Buchanan, Tai-Hoon Kim:
A comprehensive survey of authentication methods in Internet-of-Things and its conjunctions. J. Netw. Comput. Appl. 204: 103414 (2022) - [j46]Arshdeep Singh, Gulshan Kumar, Rahul Saha, Mauro Conti, Mamoun Alazab, Reji Thomas:
A survey and taxonomy of consensus protocols for blockchains. J. Syst. Archit. 127: 102503 (2022) - [j45]Amandeep Verma, Rahul Saha, Neeraj Kumar, Gulshan Kumar, Tai-Hoon Kim:
A detailed survey of denial of service for IoT and multimedia systems: Past, present and futuristic development. Multim. Tools Appl. 81(14): 19879-19944 (2022) - [j44]Rahul Saha, Gulshan Kumar, Mauro Conti, Tannishtha Devgun, Tai-Hoon Kim, Mamoun Alazab, Reji Thomas:
DHACS: Smart Contract-Based Decentralized Hybrid Access Control for Industrial Internet-of-Things. IEEE Trans. Ind. Informatics 18(5): 3452-3461 (2022) - [j43]Wei Lo, Hamed AlQahtani, Kutub Thakur, Ahmad S. Almadhor, Subhash Chander, Gulshan Kumar:
A hybrid deep learning based intrusion detection system using spatial-temporal representation of in-vehicle network traffic. Veh. Commun. 35: 100471 (2022) - [c12]Irfan Ahmad Rather, Gulshan Kumar, Rahul Saha:
Analog and Digital RoF Spatial Mux MIMO-LTE System based A2 (arithmetic Aquila) optimization model for 5G network. ACM 2022: 86-101 - [c11]Arshdeep Singh, Rahul Saha, Mauro Conti, Gulshan Kumar:
PoSC: Combined Score for Consensus in Intemet-of-Things Applications. BCCA 2022: 173-180 - [c10]D. A. Sasi Kiran, Kritika Anand, Chaitanya Kharyal, Gulshan Kumar, Nandiraju Gireesh, Snehasis Banerjee, Ruddra Dev Roychoudhury, Mohan Sridharan, Brojeshwar Bhowmick, K. Madhava Krishna:
Spatial Relation Graph and Graph Convolutional Network for Object Goal Navigation. CASE 2022: 1392-1398 - [c9]Vibhor Saran, Ramendra Kumar, Gulshan Kumar, Kumar Chokalingam, Madhusmita Rawooth, Gaurav Parchani:
Validation of Dozee, a Ballistocardiography-based Device, for Contactless and Continuous Heart Rate and Respiratory Rate Measurement. EMBC 2022: 1939-1943 - [c8]Nemath Ahmed, Srivyshnav KS, Kumar Chokalingam, Madhusmita Rawooth, Gulshan Kumar, Gaurav Parchani, Vibhor Saran:
Classification of Sleep-Wake State in Ballistocardiogram system based on Deep Learning. EMBC 2022: 1944-1947 - [c7]Alessandro Brighente, Mauro Conti, Gulshan Kumar, Reza Ghanbari, Rahul Saha:
Stopping Floods with Buckets: Attack and Countermeasure for IOTA Autopeering. M&N 2022: 1-6 - [i7]D. A. Sasi Kiran, Kritika Anand, Chaitanya Kharyal, Gulshan Kumar, Nandiraju Gireesh, Snehasis Banerjee, Ruddra Dev Roychoudhury, Mohan Sridharan, Brojeshwar Bhowmick, K. Madhava Krishna:
Spatial Relation Graph and Graph Convolutional Network for Object Goal Navigation. CoRR abs/2208.13031 (2022) - 2021
- [j42]PLS Jayalaxmi, Rahul Saha, Gulshan Kumar, Neeraj Kumar, Tai-Hoon Kim:
A Taxonomy of Security Issues in Industrial Internet-of-Things: Scoping Review for Existing Solutions, Future Implications, and Research Challenges. IEEE Access 9: 25344-25359 (2021) - [j41]Tai-Hoon Kim, Gulshan Kumar, Rahul Saha, William J. Buchanan, Tannishtha Devgun, Reji Thomas:
LiSP-XK: Extended Light-Weight Signcryption for IoT in Resource-Constrained Environments. IEEE Access 9: 100972-100980 (2021) - [j40]Kutub Thakur, Hamed AlQahtani, Gulshan Kumar:
