Seguir
Dr. Vinay Avasthi
Título
Citado por
Citado por
Ano
Security algorithms for cloud computing
A Bhardwaj, GVB Subrahmanyam, V Avasthi, H Sastry
Procedia Computer Science 85, 535-542, 2016
1522016
Ransomware digital extortion: a rising new age threat
A Bhardwaj, V Avasthi, H Sastry, GVB Subrahmanyam
Indian Journal of Science and Technology 9 (14), 1-5, 2016
892016
Design of high-speed, low-power non-volatile master slave flip flop (NVMSFF) for memory registers designs
KA Muthappa, ASA Nisha, R Shastri, V Avasthi, PCS Reddy
Applied Nanoscience 13 (8), 5369-5378, 2023
612023
Impact of social networking on Indian youth-A survey
A Bhardwaj, V Avasthi, S Goundar
International Journal of Electronics and Information Engineering 7 (1), 41-51, 2017
502017
DDoS attacks, new DDoS taxonomy and mitigation solutions—A survey
A Bhardwaj, GVB Subrahmanyam, V Avasthi, H Sastry, S Goundar
2016 International Conference on Signal Processing, Communication, Power and …, 2016
492016
Cyber security attacks on robotic platforms
A Bhardwaj, V Avasthi, S Goundar
Network Security 2019 (10), 13-19, 2019
362019
Edge detection using guided Sobel image filtering
R Ranjan, V Avasthi
Wireless Personal Communications 132 (1), 651-677, 2023
212023
Review of solutions for securing end user data over cloud applications
A Bhardwaj, GVB Subramanyam, V Avasthi, H Sastry
International Journal of Advanced Computer Research 6 (27), 222, 2016
152016
Exploring 3d network-on-chip architectures and challenges
S Tyagi, P Maheshwari, A Agarwal, V Avasthi
2017 International Conference on Computer and Applications (ICCA), 97-101, 2017
122017
Solutions for DDoS attacks on cloud
A Bhardwaj, GVB Subrahmanyam, V Avasthi, HG Sastry
2016 6th International Conference-Cloud System and Big Data Engineering …, 2016
112016
Deep convolutional neural network for partial discharge monitoring system
R Srivastava, V Avasthi
Advances in Engineering Software 180, 103407, 2023
92023
Design a resilient network infrastructure security policy framework
A Bhardwaj, GVB Subrahmanyam, V Avasthi, H Sastry
Indian Journal of Science and Technology 9 (19), 9-9, 2016
92016
A hybrid edge detection mechanism based on edge preserving filtration and type-1 fuzzy logic
R Ranjan, V Avasthi
International Journal of Information Technology 14 (6), 2991-3000, 2022
72022
Enhanced edge detection technique in digital images using optimised fuzzy operation
R Ranjan, DV Avasthi
Webology 19 (1), 5402-5416, 2022
72022
Person identification using electrocardiogram and deep long short term memory
PK Gupta, V Avasthi
International Journal of Information Technology 15 (3), 1709-1717, 2023
62023
Three tier network architecture to mitigate ddos attacks on hybrid cloud environments
A Bhardwaj, GVB Subrahmanyam, V Avasthi, H Sastry
Proceedings of the Second International Conference on Information and …, 2016
52016
The evolution of knowledge in communities of practice
V Avasthi, S Dey, KK Jain, R Mishra
Proceedings of the 2015 Conference on research in adaptive and convergent …, 2015
52015
Loss in tacit knowledge because of employees attrition
V Avasthi, S Dey
International Journal of Intercultural Information Management 5 (1-2), 1-18, 2015
42015
Lightweight authentication scheme based on modified EAP security for CoAP protocol-based IoMT applications
PS Salankar, V Avasthi, A Pasricha
International Journal of Information and Computer Security 20 (1-2), 176-198, 2023
32023
Scrutinizing Lean Thinking and Agile Methodologies from practitioner’s point of view
S Kaushik, V Avasthi, A Bharadwaj
Indian Journal of Science and Technology 9 (20), 1-5, 2016
32016
O sistema não pode efectuar a operação agora. Tente mais tarde.
Artigos 1–20