Smart farming–IoT in agriculture R Dagar, S Som, SK Khatri 2018 International Conference on Inventive Research in Computing …, 2018 | 288 | 2018 |
Study on sql injection attacks: Mode detection and prevention S Som, S Sinha, R Kataria International journal of engineering applied sciences and technology 1 (8 …, 2016 | 54 | 2016 |
A reliability based variant of AODV in MANETs: proposal, analysis and comparison S Tyagi, S Som, QP Rana Procedia Computer Science 79, 903-911, 2016 | 40 | 2016 |
Trust based Dynamic Multicast Group Routing ensuring Reliability for Ubiquitous Environment in MANETs S Tyagi, S Som, QP Rana International Journal of Ambient Computing and Intelligence (IJACI) 8 (1), 70-97, 2017 | 32 | 2017 |
Confusion and diffusion of color images with multiple chaotic maps and chaos-based pseudorandom binary number generator S Som, S Dutta, R Singha, A Kotal, S Palit Nonlinear Dynamics 80, 615-627, 2015 | 32 | 2015 |
Confusion and diffusion of grayscale images using multiple chaotic maps S Som, A Kotal 2012 National Conference on Computing and Communication Systems, 1-5, 2012 | 31 | 2012 |
Applications and usage of visual cryptography: A review A Pandey, S Som 2016 5th International Conference on Reliability, Infocom Technologies and …, 2016 | 30 | 2016 |
Lysozyme in egg whites of tortoises and turtle: Purification and properties of egg white lysozyme of Trionyx gangeticus cuvier SK Gayen, S Som, NK Sinha, A Sen Archives of Biochemistry and Biophysics 183 (2), 432-442, 1977 | 28 | 1977 |
A colour image encryption based on DNA coding and chaotic sequences S Som, A Kotal, A Chatterjee, S Dey, S Palit 2013 1st International Conference on Emerging Trends and Applications in …, 2013 | 25 | 2013 |
Key based bit level genetic cryptographic technique (KBGCT) S Som, NS Chatterjee, JK Mandal 2011 7th International Conference on Information Assurance and Security (IAS …, 2011 | 22 | 2011 |
A chaos based partial image encryption scheme S Som, A Kotal, A Mitra, S Palit, BB Chaudhuri 2014 2Nd international conference on business and information management …, 2014 | 21 | 2014 |
Large scale image tamper detection and restoration D Sarkar, S Palit, S Som, KN Dey Multimedia Tools and Applications 79 (25), 17761-17791, 2020 | 19 | 2020 |
Study of different cryptographic technique and challenges in future A Bhardwaj, S Som 2016 International Conference on Innovation and Challenges in Cyber Security …, 2016 | 18 | 2016 |
Anti social comment classification based on kNN algorithm N Chandra, SK Khatri, S Som 2017 6th International Conference on Reliability, Infocom Technologies and …, 2017 | 16 | 2017 |
Cryptographic technique using substitution through circular path followed by genetic function S Som, M Banerjee International Journal of Computer Applications (IJCA), 2013 | 16 | 2013 |
Statistical analysis of student feedback system using Cronbach's alpha and Utility Measurement Process S Som, R Majumdar, M Ghosh, C Malkani 2017 International Conference on Infocom Technologies and Unmanned Systems …, 2017 | 14 | 2017 |
Security and Privacy Challenges: Internet of Things S Nath, S Som Indian Journal of Science and Technology 10 (3), 1-5, 2017 | 14 | 2017 |
Cryptography encryption technique using circular bit rotation in binary field D Pradhan, S Som, A Rana 2020 8th International Conference on Reliability, Infocom Technologies and …, 2020 | 12 | 2020 |
Predictive analysis of machine learning algorithms for breast cancer diagnosis M Arora, S Som, A Rana 2020 8th International Conference on Reliability, Infocom Technologies and …, 2020 | 12 | 2020 |
Security solutions for physical layer of IoT S Chowdhary, S Som, V Tuli, SK Khatri 2017 International Conference on Infocom Technologies and Unmanned Systems …, 2017 | 12 | 2017 |