An intelligent algorithmically generated domain detection system. Comput. Electr. Eng. 92: 107129 (2021) - [j39]Gurjot Singh Gaba, Gulshan Kumar, Tai-Hoon Kim, Himanshu Monga, Pardeep Kumar:
Secure Device-to-Device communications for 5G enabled Internet of Things applications. Comput. Commun. 169: 114-128 (2021) - [j38]Gulshan Kumar, Rahul Saha, Chhagan Lal, Mauro Conti:
Internet-of-Forensic (IoF): A blockchain based digital forensics framework for IoT applications. Future Gener. Comput. Syst. 120: 13-25 (2021) - [j37]Rekha Goyat, Gulshan Kumar, Mamoun Alazab, Rahul Saha, Reji Thomas, Mritunjay Kumar Rai:
A secure localization scheme based on trust assessment for WSNs using blockchain technology. Future Gener. Comput. Syst. 125: 221-231 (2021) - [j36]Rahul Saha, Gulshan Kumar, Mritunjay Kumar Rai, Hye-Jin Kim:
Adaptive classifier-based intrusion detection system using logistic regression and Euclidean distance on network probe vectors in resource constrained networks. Int. J. Inf. Comput. Secur. 16(3/4): 226-238 (2021) - [j35]Majdi H. Beseiso, Gulshan Kumar:
A fuzzy computational approach for selecting interdependent projects using prioritized criteria. J. Intell. Fuzzy Syst. 40(6): 11341-11354 (2021) - [j34]Ankush Manocha, Munish Bhatia, Gulshan Kumar:
Dew computing-inspired health-meteorological factor analysis for early prediction of bronchial asthma. J. Netw. Comput. Appl. 179: 102995 (2021) - [j33]Geeta Kocher, Gulshan Kumar:
Machine learning and deep learning methods for intrusion detection systems: recent developments and challenges. Soft Comput. 25(15): 9731-9763 (2021) - [j32]Rahul Saha, Gulshan Kumar, G. Geetha, Tai-Hoon Kim, Mamoun Alazab, Reji Thomas, Mritunjay Kumar Rai, Joel J. P. C. Rodrigues:
The Blockchain Solution for the Security of Internet of Energy and Electric Vehicle Interface. IEEE Trans. Veh. Technol. 70(8): 7495-7508 (2021) - [c6]Rahul Saha, Gulshan Kumar, Alessandro Brighente, Mauro Conti:
Towards An Enhanced Reputation System for IOTA's Coordicide. BCCA 2021: 26-33 - [c5]Alessandro Brighente, Mauro Conti, Gulshan Kumar, Reza Ghanbari, Rahul Saha:
Knocking on Tangle's Doors: Security Analysis of IOTA Ports. Blockchain 2021: 433-439 - [c4]Gulshan Kumar, Narasimhan Sai Shankar, Himansu Didwania, Ruddra Dev Roychoudhury, Brojeshwar Bhowmick, K. Madhava Krishna:
GCExp: Goal-Conditioned Exploration for Object Goal Navigation. RO-MAN 2021: 123-130 - [i6]Parul Khurana, Geetha Ganesan, Gulshan Kumar, Kiran Sharma:
A weighted unified informetrics based on Scopus and WoS. CoRR abs/2106.01232 (2021) - [i5]Parul Khurana, Geetha Ganesan, Gulshan Kumar, Kiran Sharma:
Proof of Reference(PoR): A unified informetrics based consensus mechanism. CoRR abs/2107.00214 (2021) - 2020
- [j31]Gurjot Singh Gaba, Gulshan Kumar, Himanshu Monga, Tai-Hoon Kim, Pardeep Kumar:
Robust and Lightweight Mutual Authentication Scheme in Distributed Smart Environments. IEEE Access 8: 69722-69733 (2020) - [j30]Tai-Hoon Kim, Gulshan Kumar, Rahul Saha, Mamoun Alazab, William J. Buchanan, Mritunjay Kumar Rai, G. Geetha, Reji Thomas:
