default search action
Munesh Chandra Trivedi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j12]Nandita Goyal, Munesh Chandra Trivedi:
Malicious host detection and classification in cloud forensics with DNN and SFLO approaches. Int. J. Syst. Assur. Eng. Manag. 15(2): 578-590 (2024) - 2023
- [j11]Pratima Sharma, Suyel Namasudra, Rubén González Crespo, Javier Parra Fuente, Munesh Chandra Trivedi:
EHDHE: Enhancing security of healthcare documents in IoT-enabled digital healthcare ecosystems using blockchain. Inf. Sci. 629: 703-718 (2023) - [j10]Awadhesh Kumar Srivastava, Vikas Tripathi, Bhaskar Pant, Devesh Pratap Singh, Munesh Chandra Trivedi:
Automatic and multimodal nuisance activity detection inside ATM cabins in real time. Multim. Tools Appl. 82(4): 5113-5132 (2023) - [j9]Shobhan Kumar, Munesh Chandra Trivedi, Arun Chauhan:
Real Time Air-Written Mathematical Expression Recognition for Children's Enhanced Learning. Neural Process. Lett. 55(3): 3355-3375 (2023) - 2022
- [j8]Krishan Kumar Sethi, Dharavath Ramesh, Munesh Chandra Trivedi:
A Spark-based high utility itemset mining with multiple external utilities. Clust. Comput. 25(2): 889-909 (2022) - [j7]Rahul Mishra, Dharavath Ramesh, Damodar Reddy Edla, Munesh Chandra Trivedi:
Blockchain assisted privacy-preserving public auditable model for cloud environment with efficient user revocation. Clust. Comput. 25(5): 3103-3127 (2022) - 2021
- [j6]Sambit Satpathy, Bidyut K. Bhattacharyya, Munesh Chandra Trivedi, Aditya Sankar Sengupta:
Buck Topology Powered Exclusively by Supercapacitor Modules - A Battery-Less Design Concept. IEEE Access 9: 25758-25767 (2021) - [j5]Jayati Bhardwaj, Virendra Kumar Yadav, Munesh Chandra Trivedi, Anurag Kumar Sen:
ARP cache poisoning: detection, mitigation and prevention schemes. Int. J. Comput. Vis. Robotics 11(4): 357-373 (2021) - [j4]Dharavath Ramesh, Rahul Mishra, Munesh Chandra Trivedi:
PCS-ABE (t, n): a secure threshold multi authority CP-ABE scheme based efficient access control systems for cloud environment. J. Ambient Intell. Humaniz. Comput. 12(10): 9303-9322 (2021) - 2019
- [j3]Munesh Chandra Trivedi, Sachin Malhotra:
Identification and Prevention of Joint Gray Hole and Black Hole Attacks. Int. J. Ambient Comput. Intell. 10(2): 80-90 (2019) - 2017
- [j2]Munesh Chandra Trivedi, Shilpi Mishra, Virendra Kumar Yadav:
Metamorphic cryptography using strength of chaotic sequence and XORing method. J. Intell. Fuzzy Syst. 32(5): 3365-3375 (2017) - [j1]Sachin Bagga, Akshay Girdhar, Munesh Chandra Trivedi:
SPMD based time sharing intelligent approach for image denoising. J. Intell. Fuzzy Syst. 32(5): 3561-3573 (2017)
Conference and Workshop Papers
- 2022
- [c3]Dharavath Ramesh, Munesh Chandra Trivedi:
MySQL Collaboration by Approving and Tracking Updates with Dependencies: A Versioning Approach. ICCSA (Workshops 5) 2022: 380-395 - 2016
- [c2]Shivani Sharma, Virendra Kumar Yadav, Munesh Chandra Trivedi, Avadesh Gupta:
Audio Steganography using ZDT: Encryption using Indexed Based Chaotic Sequence. ICTCS 2016: 66:1-66:5 - [c1]Munesh Chandra Trivedi, Shivani Sharma, Virendra Kumar Yadav:
Analysis of Several Image Steganography Techniques in Spatial Domain: A Survey. ICTCS 2016: 84:1-84:7
Informal and Other Publications
- 2013
- [i3]Mohammadi Akheela Khanum, Munesh Chandra Trivedi:
Exploring Verbalization and Collaboration during Usability Evaluation with Children in Context. CoRR abs/1306.4094 (2013) - 2012
- [i2]Munesh Chandra Trivedi, Mohammadi Akheela Khanum:
Role of context in usability evaluations: A review. CoRR abs/1204.2138 (2012) - [i1]Mohammadi Akheela Khanum, Munesh Chandra Trivedi:
Take Care: A Study on Usability Evaluation Methods for Children. CoRR abs/1212.0647 (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint