Aumreesh Kumar Saxena

Aumreesh Kumar Saxena
Sagar Institute of Research and Technology | SIRT · CSE

About

18
Publications
4,435
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
262
Citations

Publications

Publications (18)
Article
The electroencephalography (EEG) signal is corrupted with some non-cerebral activities due to patient movement during signal measurement. These non-cerebral activities are termed as artifacts, which may diminish the superiority of acquired EEG signal statistics. The state of the art artifact elimination approaches applied canonical correlation anal...
Article
To enhance the ability of intrusion detection system (IDS) with detection accuracy and low false positive rate, artificial immune system (AIS) based multi agent IDS is proposed that is inspired by human immune system (HIS). Presented IDS is designed four new algorithms these are mobile agent cloning algorithm, attribute selection algorithm based on...
Article
Full-text available
Mobile ad hoc networks (MANET) is the most useful network in present and it is used in many application. In the MANET prevention concept is not sufficient from the security point of view, so the detection concept is added. Intrusion Detection System (IDS) is another concept to provide security in the network. Basically IDS is used to identify selfi...
Chapter
Full-text available
MANAT is uniquely named framework which is not completely established, so they rely upon their neighbors to hand-off message. The node can move freely around the network. Unlike wired frameworks, there is no settled and dedicated association open between the center points. So any center point can get to any association between any center points. Pr...
Chapter
Security of information is a prime concern in today’s world, and cryptography is one of the solutions. To enlarge the authenticity and confidentiality of the data, there is a continuous development in cryptography with higher efficiency. With this continuation, we propose 16-byte block cipher symmetric key cryptography algorithm which is suitable f...
Chapter
Images are used to understand better and efficient services in many fields like crime prevention, government, hospitals, fashion and graphics, journalism. The popularity of the entire digital image tends to the huge amount of digital data in image database. It is difficult for the system to retrieve and search the query image from the large amount...
Article
Full-text available
The extensive access of network interaction has made present networks more responsive to earlier intrusions. In distributed network intrusions, there are many computing nodes that are assisted by intruders. The evidence of intrusions is to be associated from all the held up nodes. From the last few years, mobile agent based technique in intrusion d...

Network

Cited By