Folgen
Wilson Naik Bhukya
Wilson Naik Bhukya
Assistant Professor, School of Computer & Information Sciences, University of Hyderabad
Bestätigte E-Mail-Adresse bei uohyd.ac.in - Startseite
Titel
Zitiert von
Zitiert von
Jahr
A hybrid genetic algorithm for the minimum energy broadcast problem in wireless ad hoc networks
A Singh, WN Bhukya
Applied Soft Computing 11 (1), 667-674, 2011
402011
Multi-stage Multi-secret sharing scheme for hierarchical access structure
WN Abdul Basit, N Chaitanya Kumar, V Ch Venkaiah, Salman Abdul Moiz, Appala ...
2017 International Conference on Computing, Communication and Automation …, 2017
312017
Masquerade Detection in Linux Systems
WN Bhukya, S Kumar, A Negi
23*
A rule based approach to group recommender systems
V Padmanabhan, SK Seemala, WN Bhukya
Multi-disciplinary Trends in Artificial Intelligence: 5th International …, 2011
112011
A study of effectiveness in masquerade detection
WN Bhukya, GS Kumar, A Negi
TENCON 2006-2006 IEEE Region 10 Conference, 1-4, 2006
92006
Layered security architecture for masquerade attack detection
H Saljooghinejad, WN Bhukya
Data and Applications Security and Privacy XXVI: 26th Annual IFIP WG 11.3 …, 2012
62012
Investigative behavior profiling with one class SVM for computer forensics
WN Bhukya, SK Banothu
Multi-disciplinary Trends in Artificial Intelligence: 5th International …, 2011
52011
An evolutionary approach to multi-point relays selection in mobile ad hoc networks
A Singh, WN Bhukya
International Conference on Pattern Recognition and Machine Intelligence …, 2019
42019
Secret sharing scheme based on Latin squares
P Ashwini, VC Venkaiah, WN Bhukya
Journal of Discrete Mathematical Sciences and Cryptography, 1-15, 2021
32021
Forensic Analysis on QEMU
N Chandra Shekar, WN Bhukya
International Conference on Computational Intelligence and Information …, 2011
32011
Reasoning about dnssec
KR Babu, V Padmanabhan, WN Bhukya
Multi-disciplinary Trends in Artificial Intelligence: 5th International …, 2011
32011
Multi application user profiling for masquerade attack detection
H Saljooghinejad, WN Rathore
Advances in Computing and Communications: First International Conference …, 2011
22011
An effective heuristic for construction of all-to-all minimum power broadcast trees in wireless networks
WN Bhukya, A Singh
2014 International Conference on Advances in Computing, Communications and …, 2014
12014
p-shrink: A Heuristic for Improving Minimum All-to-All Power Broadcast Trees in Wireless Networks
WN Bhukya, A Singh
Proceedings of Ninth International Conference on Wireless Communication and …, 2014
12014
A study on energy issues in construction of all-to-all minimum power broadcast (A2A MPB) trees in wireless networks
WN Bhukya, A Singh
2013 International Conference on Advances in Computing, Communications and …, 2013
12013
An energy efficient security provisioning scheme for TinySec in wireless sensor networks
WN Bhukya, Y Gavali, A Negi, A Singh
TENCON 2008-2008 IEEE Region 10 Conference, 1-4, 2008
12008
Content Based Network Representational Learning for Movie Recommendation (CNMovieRec)
NR Kota, V Padmanabhan, WN Bhukya
International Conference on Multi-disciplinary Trends in Artificial …, 2023
2023
Check for updates
CBN Representational, NR Kota, WN Bhukya
Multi-disciplinary Trends in Artificial Intelligence: 16th International …, 2023
2023
GUI-Based User Profiling for Masquerade Detection in Linux Systems
WN Bhukya, S Kumar, A Negi
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–19