A machine learning-based big EEG data artifact detection and wavelet-based removal: an empirical approach S Stalin, V Roy, PK Shukla, A Zaguia, MM Khan, PK Shukla, A Jain Mathematical Problems in Engineering 2021, 1-11, 2021 | 102 | 2021 |
A survey of IDS classification using KDD CUP 99 dataset in WEKA MU Modi, A Jain International Journal of Scientific & Engineering Research 6 (11), 947-954, 2015 | 36 | 2015 |
A Review of Content Based Image Classification using Machine Learning Approach S Kumar, Z Khan, A Jain International Journal of Advanced Computer Research 2 (5), 55-60, 2012 | 36 | 2012 |
A novel defense scheme against DDOS attack in VANET A Jain, A Pathre, C Agrawal Wireless and Optical Communications Networks (WOCN), 2013 Tenth …, 2013 | 34* | 2013 |
Identification of malicious vehicle in vanet environment from ddos attack A Pathre, A Jain Journal of Global Research in Computer Science 4 (6), 30-34, 2013 | 32 | 2013 |
A Review: Image Encryption Techniques and its Terminologies A Oad, H Yadav, A Jain International Journal of Engineering and Advanced Technology (IJEAT) ISSN 3 …, 2014 | 25 | 2014 |
Design Hybrid method for intrusion detection using Ensemble cluster classification and SOM network D Rathore, A Jain International Journal of Advanced Computer Research 2 (3), 181, 2012 | 25 | 2012 |
AN IMPROVED METHOD TO DETECT INTRUSION U Modi, A Jain Informatics Engineering, an International Journal (IEIJ) 4 (2), 17-29, 2016 | 23 | 2016 |
Mining Interesting Positive and Negative Association Rule Based on Improved Genetic Algorithm (MIPNAR_GA) N Rai, S Jain, A Jain Network and Complex Systems, IISTE journals 3 (10), 17-26, 2013 | 23 | 2013 |
Ensemble Neural Network and K-NN Classifiers for Intrusion Detection S Chaurasia, A Jain International Journal of Computer Science and Information Technologies 5 (2 …, 2014 | 21 | 2014 |
Review: Ensemble Neural Network and KNN Classifiers for Intrusion Detection S Chaurasia, A Jain International Journal of Scientific & Engineering Research 4 (12), 213-217, 2013 | 21* | 2013 |
Anomaly Intrusion Detection Techniques: A Brief Review A Jain, B Verma, JL Rana International Journal of Scientific & Engineering Research 5 (7), 1372-1383, 2014 | 19 | 2014 |
Classifier Selection Models for Intrusion Detection System (IDS) A Jain, B Verma, JL Rana Informatics Engineering, an International Journal (IEIJ) 4 (1), 1-11, 2016 | 17 | 2016 |
Location based Energy Efficient Scheme for Maximizing Routing Capability of AODV Protocol in MANET S Goswami, C Agrawal, A Jain International Journal Wireless and Microwave Technologies 5 (3), 33-44, 2015 | 14 | 2015 |
Location based Energy Efficient Scheme for Maximizing Routing Capability of AODV Protocol in MANET S Goswami, C Agrawal, A Jain International Journal of Wireless and Microwave Technologies (IJWMT) 5 (3 …, 2015 | 14 | 2015 |
An Assessment of Fuzzy Temporal Association Rule Mining S Jain, S Jain, A Jain International Journal of Application or Innovation in Engineering …, 2013 | 14 | 2013 |
Digital Watermarking Method Using Replacement of Second Least Significant Bit (LSB) with Inverse of LSB A Singh, S Jain, A Jain International Journal of Emerging Technology and Advanced Engineering 3 (2 …, 2013 | 14 | 2013 |
A Survey: Detection of Duplicate Record D Bharambe, S Jain, A Jain nternational Journal of Emerging Technology and Advanced Engineering 2 (11 …, 2012 | 14 | 2012 |
SQLAS: TOOL TO DETECT AND PREVENT ATTACKS IN PHP WEB APPLICATIONS V Dwivedi, H Yadav, A Jain International Journal of Security, Privacy and Trus t Management (IJSPTM) 4 …, 2015 | 12 | 2015 |
A Review Of Fast Clustering-Based Feature Subset Selection Algorithm P Gupta, S Jain, A Jain INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH 3 (11), 86-91, 2014 | 12 | 2014 |