CASCF: Certificateless Aggregated SignCryption Framework for Internet-of-Things Infrastructure. IEEE Access 8: 94748-94756 (2020) - [j29]Tai-Hoon Kim, Gulshan Kumar, Rahul Saha, Mritunjay Kumar Rai, William J. Buchanan, Reji Thomas, Mamoun Alazab:
A Privacy Preserving Distributed Ledger Framework for Global Human Resource Record Management: The Blockchain Aspect. IEEE Access 8: 96455-96467 (2020) - [j28]Gurjot Singh Gaba, Gulshan Kumar, Himanshu Monga, Tai-Hoon Kim, Madhusanka Liyanage, Pardeep Kumar:
Robust and Lightweight Key Exchange (LKE) Protocol for Industry 4.0. IEEE Access 8: 132808-132824 (2020) - [j27]Gulshan Kumar, Rahul Saha, Mritunjay Kumar Rai, Reji Thomas, G. Geetha, Tai-Hoon Kim, Joel J. P. C. Rodrigues:
A Novel Framework for Fog Computing: Lattice-Based Secured Framework for Cloud Interface. IEEE Internet Things J. 7(8): 7783-7794 (2020) - [j26]Ashish Kumar, Rahul Saha, Mamoun Alazab, Gulshan Kumar:
A Lightweight Signcryption Method for Perception Layer in Internet-of-Things. J. Inf. Secur. Appl. 55: 102662 (2020) - [j25]Ankush Manocha, Gulshan Kumar, Munish Bhatia, Amit Sharma:
Video-assisted smart health monitoring for affliction determination based on fog analytics. J. Biomed. Informatics 109: 103513 (2020) - [j24]Stuart Mumford, Nabil Freij, Steven Christe, Jack Ireland, Florian Mayer, V. Keith Hughitt, Albert J. Shih, Daniel Ryan, Simon Liedtke, David Pérez-Suárez, Pritish Chakraborty, Vishnunarayan K, Andrew Inglis, Punyaslok Pattnaik, Brigitta M. Sipocz, Rishabh Sharma, Andrew Leonard, David Stansby, Russell J. Hewett, Alex Hamilton, Laura Hayes, Asish Panda, Matt Earnshaw, Nitin Choudhary, Ankit Kumar, Prateek Chanda, Md. Akramul Haque, Michael Kirk, Michael Mueller, Sudarshan Konge, Rajul Srivastava, Yash Jain, Samuel Bennett, Ankit Baruah, Will T. Barnes, Michael Charlton, Shane A. Maloney, Nicky Chorley, Himanshu, Sanskar Modi, James Mason, Jose Rozo, Larry Manley, Agneet Chatterjee, John Evans, Michael Malocha, Monica G. Bobra, Sourav Ghosh, Dominik Stanczak, Ruben De Visscher, Shresth Verma, Ankit Agrawal, Dumindu Buddhika, Swapnil Sharma, Jongyeob Park, Matt Bates, Dhruv Goel, Garrison Taylor, Goran Cetusic, Jacob, Mateo Inchaurrandieta, Sally Dacie, Sanjeev Dubey, Deepankar Sharma, Erik Bray, Jai Rideout, Serge Zahniy, Tomas Meszaros, Abhigyan Bose, André Chicrala, Ankit, Chloé Guennou, Daniel D'avella, Daniel Williams, Jordan Ballew, Nick Murphy, Priyank Lodha, Thomas Robitaille, Yash Krishan, Andrew Hill, Arthur Eigenbrot, Benjamin Mampaey, Bernhard Wiedemann, Carlos Molina, Duygu Keskek, Ishtyaq Habib, Joseph Letts, Juanjo Bazán, Quinn Arbolante, Reid Gomillion, Yash Kothari, Yash Sharma, Abigail Stevens, Adrian M. Price-Whelan, Ambar Mehrotra, Arseniy Kustov, Brandon Stone, Trung Dang, Emmanuel Arias, Fionnlagh Dover, Freek Verstringe, Gulshan Kumar, Harsh Mathur, Igor Babuschkin, Jaylen Wimbish, Juan Buitrago-Casas, Kalpesh Krishna, Kaustubh Hiware, Manas Mangaonkar, Matthew Mendero, Mickaël Schoentgen, Norbert Gyenge, Ole Streicher, Rajasekhar Mekala, Rishabh Mishra, Shashank Srikanth, Sarthak Jain, Tannmay Yadav, Tessa Wilkinson, Tiago Pereira, Yudhik Agrawal, Jamescalixto, Yasintoda, Sophie Murray:
SunPy: A Python package for Solar Physics. J. Open Source Softw. 5(46): 1832 (2020) - [j23]Gulshan Kumar, Rahul Saha, Mritunjay Kumar Rai, Reji Thomas, Tai-Hoon Kim:
