Security algorithms for cloud computing A Bhardwaj, GVB Subrahmanyam, V Avasthi, H Sastry Procedia Computer Science 85, 535-542, 2016 | 152 | 2016 |
Ransomware digital extortion: a rising new age threat A Bhardwaj, V Avasthi, H Sastry, GVB Subrahmanyam Indian Journal of Science and Technology, 2016 | 80 | 2016 |
Impact of social networking on Indian youth-A survey A Bhardwaj, V Avasthi, S Goundar International Journal of Electronics and Information Engineering 7 (1), 41-51, 2017 | 47 | 2017 |
Design of high-speed, low-power non-volatile master slave flip flop (NVMSFF) for memory registers designs KA Muthappa, ASA Nisha, R Shastri, V Avasthi, PCS Reddy Applied Nanoscience 13 (8), 5369-5378, 2023 | 45 | 2023 |
DDoS attacks, new DDoS taxonomy and mitigation solutions—A survey A Bhardwaj, GVB Subrahmanyam, V Avasthi, H Sastry, S Goundar 2016 International Conference on Signal Processing, Communication, Power and …, 2016 | 37 | 2016 |
Cyber security attacks on robotic platforms A Bhardwaj, V Avasthi, S Goundar Network Security 2019 (10), 13-19, 2019 | 31 | 2019 |
Review of solutions for securing end user data over cloud applications A Bhardwaj, GVB Subramanyam, V Avasthi, H Sastry International Journal of Advanced Computer Research 6 (27), 222, 2016 | 13 | 2016 |
Solutions for DDoS attacks on cloud A Bhardwaj, GVB Subrahmanyam, V Avasthi, HG Sastry 2016 6th International Conference-Cloud System and Big Data Engineering …, 2016 | 11 | 2016 |
A hybrid edge detection mechanism based on edge preserving filtration and type-1 fuzzy logic R Ranjan, V Avasthi International Journal of Information Technology 14 (6), 2991-3000, 2022 | 9 | 2022 |
Exploring 3d network-on-chip architectures and challenges S Tyagi, P Maheshwari, A Agarwal, V Avasthi 2017 International Conference on Computer and Applications (ICCA), 97-101, 2017 | 9 | 2017 |
Design a resilient network infrastructure security policy framework A Bhardwaj, GVB Subrahmanyam, V Avasthi, H Sastry Indian Journal of Science and Technology, 2016 | 9 | 2016 |
Edge Detection Using Guided Sobel Image Filtering R Ranjan, V Avasthi Wireless Personal Communications 132 (1), 651-677, 2023 | 6 | 2023 |
Enhanced edge detection technique in digital images using optimised fuzzy operation R Ranjan, V Avasthi Webology 19 (1), 5402-5416, 2022 | 6 | 2022 |
Three tier network architecture to mitigate ddos attacks on hybrid cloud environments A Bhardwaj, GVB Subrahmanyam, V Avasthi, H Sastry Proceedings of the Second International Conference on Information and …, 2016 | 5 | 2016 |
The evolution of knowledge in communities of practice V Avasthi, S Dey, KK Jain, R Mishra Proceedings of the 2015 Conference on research in adaptive and convergent …, 2015 | 5 | 2015 |
Deep convolutional neural network for partial discharge monitoring system R Srivastava, V Avasthi Advances in Engineering Software 180, 103407, 2023 | 4 | 2023 |
Person identification using electrocardiogram and deep long short term memory PK Gupta, V Avasthi International Journal of Information Technology 15 (3), 1709-1717, 2023 | 3 | 2023 |
Scrutinizing Lean Thinking and Agile Methodologies from Practitioner’ s Point of View S Kaushik, V Avasthi, A Bharadwaj Indian Journal of Science and Technology, 2016 | 3 | 2016 |
Lightweight authentication scheme based on modified EAP security for CoAP protocol-based IoMT applications PS Salankar, V Avasthi, A Pasricha International Journal of Information and Computer Security 20 (1-2), 176-198, 2023 | 2 | 2023 |
Fuzzy based image edge detection using improved cuckoo search optimization algorithms R Ranjan, V Avasthi 2022 2nd International Conference on Emerging Frontiers in Electrical and …, 2022 | 2 | 2022 |