2023 |
Monika Chaudhary, Nitin Goyal, Abderrahi Benslimane, Lalit Kumar Awasthi, Ayed Alwadain, Aman Singh |
Underwater Wireless Sensor Networks: Enabling Technologies for Node Deployment and Data Collection Challenges. Vol. 10, No. 4, pp. 3500-3524. |
International Journal of Communication Systems |
SCI |
Q1 |
- |
2023 |
Amitoj Bir Singh, Lalit Kumar Awasthi, Mohammad Shorfuzzaman, Abdulmajeed Alsufyani, Mueen Uddin |
Chained Dual-Generative Adversarial Network: A Generalized Defense Against Adversarial Attacks. Vol. 74, No. 2, pp. 2541-2555. |
Computers, Materials & Continua |
SCI |
Q1 |
- |
2023 |
Md Sarfaraj Alam Ansari, Kunwar Pal, Prajjval Govil, Mahesh Chandra Govil, Lalit Kumar Awasthi |
A statistical analysis of SAMPARK dataset for peer-to-peer traffic and selfish-peer identification Vol. 82 pp. 8507-8535. |
Multimedia Tools and Applications |
SCI |
Q1 |
- |
2023 |
Himanshu Verma, Naveen Chauhan, Lalit Kumar Awasthi |
Modelling Buffer-Overflow in 6LoWPAN-Based Resource-Constraint IoT-Healthcare Network Vol.129 pp.1113-1128. DOI: https://doi.org/10.1007/s11277-023-10178-w |
Wireless Personal Communications |
SCI |
Q1 |
- |
2023 |
Urvashi, Geeta Sikka, Lalit K Awasthi, Bharat Bhargava |
Quantitative evaluation of extensive vulnerability set using cost benefit analysis Vol. 3 pp. 1 - 11. DOI: 10.1109/TDSC.2023.3253121 |
IEEE Transactions on Dependable and Secure Computing |
SCI |
Q1 |
- |
2023 |
Pranjal Kumar, Siddhartha Chauhan, Lalit Kumar Awasthi |
Artificial Intelligence in Healthcare: Review, Ethics, Trust Challenges & Future Research Directions Vol. 120 pp. 1-58. DOI: https://doi.org/10.1016/j.engappai.2023.105894 |
Engineering Applications of Artificial Intelligence |
SCI |
Q1 |
- |
2023 |
Raj Mohan Singh, Lalit Kumar Awasthi, Geeta Sikka |
Towards Metaheuristic Scheduling Techniques in Cloud and Fog: An Extensive Taxonomic Review, Vol. 55, No. 3, pp. 1-43. https://doi.org/10.1145/3494520 |
ACM Computing Surveys |
SCI |
Q1 |
- |
2023 |
Shailza Kanwar, Lalit Kumar Awasthi, Vivek Shrivastava |
Efficient Random Forest Algorithm for Multi-objective Optimization in Software Defect Prediction Vol.4 pp. 1-13. DOI: https://doi.org/10.1080/03772063.2023.2205377 |
IETE Journal of Research |
SCI |
Q1 |
- |
2023 |
Shailza Kanwar, Lalit Kumar Awasthi, Vivek Shrivastava |
Candidate project selection in cross project defect prediction using hybrid method Vol. 218 pp. 1-11. DOI: https://doi.org/10.1016/j.eswa.2023.119625 |
Expert Systems with Applications |
SCI |
Q1 |
- |
2023 |
Prashant Kumar, Naveen Chauhan, Mohit Kumar, Lalit K Awasthi |
Clustering based opportunistic traffic offloading technique for device-to-device communication Vol. 14 pp. 827-839. DOI: |
International Journal of System Assurance Engineering and Management |
SCI |
Q1 |
- |
2023 |
Ishana Attri, Lalit Kumar Awasthi, Teek Parval Sharma |
Machine learning in agriculture: a review of crop management applications Vol.2 pp. 1-41. DOI: https://doi.org/10.1007/s11042-023-16105-2 |
Multimedia Tools and Applications |
SCI |
Q1 |
- |
2023 |
Pankaj Sharma, Lalit Kumar Awasthi |
Next-generation Digital Forensics Challenges and Evidence Preservation Framework for IoT Devices. Vol. 14 pp.1-3. |
International Journal of Next-Generation Computing |
SCI |
Q1 |
- |
2023 |
Ishana Attri, Lalit Kumar Awasthi, Teek Parval Sharma, Priyanka Rathee |
A review of deep learning techniques used in agriculture Vol.77 pp.1-22. DOI: https://doi.org/10.1016/j.ecoinf.2023.102217 |
Ecological Informatics |
SCI |
Q1 |
- |
2023 |
Neha Bansal, Shelly Sachdeva, Lalit K Awasthi |
