Detection of packet dropping attack using improved acknowledgement based scheme in MANET ASA Ukey, M Chawla IJCSI International Journal of Computer Science Issues 7 (4), 12-17, 2010 | 77 | 2010 |
A clustering based hotspot identification approach for crime prediction G Hajela, M Chawla, A Rasool Procedia Computer Science 167, 1462-1470, 2020 | 75 | 2020 |
Enhanced fuzzy logic‐based spray and wait routing protocol for delay tolerant networks S Jain, M Chawla, VNGJ Soares, JJ Rodrigues International Journal of Communication Systems 29 (12), 1820-1843, 2016 | 49 | 2016 |
Survey of buffer management policies for delay tolerant networks S Jain, M Chawla The Journal of Engineering 2014 (3), 117-123, 2014 | 48 | 2014 |
A comparative study of local outlier factor algorithms for outliers detection in data streams S Mishra, M Chawla Emerging Technologies in Data Mining and Information Security: Proceedings …, 2019 | 46 | 2019 |
An efficient analysis of crop yield prediction using Hadoop framework based on random forest approach S Sahu, M Chawla, N Khare 2017 international conference on computing, communication and automation …, 2017 | 43 | 2017 |
Vehicular ad hoc networks and its applications in diversified fields R Barskar, M Chawla International Journal of Computer Applications 123 (10), 2015 | 43 | 2015 |
Natural language processing based hybrid model for detecting fake news using content-based features and social features S Bauskar, V Badole, P Jain, M Chawla International Journal of Information Engineering and Electronic Business 11 …, 2019 | 37 | 2019 |
A three phase optimization method for precopy based VM live migration S Sharma, M Chawla SpringerPlus 5, 1-24, 2016 | 34 | 2016 |
A technical review for efficient virtual machine migration S Sharma, M Chawla 2013 International Conference on Cloud & Ubiquitous Computing & Emerging …, 2013 | 29 | 2013 |
Comparing delay tolerant network routing protocols for optimizing L-copies in spray and wait routing for minimum delay A Mehto, M Chawla Conference on Advances in Communication and Control Systems (CAC2S 2013 …, 2013 | 28 | 2013 |
A survey on efficient group key management schemes in wireless networks R Barskar, M Chawla Indian Journal of Science and Technology, 2016 | 22 | 2016 |
Spatial domain image steganography based on security and randomization N Tiwari, M Sandilya, M Chawla International Journal of Advanced Computer Science and Applications 5 (1), 2014 | 21 | 2014 |
Destination based group Gray hole attack detection in MANET through AODV A Kumar, M Chawla International Journal of Computer Science Issues (IJCSI) 9 (4), 292, 2012 | 20 | 2012 |
Clustering in mobile ad-hoc networks: a review M Chawla, J Singhai, JL Rana International Journal of Computer Science and Information Security 8 (2 …, 2010 | 18 | 2010 |
Extended ad hoc on demand distance vector local repair trial for MANET PP Naidu, M Chawla International Journal of Wireless & Mobile Networks 4 (2), 235, 2012 | 17 | 2012 |
A Review Paper on Cooperative Blackhole And Grayhole Attacks in Mobile Ad hoc Networks S Jain, J Singhai, M Chawla International Journal of Ad Hoc, Sensor & Ubiquitous Computing 2 (3), 71, 2011 | 16 | 2011 |
Survey of applications based on vehicular ad-hoc network (VANET) framework MS Sahasrabudhe, M Chawla International Journal of Computer Science and Information Technologies 5 (3 …, 2014 | 13 | 2014 |
Modified different neighbor history spray and wait using PROPHET in delay tolerant network A Mehto, M Chawla International Journal of Computer Applications 86 (18), 30-35, 2014 | 12 | 2014 |
A fuzzy logic based buffer management scheme with traffic differentiation support for delay tolerant networks S Jain, M Chawla Telecommunication Systems 68, 319-335, 2018 | 11 | 2018 |