Follow
Manisha Nene
Title
Cited by
Cited by
Year
A Survey on Machine Learning Techniques for Intrusion Detection Systems
J Singh, MJ Nene
International Journal of Advanced Research in Computer and Communication …, 2013
1482013
Buried Object Detection and Analysis of GPR Images: Using Neural Network and Curve Fitting
NP Singh, MJ Nene
IEEE, Emerging Research Areas and 2013 International Conference on …, 2013
682013
A survey on types of machine learning techniques in intrusion prevention systems
S Das, MJ Nene
2017 International Conference on Wireless Communications, Signal Processing …, 2017
552017
Node-level trust evaluation in wireless sensor networks
SS Desai, MJ Nene
IEEE Transactions on Information Forensics and Security 14 (8), 2139-2152, 2019
472019
Psychological, Social, and Cultural Aspects of Internet Addiction
B Bozoglan, MJ Nene
IGI Global, 2017
422017
Employability of blockchain technology in defence applications
A Sudhan, MJ Nene
2017 International Conference on Intelligent Sustainable Systems (ICISS …, 2017
422017
A Survey on Latest DoS Attacks:Classification and Defense Mechanisms
MJ Nene, Rajkumar
International Journal of Innovative Research in Computer and Communication …, 2013
40*2013
One time pad generation using quantum superposition states
G Upadhyay, MJ Nene
2016 IEEE International Conference on Recent Trends in Electronics …, 2016
382016
Algorithm for Autonomous Reorganization of Mobile Wireless Camera Sensor Networks to Improve Coverage
MJ Nene, RS Deodhar, LM Patnaik
IEEE SENSORS JOURNAL, VOL. 15, NO. 8, AUGUST 2015 15 (8), 4428-4441, 2015
292015
A Security Framework for Military Application on Infrastructure Based Wireless Sensor Network
S Roy, MJ Nene
IEEE International Conference on Research in Computational Intelligence and …, 2015
292015
Data Leakage Prevention for Data in Transit using Artificial Intelligence and Encryption Techniques
M Ghouse, MJ Nene, C VembuSelvi
2019 International Conference on Advances in Computing, Communication and …, 2019
232019
Two‐factor authentication using biometric based quantum operations
MK Sharma, MJ Nene
Security and Privacy 3 (3), e102, 2020
202020
Survey of Flocking Algorithms in Multi-agent Systems
A Barve, MJ Nene
International Journal of Computer Science Issues 10 (6(2)), 110-117, 2013
202013
Peer Selection Techniques for Enhanced Transaction Propagation in Bitcoin Peer-to-Peer Network
A Sudhan, MJ Nene
2018 Second International Conference on Intelligent Computing and Control …, 2018
192018
Self Organizing Localization Algorithm for Large Scale Underwater Sensor Network
SS Naik, MJ Nene
IEEE International Conference on Recent Advances in Computing and Software …, 2012
192012
Multihop Trust Evaluation using Memory integrity in Wireless Sensor Networks
SS Desai, MJ Nene
IEEE Transactions on Information Forensics and Security, doi: 10.1109/TIFS …, 2021
182021
RSS based detection and expulsion of malicious users from cooperative sensing in Cognitive Radios
S Yadav, MJ Nene
IEEE International Conf. Advance Computing Conference (IACC), 2013, 3rd …, 2013
182013
Quantum Computing: An Entanglement Measurement
M Gupta, MJ Nene
IEEE International Conference on Advent Trends in Multidisciplinary Research …, 2021
172021
Pauli Matrix based Quantum Communication Protocol
P Nema, MJ Nene
IEEE International Conference on Advent Trends in Multidisciplinary Research …, 2021
172021
Dual factor third‐party biometric‐based authentication scheme using quantum one time passwords
MK Sharma, MJ Nene
Wiley Journal Security Privacy, e-129, DOI: 10.1002/spy2.129, 2020
172020
The system can't perform the operation now. Try again later.
Articles 1–20