A Lattice Signcrypted Secured Localization in Wireless Sensor Networks. IEEE Syst. J. 14(3): 3949-3956 (2020) - [j22]Gulshan Kumar:
An improved ensemble approach for effective intrusion detection. J. Supercomput. 76(1): 275-291 (2020) - [j21]Gulshan Kumar, Kutub Thakur, Maruthi Rohit Ayyagari:
MLEsIDSs: machine learning-based ensembles for intrusion detection systems - a review. J. Supercomput. 76(11): 8938-8971 (2020) - [j20]Gulshan Kumar, Rahul Saha, Mritunjay Kumar Rai, William J. Buchanan, Reji Thomas, G. Geetha, Tai-Hoon Kim, Joel J. P. C. Rodrigues:
A Privacy-Preserving Secure Framework for Electric Vehicles in IoT Using Matching Market and Signcryption. IEEE Trans. Veh. Technol. 69(7): 7707-7722 (2020) - [i4]Gulshan Kumar, Rahul Saha, William J. Buchanan, G. Geetha, Reji Thomas, Tai-Hoon Kim, Mamoun Alazab:
Decentralized Accessibility of e-commerce Products through Blockchain Technology. CoRR abs/2007.05265 (2020) - [i3]Nemath Ahmed, Aashit Singh, Srivyshnav KS, Gulshan Kumar, Gaurav Parchani, Vibhor Saran:
Classification Of Sleep-Wake State In A Ballistocardiogram System Based On Deep Learning. CoRR abs/2011.08977 (2020)
2010 – 2019
- 2019
- [j19]Rahul Saha, Gulshan Kumar, Mritunjay Kumar Rai, Reji Thomas, Se-Jung Lim:
Privacy Ensured ${e}$ -Healthcare for Fog-Enhanced IoT Based Applications. IEEE Access 7: 44536-44543 (2019) - [j18]Rahul Saha, G. Geetha, Gulshan Kumar, Tai-Hoon Kim, William J. Buchanan:
MRC4: A Modified RC4 Algorithm Using Symmetric Random Function Generator for Improved Cryptographic Features. IEEE Access 7: 172045-172054 (2019) - [j17]Tai-Hoon Kim, Rekha Goyat, Mritunjay Kumar Rai, Gulshan Kumar, William J. Buchanan, Rahul Saha, Reji Thomas:
A Novel Trust Evaluation Process for Secure Localization Using a Decentralized Blockchain in Wireless Sensor Networks. IEEE Access 7: 184133-184144 (2019) - [j16]Gulshan Kumar, Rahul Saha, Mritunjay Kumar Rai, Reji Thomas, Tai-Hoon Kim:
Proof-of-Work Consensus Approach in Blockchain Technology for Cloud and Fog Computing Using Maximization-Factorization Statistics. IEEE Internet Things J. 6(4): 6835-6842 (2019) - [j15]Gulshan Kumar, Rahul Saha, Mritunjay Kumar Rai, Reji Thomas, Tai-Hoon Kim, Se-Jung Lim, Jai Sukh Paul Singh:
Improved Location Estimation in Wireless Sensor Networks Using a Vector-Based Swarm Optimized Connected Dominating Set. Sensors 19(2): 376 (2019) - [j14]Rekha Goyat, Mritunjay Kumar Rai, Gulshan Kumar, Rahul Saha, Tai-Hoon Kim:
Energy Efficient Range-Free Localization Algorithm for Wireless Sensor Networks. Sensors 19(16): 3603 (2019) - 2018
- [j13]Gulshan Kumar, Rahul Saha, Mritunjay Kumar Rai, Tai-Hoon Kim:
Multidimensional Security Provision for Secure Communication in Vehicular Ad Hoc Networks Using Hierarchical Structure and End-to-End Authentication. IEEE Access 6: 46558-46567 (2018) - [j12]Gulshan Kumar, Mritunjay Kumar Rai, Rahul Saha, Hye-Jin Kim:
An improved DV-Hop localization with minimum connected dominating set for mobile nodes in wireless sensor networks. Int. J. Distributed Sens. Networks 14(1) (2018) - [j11]Gulshan Kumar, Rahul Saha, Mandeep Singh, Mritunjay Kumar Rai:
