Design, implementation and analysis of multi layer, multi factor authentication (mfa) setup for webmail access in multi trust networks S Chaudhari, SS Tomar, A Rawat 2011 International Conference on Emerging Trends in Networks and Computer …, 2011 | 21 | 2011 |
Real time logs and traffic monitoring, analysis and visualization setup for IT security enhancement S Chaudhari, V Maurya, V Singh, S Tomar, A Rajan, A Rawat 5th International Conference on Next Generation Computing Technologies (NGCT …, 2020 | 6 | 2020 |
Conceptual model for comparison of IPv6 ISPs based on IPv4 traffic profiles SS Tomar, A Rawat, PD Vyavahare, S Tokekar International Journal of Information Technology 12 (4), 1171-1182, 2020 | 5 | 2020 |
User and Device Tracking in Private Networks by Correlating Logs: A System for Responsive Forensic Analysis S Chaudhari, H Chauhan, SS Tomar, A Rawat 2014 Fourth International Conference on Communication Systems and Network …, 2014 | 4 | 2014 |
Implementation and Security Analysis of a CallerId Augmented 2FA Setup for Secure Web-mail Access AA Tomar, S Chaudhari, J Patil, A Rawat Proceedings of the 2010 IEEE International Conference on Advances in …, 2010 | 4 | 2010 |
Investigations on equal cost multi-path feature in dynamic routing protocols in ipv6 networks SS Tomar, A Rawat, S Tokekar, PD Vyavahare 2019 IEEE Conference on Information and Communication Technology, 1-6, 2019 | 1 | 2019 |
Study on QoS Gains in Migration from IPv4 to IPv6 Internet SS Tomar, A Rawat, PD Vyavahare, S Tokekar International Journal of Information Technology and Computer Science 9 (5), 1-10, 2017 | 1 | 2017 |
Design, development and analysis of a comprehensive open source system for proactive management of security aspects of a control network [C] SS Tomar, SN Chaudhari, HS Chouhan, VK Maurya, A Rawat 9th International Workshop on Personal Computers and Particle Accelerator …, 2012 | 1 | 2012 |
Study on Machine Learning Models for IPv6 Address Lookup in Large Block Lists NK Radke, SS Tomar, A Rajan 2023 National Conference on Communications (NCC), 1-6, 2023 | | 2023 |
Inimitable Approach to Detect & Quarantine Botnet Malware Infections in Network VK Maurya, S Chaudhari, DK Sirohi, S Tomar, A Rajan, A Rawat 2021 2nd International Conference on Secure Cyber Computing and …, 2021 | | 2021 |
Proactive Data Centre & Network Room Overheating Management System (DCNROMS) Utilizing Open Source Software and Tools VK Maurya, SK Yadav, KK Bachhil, HS Chouhan, S Chaudhari, SS Tomar, ... 2019 5th International Conference on Advanced Computing & Communication …, 2019 | | 2019 |
Secure setup for remote access/control of scientific instruments over internet SS Tomar, S Chaudhari, VK Maurya, A Rajan, A Rawat Proceedings of the eighth DAE-BRNS Indian particle accelerator conference, 2018 | | 2018 |
A Novel Central Arbiter to Mitigate Denial of Service Attacks on Duplicate Address Detection in IPv6 Networks SS Tomar, A Rawat, PD Vyavahare, S Tokekar 11th International Conference on Emerging Security Information, Systems and …, 2017 | | 2017 |
Control and monitoring of EXAFS beamline of Indus-2 at RRCAT remotely from BARC J Patil, SS Tomar, A Rawat | | 2009 |
Exploiting database technology for object based event storage and retrieval A Rawat, A Rajan, SS Tomar, A Bansal | | 2005 |
A user-friendly data acquisition, analysis and management setup for training of super conducting magnets at CAT A Rawat, SS Tomar, J Patil | | 2003 |
Investigations in Quality of Service and Security Issues in IPv6 Networks SS Tomar Indore, 0 | | |
Open Source Framework for Proactive Administration of Network SS Tomar, S Chaudhari, J Patil, A Bansal, A Rawat | | |