Recognizing Attacks in Wireless Sensor Network in View of Internet of Things DP Acharjya, NSS Ahmed Internet of Things: novel advances and envisioned applications 25, 149-172, 2017 | 13 | 2017 |
A framework for phishing attack identification using rough set and formal concept analysis NSS Ahmed, DP Acharjya, S Sanyal International Journal of Communication Networks and Distributed Systems 18 …, 2017 | 12 | 2017 |
Detection of denial of service attack in wireless network using dominance based rough set NSS Ahmed, DP Acharjya International Journal of Advanced Computer Science and Applications 6 (12 …, 2015 | 11 | 2015 |
Tracing of online assaults in 5G networks using dominance based rough set and formal concept analysis DP Acharjya, NSS Ahmed Peer to Peer Networking and Applications 14 (1), 349-374, 2021 | 9 | 2021 |
Dominance Based Rough Set Approach for the Detection of Jamming Attack NSS Ahmed, DP Acharjya International Journal of Philosophies in Computer Science 1 (2), 45-66, 2016 | 6 | 2016 |
A framework for various attack identification in MANET using Multi Granular Rough Set NSS Ahmed, DP Acharjya Research anthology on securing mobile technologies and applications, 119-143, 2021 | 5 | 2021 |
Integrating Machine Learning and Stochastic pattern Analysis for the Forecasting of Time-Series Data ABF Khan, K Kamalakannan, NSS Ahmed Springer Nature Computer Science 4 (5), 1-6, 2023 | 4 | 2023 |
An application of containing order rough set for analyzing data of intrusion detection NSS Ahmed An Interdisciplinary J. of Scientific Research & Edu 2 (5), 52-57, 2016 | 2 | 2016 |
A Survey on Machine Learning Techniques for the Diagnosis of Liver Disease U Vandana, NSS Ahmed International Journal 7 (6), 30-36, 2022 | 1 | 2022 |
Public Key Cryptography Algorithm Using Binary Manipulation and Chinese Remainder Theorem NSS Ahmed, R Selvakumar, A Taywade International Journal of Recent Technology and Engineering (IJRTE) 2 (5), 85-88, 2013 | 1* | 2013 |
face recognition using CNN algorithm K Vasanthalakshmi, NSS Ahmed International Journal of Current Sciences 12 (2), 631-635, 2022 | | 2022 |
Signature based Indexing method for efficient content based retrieval of relative temporal patterns M Gayathri, NSS Ahmed International Journal of Creative Research Thoughts 10 (6), a283-a287, 2022 | | 2022 |
Indian Currency Fake Note Detection VVRR Reddy, NSS Ahmed International Journal of Creative Research Thoughts 10 (6), a375-a386, 2022 | | 2022 |
Desktop Supermarket Applications D Vedaprasanna, NSS Ahmed International Journal of Current Sciences 12 (2), 619-622, 2022 | | 2022 |
A Lightweight Policy Update Scheme for Outsourced Personal Health Records Sharing NSS Ahmed International Journal of Creative Research Thoughts 10 (5), h809-h813, 2022 | | 2022 |
Detecting unauthorized person using cnn and opencv techniques J Hemavathi, NSS Ahmed International Journal of Creative Research Thoughts 10 (5), h610-h622, 2022 | | 2022 |
Identification of acute illness and facial cues illness using convolutional neural network RV Reddy, KVY Kumar, NSS Ahmed International Journal of Creative Research Thoughts 10 (5), g634-g640, 2022 | | 2022 |
A framework for various attack identification in MANET using Multi Granular Rough Set NSS Ahmed, DP Acharjya International Journal of Information Security and Privacy 13 (4), 28-53, 2019 | | 2019 |
Analyzing and tracing of various packet dropping attacks using containing order rough set VAA Basha, NSS Ahmed IOSR Journal of Engineering 2 (Special Issue on IoT), 10-16, 2019 | | 2019 |
A Novel Ids Framework For Computer Networks Using Hybrid Rough Computing Approaches NSS Ahmed VIT University, 1-170, 2016 | | 2016 |