Munesh Chandra Trivedi

Orcid: 0000-0002-4524-6835

According to our database1, Munesh Chandra Trivedi authored at least 18 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Malicious host detection and classification in cloud forensics with DNN and SFLO approaches.
Int. J. Syst. Assur. Eng. Manag., 2024

2023
Real Time Air-Written Mathematical Expression Recognition for Children's Enhanced Learning.
Neural Process. Lett., June, 2023

EHDHE: Enhancing security of healthcare documents in IoT-enabled digital healthcare ecosystems using blockchain.
Inf. Sci., June, 2023

Automatic and multimodal nuisance activity detection inside ATM cabins in real time.
Multim. Tools Appl., February, 2023

2022
A Spark-based high utility itemset mining with multiple external utilities.
Clust. Comput., 2022

Blockchain assisted privacy-preserving public auditable model for cloud environment with efficient user revocation.
Clust. Comput., 2022

MySQL Collaboration by Approving and Tracking Updates with Dependencies: A Versioning Approach.
Proceedings of the Computational Science and Its Applications - ICCSA 2022 Workshops, 2022

2021
PCS-ABE (t, n): a secure threshold multi authority CP-ABE scheme based efficient access control systems for cloud environment.
J. Ambient Intell. Humaniz. Comput., 2021

ARP cache poisoning: detection, mitigation and prevention schemes.
Int. J. Comput. Vis. Robotics, 2021

Buck Topology Powered Exclusively by Supercapacitor Modules - A Battery-Less Design Concept.
IEEE Access, 2021

2019
Identification and Prevention of Joint Gray Hole and Black Hole Attacks.
Int. J. Ambient Comput. Intell., 2019

2017
Metamorphic cryptography using strength of chaotic sequence and XORing method.
J. Intell. Fuzzy Syst., 2017

SPMD based time sharing intelligent approach for image denoising.
J. Intell. Fuzzy Syst., 2017

2016
Analysis of Several Image Steganography Techniques in Spatial Domain: A Survey.
ICTCS, 2016

Audio Steganography using ZDT: Encryption using Indexed Based Chaotic Sequence.
ICTCS, 2016

2013
Exploring Verbalization and Collaboration during Usability Evaluation with Children in Context.
CoRR, 2013

2012
Take Care: A Study on Usability Evaluation Methods for Children
CoRR, 2012

Role of context in usability evaluations: A review
CoRR, 2012


  Loading...