Are NoSQL Databases Affected by Schema? Vol.3 pp. 1-22. DOI: https://doi.org/10.1080/03772063.2023.2237478 |
IETE Journal of Research |
SCI |
Q1 |
- |
2023 |
Neha Agarwal, Geeta Sikka, Lalit Kumar Awasthi |
WGSDMM+ GA: A genetic algorithm-based service clustering methodology assimilating dirichlet multinomial mixture model with word embedding Vol. 145 pp. 254-266. DOI: https://doi.org/10.1016/j.future.2023.03.028 |
Future Generation Computer Systems |
SCI |
Q1 |
- |
2023 |
Pranjal Kumar, Siddhartha Chauhan, Lalit Kumar Awasthi |
Human Activity Recognition (HAR) Using Deep Learning: Review, Methodologies, Progress and Future Research Directions Vol. 3 pp. 1-41. DOI: https://doi.org/10.1007/s11831-023-09986-x |
Archives of Computational Methods in Engineering |
SCI |
Q1 |
- |
2023 |
Himanshu Verma, Naveen Chauhan, Lalit Kumar Awasthi |
Schema generation for document stores using workload-driven approach Vol.4 pp. 1-49. DOI: https://doi.org/10.1007/s11227-023-05613-5 |
The Journal of Supercomputing |
SCI |
Q1 |
- |
2023 |
Himanshu Verma, Naveen Chauhan, Lalit Kumar Awasthi |
A Comprehensive review of ‘Internet of Healthcare Things’: Networking aspects, technologies, services, applications, challenges, and security concerns Vol. 50 pp.1-26. DOI: https://doi.org/10.1016/j.cosrev.2023.100591 |
Computer Science Review |
SCI |
Q1 |
- |
2023 |
Rohit Singh, Lalit Kumar Awasthi, Kp Sharma |
EEDF: Enhanced Encryption Decryption Framework for Device Authentication in IoT. Vol. 56, No. 3, pp. 163-184. |
Adhoc & Sensor Wireless Networks |
Other |
Q1 |
- |
2005 |
Lalit Kumar, Parveen Kumar, RK Chauhan |
Message Logging and Checkpointing in Mobile Computing |
Journal of Multi-disciplinary Engineering Technologies |
- |
Q1 |
- |
2005 |
Lalit Kumar, Parveen Kumar, RK Chauhan |
Pitfalls in Minimum-process Coordinated Checkpointing protocols for Mobile Distributed |
ACCST Journal of Research |
- |
Q1 |
- |
2005 |
Parveen Kumar, Lalit Kumar, RK Chauhan |
Synchronous Checkpointing Protocols for Mobile Distributed Systems: A Comparative Study |
International Journal of information and computing science |
- |
Q1 |
- |
2005 |
Parveen Kumar, Lalit Kumar, RK Chauhan |
A low overhead Non-intrusive Hybrid Synchronous checkpointing protocol for mobile systems |
Journal of Multidisciplinary Engineering Technologies |
- |
Q1 |
- |
2005 |
Lalit Kumar, Parveen Kumar, RK Chauhan |
Logging based coordinated checkpointing in mobile distributed computing systems |
IETE journal of research |
- |
Q1 |
- |
2006 |
RK Chauhan, Parveen Kumar, Lalit Kumar |
Non-intrusive C oordinated C heckpointing Protocol for Mobile C omputing Sy stems: A Critical Survey |
ACCST Journal of Research |
- |
Q1 |
- |
2006 |
RK Chauhan, Parveen Kumar, Lalit Kumar |
Hybrid and intrusive synchronous checkpointing protocols for mobile distributed systems |
in ACCST Journal of Research |
- |
Q1 |
- |
2006 |
RK Chauhan, Parveen Kumar, Lalit Kumar |
Checkpointing Distributed Applications on Mobile Computers |
Journal of Multidisciplinary Engineering and Technologies |
- |
Q1 |
- |
2006 |
RK Chauhan, Parveen Kumar, Lalit Kumar |
A coordinated checkpointing protocol for mobile computing systems |
International Journal of information and computing science, Accepted for Publication |
- |
Q1 |
- |
2006 |
Parveen Kumar, Lalit Kumar, RK Chauhan |
A hybrid coordinated checkpointing protocol for mobile computing systems |
IETE journal of research |
- |
Q1 |
- |
2006 |
Parveen Kumar, Lalit Kumar, RK Chauhan |
A Nonintrusive Hybrid Synchronous Checkpointing Protocol for Mobile Systems |
IETE Journal of Research |
- |
Q1 |
- |
2007 |
Lalit Kumar Awasthi, Prashant Kumar |
