Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Feature Selection-Based Evaluation for Network Intrusion Detection System with Machine Learning Methods on CICIDS2017

    Network attacks endanger the privacy and security of information. As a consequence of this, an effective mechanism is required for identifying network attacks. In this study, we show NIDS to increase classific...

    Lav Upadhyay, Meenakshi Tripathi, Jyoti Grover in Communication and Intelligent Systems (2024)

  2. No Access

    Chapter and Conference Paper

    Addressing DIO Suppression Attack in RPL based IoT Networks

    The Internet of Things (IoT) has brought a revolution in technology in the last decade. IoT is susceptible to numerous internal routing attacks because of the characteristics of the sensors used in IoT network...

    Rajat Kumar, Jyoti Grover, Girish Sharma in Information Security, Privacy and Digital … (2024)

  3. No Access

    Chapter and Conference Paper

    Performance Assessment of Routing Protocols in Cognitive Radio Vehicular Ad Hoc Networks

    Cognitive radio technology is an inventive method to solve spectrum scarcity problems in wireless networks. Growing interest of cognitive radio (CR) technology in vehicular communication systems has led CR-ena...

    Jyoti Grover, Sunita Singhal in Applied Mathematics and Computational Intelligence (2023)

  4. No Access

    Chapter and Conference Paper

    Analysis of Hatchetman Attack in RPL Based IoT Networks

    Low power and lossy networks (LLN) are flourishing as an integral part of communication infrastructure, particularly for growing Internet of Things (IoT) applications. RPL-based LLNs are vulnerable and unprote...

    Girish Sharma, Jyoti Grover, Abhishek Verma in Emerging Technologies in Computer Engineer… (2022)

  5. No Access

    Chapter and Conference Paper

    Performance Evaluation of Image-Based Diseased Leaf Identification Model Using CNN and GA

    India is an agricultural country and plays an important role in agriculture due to rapid population growth and increased demand for food production. Due to growing population, weather shifts and to make more p...

    Anita Shrotriya, Akhilesh Kumar Sharma in International Conference on Artificial Int… (2022)

  6. No Access

    Chapter and Conference Paper

    Investigation of SNR in VLC-Based Intelligent Transportation System Under Environmental Disturbances

    Various forms of wireless communications technologies have been proposed for intelligent transportation systems (ITSs). Recent events have illustrated that visible light communication (VLC) can play a signific...

    Ritvik Maheshwari, Jyoti Grover in Mobile Radio Communications and 5G Networks (2021)

  7. No Access

    Chapter and Conference Paper

    Hybrid Genetic Algorithm: Traveling Salesman Problem

    A genetic algorithm has three main operators namely selection, crossover and mutation. Each operator has various sub operators. Selection of sub operator that can be applied on particular problem is difficult...

    Sunita Singhal, Hemlata Goyal, Parth Singhal in Advances in Decision Sciences, Image Proce… (2020)

  8. No Access

    Chapter and Conference Paper

    Performance Assessment of Thirteen Crossover Operators Using GA

    Performance of genetic algorithms depends on evolutionary operators, i.e., selection, crossover, and mutation, in general, and on the type of crossover operators, in particular. With constant research going on...

    Ashish Jain, Tripti Mishra, Jyoti Grover, Vivek Verma in Soft Computing for Problem Solving (2019)

  9. No Access

    Chapter and Conference Paper

    Real-Time VANET Applications Using Fog Computing

    The main objective of vehicular ad hoc networks (VANETs) is to improve driver safety and traffic efficiency. Most of VANET applications are based on periodic exchange of safety messages between nearby vehicles...

    Jyoti Grover, Ashish Jain, Sunita Singhal in Proceedings of First International Confere… (2018)

  10. No Access

    Chapter and Conference Paper

    Cuckoo Search Strategies for Solving Combinatorial Problems (Solving Substitution Cipher: An Investigation)

    Approximate algorithms have been well studied in order to solve combinatorial problems. This paper addresses cryptanalysis of the substitution cipher which is an interesting combinatorial problem. For this pur...

    Ashish Jain, Jyoti Grover, Tarun Jain in Proceedings of First International Confere… (2018)

  11. Chapter and Conference Paper

    Vimprint: Exploring Alternative Learning through Low-End Mobiles

    The Internet today provides a plethora of applications to assist anyone wanting to learn a new subject, language or a concept. Resources available include dictionaries, translation engines, downloadable e-book...

    Sheetal K. Agarwal, Jyoti Grover, Anupam Jain in Human-Computer Interaction – INTERACT 2013 (2013)

  12. Chapter and Conference Paper

    Visual Conversational Interfaces to Empower Low-Literacy Users

    Mobile phones have come a long way from being plain voice calling devices to becoming multipurpose handy tools powered by ever increasing new applications available on-the-go. For many, the mobile phone of tod...

    Sheetal K. Agarwal, Jyoti Grover, Arun Kumar in Human-Computer Interaction – INTERACT 2013 (2013)

  13. No Access

    Chapter and Conference Paper

    Misbehavior Detection Based on Ensemble Learning in VANET

    Detection of misbehaviors in Vehicular Ad Hoc Networks (VANETs) using machine learning methods has not been investigated extensively. In VANET, an illegitimate vehicle may transmit inaccurate messages to trigg...

    Jyoti Grover, Vijay Laxmi, Manoj Singh Gaur in Advanced Computing, Networking and Security (2012)

  14. No Access

    Chapter and Conference Paper

    Machine Learning Approach for Multiple Misbehavior Detection in VANET

    The motivation behind Vehicular Ad Hoc Networks (VANETs) is to improve traffic safety and driving efficiency. VANET applications operate on the principle of periodic exchange of messages between nodes. However...

    Jyoti Grover, Nitesh Kumar Prajapati in Advances in Computing and Communications (2011)

  15. No Access

    Chapter and Conference Paper

    Performance Evaluation and Detection of Sybil Attacks in Vehicular Ad-Hoc Networks

    Vehicular Ad-hoc Networks (VANET) technology provides a fast, easy to deploy and an inexpensive solution for intelligent traffic control and traffic disaster preventive measure. In VANET, moving vehicles commu...

    Jyoti Grover, Deepak Kumar, M. Sargurunathan in Recent Trends in Network Security and Appl… (2010)