Systematic review of security vulnerabilities in ethereum blockchain smart contract SS Kushwaha, S Joshi, D Singh, M Kaur, HN Lee IEEE Access 10, 6605-6621, 2022 | 296 | 2022 |
Dingo optimizer: a nature‐inspired metaheuristic approach for engineering problems AK Bairwa, S Joshi, D Singh Mathematical Problems in Engineering 2021 (1), 2571863, 2021 | 171 | 2021 |
Ethereum smart contract analysis tools: A systematic review SS Kushwaha, S Joshi, D Singh, M Kaur, HN Lee Ieee Access 10, 57037-57062, 2022 | 138 | 2022 |
A review on localization in wireless sensor networks J Kuriakose, S Joshi, R Vikram Raju, A Kilaru Advances in signal processing and intelligent recognition systems, 599-610, 2014 | 120 | 2014 |
Localization in wireless sensor networks: a survey J Kuriakose, S Joshi, VI George arXiv preprint arXiv:1410.8713, 2014 | 33 | 2014 |
Comprehensive analysis of advanced techniques and vital tools for detecting malware intrusion V Vasani, AK Bairwa, S Joshi, A Pljonkin, M Kaur, M Amoon Electronics 12 (20), 4299, 2023 | 31 | 2023 |
Detection of malware in downloaded files using various machine learning models A Kamboj, P Kumar, AK Bairwa, S Joshi Egyptian Informatics Journal 24 (1), 81-94, 2023 | 27 | 2023 |
Data security for software as a service PK Tiwari, S Joshi Web-based services: Concepts, methodologies, tools, and applications, 864-880, 2016 | 27 | 2016 |
Mutual authentication of nodes using session token with fingerprint and MAC address validation AK Bairwa, S Joshi Egyptian Informatics Journal 22 (4), 479-491, 2021 | 19 | 2021 |
An overview of blockchain-based smart contract SS Kushwaha, S Joshi Computer Networks and Inventive Communication Technologies: Proceedings of …, 2021 | 18 | 2021 |
Dynamic weighted virtual machine live migration mechanism to manages load balancing in cloud computing PK Tiwari, S Joshi 2016 IEEE International Conference on Computational Intelligence and …, 2016 | 17 | 2016 |
Comprehensive review of orthogonal regression and its applications in different domains Pallavi, S Joshi, D Singh, M Kaur, HN Lee Archives of Computational Methods in Engineering 29 (6), 4027-4047, 2022 | 16 | 2022 |
Mla-rpm: A machine learning approach to enhance trust for secure routing protocol in mobile ad hoc networks AK Bairwa, S Joshi Int J Adv Sci Technol 29 (04), 11265-11274, 2020 | 15 | 2020 |
An efficient approach to secure smart contract of Ethereum blockchain using hybrid security analysis approach SS Kushwaha, S Joshi, AK Gupta Journal of Discrete Mathematical Sciences and Cryptography 26 (5), 1499-1517, 2023 | 14 | 2023 |
A review on load balancing of virtual machine resources in cloud computing PK Tiwari, S Joshi Proceedings of First International Conference on Information and …, 2016 | 13 | 2016 |
Blockchain ecosystem for credit transfer in education R Manoj, S Joshi, U Dabholkar, G Prakash Panicker, K Peter Kuriakose, ... Mathematical Problems in Engineering 2021 (1), 8526456, 2021 | 12 | 2021 |
Color image watermarking with watermark authentication against false positive detection using SVD N Singh, S Joshi, S Birla International Conference on Sustainable Computing in Science, Technology and …, 2019 | 11 | 2019 |
A review of data security and privacy issues over SaaS PK Tiwari, S Joshi 2014 IEEE International Conference on Computational Intelligence and …, 2014 | 11 | 2014 |
An agent based routing search methodology for improving QoS in MANET AK Bairwa, S Joshi Ingeniare: Revista Chilena de Ingenieria 28 (4), 558-564, 2020 | 9 | 2020 |
An efficient Paillier cryptographic technique for secure data storage on the cloud S Joshi 2020 4th International Conference on Intelligent Computing and Control …, 2020 | 9 | 2020 |