A synchronous checkpointing protocol for mobile distributed systems: probabilistic approach |
International Journal of Information and Computer Security |
- |
Q1 |
- |
2009 |
Amit Nayyer, Rajesh Sharma, Meenakshi Nayyer, Lalit Kumar Awasthi |
Wait and Watch Technique: Removing Time synchronization overhead in Wireless Sensor Network |
2009 IEEE International Advance Computing Conference |
- |
Q1 |
- |
2010 |
Ankur Gupta, Lalit K Awasthi |
A containment-based security model for cycle-stealing P2P applications |
Information Security Journal: A Global Perspective |
- |
Q1 |
- |
2010 |
Kamal Kant |
Lalit K. Awasthi,(2010):“Unicast And Multicast Routing Protocols For Manets: A Comparative Survey” |
International Journal of IT & Knowledge |
- |
Q1 |
- |
2010 |
Ankur Gupta, Lalit K Awasthi |
PArch: a cross-organisational peer-to-peer framework supporting the aggregation and exchange of storage for efficient e-mail archival |
International Journal of Business Information Systems |
- |
Q1 |
- |
2010 |
Kamal Kant, K Lalit |
Awasthi: A Survey on Routing Protocols for MANETs and Comparisons |
IEEE supported International Conference on Recent Trends in Soft Computing and Information Technology, TSCIT-09 |
- |
Q1 |
- |
2010 |
Soni Chaurasia, Siddhartha Chauhan, LK Awasthi |
Energy efficient protocol for providing QoS for Wireless Sensor Network |
2010 International Conference on Industrial Electronics, Control and Robotics |
- |
Q1 |
- |
2010 |
Ankur Gupta, Lalit K Awasthi |
Toward a Quality-of-Service Framework for Peer-to-Peer Applications |
International Journal of Distributed Systems and Technologies (IJDST) |
- |
Q1 |
- |
2010 |
Ankur Gupta, Lalit K Awasthi |
IndNet: towards a peer-to-peer community network that connects the information technology industry and academia in India |
International Journal of Networking and Virtual Organisations |
- |
Q1 |
- |
2010 |
Lalit K Awasthi, Manoj Misra, Ramesh C Joshi |
A weighted checkpointing protocol for mobile distributed systems |
International Journal of ad hoc and ubiquitous Computing |
- |
Q1 |
- |
2010 |
Naveen Chauhan, Lalit K Awasthi, Narottam Chand, RC Joshi, Manoj Misrah |
Energy efficient cooperative caching in mobile ad hoc networks |
International Journal of Applied Engineering Research |
- |
Q1 |
- |
2010 |
Naveen Chauhan, Lalit K Awasthi, Narottam Chand, RC Joshi, Manoj Misra |
Global cluster cooperation strategy in mobile ad hoc networks |
International Journal of Computer Science and Engineering |
- |
Q1 |
- |
2010 |
Kamal Kant, Lalit K Awasthi |
Unicast and Multicast Routing Protocols for MA-NETs: A Comparative Survey |
International Journal of IT & Knowledge Management (IJITKM), Special issue |
- |
Q1 |
- |
2010 |
Prashant Kumar, Naveen Chauhan, L K Awasthi, Narottam Chand |
Proactive approach for cooperative caching in mobile adhoc networks |
International Journal of Computer Science Issues (IJCSI) |
- |
Q1 |
- |
2011 |
R Srikanth, LK Awasthi |
Voronoi-based Continuous query processing for mobile users |
2011 International Conference on Communication Systems and Network Technologies |
- |
Q1 |
- |
2011 |
Anurag Singh, Narottam Chand, Lalit Kr Awasthi |
Enhancing Cache Invalidation Techniques in IVANET |
2011 International Conference on Communication Systems and Network Technologies |
- |
Q1 |
- |
2011 |
Anurag Singh, Narottam Chand, Lalit Kr Awasthi |
Cache invalidation for location dependent and independent data in IVANETs |
International Conference on Advances in Computing and Communications |
- |
Q1 |
- |
2011 |
Manju Bala, Lalit Awasthi |
Performance tradeoff with routing protocols for radio models in wireless sensor networks |
