Study and investigation on 5G technology: A systematic review R Dangi, P Lalwani, G Choudhary, I You, G Pau Sensors 22 (1), 26, 2021 | 368 | 2021 |
Intrusion Detection Systems for Networked Unmanned Aerial Vehicles: A Survey G Choudhary, V Sharma, I You, K Yim, R Chen, JH Cho 2018 14th International Wireless Communications & Mobile Computing …, 2018 | 129 | 2018 |
Internet of Drones (IoD): threats, vulnerability, and security perspectives G Choudhary, V Sharma, T Gupta, J Kim, I You MobiSec’18: The 3rd International Symposium on Mobile Internet Security, 2018 | 116 | 2018 |
Security of zero trust networks in cloud computing: A comparative review S Sarkar, G Choudhary, SK Shandilya, A Hussain, H Kim Sustainability 14 (18), 11213, 2022 | 90 | 2022 |
An enhanced LoRaWAN security protocol for privacy preservation in IoT with a case study on a smart factory-enabled parking system I You, S Kwon, G Choudhary, V Sharma, JT Seo Sensors 18 (6), 1888, 2018 | 84 | 2018 |
Internet of Things: A survey on architecture, technologies, protocols and challenges G Choudhary, AK Jain 2016 International Conference on Recent Advances and Innovations in …, 2016 | 84 | 2016 |
Cyber Security Challenges in Aviation Communication, Navigation, and Surveillance G Dave, G Choudhary, V Sihag, I You, KKR Choo Computers & Security, 102516, 2022 | 77 | 2022 |
Sustainable and secure trajectories for the military Internet of Drones (IoD) through an efficient Medium Access Control (MAC) protocol G Choudhary, V Sharma, I You Computers & Electrical Engineering 74, 59-73, 2019 | 75 | 2019 |
De-LADY: Deep learning based Android malware detection using Dynamic features V Sihag, M Vardhan, P Singh, G Choudhary, S Son Journal of Internet Services and Information Security (JISIS) 11 (2), 34-45, 2021 | 74 | 2021 |
Ml-based 5g network slicing security: A comprehensive survey R Dangi, A Jadhav, G Choudhary, N Dragoni, MK Mishra, P Lalwani Future Internet 14 (4), 116, 2022 | 72 | 2022 |
Behavior and vulnerability assessment of drones-enabled industrial internet of things (iiot) V Sharma, G Choudhary, Y Ko, I You IEEE Access 6, 43368-43383, 2018 | 71 | 2018 |
Blockchain-based privacy preservation scheme for misbehavior detection in lightweight IoMT devices S Rahmadika, PV Astillo, G Choudhary, DG Duguma, V Sharma, I You IEEE Journal of Biomedical and Health Informatics 27 (2), 710-721, 2022 | 64 | 2022 |
Security of 5g-mobile backhaul networks: a survey G Choudhary, J Kim, V Sharma Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable …, 2019 | 52 | 2019 |
BERT-based transfer-learning approach for nested named-entity recognition using joint labeling A Agrawal, S Tripathi, M Vardhan, V Sihag, G Choudhary, N Dragoni Applied Sciences 12 (3), 976, 2022 | 40 | 2022 |
Lightweight Misbehavior Detection Management of Embedded IoT Devices in Medical Cyber Physical Systems G Choudhary, PV Astillo, I You, K Yim, R Chen, JH Cho IEEE Transactions on Network and Service Management, 2020 | 37 | 2020 |
Cyber4drone: A systematic review of cyber security and forensics in next-generation drones V Sihag, G Choudhary, P Choudhary, N Dragoni Drones 7 (7), 430, 2023 | 35 | 2023 |
A Survey on the Security and the Evolution of Osmotic and Catalytic Computing for 5G Networks G Choudhary, V Sharma 5G enabled secure wireless networks, 69-102, 2019 | 29 | 2019 |
Self-enforcing game theory-based resource allocation for LoRaWAN assisted public safety communications V Sharma, G Choudhary, I You, JD Lim, JN Kim Journal of Internet Technology 19 (2), 515-530, 2018 | 25 | 2018 |
Misbehavior detection of embedded IoT devices in medical cyber physical systems I You, K Yim, V Sharma, G Choudhary, IR Chen, JH Cho Proceedings of the 2018 IEEE/ACM international conference on connected …, 2018 | 23 | 2018 |
Emerging Cyber Security Challenges after COVID Pandemic: A Survey A Choudhary, G Choudhary, K Pareek, C Kunndra, J Luthra, N Dragoni | 22 | 2022 |