Security algorithms for cloud computing A Bhardwaj, GVB Subrahmanyam, V Avasthi, H Sastry Procedia Computer Science 85, 535-542, 2016 | 152 | 2016 |
Ransomware digital extortion: a rising new age threat A Bhardwaj, V Avasthi, H Sastry, GVB Subrahmanyam Indian Journal of Science and Technology 9 (14), 1-5, 2016 | 89 | 2016 |
Design of high-speed, low-power non-volatile master slave flip flop (NVMSFF) for memory registers designs KA Muthappa, ASA Nisha, R Shastri, V Avasthi, PCS Reddy Applied Nanoscience 13 (8), 5369-5378, 2023 | 61 | 2023 |
Impact of social networking on Indian youth-A survey A Bhardwaj, V Avasthi, S Goundar International Journal of Electronics and Information Engineering 7 (1), 41-51, 2017 | 50 | 2017 |
DDoS attacks, new DDoS taxonomy and mitigation solutions—A survey A Bhardwaj, GVB Subrahmanyam, V Avasthi, H Sastry, S Goundar 2016 International Conference on Signal Processing, Communication, Power and …, 2016 | 49 | 2016 |
Cyber security attacks on robotic platforms A Bhardwaj, V Avasthi, S Goundar Network Security 2019 (10), 13-19, 2019 | 36 | 2019 |
Edge detection using guided Sobel image filtering R Ranjan, V Avasthi Wireless Personal Communications 132 (1), 651-677, 2023 | 21 | 2023 |
Review of solutions for securing end user data over cloud applications A Bhardwaj, GVB Subramanyam, V Avasthi, H Sastry International Journal of Advanced Computer Research 6 (27), 222, 2016 | 15 | 2016 |
Exploring 3d network-on-chip architectures and challenges S Tyagi, P Maheshwari, A Agarwal, V Avasthi 2017 International Conference on Computer and Applications (ICCA), 97-101, 2017 | 12 | 2017 |
Solutions for DDoS attacks on cloud A Bhardwaj, GVB Subrahmanyam, V Avasthi, HG Sastry 2016 6th International Conference-Cloud System and Big Data Engineering …, 2016 | 11 | 2016 |
Deep convolutional neural network for partial discharge monitoring system R Srivastava, V Avasthi Advances in Engineering Software 180, 103407, 2023 | 9 | 2023 |
Design a resilient network infrastructure security policy framework A Bhardwaj, GVB Subrahmanyam, V Avasthi, H Sastry Indian Journal of Science and Technology 9 (19), 9-9, 2016 | 9 | 2016 |
A hybrid edge detection mechanism based on edge preserving filtration and type-1 fuzzy logic R Ranjan, V Avasthi International Journal of Information Technology 14 (6), 2991-3000, 2022 | 7 | 2022 |
Enhanced edge detection technique in digital images using optimised fuzzy operation R Ranjan, DV Avasthi Webology 19 (1), 5402-5416, 2022 | 7 | 2022 |
Person identification using electrocardiogram and deep long short term memory PK Gupta, V Avasthi International Journal of Information Technology 15 (3), 1709-1717, 2023 | 6 | 2023 |
Three tier network architecture to mitigate ddos attacks on hybrid cloud environments A Bhardwaj, GVB Subrahmanyam, V Avasthi, H Sastry Proceedings of the Second International Conference on Information and …, 2016 | 5 | 2016 |
The evolution of knowledge in communities of practice V Avasthi, S Dey, KK Jain, R Mishra Proceedings of the 2015 Conference on research in adaptive and convergent …, 2015 | 5 | 2015 |
Loss in tacit knowledge because of employees attrition V Avasthi, S Dey International Journal of Intercultural Information Management 5 (1-2), 1-18, 2015 | 4 | 2015 |
Lightweight authentication scheme based on modified EAP security for CoAP protocol-based IoMT applications PS Salankar, V Avasthi, A Pasricha International Journal of Information and Computer Security 20 (1-2), 176-198, 2023 | 3 | 2023 |
Scrutinizing Lean Thinking and Agile Methodologies from practitioner’s point of view S Kaushik, V Avasthi, A Bharadwaj Indian Journal of Science and Technology 9 (20), 1-5, 2016 | 3 | 2016 |