Wireless Engineering and Technology |
- |
Q1 |
- |
2011 |
Ankur Gupta, Lalit K Awasthi |
Peers-for-peers (P4P): an efficient and reliable fault-tolerance strategy for cycle-stealing P2P applications |
International Journal of Communication Networks and Distributed Systems |
- |
Q1 |
- |
2011 |
Manju Bala, Lalit Awasthi |
PERFORMANCE TRADEOFF WITH ROUTING PROTOCOLS FOR RADIO MODELS IN WIRELESS SENSOR NETWORKS |
Wireless Engineering and Technology |
- |
Q1 |
- |
2011 |
A Gupta |
Awasthi, LK: Peer-to-Peer Networks and Computation: Current Trends and Future Perspectives |
Computing and Informatics |
- |
Q1 |
- |
2011 |
Naveen Chauhan, Lalit K Awasthi, Narottam Chand, Ramesh Chandra Joshi, Manoj Misra |
Cooperative Caching in Mobile Ad Hoc Networks |
International Journal of Mobile Computing and Multimedia Communications (IJMCMC) |
- |
Q1 |
- |
2011 |
Siddhartha Chauhan, Lalit Kumar Awasthi |
Cluster based task scheduling in wireless sensor network |
International Journal of Computer Applications |
- |
Q1 |
- |
2011 |
Siddhartha Chauhan, Lalit Awasthi |
TBEE: Tier based energy efficient protocol providing sink and source mobility in wireless sensor networks |
International Journal of Computer Science Issues (IJCSI) |
- |
Q1 |
- |
2011 |
Siddhartha Chauhan, Lalit Kumar Awasth |
Adaptive time synchronization for homogeneous WSNs |
International journal of radio frequency identification & wireless sensor networks |
- |
Q1 |
- |
2011 |
Amit Nayyer, Meenakshi Nayyer, Lalit Kr Awasthi |
A comparative study of time synchronization protocols in wireless sensor network |
International Journal of Computer Applications |
- |
Q1 |
- |
2011 |
Naveen Chauhan, Lalit K Awasthi |
Narottam chand |
Vivek Katiyar, and Ankit Chug,“A Distributed Weighted Cluster Based Routing Protocol for Manets,” World Academy of Science, Engineering and Technology |
- |
Q1 |
- |
2012 |
Naveen Chauhan, Lalit K Awasthi, Narottam Chand |
Cache replacement in mobile adhoc networks |
International Journal of Distributed Systems and Technologies (IJDST) |
- |
Q1 |
- |
2012 |
Siddhartha Chauhan, Lalit Kumar Awasthi |
Adaptive Time Synchronization for Homogeneous WSNs |
International Journal of Engineering Business Management |
- |
Q1 |
- |
2012 |
Lalit K Awasthi, Manoj Misra, Ramesh C Joshi |
An efficient coordinated checkpointing approach for distributed computing systems with reliable channels |
International Journal of Computers and Applications |
- |
Q1 |
- |
2012 |
Ajay Guleria, Narottam Chand, Mohinder Kumar, Lalit Awasthi |
Request Analysis and Dynamic Queuing System for VANETs |
International Journal of Advanced Computer Science and Applications |
- |
Q1 |
- |
2012 |
Ashok Kumar Nanda, Lalit Kumar Awasthi |
Secure SMS Encryption Using NTRU Cryptosystem. |
Journal of Information Assurance & Security |
- |
Q1 |
- |
2012 |
Lalit K Awasthi, Manoj Misra, Ramesh C Joshi |
An efficient coordinated checkpointing approach for distributed computing systems with reliable channels |
International Journal of Computers and Applications |
- |
Q1 |
- |
2012 |
Ajay Guleria, Narottam Chand, Mohinder Kumar, Lalit Awasthi |
Request Analysis and Dynamic Queuing System for VANETs |
International Journal of Advanced Computer Science and Applications |
- |
Q1 |
- |
2012 |
Ashok Kumar Nanda, Lalit Kumar Awasthi |
Secure SMS Encryption Using NTRU Cryptosystem. |
Journal of Information Assurance & Security |
- |
Q1 |
- |
2012 |
Ashok Kumar Nanda, LK Awasthi |
SMS security using ntru cryptosystem for m-commerce |
Research Scholar, CSE Department National Institute of Technology |
- |
Q1 |
- |
2012 |
