Predictive methods for improved vehicular WiFi access P Deshpande, A Kashyap, C Sung, SR Das Proceedings of the 7th international conference on Mobile systems …, 2009 | 215 | 2009 |
Design and evaluation of imesh: an infrastructure-mode wireless mesh network V Navda, A Kashyap, SR Das Sixth IEEE International Symposium on a World of Wireless Mobile and …, 2005 | 180 | 2005 |
A measurement-based approach to modeling link capacity in 802.11-based wireless networks A Kashyap, S Ganguly, SR Das Proceedings of the 13th annual ACM international conference on Mobile …, 2007 | 175 | 2007 |
Performance optimizations for deploying voip services in mesh networks S Ganguly, V Navda, K Kim, A Kashyap, D Niculescu, R Izmailov, S Hong, ... IEEE Journal on Selected Areas in Communications 24 (11), 2147-2158, 2006 | 173 | 2006 |
I3FS: An In-Kernel Integrity Checker and Intrusion Detection File System. S Patil, A Kashyap, G Sivathanu, E Zadok LISA 4 (1), 67-78, 2004 | 141 | 2004 |
Systems and methods for protecting organizations against spear phishing attacks A Kashyap, S Shekhar US Patent 9,160,766, 2015 | 74 | 2015 |
Analyzing social and stylometric features to identify spear phishing emails P Dewan, A Kashyap, P Kumaraguru 2014 apwg symposium on electronic crime research (ecrime), 1-13, 2014 | 71 | 2014 |
VoIP on wireless meshes: Models, algorithms and evaluation A Kashyap, S Ganguly, SR Das, S Banerjee IEEE INFOCOM 2007-26th IEEE International Conference on Computer …, 2007 | 70 | 2007 |
Passive measurement of interference in wifi networks with application in misbehavior detection U Paul, A Kashyap, R Maheshwari, SR Das IEEE transactions on mobile computing 12 (3), 434-446, 2011 | 59 | 2011 |
On admission of VoIP calls over wireless mesh network H Wei, K Kim, A Kashyap, S Ganguly 2006 IEEE International Conference on Communications 5, 1990-1995, 2006 | 53 | 2006 |
An integrated approach for p2p file sharing on multi-hop wireless networks B Tang, Z Zhou, A Kashyap, T Chiueh WiMob'2005), IEEE International Conference on Wireless And Mobile Computing …, 2005 | 52 | 2005 |
Techniques for identifying suspicious applications using requested permissions A Kashyap US Patent 8,769,676, 2014 | 45 | 2014 |
Deconstructing interference relations in WiFi networks A Kashyap, U Paul, SR Das 2010 7th Annual IEEE Communications Society Conference on Sensor, Mesh and …, 2010 | 45 | 2010 |
Systems and methods for monitoring a mobile-computing device using geo-location information H Puri, A Kashyap, S Sawhney US Patent 8,111,154, 2012 | 44 | 2012 |
Are you at risk? Profiling organizations and individuals subject to targeted attacks O Thonnard, L Bilge, A Kashyap, M Lee Financial Cryptography and Data Security: 19th International Conference, FC …, 2015 | 42 | 2015 |
Measurement-based approaches for accurate simulation of 802.11-based wireless networks A Kashyap, S Ganguly, SR Das Proceedings of the 11th international symposium on modeling, analysis and …, 2008 | 34 | 2008 |
Role of text message reminder on oral hygiene maintenance of orthodontic patients GS Kumar, A Kashyap, S Raghav, R Bhardwaj, A Singh, G Guram J Contemp Dent Pract 19 (1), 98-101, 2018 | 33 | 2018 |
Systems and methods for detecting information leakage by an organizational insider KA Roundy, A Kashyap US Patent 9,652,597, 2017 | 23 | 2017 |
Systems and methods for determining a rating for an item from user reviews A Kashyap, KR Balasundaram US Patent 8,949,243, 2015 | 23 | 2015 |
Real-time video stream aggregation in wireless mesh network V Navda, A Kashyap, S Ganguly, R Izmailov 2006 IEEE 17th International Symposium on Personal, Indoor and Mobile Radio …, 2006 | 22 | 2006 |