Logo


Dr. Ashish Kumar Srivastava

Qualification : Ph.D.

Course Specialization Group College Name/University Year of Passing
Ph.D. Information Technology Information Technology Maulana Azad National Institute of Technology, Bhopal 2013
M.Tech. Information Technology Information Technology Department of Information Technology, Tezpur Central University Tezpur Assam. 2002
B.E. Electrical & Electronics Engineering Electrical & Electronics Engineering Sri Rama Krishna Engineering College Coimbatore under Bharatiar University Coimbatore Tamil Nadu. 2000

My Publications

S.No Title of the Paper Full Details of Journal Name / Conference Name, Volume number, page number, Date
1 Extraction of reordering rules for statistical machine translation Accepted for publication in Journal of Intelligent and Fuzzy Systems SCI, SCOPUS with (IF-1.426). Year 2017
2 “A Remote Health Monitoring System for Elderly Living in Old Age home” Published in International Journal of Advance Engineering and Research Development(IJAERD), volume 04, Issue 04, April-2017 Year 2016
3 “An Augmentation Of Tcp For Competency Enlargement In MANET” Published in International Journal Of Current Engineering And Scientific Research, ISSN (Print): 2393-8374, (Online): 2394-0697, Volume-3, Issue-2, 2016, pg. no1-9. Year 2015
4 “A Survey of Efficient Load Balancing Technique in Cloud Computing” CiiT International Journal of Networking and Communication Engineering, Vol. 7, No. 1, ISSN No:0974-9616, Jan 2015. Year 2014
5 “Wimax Call admission control protocols: A survey” vol 4,issue 3,ISSN No. 2231-4946, International Journal of Computer Applications in Engineering Sciences(IJCAES), Vol 4, Issue 3, ISSN No. 2231-4946 Dec 2014.
6 “Android Malware Detection Using SVM and GA” published in International Journal of Advanced Research in Computer Science and Software Engineering Volume 4, Issue 5, May 2014 ISSN: 2277 128X Year 2013
7 “Study of Wormhole Attack in Mobile Ad-Hoc Network” International Journal of Computer Applications, ISSN No.0975 – 8887) Volume 73– No.12, pp. 32-37, July 2013.
8 “Implementation of RI MAC Protocol for Broadcast Problem in Wireless Sensor Network” International Journal of Advances in Electrical and Electronics Engineering, Vol.2, No.1, 2013 Pp.137-142.
9 Article: Study of Wormhole Attack in Mobile Ad-Hoc Network. International Journal of Computer Applications 73(12):32-37, July 2013. Published by Foundation of Computer Science, New York, USA
10 Article: A Review of Worm Hole over Mobile Ad Hoc Network. International Journal of Computer Applications 71(3):23-26, June 2013. Published by Foundation of Computer Science, New York, USA.
11 Article: Review on Classification of Web Log Data using CART Algorithm. International Journal of Computer Applications 80(17):41-43, October 2013. Published by Foundation of Computer Science, New York, USA.
12 Article: Improvising Performance with Security of AODV Routing Protocol for MANETs. International Journal of Computer Applications 78(11):30-36, September 2013. Published by Foundation of Computer Science, New York, USA.
13 Article: A Survey on Authentication Mechanism against SQL Injection in XML. International Journal of Computer Applications 78(7):22-25, September 2013. Published by Foundation of Computer Science, New York, USA Year 2011
14 “Security solution for WSN using Mobile agent Technology,” International Journal of Computer Trends and Technology, issue1, vol.2, pp.1-5, Sep-Oct 2011. Year 2010
15 “Key Management Scheme with Secure Routing for WSN,” International Journal of Intelligent Information Processing, Serials Publications, vol.2, pp1585-1589, December 2010.
16 “Secure Mobile agent based Information gathering in wireless network,” International Journal on Computer Science and Engineering, vol.02, no.05, pp1685-1689, 2010. Cited by 02
17 “Wireless sensor networks: A survey of Intrusions and their Explored remedies,” International Journal of Engineering Science and Technology, vol. 2, Issue 5, ISSN: 0975-5462, pp962-969, Jun2010. Cited by 10
