Web mining: Today and tomorrow K Sharma, G Shrivastava, V Kumar 2011 3rd International Conference on Electronics Computer Technology 1, 399-403, 2011 | 157 | 2011 |
Cryptocurrencies and Blockchain Technology Applications G Shrivastava, DN Le, K Sharma John Wiley & Sons, 2020 | 41* | 2020 |
Big data analysis and compression for indoor air quality K Sansanwal, G Shrivastava, R Anand, K Sharma Handbook of IoT and Big Data, 1-21, 2019 | 41 | 2019 |
Towards Privacy Risk Analysis in Android Applications Using Machine Learning Approaches K Sharma, BB Gupta International Journal of E-Services and Mobile Applications (IJESMA) 11 (2 …, 2019 | 36 | 2019 |
Mitigation and risk factor analysis of android applications K Sharma, BB Gupta Computers & Electrical Engineering 71, 416-430, 2018 | 35 | 2018 |
Role of Cyber Security and Cyber Forensics in India G Shrivastava, K Sharma, M Khari, SE Zohora Handbook of Research on Network Forensics and Analysis Techniques, 143-161, 2018 | 31 | 2018 |
Multi-layer Defense against Malware Attacks on Smartphone Wi-Fi Access Channel K Sharma, BB Gupta Procedia Computer Science 78, 19-25, 2016 | 29 | 2016 |
Forensic Computing Models: Technical Overview G Shrivastava, K Sharma, A Dwivedi CCSEA, SEA, CLOUD, DKMP, CS & IT 5, 207-216, 2012 | 29 | 2012 |
Effect of Quarantine and Recovery on Infectious Nodes in Wireless Sensor Network PK Srivastava, RP Ojha, K Sharma, S Awasthi, G Sanyal International Journal of Sensors Wireless Communications and Control 8 (1 …, 2018 | 28 | 2018 |
Design and Analysis of Modified SIQRS Model for Performance Study of Wireless Sensor Network RP Ojha, G Sanyal, PK Srivastava, K Sharma Scalable Computing: Practice and Experience 18 (3), 229-242, 2017 | 28 | 2017 |
Public key infrastructure and trust of Web based knowledge discovery K Sharma, G Shrivastava International Journal of Engineering, Sciences and Management (IJESM) 4 (1 …, 2014 | 27 | 2014 |
Forensic investigation in cloud computing environment A Saxena, G Shrivastava, K Sharma The International Journal of forensic computer science 2, 64-74, 2012 | 27 | 2012 |
The Detection & Defense of DoS & DDos Attack: A Technical Overview G Shrivastava, K Sharma, S Rai Proceeding of International Conference in Computing, 274-282, 2010 | 27 | 2010 |
Smartphone Triggered Security Challenges ‐ Issues, Case Studies and Prevention SR Srivastava, S Dube, G Shrivastava, K Sharma Cyber Security in Parallel and Distributed Computing: Concepts, Techniques …, 2019 | 25 | 2019 |
Taxonomy of Distributed Denial of Service (DDoS) Attacks and Defense Mechanisms in Present Era of Smartphone Devices K Sharma, BB Gupta International Journal of E-Services and Mobile Applications (IJESMA) 10 (2 …, 2018 | 25 | 2018 |
Denial-of-Service (DoS) Attack and Botnet: Network Analysis, Research Tactics, and Mitigation A Arora, SK Yadav, K Sharma Handbook of Research on Network Forensics and Analysis Techniques, 117-141, 2018 | 23 | 2018 |
Cross-Layer Based Intrusion Detection and Prevention for Network R Kumari, K Sharma Handbook of Research on Network Forensics and Analysis Techniques, 38-56, 2018 | 22 | 2018 |
Attack in smartphone wi-fi access channel: State of the art, current issues, and challenges K Sharma, BB Gupta Next-Generation Networks: Proceedings of CSI-2015, 555-561, 2018 | 21 | 2018 |
A new framework semantic web technology based e-learning G Shrivastava, K Sharma, A Bawankan 2012 11th International Conference on Environment and Electrical Engineering …, 2012 | 19 | 2012 |
Network Forensics: Today and Tomorrow G Shrivastava, K Sharma, R Kumari 10th INDIACom; 3rd 2016 International Conference as INDIACom-2016, 5752-5756, 2016 | 18 | 2016 |