Rajesh Sharma, Lalit Kumar Awasthi |
A log-based recovery protocol for mobile distributed computing systems |
Journal of Bioinformatics and Intelligent Control |
- |
Q1 |
- |
2012 |
Naveen Chauhan, LK Awasthi |
Prefetching based Cooperative Caching in Mobile Adhoc Networks |
International Conference on Emerging Trends in Computer and Electronics Engineering (ICETCEE‟ 2012) |
- |
Q1 |
- |
2012 |
Ashok Kumar Nanda, Lalit Kumar Awasthi |
XTR Cryptosystem for SMS security |
International Journal of Engineering and Technology |
- |
Q1 |
- |
2012 |
Ravi Kant Sahu, Abhishek Mohta, LK Awasthi |
Energy-efficient grid-based data dissemination in wireless sensor networks |
IJCA Proceedings on International Conference on Recent Advances and Future Trends in Information Technology (iRAFIT 2012), iRAFIT (7) |
- |
Q1 |
- |
2012 |
Naveen Chauhan, LK Awasthi, Narottam Chand |
Cluster based efficient caching technique for wireless sensor networks |
International Conference on Latest Computational Technologies |
- |
Q1 |
- |
2012 |
Naveen Chauhan, LK Awasthi, Narottam Chand |
Cluster based efficient caching technique for wireless sensor networks |
International Conference on Latest Computational Technologies |
- |
Q1 |
- |
2012 |
Manju Bala, Lalit Awasthi |
On proficiency of HEED protocol with heterogeneity for wireless sensor networks with BS and nodes mobility |
energy |
- |
Q1 |
- |
2012 |
Manju Bala, Lalit Awasthi |
Proficient D-HEED Protocol for Maximizing the Lifetime of WSN and Comparative Performance Investigations with Various Deployment Strategies |
International Journal of Advanced Science and Technology |
- |
Q1 |
- |
2012 |
Manju Bala, Lalit Awasthi |
Proficient D-SEP protocol with heterogeneity for maximizing the lifetime of wireless sensor networks |
International Journal of Intelligent systems and applications |
- |
Q1 |
- |
2012 |
Abhishek Mohta, Lalit Kumar Awasti |
Cloud data security while using third party auditor |
International Journal of Scientific & Engineering Research |
- |
Q1 |
- |
2012 |
Abhishek Mohta, Ravi Kant Sahu, Lalit Kumar Awasthi |
Robust data security for cloud while using third party auditor |
International journal of advanced research in computer science and software engineering |
- |
Q1 |
- |
2013 |
Anurag Singh, Narottam Chand, Lalit Kr Awasthi |
Cache invalidation for location dependent and independent data in IVANETs |
International Conference on Advances in Computing and Communications |
- |
Q1 |
- |
2013 |
Ankur Gupta, Lalit K Awasthi |
Peer enterprises: design and implementation of a cross-organisational peer-to-peer framework |
International Journal of Communication Networks and Distributed Systems |
- |
Q1 |
- |
2014 |
Brij Bihari Dubey, Naveen Chauhan, Narottam Chand, Lalit Kr Awasthi |
NRNDD: Nearest Relay Node based Data Dissemination Technique for VANETs |
Proceedings of the 2014 International Conference on Information and Communication Technology for Competitive Strategies |
- |
Q1 |
- |
2014 |
Siddhartha Chauhan, Lalit Kumar Awasthi |
An energy efficient cycle stealing algorithm for best effort services in wireless sensor networks |
International Journal of Communication Networks and Distributed Systems |
- |
Q1 |
- |
2014 |
Prashant Kumar, Naveen Chauhan, Lalit Kumar Awasthi, Narottam Chand |
Cooperative cache replacement policy for MANETs |
International Journal of Advanced Pervasive and Ubiquitous Computing (IJAPUC) |
- |
Q1 |
- |
2014 |
Lalit K Awasthi, Manoj Misra, Ramesh Chandra Joshi |
Minimum mutable checkpoint-based coordinated checkpointing protocol for mobile distributed systems |
International Journal of Communication Networks and Distributed Systems |
