Comparative analysis of aodv, olsr, tora, dsr and dsdv routing protocols in mobile ad-hoc networks D Kaur, N Kumar International Journal of Computer Network and Information Security 5 (3), 39, 2013 | 69 | 2013 |
Forensic-chain: Blockchain based digital forensics chain of custody with PoC in Hyperledger Composer AH Lone, RN Mir Digital Investigation 28, 44-55, 2019 | 38 | 2019 |
Effect of arbuscular mycorrhizal fungi on growth and development of potato (Solanum tuberosum) plant. L Rafiq, S Razia, S Vandna, K Vijay, M Rayees, KK Koul Asian Journal of Crop Science 7 (3), 233-243, 2015 | 34 | 2015 |
Applicability of mobile contact tracing in fighting pandemic (COVID-19): Issues, challenges and solutions AB Dar, AH Lone, S Zahoor, AA Khan, R Naaz Computer Science Review, 100307, 2020 | 22 | 2020 |
Resource management in pervasive Internet of Things: A survey S Zahoor, RN Mir Journal of King Saud University-Computer and Information Sciences, 2018 | 21 | 2018 |
Energy efficiency optimization in wireless sensor network using proposed load balancing approach S Kaur, RN Mir International Journal of Computer Networks and Applications (IJCNA) 3 (5 …, 2016 | 19 | 2016 |
Ethics aware object oriented smart city architecture S Sholla, R Naaz, MA Chishti China Communications 14 (5), 160-173, 2017 | 15 | 2017 |
Clustering in wireless sensor networks-a survey S Kaur, RN Mir International Journal of Computer Network and Information Security 8 (6), 38, 2016 | 15 | 2016 |
A 4 GS/s, 1.8 V multiplexer encoder based flash ADC using TIQ technique L Nazir, RN Mir 2014 International Conference on Signal Processing and Integrated Networks …, 2014 | 15 | 2014 |
Behaviour visualization for malicious-attacker node collusion in MANET based on probabilistic approach RF Olanrewaju, BUI Khan, RN Mir, A Shah American Journal of Computer Science and Engineering 2 (3), 10-19, 2015 | 14 | 2015 |
Incorporating ethics in Internet of Things (IoT) enabled connected smart healthcare S Sholla, R Naaz, MA Chishti 2017 IEEE/ACM International Conference on Connected Health: Applications …, 2017 | 12 | 2017 |
Securing electronic transactions via payment gateways–a systematic review RF Olanrewaju, BUI Khan, MMUI Mattoo, F Anwar, ANB Nordin, RN Mir International Journal of Internet Technology and Secured Transactions 7 (3 …, 2017 | 11 | 2017 |
A 7GS/s, 1.2 V. pseudo logic encoder based flash ADC using TIQ technique L Nazir, B Khurshid, RN Mir 2015 Annual IEEE India Conference (INDICON), 1-6, 2015 | 11 | 2015 |
STRATEGIC PROFILING FOR BEHAVIOUR VISUALIZATION OF MALICIOUS NODE IN MANETS USING GAME THEORY. BUL ISLAM KHAN, RF OLANREWAJU, RN MIR, A BABA, BW ADEBAYO Journal of Theoretical & Applied Information Technology 77 (1), 2015 | 11 | 2015 |
A survey on the Internet of Things security O Yousuf, RN Mir Information & Computer Security, 2019 | 10 | 2019 |
An enhanced time efficient technique for image watermarking using ant colony optimization and light gradient boosting algorithm V Sharma, RN Mir Journal of King Saud University-Computer and Information Sciences, 2019 | 9 | 2019 |
Forensic-chain: ethereum blockchain based digital forensics chain of custody AH Lone, RN Mir Sci. Pract. Cyber Secur. J, 2018 | 9 | 2018 |
Adoption of cloud computing in higher learning institutions: a systematic review NB Nordin, RN Mir, Z Noor Indian Journal of Science and Technology 10, 36, 2017 | 9 | 2017 |
RFDA: reliable framework for data administration based on split-merge policy RF Olanrewaju, BUI Khan, A Baba, RN Mir, SA Lone 2016 SAI Computing Conference (SAI), 545-552, 2016 | 9 | 2016 |
Base station positioning in wireless sensor networks S Kaur, RN Mir 2016 International Conference on Internet of Things and Applications (IOTA …, 2016 | 8 | 2016 |