Audit and Analysis of Impostors: An experimental approach to detect fake profile in online social network AJ Sarode, A Mishra Proceedings of the Sixth International Conference on Computer and …, 2015 | 22 | 2015 |
Relating Wiener’s cybernetics aspects and a situation awareness model implementation for information security risk management K Anjaria, A Mishra Kybernetes 47 (1), 58-79, 2018 | 18 | 2018 |
Lwr-based quantum-safe pseudo-random number generator AA Pandit, A Kumar, A Mishra Journal of Information Security and Applications 73, 103431, 2023 | 16 | 2023 |
Thread scheduling using ant colony optimization: An intelligent scheduling approach towards minimal information leakage K Anjaria, A Mishra Karbala International Journal of Modern Science 3 (4), 241-258, 2017 | 16 | 2017 |
Quantitative analysis of information leakage in service-oriented architecture-based web services K Anjaria, A Mishra Kybernetes 46 (3), 479-500, 2017 | 13 | 2017 |
Component assessment and proactive model for support of dynamic integration in self adaptive system A Mishra, AK Misra ACM SIGSOFT Software Engineering Notes 34 (4), 1-9, 2009 | 12 | 2009 |
Relating interactive system design and information theory from information leakage perspective K Anjaria, A Mishra International Journal of Engineering and Manufacturing 7 (1), 1, 2017 | 11 | 2017 |
Information leakage analysis of software: How to make it useful to IT industries? K Anjaria, A Mishra Future Computing and Informatics Journal 2 (1), 10-18, 2017 | 9 | 2017 |
Secure authentication: Eliminating possible backdoors in client-server endorsement JP Jyotiyana, A Mishra Procedia Computer Science 85, 606-615, 2016 | 9 | 2016 |
Implementation of modified TEA to enhance security CK Rajak, A Mishra Information and Communication Technology for Intelligent Systems (ICTIS 2017 …, 2018 | 7 | 2018 |
Optimized multi-sensor multi-target tracking algorithm for air surveillance system A Thite, A Mishra 2016 2nd International Conference on Advances in Electrical, Electronics …, 2016 | 7 | 2016 |
Evaluation of Cryptographically Secure Pseudo Random Number Generators for Post Quantum Era A Kumar, A Mishra 2022 IEEE 7th International conference for Convergence in Technology (I2CT), 1-5, 2022 | 6 | 2022 |
Analysis of CRYSTALS-Dilithium for BlockChain security L Sharma, A Mishra 2021 2nd International Conference on Secure Cyber Computing and …, 2021 | 6 | 2021 |
Dynamic monitoring of website content and alerting defacement using trusted platform module N Viswanathan, A Mishra Emerging Research in Computing, Information, Communication and Applications …, 2016 | 6 | 2016 |
Prevention of information leakages in a web browser by monitoring system calls H Wadkar, A Mishra, A Dixit 2014 IEEE International Advance Computing Conference (IACC), 199-204, 2014 | 6 | 2014 |
Relation between cybernetics and information security: from Norbert Wiener’s perspectives K Anjaria, A Mishra Kybernetes 46 (10), 1654-1673, 2017 | 5 | 2017 |
Relating Maxwell’s demon and quantitative analysis of information leakage for practical imperative programs K Anjaria, A Mishra Chinese Physics B 26 (10), 100507, 2017 | 4 | 2017 |
Framework to Secure Browser Using Configuration Analysis HS Wadkar, A Mishra, AM Dixit International Journal of Information Security and Privacy (IJISP) 11 (2), 49-63, 2017 | 4 | 2017 |
Hardening web browser security configuration using machine learning technique H Wadkar, A Mishra International Journal of Electronic Business 15 (3), 275-295, 2020 | 3 | 2020 |
Dynamic software component authentication for autonomous systems using slack space PS Beri, A Mishra 2019 3rd International Conference on Trends in Electronics and Informatics …, 2019 | 3 | 2019 |