Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Development of e-Governance in an Emerging Economy Like India: Assessment and Way Ahead for Key Components., , and . ICEGOV, page 613-616. ACM, (2017)GENDroid - a graph-based ensemble classifier for detecting Android malware., and . Int. J. Inf. Comput. Secur., 18 (3/4): 327-347 (2022)A reversible code over GF(q)., and . Kybernetika, 22 (1): 85-91 (1986)Sentiment analysis and topic modeling of COVID-19 tweets of India., , , and . Int. J. Syst. Assur. Eng. Manag., 15 (5): 1756-1776 (May 2024)Steganography-Based Secure Communication., , and . SocProS, volume 236 of Advances in Intelligent Systems and Computing, page 781-792. Springer, (2012)A note on Reed-Muller codes., and . Discret. Appl. Math., 2 (4): 345-348 (1980)Secure Group Communication with Hidden Group Key., , and . Inf. Secur. J. A Glob. Perspect., 22 (1): 21-34 (2013)Internet Traffic Surveillance & Network Monitoring in India: Case Study of NETRA., and . Netw. Protoc. Algorithms, 8 (4): 1-28 (2016)Meta-Heuristic Algorithms to Improve Fuzzy C-Means and K-Means Clustering for Location Allocation of Telecenters Under E-Governance in Developing Nations., , and . Int. J. Fuzzy Log. Intell. Syst., 19 (4): 290-298 (2019)An Image Steganography Method Using Spread Spectrum Technique., , and . SocProS (2), volume 336 of Advances in Intelligent Systems and Computing, page 215-232. Springer, (2014)