Optimized Packet Filtering Honeypot with Snooping Agents in Intrusion Detection System for WLAN. Int. J. Inf. Secur. Priv. 12(1): 53-62 (2018) - [j10]Harmandeep Singh Brar, Gulshan Kumar:
Cybercrimes: A Proposed Taxonomy and Challenges. J. Comput. Networks Commun. 2018: 1798659:1-1798659:11 (2018) - [j9]Rahul Saha, G. Geetha, Gulshan Kumar, Tai-Hoon Kim:
RK-AES: An Improved Version of AES Using a New Key Generation Process with Random Keys. Secur. Commun. Networks 2018: 9802475:1-9802475:11 (2018) - [j8]Jai Sukh Paul Singh, Mritunjay Kumar Rai, Gulshan Kumar, Rajwinder Singh, Hye-Jin Kim, Tai-Hoon Kim:
Advanced Multiresolution Wavelet Based Wideband Spectrum Sensing Technique for Cognitive Radio. Wirel. Commun. Mob. Comput. 2018: 1908536:1-1908536:13 (2018) - 2017
- [j7]Gulshan Kumar, Mritunjay Kumar Rai:
An energy efficient and optimized load balanced localization method using CDS with one-hop neighbourhood and genetic algorithm in WSNs. J. Netw. Comput. Appl. 78: 73-82 (2017) - [j6]Gulshan Kumar, Mritunjay Kumar Rai, Rahul Saha:
Securing range free localization against wormhole attack using distance estimation and maximum likelihood estimation in Wireless Sensor Networks. J. Netw. Comput. Appl. 99: 10-16 (2017) - [j5]Gulshan Kumar, Mritunjay Kumar Rai, Hye-Jin Kim, Rahul Saha:
A Secure Localization Approach Using Mutual Authentication and Insider Node Validation in Wireless Sensor Networks. Mob. Inf. Syst. 2017: 3243570:1-3243570:12 (2017) - 2015
- [j4]Rahul Saha, G. Geetha, Gulshan Kumar:
Probabilistic Relation between Triadic Closure and the Balance of Social Networks in Presence of Influence. Int. J. Cyber Behav. Psychol. Learn. 5(4): 53-61 (2015) - [p1]Gulshan Kumar, Krishan Kumar:
A Multi-objective Genetic Algorithm Based Approach for Effective Intrusion Detection Using Neural Networks. Intelligent Methods for Cyber Warfare 2015: 173-200 - 2012
- [j3]Gulshan Kumar, Krishan Kumar:
The Use of Artificial-Intelligence-Based Ensembles for Intrusion Detection: A Review. Appl. Comput. Intell. Soft Comput. 2012: 850160:1-850160:20 (2012) - [j2]Gulshan Kumar, Krishan Kumar:
An information theoretic approach for feature selection. Secur. Commun. Networks 5(2): 178-185 (2012) - 2011
- [c3]Gulshan Kumar, Krishan Kumar:
AI based supervised classifiers: an analysis for intrusion detection. ACAI 2011: 170-174 - [c2]Gulshan Kumar, Krishan Kumar:
A novel evaluation function for feature selection based upon information theory. CCECE 2011: 395-399 - [c1]Gulshan Kumar, Mritunjay Kumar Rai, Gang-soo Lee:
An Approach to Provide Security in Wireless Sensor Network Using Block Mode of Cipher. FGIT-SecTech 2011: 101-112 - [i2]Gulshan Kumar, Mritunjay Kumar Rai:
X-ray view on a Class using Conceptual Analysis in Java Environment. CoRR abs/1110.3384 (2011) - [i1]Gulshan Kumar, Mritunjay Kumar Rai:
An Approach to Provide Security in Mobile Ad-Hoc Networks Using Counter Mode of Encryption on Mac Layer. CoRR abs/1110.3386 (2011) - 2010
- [j1]Gulshan Kumar, Krishan Kumar, Monika Sachdeva:
The use of artificial intelligence based techniques for intrusion detection: a review. Artif. Intell. Rev. 34(4): 369-387 (2010)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:36 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint