Year : 2021
Exploring the Dynamics of a Malware Propagation Model and Its Control Strategy
Publisher : Springer US
Year : 2021
Exploring the behavior of malware propagation on mobile wireless sensor networks: Stability and control analysis
Publisher : North-Holland
Year : 2020
Exploring the delayed and optimally controlled dynamics of malicious objects in computer network
Publisher : Nova Science Publishers
Year : 2020
Parametric excitation and Hopf bifurcation analysis of a time delayed nonlinear feedback oscillator
Publisher : Springer India
Year : 2019
Delay dynamics of worm propagation model with non-linear incidence rates in wireless sensor network
Publisher : Zhejiang University (Science Edition)
Year : 2019
Virus dynamics of a distributed attack on a targeted network: Effect of firewall and optimal control
Publisher : Elsevier
Year : 2019
Discrete and data packet delays as determinants of switching stability in wireless sensor networks
Publisher : Elsevier
Year : 2019
Dynamics of an SEIR epidemic model with nonlinear incidence and treatment rates
Publisher : Nonlinear Dynamics
Year : 2018
Global Stability of Worm Propagation Model with Nonlinear Incidence Rate in Computer Network
Publisher : International Journal of Network Security
Year : 2018
Detecting malicious chaotic signals in wireless sensor network
Publisher : North-Holland
Year : 2018
Bifurcation analysis of an e-epidemic model in wireless sensor network
Publisher : International Journal of Computer Mathematics
Year : 2017
Modeling the virus dynamics in computer network with SVEIR model and nonlinear incident rate
Publisher : Journal of Applied Mathematics and Computing
Year : 2016
Identifying clues to molecular etiology of multiple sclerosis in South Indian patients
Cite this Research Publication :
D. Joseph and Kumar, S., “Identifying clues to molecular etiology of multiple sclerosis in South Indian patients”, Multiple Sclerosis and Related Disorders, vol. 5, pp. 7-11, 2016.
Publisher : Multiple Sclerosis and Related Disorders
Year : 2012
Design of Stream cipher for text encryption using soft computing based techniques
Cite this Research Publication :
S. Santhanalakshmi, Sangeeta, K., and Patra, G. K., “Design of Stream cipher for text encryption using soft computing based techniques”, IJCSNS International Journal of Computer Science and Network Security, vol. 12, pp. 149–152, 2012.
Publisher : IJCSNS International Journal of Computer Science and Network Security