Dr. Khaleel Ahmad
Dr. Khaleel Ahmad
Assistant Professor, Dept of CS & IT, MANUU, India
Verified email at
Cited by
Cited by
ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs
T Khan, K Singh, MH Hasan, K Ahmad, GT Reddy, S Mohan, A Ahmadian
Future Generation Computer Systems 125, 921-943, 2021
Analytics of machine learning-based algorithms for text classification
SU Hassan, J Ahamed, K Ahmad
Sustainable operations and computers 3, 238-248, 2022
Performance Improvements of AODV by Black Hole Attack Detection Using IDS and Digital Signature
MI Talukdar, R Hassan, MS Hossen, K Ahmad, F Qamar, A Sid Ahmed
Wireless Communications and Mobile Computing, 2021
Markov chain based modeling bandwith states of the wireless sensor networks of monitoring system
K Khujamatov, K Ahmad, E Reypnazarov, D Khasanov
International Journal of Advanced Science and Technology 29 (4), 4889-4903, 2020
Machine learning and big data: concepts, algorithms, tools and applications
UN Dulhare, K Ahmad, KAB Ahmad
John Wiley & sons, 2020
Flying ad hoc network expedited by DTN scenario: Reliable and cost-effective MAC protocols perspective
S Arsheen, A Wahid, K Ahmad, K Khalim
2020 IEEE 14th International Conference on Application of Information and …, 2020
Classification of internet security attacks
K Ahmad, S Verma, N Kumar, J Shekhar
Proceeding of the 5th National Conference INDIACom-2011Bharti Vidyapeeth’s …, 2011
CDPS-IoT: Cardiovascular Disease Prediction System Based on IoT using Machine Learning
J Ahamed, AM Koli, K Ahmad, MA Jamal, BB Gupta
International Journal of Interactive Multimedia and Artificial Intelligence, 2021
FUZZY-PRoPHET: a novel routing protocol for opportunistic network
K Ahmad, M Fathima, V Jain, A Fathima
International Journal of Information Technology 9, 121-127, 2017
Classification of SQL injection attacks
K Ahmad, J Shekhar, K Yadav
VSRD Technical & Non-Technical Journal 1 (4), 235-242, 2010
NTRU Algorithm: Nth Degree Truncated Polynomial Ring Units
A Kamal, K Ahmad, R Hassan, K Khalim
Functional Encryption, 103-115, 2021
AES and MQTT based security system in the internet of things
J Ahamed, M Zahid, M Omar, K Ahmad
Journal of Discrete Mathematical Sciences and Cryptography 22 (8), 1589-1598, 2019
Analysis of web mining applications and beneficial areas
K Ahmad
IIUM Engineering journal 12 (2), 185-195, 2011
Analysis of digital forensic tools and investigation process
S Yadav, K Ahmad, J Shekhar
International conference on high performance architecture and grid computing …, 2011
An efficient image retrieval tool: query based image management system
K Ahmad, M Sahu, M Shrivastava, MA Rizvi, V Jain
International Journal of Information Technology 12 (1), 103-111, 2020
E-commerce security through asymmetric key algorithm
A Chaudhary, K Ahmad, MA Rizvi
2014 Fourth International Conference on Communication Systems and Network …, 2014
An approach to adding simple interface as security gateway architecture for IoT device
N Pavlović, M Šarac, S Adamović, M Saračević, K Ahmad, N Maček, ...
Multimedia Tools and Applications, 1-16, 2021
Security of NoSQL database against intruders
K Ahmad, MS Alam, NI Udzir
Recent Patents on Engineering 13 (1), 5-12, 2019
Hands-on InfluxDB
K Ahmad, M Ansari
NoSQL, 341-354, 2017
E-commerce security through elliptic curve cryptography
K Ahmad, MS Alam
Procedia Computer Science 78, 867-873, 2016
The system can't perform the operation now. Try again later.
Articles 1–20