default search action
Sarsij Tripathi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j22]Sanjay Gupta, Sarsij Tripathi:
A comprehensive survey on cloud computing scheduling techniques. Multim. Tools Appl. 83(18): 53581-53634 (2024) - [j21]Anurag Shukla, Sarsij Tripathi, Mohit Sajwan, Deepak Singh:
SEE2PK: Secure and energy efficient protocol based on pairwise key for hierarchical wireless sensor network. Peer Peer Netw. Appl. 17(2): 701-721 (2024) - 2023
- [j20]Ankit Agrawal, Sarsij Tripathi, Manu Vardhan:
Multicore based least confidence query sampling strategy to speed up active learning approach for named entity recognition. Computing 105(5): 979-997 (2023) - [j19]Riju Bhattacharya, Naresh Kumar Nagwani, Sarsij Tripathi:
A hybrid approach for predicting missing follower-followee links in social networks using topological features with ensemble learning. Data Technol. Appl. 57(1): 131-153 (2023) - [j18]Riju Bhattacharya, Naresh Kumar Nagwani, Sarsij Tripathi:
CommunityGCN: community detection using node classification with graph convolution network. Data Technol. Appl. 57(4): 580-604 (2023) - [j17]Mohd Aqib, Dinesh Kumar, Sarsij Tripathi:
Machine Learning for Fog Computing: Review, Opportunities and a Fog Application Classifier and Scheduler. Wirel. Pers. Commun. 129(2): 853-880 (2023) - 2021
- [j16]Shubhra Dwivedi, Manu Vardhan, Sarsij Tripathi:
Building an efficient intrusion detection system using grasshopper optimization algorithm for anomaly detection. Clust. Comput. 24(3): 1881-1900 (2021) - [j15]Ankit Agrawal, Sarsij Tripathi:
Particle swarm optimization with adaptive inertia weight based on cumulative binomial probability. Evol. Intell. 14(2): 305-313 (2021) - [j14]Ankit Agrawal, Sarsij Tripathi, Manu Vardhan:
Uncertainty query sampling strategies for active learning of named entity recognition task. Intell. Decis. Technol. 15(1): 99-114 (2021) - [j13]Riju Bhattacharya, Naresh Kumar Nagwani, Sarsij Tripathi:
A Comparative Study of Graph Kernels and Clustering Algorithms. Int. J. Multim. Data Eng. Manag. 12(1): 33-48 (2021) - [j12]Ankit Agrawal, Sarsij Tripathi, Manu Vardhan:
Active learning approach using a modified least confidence sampling strategy for named entity recognition. Prog. Artif. Intell. 10(2): 113-128 (2021) - [j11]Shubhra Dwivedi, Manu Vardhan, Sarsij Tripathi:
Multi-Parallel Adaptive Grasshopper Optimization Technique for Detecting Anonymous Attacks in Wireless Networks. Wirel. Pers. Commun. 119(3): 2787-2816 (2021) - 2020
- [j10]Shubhra Dwivedi, Manu Vardhan, Sarsij Tripathi:
Distributed Denial-of-Service Prediction on IoT Framework by Learning Techniques. Open Comput. Sci. 10(1): 220-230 (2020) - [j9]Shubhra Dwivedi, Manu Vardhan, Sarsij Tripathi:
An effect of chaos grasshopper optimization algorithm for protection of network infrastructure. Comput. Networks 176: 107251 (2020) - [j8]Shubhra Dwivedi, Manu Vardhan, Sarsij Tripathi, Alok Kumar Shukla:
Implementation of adaptive scheme in evolutionary technique for anomaly-based intrusion detection. Evol. Intell. 13(1): 103-117 (2020) - [j7]Shubhra Dwivedi, Manu Vardhan, Sarsij Tripathi:
Incorporating evolutionary computation for securing wireless network against cyberthreats. J. Supercomput. 76(11): 8691-8728 (2020) - [j6]Anurag Shukla, Sarsij Tripathi:
A multi-tier based clustering framework for scalable and energy efficient WSN-assisted IoT network. Wirel. Networks 26(5): 3471-3493 (2020) - [j5]Anurag Shukla, Sarsij Tripathi:
An Effective Relay Node Selection Technique for Energy Efficient WSN-Assisted IoT. Wirel. Pers. Commun. 112(4): 2611-2641 (2020)
2010 – 2019
- 2019
- [j4]Anurag Shukla, Sarsij Tripathi:
A Matrix-Based Pair-Wise Key Establishment for Secure and Energy Efficient WSN-Assisted IoT. Int. J. Inf. Secur. Priv. 13(3): 91-105 (2019) - [c3]Pavan Kumar Mishra, Ashish Kumar Mishra, Sarsij Tripathi:
Relay Selection Scheme for Dynamic Network Scenario in Multi-hop D2D Communication. ICCCS 2019: 538-542 - 2018
- [j3]Anurag Shukla, Sarsij Tripathi:
An optimal relay node selection technique to support green internet of things. J. Intell. Fuzzy Syst. 35(2): 1301-1314 (2018) - 2013
- [c2]Rudra Pratap Ojha, Rama Shankar Yadav, Sarsij Tripathi:
Secure Real Time Scheduling on Cluster with Energy Minimization. QSHINE 2013: 904-914 - 2011
- [j2]Sarsij Tripathi, Rama Shankar Yadav, Ranvijay, Rajib L. Jana:
Resource Management in Real Time Distributed System with Security Constraints: A Review. Int. J. Distributed Syst. Technol. 2(2): 38-58 (2011) - [j1]Arun Prakash, Sarsij Tripathi, Rajesh Verma, Neeraj Tyagi, Rajeev Tripathi, Kshirasagar Naik:
Vehicle assisted cross-layer handover scheme in NEMO-based VANETs (VANEMO). Int. J. Internet Protoc. Technol. 6(1/2): 83-95 (2011) - 2010
- [c1]Arun Prakash, Sarsij Tripathi, Rajesh Verma, Neeraj Tyagi, Rajeev Tripathi, Kshirasagar Naik:
A Cross Layer Seamless Handover Scheme in IEEE 802.11p Based Vehicular Networks. IC3 (2) 2010: 84-95
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-05-21 21:30 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint