Enhanced Elman spike neural network fostered blockchain framework espoused intrusion detection for securing Internet of Things network VR Vadi, S Abidin, A Khan, M Izhar Transactions on Emerging Telecommunications Technologies 33 (12), e4634, 2022 | 8 | 2022 |
Recorder App: Designing and Development of a Smart Phone Application M Izhar, M Malhotra 2014 International Conference on Computing for Sustainable Global …, 2014 | 5 | 2014 |
Network security issues in context of rsna and firewall M Izhar, M Shahid, VR Singh International Journal of Computer Applications 82 (16), 2013 | 5 | 2013 |
Safe Electronic Healthcare System with Innovative Blockchain Technology S Abidin, M Izhar, MA Siddiqui, R Kumar BP International, 2022 | 4 | 2022 |
5th Generation Wireless Communication Revolution S Abidin, M Izhar, VR Vadi Int. J. Recent Technol. Eng. IJRTE 8 (5), 1505-1508, 2020 | 4 | 2020 |
Attacks on WSN and its limitations S Abidin, M Izhar Int. J. Comput. Sci. Eng 5 (11), 157-160, 2017 | 4 | 2017 |
Enhanced Security Evaluation and Analysis of Wireless Network based on MAC Protocol M Izhar, M Shahid, VR Singh International Journal of Scientific and Research Publication 3 (11), 1-4, 2013 | 4 | 2013 |
5th Generation Wireless Communication Revolution: A Recent Study S Abidin, M Izhar, VR Vadi Novel Perspectives of Engineering Research 3, 113-118, 2021 | 3 | 2021 |
A Practical Approach for Evaluation of Security Methods of Wireless Network M Izhar, M Shahid, VR Singh Journal of Emerging Trends in Computing and Information Sciences 4 (10), 2013 | 3 | 2013 |
Network Security Vulnerabilities: Malicious Nodes attack M Izhar, VR Singh International Journal of Scientific and Research Publications 4 (7), 1-5, 2014 | 2 | 2014 |
Proposing of Collisions Free and Secure Network for IEEE 802. 11 WLAN M Izhar, V R Singh International Journal of Computer Applications 98 (5), 22-26, 2014 | | 2014 |
Year of Publication: 2012 M Izhar, M Shahid, VR Singh | | 2012 |
DESIGN & MODELING OF MANET USING DIFFERENT SLOT TIME SIMULATED BY NS-2 M Izhar, M Shahid, VR Singh International Journal on Computer Science and Engineering 3 (5), 1999-2009, 2011 | | 2011 |
IEEE 802.11 WLAN M Izhar, VR Singh International Journal of Computer Applications 975, 8887, 0 | | |
Cloud Computing evolved paradigm for Digital India M Izhar, V Sharma | | |
Network Security Vulnerabilities Heading for Malicious Attack M Izhar, M Shahid, VR Singh | | |