- |
Q1 |
- |
2014 |
Lalit K Awasthi, Manoj Misra, Ramesh Chandra Joshi |
Minimum mutable checkpoint-based coordinated checkpointing protocol for mobile distributed systems |
Lalit K Awasthi, Manoj Misra, Ramesh Chandra Joshi |
- |
Q1 |
- |
2015 |
Brij Bihari Dubey, Naveen Chauhan, Narottam Chand, Lalit Kumar Awasthi |
Analyzing and reducing impact of dynamic obstacles in vehicular ad-hoc networks |
Wireless Networks |
- |
Q1 |
- |
2015 |
Rakesh Nayak, Ashok Kumar Nanda, Lalit Kumar Awasthi, L Kumar |
Multiple private keys with NTRU cryptosystem |
International Journal of Research in Computer and Communication Technology |
- |
Q1 |
- |
2016 |
Rajesh Sharma, Lalit Kumar Awasthi, Naveen Chauhan |
An Alpha-Shapes based Technique for Detecting Boundaries of a Wireless Sensor Network |
IJCA Proceedings on Recent Innovations in Computer Science and Information Technology |
- |
Q1 |
- |
2016 |
Rajesh Sharma, Lalit Kumar Awasthi, Naveen Chauhan |
Minimal marking of trap-regions for efficient greedy forwarding in wsns |
International Journal of Next-Generation Computing |
- |
Q1 |
- |
2016 |
Brij Bihari Dubey, Naveen Chauhan, Narottam Chand, Lalit Kumar Awasthi |
Priority based efficient data scheduling technique for VANETs |
Wireless Networks |
- |
Q1 |
- |
2017 |
Brij Bihari Dubey, Naveen Chauhan, Narottam Chand, Lalit Kumar Awasthi |
Incentive based scheme for improving data availability in vehicular ad-hoc networks |
Wireless Networks |
- |
Q1 |
- |
2018 |
Prashant Kumar, Naveen Chauhan, Narottam Chand, Lalit K Awasthi |
SF-APP: A Secure Framework for Authentication and Privacy Preservation in Opportunistic Networks |
International Journal of Web Services Research (IJWSR) |
- |
Q1 |
- |
2018 |
Anita Choudhary, Mahesh Chandra Govil, Girdhari Singh, Lalit K Awasthi, ES Pilli |
Task clustering-based Energy-aware Workflow Scheduling in Cloud environment |
2018 IEEE 20th International Conference on High Performance Computing and Communications; IEEE 16th International Conference on Smart City; IEEE 4th International Conference on Data Science and Systems (HPCC/SmartCity/DSS) |
- |
Q1 |
- |
2018 |
Urvashi Garg, Geeta Sikka, Lalit K Awasthi |
Empirical analysis of attack graphs for mitigating critical paths and vulnerabilities |
Computers & Security |
- |
Q1 |
- |
2019 |
Anita Choudhary, Mahesh Chandra Govil, Girdhari Singh, Lalit K Awasthi, Emmanuel S Pilli |
Energy-efficient fuzzy-based approach for dynamic virtual machine consolidation |
International Journal of Grid and Utility Computing |
- |
Q1 |
- |
2019 |
Amit Nayyer, Aman Kumar Sharma, Lalit Kumar Awasthi |
Laman: A supervisor controller based scalable framework for software defined networks |
Computer Networks |
- |
Q1 |
- |
2020 |
Amit Nayyer, Aman Kumar Sharma, Lalit Kumar Awasthi |
Game Theory-based Routing for Software-Defined Networks |
IJRASET, XII (8)(2020) |
- |
Q1 |
- |
2020 |
LALIT K AWASTHI, NEW DELHI |
Building Agile and Evolving Higher Education Institutions |
REIMAGINING INDIAN UNIVERSITIES |
- |
Q1 |
- |
2020 |
Abhilasha Sharma, Lalit Kumar Awasthi |
AdPS: Adaptive Priority Scheduling for Data Services in Heterogeneous Vehicular Networks |
Computer Communications |
- |
Q1 |
- |
2020 |
Neha Agarwal, Geeta Sikka, Lalit Kumar Awasthi |
Evaluation of web service clustering using Dirichlet Multinomial Mixture model based approach for Dimensionality Reduction in service representation |
Information Processing & Management |
- |
Q1 |
- |
2020 |
Neha Agarwal, Geeta Sikka, Lalit Kumar Awasthi |
Enhancing web service clustering using Length Feature Weight Method for service description document vector space representation |
