Hybrid WGWO: whale grey wolf optimization-based novel energy-efficient clustering for EH-WSNs RS Rathore, S Sangwan, S Prakash, K Adhikari, R Kharel, Y Cao EURASIP Journal on Wireless Communications and Networking 2020, 1-28, 2020 | 81 | 2020 |
In-Vehicle Communication Cyber Security: Challenges and Solutions RS Rathore, C Hewage, O Kaiwartya, J Lloret Sensors 22 (17), 1-36, 2022 | 76 | 2022 |
Security issues with virtualization in cloud computing V Kumar, RS Rathore 2018 International Conference on Advances in Computing, Communication …, 2018 | 55 | 2018 |
E-Commerce Security using PKI approach V Rattan, EM Sinha, V Bali, RS Rathore International Journal on Computer Science and Engineering 2 (5), 1439-1444, 2010 | 54 | 2010 |
Search Engine Optimization in E-Commerce Sites SN Srivastava, S Kshatriya, RS Rathore International Research Journal of Engineering and Technology (IRJET) 4 (5 …, 2017 | 53 | 2017 |
W-GUN: Whale optimization for energy and delay-centric green underwater networks RS Rathore, S Sangwan, S Mazumdar, O Kaiwartya, K Adhikari, R Kharel, ... Sensors 20 (5), 1377, 2020 | 47 | 2020 |
Green communication for next-generation wireless systems: optimization strategies, challenges, solutions, and future aspects RS Rathore, S Sangwan, O Kaiwartya, G Aggarwal Wireless Communications and Mobile Computing 2021, 1-38, 2021 | 45 | 2021 |
A Framework to Provide a Bidirectional Abstraction of the Asymmetric Network to Routing Protocols V Bali, RS Rathore, A Sirohi, P Verma 2009 Second International Conference on Emerging Trends in Engineering …, 2009 | 45 | 2009 |
Modified echo state network enabled dynamic duty cycle for optimal opportunistic routing in EH-WSNs RS Rathore, S Sangwan, K Adhikari, R Kharel Electronics 9 (1), 98, 2020 | 44 | 2020 |
Performance analysis of priority scheme in ATM network V Bali, RS Rathore, A Sirohi International Journal of Computer Applications 1 (13), 26-31, 2010 | 44 | 2010 |
An efficient distributed group key management using hierarchical approach with ECDH and symmetric algorithm UP Singh, RS Rathore J. Comput. Eng. Intel. Syst 3 (7), 32-41, 2012 | 43 | 2012 |
Privacy Preserving in TPA using Secured Encryption Technique for Secure Cloud R Tomar, RS Rathore International Journal of Computer Applications 138 (8), 2016 | 42 | 2016 |
Detailed Review of Image Based Steganographic Techniques S Singhal, RS Rathore IJCST 6, 93-95, 2015 | 42 | 2015 |
BEST—Blockchain-Enabled Secure and Trusted Public Emergency Services for Smart Cities Environment Bhawana, S Kumar, RS Rathore, M Mahmud, O Kaiwartya, J Lloret Sensors 22 (15), 5733, 2022 | 41 | 2022 |
A Review on Natural Language Processing V Kumar, RS Rathore International Journal Of Engineering Development And Research, 2016 | 41 | 2016 |
Distributed Hierarchical Group Key Management using Elliptic Curve and Hash Function UP Singh, RS Rathore International Journal of Computer Applications 61 (19), 2013 | 41 | 2013 |
A novel approach to priority based focused crawler R Dixit, S Gupta, RS Rathore, S Gupta International Journal of Computer Applications 116 (19), 2015 | 40 | 2015 |
Three Level Cloud Computing Security Model P Sharma, RS Rathore International Journal of Computer Applications 119 (2), 2015 | 40 | 2015 |
Clustering Technique Approach to Detect the Special Patterns for Medical Video Mining V Bali, RS Rathore, A Sirohi, P Verma Advances in Data Management, 140, 2009 | 40 | 2009 |
A Survey on Privacy Preserving in TPA Using Secured Encryption Technique for Secure Cloud R Tomar, RS Rathore International Advanced Research Journal in Science , Engineering and …, 2016 | 39 | 2016 |