18 “A collaborative model for Data Privacy and its Legal Enforcement”, International Journal of Computer Science and Information Security ISSN-19475500, April2010, vol.18, no.1, pp. 176-182. Cited by 02
19 “Cross level DDoS defence System” Published in IEEE WiSPNET 2017 Conference Chennai, PP.1875-1879.
20 “An Augmentation Of Tcp For Competency Enlargement In Manet” published in proceedings of Futuristic Trends in Engineering, Science, Humanities, and Technology (FTESHT-16), ISSN (PRINT): 2393-8374, (ONLINE): 2394-0697, VOLUME-3, ISSUE-2, 2016.
21 “Simulation Based Study of Gray Hole Attack in MANET”, Accepted for Publication in Proceedings of the 10th INDIACom; INDIACom-2016 3rd 2016 International Conference on “Computing for Sustainable Global Development”, Supported by IET and CSI Delhi Chapter and CSI 16th – 18th March, 2016, Bharati Vidyapeeth’s Institute of Computer Applications and Management (BVICAM), New Delhi (INDIA) Year 2015
22 “A Multipath Routing Protocol for Cognitive Radio AdHoc Networks (CRAHNs)”, International Conference on Advances in Computing, Communications and Informatics, ICACCI 2015,10-13 Aug 2015, Kochi, Kerala. (DOI: 10.1109/ICACCI.2015.7275905) Year 2014
23 “A Stable Route Selection Algorithm for Cognitive Radio Networks”, International Conference on Advances in Computing, Communications and Informatics, ICACCI 2014,24-27 Dec 2014, New Delhi. (DOI:10.1109/ICACCI.2014.6968260)
24 “A SINR based Clustering Protocol for Cognitive Radio AdHoc Networks (CRAHN)”, 14th IEEE ICIT 2014, Bhubaneshwar.(DOI:10.1109/ICIT.2014.76)
25 “An energy efficient framework for detection and monitoring of forest fire using mobile agents in wireless sensor networks” IEEE ICCIC 2014, ISSN No.978-1-4799-3975-6, Dec 2014.
26 “Implementation of RIMAC protocol over MAC Protocol for WSN”, IEEE International Conference on Advance Research in Engineering and Technology(IEEE ICARET-2013), organized by K.L University, Vaddeswaran, Guntur, Andra Pradesh, India, 8th & 9th Feb2013.
27 “Improvising the performance with security of AODV routing protocol in MANETs” IEEE Conference Engineering NUiCONE), 2013 Nirma University Ahmedabad on 28-30 Nov. 2013 pp.1 – 6, ISBN: 978-1-4799-0726-7.
28 “An Energy Efficient: RI MAC Protocol implementation over MAC Protocol for Wireless Sensor” Fourth International Conference on Recent Trends in Information, Telecommunication and Computing – ITC 2013, held during Aug 01-02, 2013, Chandigarh , India. ITC 2013, Year 2011
29 “MASAP: Mobile Agent Spam Attack Prevention for WSN Environment,” International Conference on Computational Intelligence and Information Technology, Pune, India, 2011© Springer LNCS, vol.250, part 2, pp.450-452.
30 “INSPIRE: Integrated Network Security Policies in Routers for Enterprises,” International Conference on Computer Engineering and Technology (ICCET), organized by International Association of Computer Science and Information Technology (IACSIT) and University Putra Malaysia, June 17-19, 2011.
31 “DRISHTI: A Real World Vision for Visually. Impaired People using Mobile Agent in WSN”, Second AMA-IEEE Medical Technology Conference in Boston, MA, on October 16-18, 2011 at the Park Plaza Hotel and Towers. Year 2010
32 “Enhancing the Efficiency of IDS System with Honey pot Placement in Network Architecture,” 1st International conference on Management of Technology and Information Security, IIIT- Allahabad, in collaboration with Carnegie Mellon University, Pittsburgh, USA, 21st -24th Jan 2010. Year 2009
33 “Localization in Wireless Sensor Networks using Directional Antenna,” Advance Computing Conference, IACC, Thapar University Patiala, 6-7March, 2009 © IEEE Xplore, doi:978-1-4244-2928-8/09/$25.00.
34 “Acquisition of Vehicle Diagnostic Data using Wireless Sensor Network,” international conference on Wireless Communication and Sensor Networks (WCSN), 15-19Dec, IIIT-Allahabad, 2009 © IEEE Xplore, doi:978-1-4244-5875-2/09/$26.00.