Docker containers versus virtual machine-based virtualization AK Yadav, ML Garg, Ritika Emerging Technologies in Data Mining and Information Security: Proceedings …, 2019 | 62 | 2019 |
Security and privacy concerns in cloud computing AK Yadav, R Tomar, D Kumar, H Gupta Computer science and software engineering 2 (5), 2012 | 18 | 2012 |
Image watermarking approach using a hybrid domain based on performance parameter analysis R Srivastava, R Tomar, M Gupta, AK Yadav, J Park Information 12 (8), 310, 2021 | 14 | 2021 |
Monitoring Based Security Approach for Cloud Computing. AK Yadav, MLG Ritika, ML Garg Ingénierie des Systèmes d Inf. 24 (6), 611-617, 2019 | 13 | 2019 |
Security and privacy concerns in cloud computing Y AnujKumar, R Tomar, D Kumar, H Gupta International Journal of Advanced Research in Computer Science and Software …, 2012 | 12 | 2012 |
Cryptographic solution for security problem in cloud computing storage during global pandemics AK Yadav, MG Ritika, M Garg International Journal of Safety and Security Engineering 11 (2), 193-199, 2021 | 8 | 2021 |
Grid resource computing environment simulation using GridSim toolkit PS Rawat, AK Yadav, V Barthwal 2015 2nd International Conference on Computing for Sustainable Global …, 2015 | 5 | 2015 |
Accurate and efficient crawling the deep Web: Surfacing hidden value S Kumar, AK Yadav, R Bharati, R Choudhary International Journal of Computer Science and Information Security 9 (5), 149, 2011 | 4 | 2011 |
Computational Intelligence in Web Mining DK Singh, R Srivastava, T Choudhury, AK Yadav Innovative Trends in Computational Intelligence, 197-215, 2022 | 3 | 2022 |
SecHMS-A secure hybrid monitoring scheme for cloud data monitoring AK Yadav, R Ritika, ML Garg EAI Endorsed Transactions on Scalable Information Systems 8 (30), e8-e8, 2021 | 3 | 2021 |
MPLS-A Fail Safe Approach to Congestion Control R Tomar, AK Yadav, D Kumar, P Chaudhary International Journal 2 (7), 2012 | 3 | 2012 |
The Issues of Energy Efficiency in Cloud Computing Based Data Centers R A K Yadav, M LGarg Bioscience Biotechnology Research Communications 12 (2), 2019 | 2* | 2019 |
Modeling and analyze the Deep Web: Surfacing hidden value S Kumar, AK Yadav, R Bharati, R Choudhary International Journal of Computer Science and Information Security 9 (6), 119, 2011 | 2 | 2011 |
Future Connected Technologies: Growing Convergence and Security Implications M Gupta, R Tomar, AK Yadav, H Sastry CRC Press, 2023 | 1 | 2023 |
Edge computing in smart agriculture BP Bhuyan, R Tomar, AK Yadav Future Connected Technologies, 200-217, 2023 | 1 | 2023 |
Security-Aware Efficient Multi-tenant Cloud Environment AK Yadav, ML Garg, Ritika Workshop on Mining Data for Financial Applications, 419-430, 2022 | 1 | 2022 |
An Efficient Approach for Security in Cloud Computing A Kumar Yadav, ML Garg, D Ritika International Journal of Advanced Studies of Scientific Research 3 (10), 2018 | 1 | 2018 |
Management of Data Security in Distributed System H Singh, A Yadav The International Journal of Science and Technoledge 2 (4), 238, 2014 | 1 | 2014 |
A mechanism for handling cold start in book recommender system by sharing student profile U Nazir, A Yadav Int. J. Appl. Innov. Eng. Manag. 2 (12), 318-322, 2013 | 1 | 2013 |
Rainfall Induced Landslide Detection in Study Area using Machine Learning Model PS Rawat, AK Yadav, V Barthwal, S Gaur 2023 7th International Conference on I-SMAC (IoT in Social, Mobile …, 2023 | | 2023 |