Security algorithms for cloud computing A Bhardwaj, GVB Subrahmanyam, V Avasthi, H Sastry Procedia Computer Science 85, 535-542, 2016 | 150 | 2016 |
Ransomware digital extortion: a rising new age threat A Bhardwaj, V Avasthi, H Sastry, GVB Subrahmanyam Indian Journal of Science and Technology 9 (14), 1-5, 2016 | 82 | 2016 |
A review on VANET routing protocols and wireless standards GD Singh, R Tomar, HG Sastry, M Prateek Smart Computing and Informatics: Proceedings of the First International …, 2018 | 47 | 2018 |
DDoS attacks, new DDoS taxonomy and mitigation solutions—A survey A Bhardwaj, GVB Subrahmanyam, V Avasthi, H Sastry, S Goundar 2016 International Conference on Signal Processing, Communication, Power and …, 2016 | 39 | 2016 |
DEAL – ‘Deep Ensemble ALgorithm’ Framework for Credit Card Fraud Detection in Real-Time Data Stream with Google TensorFlow M Arya, H Sastry G Smart Science 8 (2), 71-83, 2020 | 35 | 2020 |
Ransomware: A rising threat of new age digital extortion A Bhardwaj Online banking security measures and data protection, 189-221, 2017 | 35 | 2017 |
Establishing parameters for comparative analysis of V2V communication in VANET R Tomar, HG Sastry, M Prateek Journal of Scientific & Industrial Research 79 (1), 26-29, 2022 | 30 | 2022 |
A novel approach to multicast in VANET using MQTT R Tomar, M Prateek, HG Sastry Ada User J 38 (4), 231-235, 2017 | 26 | 2017 |
Analysis of beaconing performance in IEEE 802.11 p on vehicular ad-hoc environment R Tomar, M Prateek, HG Sastry 2017 4th IEEE Uttar Pradesh Section International Conference on Electrical …, 2017 | 22 | 2017 |
A novel protocol for information dissemination in vehicular networks R Tomar, HG Sastry, M Prateek International Conference on Internet of Vehicles, 1-14, 2019 | 20 | 2019 |
Semantic Information Extraction from Multi-Corpora Using Deep Learning. S Kumar, HG Sastry, V Marriboyina, H Alshazly, SA Idris, M Verma, ... Computers, Materials & Continua 70 (3), 2022 | 15 | 2022 |
User interface design challenges for digital libraries H Sastry, G Manjunath, LC Reddy International Journal of Computer Applications 15 (6), 7-13, 2011 | 15 | 2011 |
A novel business intelligence system framework M Venkatadri, GS Hanumat, G Manjunath Universal Journal of Computer Science and Engineering Technology 1 (2), 112-116, 2010 | 15 | 2010 |
Review of solutions for securing end user data over cloud applications A Bhardwaj, GVB Subramanyam, V Avasthi, H Sastry International Journal of Advanced Computer Research 6 (27), 222, 2016 | 14 | 2016 |
A novel extra tree ensemble optimized dl framework (Eteodl) for early detection of diabetes M Arya, H Sastry G, A Motwani, S Kumar, A Zaguia Frontiers in Public Health 9, 797877, 2022 | 13 | 2022 |
User interface design principles for digital libraries HG Sastry, LC Reddy International Journal of Web Applications 1 (2), 86-91, 2009 | 13 | 2009 |
Intruder detection in VANET data streams using federated learning for smart city environments M Arya, H Sastry, BK Dewangan, MKI Rahmani, S Bhatia, AW Muzaffar, ... Electronics 12 (4), 894, 2023 | 12 | 2023 |
Solutions for DDoS attacks on cloud A Bhardwaj, GVB Subrahmanyam, V Avasthi, HG Sastry 2016 6th International Conference-Cloud System and Big Data Engineering …, 2016 | 11 | 2016 |
Significance of Web 2. 0 in Digital Libraries HG Sastry, LC Reddy International Journal on Computer Science and Engineering 2 (6), 2010 | 11 | 2010 |
A V2I based approach to multicast in vehicular networks R Tomar, HG Sastry, M Prateek Malaysian Journal of Computer Science, 93-107, 2020 | 9 | 2020 |