Dr. Manju Khari
Dr. Manju Khari
Netaji Subhas University of Technology, East Campus, Delhi, India.
Verified email at aiactr.ac.in
Cited by
Cited by
Collaborative handshaking approaches between internet of computing and internet of things towards a smart world: a review from 2009–2017
S Jha, R Kumar, JM Chatterjee, M Khari
Telecommunication Systems 70 (4), 617-634, 2019
Defining Malicious Behavior of a Node and its Defensive Techniques in Ad Hoc Networks
R Saini, M Khari
Journal of Smart Sensors and Adhoc Networks (IJSSAN) 1, 18-21, 2011
Neutrosophic soft set decision making for stock trending analysis
S Jha, R Kumar, JM Chatterjee, M Khari, N Yadav, F Smarandache
Evolving Systems 10 (4), 621-627, 2019
Securing data in Internet of Things (IoT) using cryptography and steganography techniques
M Khari, AK Garg, AH Gandomi, R Gupta, R Patan, B Balusamy
IEEE Transactions on Systems, Man, and Cybernetics: Systems 50 (1), 73-80, 2019
ARM–AMO: an efficient association rule mining algorithm based on animal migration optimization
F Chiclana, R Kumar, M Mittal, M Khari, JM Chatterjee, SW Baik
Knowledge-Based Systems 154, 68-80, 2018
Enhanced resource allocation in mobile edge computing using reinforcement learning based MOACO algorithm for IIOT
S Vimal, M Khari, N Dey, RG Crespo, YH Robinson
Computer Communications 151, 355-364, 2020
Heuristic search-based approach for automated test data generation: a survey
R Malhotra, M Khari
International Journal of Bio-Inspired Computation 5 (1), 1-18, 2013
A review on key management schemes in MANET
R Dalal, Y Singh, M Khari
International Journal of Distributed and Parallel Systems 3 (4), 165, 2012
Gesture Recognition of RGB and RGB-D Static Images Using Convolutional Neural Networks.
M Khari, AK Garg, RG Crespo, E Verd˙
International Journal of Interactive Multimedia & Artificial Intelligence 5 (7), 2019
Comparison of six prioritization techniques for software requirements
M Khari, N Kumar
Journal of Global Research in Computer Science 4 (1), 38-43, 2013
Different ways to achieve Trust in MANET
R Dalal, M Khari, Y Singh
International Journal on AdHoc Networking Systems (IJANS) 2 (2), 53-64, 2012
An extensive evaluation of search-based software testing: a review
M Khari, P Kumar
Soft Computing 23 (6), 1933-1946, 2019
Empirical study of software defect prediction: a systematic mapping
LH Son, N Pritam, M Khari, R Kumar, PTM Phuong, PH Thong
Symmetry 11 (2), 212, 2019
Optimized test suites for automated testing using different optimization techniques
M Khari, P Kumar, D Burgos, RG Crespo
Soft Computing 22 (24), 8341-8352, 2018
Energy enhancement using Multiobjective Ant colony optimization with Double Q learning algorithm for IoT based cognitive radio networks
S Vimal, M Khari, RG Crespo, L Kalaivani, N Dey, M Kaliappan
Computer Communications 154, 481-490, 2020
Biometric iris recognition using radial basis function neural network
M Dua, R Gupta, M Khari, RG Crespo
Soft Computing 23 (22), 11801-11815, 2019
Cyber Security in Parallel and Distributed Computing
DN Le, R Kumar, BK Mishra, M Khari, JM Chatterjee
Wiley, Hoboken, 2019
Role of Cyber Security in Today’s Scenario
M khari, G Shrivastava, S Gupta, G Rashmi
Detecting and Mitigating Robotic Cyber Security Risks, 177, 2017
Internet of Things: Proposed security aspects for digitizing the world
M Khari, M Kumar, S Vij, P Pandey
2016 3rd International Conference on Computing for Sustainable Globalá…, 2016
Assessment of code smell for predicting class change proneness using machine learning
N Pritam, M Khari, R Kumar, S Jha, I Priyadarshini, M Abdel-Basset, ...
IEEE Access 7, 37414-37425, 2019
The system can't perform the operation now. Try again later.
Articles 1–20