default search action
Nishtha Kesswani
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j19]Priyanka Nehra, Nishtha Kesswani:
Efficient resource allocation and management by using load balanced multi-dimensional bin packing heuristic in cloud data centers. J. Supercomput. 79(2): 1398-1425 (2023) - 2022
- [j18]Krishan Pal Singh, Nishtha Kesswani:
An Anomaly-Based Intrusion Detection System for IoT Networks Using Trust Factor. SN Comput. Sci. 3(2): 168 (2022) - [j17]Monika Jyotiyana, Nishtha Kesswani, Munish Kumar:
A deep learning approach for classification and diagnosis of Parkinson's disease. Soft Comput. 26(18): 9155-9165 (2022) - [j16]Nishtha Kesswani, Sanjay Kumar:
Government website accessibility: a cross-country analysis of G7 and BRICS countries. Univers. Access Inf. Soc. 21(3): 609-624 (2022) - 2021
- [j15]Sarika Choudhary, Apurba Dey, Nishtha Kesswani:
CRIDS: Correlation and Regression-Based Network Intrusion Detection System for IoT. SN Comput. Sci. 2(3): 168 (2021) - [j14]Maruthi Rohit Ayyagari, Nishtha Kesswani, Munish Kumar, Krishan Kumar:
Intrusion detection techniques in network environment: a systematic review. Wirel. Networks 27(2): 1269-1285 (2021) - 2020
- [j13]Nishtha Kesswani, Basant Agarwal:
SmartGuard: an IoT-based intrusion detection system for smart homes. Int. J. Intell. Inf. Database Syst. 13(1): 61-71 (2020) - [j12]Shelendra Kumar Jain, Nishtha Kesswani, Basant Agarwal:
Security, privacy and trust: privacy preserving model for internet of things. Int. J. Intell. Inf. Database Syst. 13(2/3/4): 249-277 (2020) - [j11]Shelendra Kumar Jain, Nishtha Kesswani:
IoTP an Efficient Privacy Preserving Scheme for Internet of Things Environment. Int. J. Inf. Secur. Priv. 14(2): 116-142 (2020) - [j10]Monika Jyotiyana, Nishtha Kesswani:
Classification and prediction of Alzheimer's disease using multi-layer perceptron. Int. J. Reason. based Intell. Syst. 12(4): 255-263 (2020)
2010 – 2019
- 2019
- [j9]Rajwinder Kaur, Karan Verma, Shelendra Kumar Jain, Nishtha Kesswani:
Efficient Routing Protocol for Location Privacy Preserving in Internet of Things. Int. J. Inf. Secur. Priv. 13(1): 70-85 (2019) - [j8]Sarika Choudhary, Nishtha Kesswani:
A Survey: Intrusion Detection Techniques for Internet of Things. Int. J. Inf. Secur. Priv. 13(1): 86-105 (2019) - [j7]Jyotsna Verma, Nishtha Kesswani:
AMIGM: Animal Migration Inspired Group Mobility Model for Mobile Ad hoc Networks. Scalable Comput. Pract. Exp. 20(3): 577-590 (2019) - [c4]Sarika Choudhary, Nishtha Kesswani:
Cluster-Based Intrusion Detection Method for Internet of Things. AICCSA 2019: 1-8 - 2018
- [j6]Nishtha Kesswani, Hongbo Lyu, Zuopeng Justin Zhang:
Analyzing Android App Privacy With GP-PP Model. IEEE Access 6: 39541-39546 (2018) - [j5]Jyotsna Verma, Nishtha Kesswani:
BIGM: A Biogeography Inspired Group Mobility Model for Mobile Ad Hoc Networks. Int. J. Wirel. Inf. Networks 25(4): 488-505 (2018) - [c3]Nishtha Kesswani, Sanjay Kumar:
The Smart-X Model for Smart Cities. COMPSAC (1) 2018: 755-760 - [c2]Sarika Choudhary, Nishtha Kesswani:
Detection and Prevention of Routing Attacks in Internet of Things. TrustCom/BigDataSE 2018: 1537-1540 - 2017
- [j4]Priyanka Verma, Nishtha Kesswani:
User identification prerequisite for memorisation a type of personalisation. Int. J. Serv. Technol. Manag. 23(4): 290-298 (2017) - 2015
- [j3]Jyotsna Verma, Nishtha Kesswani:
A Review on Bio-Inspired Migration Optimization Techniques. Int. J. Bus. Data Commun. Netw. 11(1): 24-35 (2015) - [j2]Nishtha Kesswani, Shelendra Kumar Jain:
Schematic Classification Model of Green Computing Approaches. J. Cases Inf. Technol. 17(3): 14-21 (2015) - [c1]Nishtha Kesswani, Sanjay Kumar:
Maintaining Cyber Security: Implications, Cost and Returns. CPR 2015: 161-164 - 2014
- [j1]Vibekananda Dutta, Nishtha Kesswani:
Designing Vision Based Autonomous Docile-X Mobile Robot for Real-time Application to Soccer Behaviors. J. Autom. Mob. Robotics Intell. Syst. 8(4): 40-50 (2014) - [i3]Priyanka Verma, Nishtha Kesswani:
Web Usage mining framework for Data Cleaning and IP address Identification. CoRR abs/1408.5460 (2014) - 2013
- [i2]Gaurav Mittal, Nishtha Kesswani, Kuldeep Goswami:
A Survey of Current Trends in Distributed, Grid and Cloud Computing. CoRR abs/1308.1806 (2013) - 2012
- [i1]Vibekananda Dutta, Nishtha Kesswani, Deepti Gahalot:
Novel Architecture for 3D model in virtual communities from detected face. CoRR abs/1210.6157 (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint