Research & Publications
International Journals
Published “Detection of JavaScript vulnerabilities at Client Agent” in International Journal of Scientific & Technology Research (IJSTR) ISSN: 2277-8616 Volume 1, Issue 7, and PP.36-41 in August 2012. URL: http://www.ijstr.org/final-print/August2012/Detection-of-Javascript-Vulnerability-At-Client-Agen.pdf
Published “An Efficient Modular Approach of Intrusion Prevention in Wireless Sensor Networks” in International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, volume 2 Issue 5, pp.11-14 in November 2013. URL: http://www.ijrte.org/v2i5.php.
Published “Potential Stir Discovery in Client and Server Side Communication with Automated Way of Communication” in Oriental International Journal of Innovative Engineering Research (OIJIER)”, ISSN: 2321-1806, Volume 2 Issue 1, PP. 16-21 in December 2013.
Published “Bitcoin Mining In India and Obstruction to Acceptance”, Published in International Journal of Engineering Sciences & Research Technology (IJESRT), ISSN: 2277-9655, pp. 532-537, February 2015. URL:http://www.ijesrt.com/issues%20pdf%20file/Archives-2015/February2015/85BITCOIN%20MININ G%20IN%20 INDIA%20AND%20OBSTRUCTION%20TO%20ACCEPTANCE.pdf
Published “A Survey on Various Techniques of Energy Consumption on Cloud Network” International Journal of Scientific & Engineering Research, ISSN 22295518, Volume 6, Issue 5, pp. 827-831, May 2015. URL:http://www.ijser.org/paper/A--Survey-on-Various-Techniques-of-Energy-Consumption-on-Cloud-Network.html
Published Accurate Localization of Wireless Sensor Node Using Genetic Algorithm And Kalman Filter” IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 2, Ver. II (Mar-Apr. 2016), PP 24-30. URL:http://www.iosrjournals.org/iosr-jce/papers/Vol18-issue2/Version2/ C1802022430. Pdf
Published “Security Enhancement of SHA with Less Execution Time and Larger Bit Difference” Engineering Universe for Scientific Research and Management, ISSN 2319-3069, Vol. 8 Issue 5 , pp. 1-6, May 2016. URL: http://eusrm.com/ Published Paper/8Vol/Issue5/2016EUSRM5201636982-cc022482-6860-4fb4-938e-233d349 b4ca113737.pdf
Published “Load Balancing Algorithms in Cloud Computing: An Extensive Survey” International Journal of Engineering Science and Computing (IJESC), ISSN 2321 3361, Volume 6 Issue No. 6, pp. 7463-7468, June 2016. URL:http://ijesc.org/upload/f30c059815a80a54adb64911a427302a.Load%20 Balancing%20Algorithms%20in%20Cloud%20Computing%20An%20Extensive%20Survey.pdf
Published “Analysis of Extended Security Model based on Smart Card using Anonymous Two Factor Authentication Key Exchange Protocol” International Journal of Emerging Technology and Advanced Engineering ISSN 22502459, ISO 9001:2008 Certified Journal Volume 7, Issue 6, June 2017.http://www.ijetae.com/files/Volume7Issue6/IJETAE_0617_50.pdf
Published “A Review: Smart Card Based PAKE Protocol on Distributed System” International Journal of Engineering Technology and Applied Science (ISSN: 2395 3853), Vol. 3 Issue 6 June 2017.
International Conferences
Published “Automated Process of Server and Client Environment with attack alert based on DES” in 2014 Fourth International Conference on Communication Systems and Network Technologies Print ISBN: 978-1-4799-3069-2 DOI: 10.1109/CSNT.2014.155 ,pp 739-742,7-9 April 2014.Publisher:IEEE. URL: http://ieeexplore.ieee.org/ document/ 6821497/
Published “Profile based Scheme against DDoS Attack in WSN”, in 2014 Fourth International Conference on Communication Systems and Network Technologies Print ISBN: 978-1-4799-3069-2 DOI: 10.1109/CSNT.2014.31 ,pp 112-116 ,7-9 April 2014.Publisher:IEEE. URL: http://ieeexplore.ieee.org/document/6821368/
Published “An Efficient Technique for Energy Consumption in Distributed Cloud Network using Ant Technique”, in 2015 International Conference on Information Technology (ICIT) Print ISBN: 978-1-5090-0486-7 DOI: 10.1109/ICIT.2015.31 ,pp 71-75 , 21-23 Dec. 2015.Publisher: IEEE. URL: http://ieeexplore.ieee.org/document /7437593/
Published “Secure transmission of 2D image using randomized chaotic mapping”, in 2016 Symposium on Colossal Data Analysis and Networking (CDAN), Electronic ISBN: 978-1-5090-0669-4 DOI: 10.1109/CDAN.2016.7570870 ,18-19 March 2016. Publisher:IEEE. URL: http://ieeexplore.ieee.org/document/7570870/
Book Published
Java Technology (In Progress)