default search action
Teek Parval Sharma
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j20]Ishana Attri
, Lalit Kumar Awasthi
, Teek Parval Sharma
:
Machine learning in agriculture: a review of crop management applications. Multim. Tools Appl. 83(5): 12875-12915 (2024) - [j19]Vishnu Kumar Prajapati
, Teek Parval Sharma
, Lalit Kumar Awasthi:
Data Dissemination Framework for Optimizing Overhead in IoT-Enabled Systems Using Tabu-RPL. SN Comput. Sci. 5(4): 343 (2024) - [c7]Rakhi
, Teek Parval Sharma
:
A Review of Adaptive Hierarchical Data Dissemination Method in Mobile Wireless Sensor Network. ICCAE 2024: 648-652 - 2023
- [j18]Ishana Attri
, Lalit Kumar Awasthi
, Teek Parval Sharma
, Priyanka Rathee:
A review of deep learning techniques used in agriculture. Ecol. Informatics 77: 102217 (2023) - 2022
- [j17]Richa Sharma, Teek Parval Sharma
, Ajay Kumar Sharma:
Detecting and Preventing Misbehaving Intruders in the Internet of Vehicles. Int. J. Cloud Appl. Comput. 12(1): 1-21 (2022) - [j16]Richa Sharma, Teek Parval Sharma, Ajay Kumar Sharma:
Trust assessment-based stable and attack resistant grouping strategy for data dissemination in IoV. Int. J. Sens. Networks 40(3): 160-174 (2022) - 2021
- [j15]Richa Sharma, Teek Parval Sharma, Ajay Kumar Sharma:
TVDD: topology based vehicular data dissemination scheme for stability optimisation in IoV. Int. J. Sens. Networks 35(4): 243-257 (2021) - 2020
- [j14]Rishabh
, Teek Parval Sharma:
Device classification based data encryption for internet of things. Int. J. High Perform. Comput. Netw. 16(1): 36-42 (2020) - [j13]Rajeev Singh
, Sudeep Tanwar
, Teek Parval Sharma:
Utilization of blockchain for mitigating the distributed denial of service attacks. Secur. Priv. 3(3) (2020) - [p1]Richa, Teek Parval Sharma
, Ajay Kumar Sharma:
Heterogeneous-Internet of Vehicles (Het-IoV) in Twenty-First Century: A Comprehensive Study. Handbook of Computer Networks and Cyber Security 2020: 555-584 - [i1]Jaydip Sen, Sidra Mehtab, Michael Ekonde Sone, Jyothsna Veeramreddy, Koneti Munivara Prasad, Rajeev Singh, Teek Parval Sharma, Anton Noskov, Ignacio Velásquez, Angélica Caro, Alfonco Rodriguez, Tamer S. A. Fatayer, Altaf O. Mulani, Pradeep B. Mane, Roshan Chitrakar, Roshan Bhusal, Prajwol Maharjan:
Computer and Network Security. CoRR abs/2007.16147 (2020)
2010 – 2019
- 2019
- [j12]Krishna Pal Sharma, Teek Parval Sharma
:
Dynamic load tuning for energy-hole avoidance in corona model for a wireless sensor network. Int. J. Sens. Networks 30(1): 56-68 (2019) - [j11]Mohammad Ahsan
, Madhu Kumari, Teek Parval Sharma:
Rumors detection, verification and controlling mechanisms in online social networks: A survey. Online Soc. Networks Media 14 (2019) - 2017
- [j10]Krishna Pal Sharma, Teek Parval Sharma
:
Energy-hole avoidance and lifetime enhancement of a WSN through load factor. Turkish J. Electr. Eng. Comput. Sci. 25: 1375-1387 (2017) - [j9]Kulwardhan Singh, Teek Parval Sharma
:
FDR: fault detection and recovery scheme for wireless sensor networks using virtual grid. Int. J. Parallel Emergent Distributed Syst. 32(6): 617-631 (2017) - [j8]Krishna Pal Sharma, Teek Parval Sharma
:
rDFD: reactive distributed fault detection in wireless sensor networks. Wirel. Networks 23(4): 1145-1160 (2017) - [j7]Krishna Pal Sharma, Teek Parval Sharma
:
ZBFR: zone based failure recovery in WSNs by utilizing mobility and coverage overlapping. Wirel. Networks 23(7): 2263-2280 (2017) - 2016
- [j6]Krishna Pal Sharma
, Teek Parval Sharma
:
Distributed connectivity restoration in networks of movable sensor nodes. Comput. Electr. Eng. 56: 608-629 (2016) - 2015
- [j5]Rajeev Singh, Teek Parval Sharma
:
A location-based method for restricting the flooding DoS effect in WLANs. J. Locat. Based Serv. 9(4): 273-295 (2015) - [j4]Rajeev Singh, Teek Parval Sharma
:
On the IEEE 802.11i security: a denial-of-service perspective. Secur. Commun. Networks 8(7): 1378-1407 (2015) - [j3]Abhiram Singh, Teek Parval Sharma
:
Position and hop-count assisted full coverage control in dense sensor networks. Wirel. Networks 21(2): 625-638 (2015) - 2014
- [j2]Rajeev Singh, Teek Parval Sharma
:
A Key Hiding Communication Scheme for Enhancing the Wireless LAN Security. Wirel. Pers. Commun. 77(2): 1145-1165 (2014) - 2013
- [c6]Rajeev Singh, Teek Parval Sharma
:
A sequence number based WLAN authentication scheme for reducing the MIC field overhead. WOCN 2013: 1-4 - 2011
- [c5]Gopal Chand Gautam, Teek Parval Sharma
:
Energy Efficient Time Synchronization Protocol for Wireless Sensor Networks. ACC (1) 2011: 421-430 - 2010
- [j1]Teek Parval Sharma
, Ramesh C. Joshi, Manoj Misra:
Data filtering and dynamic sensing for continuous monitoring in wireless sensor networks. Int. J. Auton. Adapt. Commun. Syst. 3(3): 239-264 (2010) - [c4]Amarjeet Kaur, Teek Parval Sharma
:
AFDEP: Agreement Based CH Failure Detection and Election Protocol for a WSN. ICT 2010: 249-257
2000 – 2009
- 2008
- [c3]Nidhi Bansal, Teek Parval Sharma
, Manoj Misra, Ramesh Chandra Joshi:
FTEP: A fault tolerant election protocol for multi-level clustering in homogeneous wireless sensor networks. ICON 2008: 1-6 - [c2]Teek Parval Sharma
, Ramesh Chandra Joshi, Manoj Misra:
Dual radio based cooperative caching for wireless sensor networks. ICON 2008: 1-7 - [c1]Teek Parval Sharma
, Ramesh C. Joshi, Manoj Misra:
Tuning Data Reporting and Sensing for Continuous Monitoring in Wireless Sensor Networks. IPCCC 2008: 412-417
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-04 21:12 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint