Follow
Dr. Rajesh Kumar Shrivastava
Dr. Rajesh Kumar Shrivastava
Bennett University, Greater Noida
Verified email at bennett.edu.in - Homepage
Title
Cited by
Cited by
Year
Attack detection and forensics using honeypot in IoT environment
RK Shrivastava, B Bashir, C Hota
Distributed Computing and Internet Technology: 15th International Conference …, 2019
542019
Modified AODV Protocol to Prevent Black Hole Attack in Mobile Ad-hoc Network
R Sharma, R Shrivastava
International Journal of Computer Science and Network Security (IJCSNS) 14 …, 2014
212014
Energy consumption using traffic models for MANET routing protocols
S Dubey, R Shrivastava
International Journal of Smart Sensors and Ad Hoc Networks (IJSSAN) 1, 2011
162011
Securing Internet of Things devices against code tampering attacks using Return Oriented Programming
RK Shrivastava, SP Singh, MK Hasan, S Islam, S Abdullah, AHM Aman
Computer Communications 193, 38-46, 2022
132022
Protection against code exploitation using ROP and check-summing in IoT environment
R Shrivastava, C Hota, P Shrivastava
2017 5th International Conference on Information and Communication …, 2017
132017
New improved algorithm for mining privacy—preserving frequent itemsets
R Shrivastava, R Awasthy, B Solanki
Int J Comp Sci Inform 1, 1-7, 2011
132011
A scenario based approach for gateway discovery using Manet routing protocol
RK Saluja, R Shrivastava
2012 International Conference on Computer Communication and Informatics, 1-6, 2012
112012
Tamper-resistant code using optimal rop gadgets for iot devices
C Hota, RK Shrivastava, S Shipra
2017 13th International Wireless Communications and Mobile Computing …, 2017
102017
Prevention of security threats in IEEE 802.16 standards
R Srivastava, DK Mehto
International Journal of Soft Computing and Engineering (IJSCE) 1 (4), 103-108, 2011
102011
Preventing data tampering in IoT networks
RK Shrivastava, S Mishra, VE Archana, C Hota
2019 IEEE International Conference on Advanced Networks and …, 2019
82019
Game theory based modified naïve-bayes algorithm to detect DoS attacks using Honeypot
RK Shrivastava, S Ramakrishna, C Hota
2019 IEEE 16th India Council International Conference (INDICON), 1-4, 2019
82019
Network based Security model using Symmetric Key Cryptography (AES 256–Rijndael Algorithm) with Public Key Exchange Protocol (Diffie-Hellman Key Exchange Protocol)
NK Jharbade, R Shrivastava
IJCSNS International Journal of Computer Science and Network Security 12 (8 …, 2012
82012
Analysis of Secure Mobile Agent System
R Shrivastava, P Mehta
International Journal of Soft Computing and Engineering (IJSCE) ISSN, 2231-2307, 2012
72012
Code tamper-proofing using dynamic canaries
RK Shrivastava, KJ Concessao, C Hota
2019 25th Asia-Pacific Conference on Communications (APCC), 238-243, 2019
52019
Profile-guided code identification and hardening using return oriented programming
RK Shrivastava, C Hota
Journal of Information Security and Applications 48, 102364, 2019
52019
Efficient question answering in chatbot using TF-IDF and cosine similarity
R Shrivastava, A Pujahari, SP Singh, T Bhowmik
Innovations in Information and Communication Technologies: Proceedings of …, 2022
42022
Resilient complex event processing in iot using side-channel information
RK Shrivastava, S Mishra, S Barua, C Hota
Proceedings of the 10th International Conference on Security of Information …, 2017
42017
An enhanced authentication mechanism for IEEE 802.16 (e) mobile WiMAX
DK Mehto, R Srivastava
International Journal of Soft Computing and Engineering 1 (4), 98-102, 2011
42011
Performance Evaluation of Extended Aodv Using Different Scenarios
R Shrivastava, RK Saluja
International Journal of Smart Sensors and Ad Hoc Networks (IJSSAN) ISSN, 2012
32012
Securing Mobile Agent and Reducing Overhead Using Dummy and Monitoring Mobile Agents
R Shrivastava
International Journal of Managment, IT and Engineering 2 (4), 296-303, 2012
32012
The system can't perform the operation now. Try again later.
Articles 1–20