Follow
Dr. Manju Khari
Title
Cited by
Cited by
Year
Securing data in Internet of Things (IoT) using cryptography and steganography techniques
M Khari, AK Garg, AH Gandomi, R Gupta, R Patan, B Balusamy
IEEE Transactions on Systems, Man, and Cybernetics: Systems 50 (1), 73-80, 2019
1252019
An evolutionary SVM model for DDOS attack detection in software defined networks
KS Sahoo, BK Tripathy, K Naik, S Ramasubbareddy, B Balusamy, M Khari, ...
IEEE Access 8, 132502-132513, 2020
1062020
Collaborative handshaking approaches between internet of computing and internet of things towards a smart world: a review from 2009–2017
LH Son, S Jha, R Kumar, JM Chatterjee, M Khari
Telecommunication Systems 70, 617-634, 2019
1012019
Enhanced resource allocation in mobile edge computing using reinforcement learning based MOACO algorithm for IIOT
S Vimal, M Khari, N Dey, RG Crespo, YH Robinson
Computer Communications 151, 355-364, 2020
922020
ARM–AMO: An efficient association rule mining algorithm based on animal migration optimization
F Chiclana, R Kumar, M Mittal, M Khari, JM Chatterjee, SW Baik
Knowledge-Based Systems 154, 68-80, 2018
842018
Energy enhancement using Multiobjective Ant colony optimization with Double Q learning algorithm for IoT based cognitive radio networks
S Vimal, M Khari, RG Crespo, L Kalaivani, N Dey, M Kaliappan
Computer Communications 154, 481-490, 2020
832020
Gesture Recognition of RGB and RGB-D Static Images Using Convolutional Neural Networks.
M Khari, AK Garg, RG Crespo, E Verd˙
Int. J. Interact. Multim. Artif. Intell. 5 (7), 22-27, 2019
802019
Empirical study of software defect prediction: A systematic mapping
LH Son, N Pritam, M Khari, R Kumar, PTM Phuong, PH Thong
Symmetry 11 (2), 212, 2019
792019
Biometric iris recognition using radial basis function neural network
M Dua, R Gupta, M Khari, RG Crespo
Soft Computing 23 (22), 11801-11815, 2019
582019
A deep learning model based on multi-objective particle swarm optimization for scene classification in unmanned aerial vehicles
A Rajagopal, GP Joshi, A Ramachandran, RT Subhalakshmi, M Khari, ...
IEEE Access 8, 135383-135393, 2020
562020
Neutrosophic soft set decision making for stock trending analysis
S Jha, R Kumar, LH Son, JM Chatterjee, M Khari, N Yadav, ...
Evolving Systems 10, 621-627, 2019
532019
An extensive evaluation of search-based software testing: a review
M Khari, P Kumar
Soft Computing 23, 1933-1946, 2019
492019
Optimized test suites for automated testing using different optimization techniques
M Khari, P Kumar, D Burgos, RG Crespo
Soft Computing 22, 8341-8352, 2018
442018
A review on key management schemes in MANET
R Dalal, Y Singh, M Khari
International Journal of Distributed and Parallel Systems 3 (4), 165, 2012
442012
Assessment of code smell for predicting class change proneness using machine learning
N Pritam, M Khari, R Kumar, S Jha, I Priyadarshini, M Abdel-Basset, ...
IEEE Access 7, 37414-37425, 2019
432019
Defining malicious behavior of a node and its defensive methods in ad hoc network
R Saini, M Khari
International Journal of Computer Applications 20 (4), 18-21, 2011
412011
Fine-tuned residual network-based features with latent variable support vector machine-based optimal scene classification model for unmanned aerial vehicles
A Rajagopal, A Ramachandran, K Shankar, M Khari, S Jha, Y Lee, ...
IEEE Access 8, 118396-118404, 2020
392020
Comparison of six prioritization techniques for software requirements
M Khari, N Kumar
Journal of Global Research in Computer Science 4 (1), 38-43, 2013
392013
Different ways to achieve Trust in MANET
R Dalal, M Khari, Y Singh
International Journal on AdHoc Networking Systems (IJANS) 2 (2), 53-64, 2012
392012
Fingerprint image enhancement and reconstruction using the orientation and phase reconstruction
R Gupta, M Khari, D Gupta, RG Crespo
Information Sciences 530, 201-218, 2020
382020
The system can't perform the operation now. Try again later.
Articles 1–20