Expert Systems with Applications |
- |
Q1 |
- |
2020 |
Satnam Kaur, Lalit K Awasthi, AL Sangal |
HMOSHSSA: a hybrid meta-heuristic approach for solving constrained optimization problems |
Engineering with Computers |
- |
Q1 |
- |
2020 |
Satnam Kaur, Lalit K Awasthi, AL Sangal, Gaurav Dhiman |
Tunicate Swarm Algorithm: A new bio-inspired based metaheuristic paradigm for global optimization |
Engineering Applications of Artificial Intelligence |
- |
Q1 |
- |
2021 |
Urvashi Garg, Geeta Sikka, Lalit K Awasthi |
Empirical risk assessment of attack graphs using time to compromise framework |
International Journal of Information and Computer Security |
- |
Q1 |
- |
2021 |
Urvashi Garg, Geeta Sikka, Lalit K Awasthi |
An ensemble approach for optimization of penetration layout in wide area networks |
Computer Communications |
- |
Q1 |
- |
2021 |
Rohit Singh, Lalit Kumar Awasthi, KP Sharma |
Distributed denial-of-service attacks and mitigation in wireless sensor networks |
Distributed Denial of Service Attacks: Concepts, Mathematical and Cryptographic Solutions |
- |
Q1 |
- |
2021 |
Prashant Kumar, Naveen Chauhan, Mohit Kumar, Lalit K Awasthi |
Clustering based opportunistic traffic offloading technique for device-to-device communication |
International Journal of System Assurance Engineering and Management |
- |
Q1 |
- |
2021 |
Abhilasha Sharma, Lalit Kumar Awasthi |
Pr-CAI: Priority based-Context Aware Information scheduling for SDN-based vehicular network |
Computer Networks |
- |
Q1 |
- |
2021 |
Amit Nayyer, Aman Kumar Sharma, Lalit Kumar Awasthi |
Learning-based hybrid routing for scalability in software defined networks |
Computer Networks |
- |
Q1 |
- |
2021 |
Satnam Kaur, Lalit K Awasthi, Amrit L Sangal |
A Review on Software Refactoring Opportunity Identification and Sequencing in Object-oriented Software |
Recent Advances in Electrical & Electronic Engineering (Formerly Recent Patents on Electrical & Electronic Engineering) |
- |
Q1 |
- |
2021 |
Samayveer Singh, Aridaman Singh Nandan, Aruna Malik, Rajeev Kumar, Lalit K Awasthi, Neeraj Kumar |
A GA-Based Sustainable and Secure Green Data Communication Method Using IoT-Enabled WSN in Healthcare |
IEEE Internet of Things Journal |
- |
Q1 |
- |
2021 |
Aridaman Singh Nandan, Samayveer Singh, Lalit K Awasthi |
An efficient cluster head election based on optimized genetic algorithm for movable sinks in IoT enabled HWSNs |
Applied Soft Computing |
- |
Q1 |
- |
2022 |
Abhilasha Sharma, Lalit Kumar Awasthi |
Ob-EID: Obstacle aware event information dissemination for SDN enabled vehicular network |
Computer Networks |
- |
Q1 |
- |
2022 |
Nishant Sharma, Naveen Chauhan, Narottam Chand, Lalit Kumar Awasthi |
Secure authentication and session key management scheme for Internet of Vehicles |
Transactions on Emerging Telecommunications Technologies |
- |
Q1 |
- |
2022 |
Himanshu Verma, Naveen Chauhan, Narottam Chand, Lalit Kumar Awasthi |
Buffer-loss estimation to address congestion in 6LoWPAN based resource-restricted ‘Internet of Healthcare Things’ network |
Computer Communications |
- |
Q1 |
- |
2022 |
Mamta Nain, Nitin Goyal, Lalit Kumar Awasthi, Amita Malik |
A range based node localization scheme with hybrid optimization for underwater wireless sensor network |
International Journal of Communication Systems |
- |
Q1 |
- |
2022 |
Nitin Goyal, Ashok Kumar, Renu Popli, Lalit Kumar Awasthi, Nonita Sharma, Gaurav Sharma |
Priority based data gathering using multiple mobile sinks in cluster based UWSNs for oil pipeline leakage detection |
Cluster Computing |
- |
Q1 |
- |