Follow
Dr. Vinay Avasthi
Title
Cited by
Cited by
Year
Security algorithms for cloud computing
A Bhardwaj, GVB Subrahmanyam, V Avasthi, H Sastry
Procedia Computer Science 85, 535-542, 2016
1522016
Ransomware digital extortion: a rising new age threat
A Bhardwaj, V Avasthi, H Sastry, GVB Subrahmanyam
Indian Journal of Science and Technology, 2016
802016
Impact of social networking on Indian youth-A survey
A Bhardwaj, V Avasthi, S Goundar
International Journal of Electronics and Information Engineering 7 (1), 41-51, 2017
472017
Design of high-speed, low-power non-volatile master slave flip flop (NVMSFF) for memory registers designs
KA Muthappa, ASA Nisha, R Shastri, V Avasthi, PCS Reddy
Applied Nanoscience 13 (8), 5369-5378, 2023
452023
DDoS attacks, new DDoS taxonomy and mitigation solutions—A survey
A Bhardwaj, GVB Subrahmanyam, V Avasthi, H Sastry, S Goundar
2016 International Conference on Signal Processing, Communication, Power and …, 2016
372016
Cyber security attacks on robotic platforms
A Bhardwaj, V Avasthi, S Goundar
Network Security 2019 (10), 13-19, 2019
312019
Review of solutions for securing end user data over cloud applications
A Bhardwaj, GVB Subramanyam, V Avasthi, H Sastry
International Journal of Advanced Computer Research 6 (27), 222, 2016
132016
Solutions for DDoS attacks on cloud
A Bhardwaj, GVB Subrahmanyam, V Avasthi, HG Sastry
2016 6th International Conference-Cloud System and Big Data Engineering …, 2016
112016
A hybrid edge detection mechanism based on edge preserving filtration and type-1 fuzzy logic
R Ranjan, V Avasthi
International Journal of Information Technology 14 (6), 2991-3000, 2022
92022
Exploring 3d network-on-chip architectures and challenges
S Tyagi, P Maheshwari, A Agarwal, V Avasthi
2017 International Conference on Computer and Applications (ICCA), 97-101, 2017
92017
Design a resilient network infrastructure security policy framework
A Bhardwaj, GVB Subrahmanyam, V Avasthi, H Sastry
Indian Journal of Science and Technology, 2016
92016
Enhanced edge detection technique in digital images using optimised fuzzy operation
R Ranjan, DV Avasthi
Webology 19 (1), 5402-5416, 2022
62022
Edge Detection Using Guided Sobel Image Filtering
R Ranjan, V Avasthi
Wireless Personal Communications 132 (1), 651-677, 2023
52023
Three tier network architecture to mitigate ddos attacks on hybrid cloud environments
A Bhardwaj, GVB Subrahmanyam, V Avasthi, H Sastry
Proceedings of the Second International Conference on Information and …, 2016
52016
The evolution of knowledge in communities of practice
V Avasthi, S Dey, KK Jain, R Mishra
Proceedings of the 2015 Conference on research in adaptive and convergent …, 2015
52015
Deep convolutional neural network for partial discharge monitoring system
R Srivastava, V Avasthi
Advances in Engineering Software 180, 103407, 2023
42023
Person identification using electrocardiogram and deep long short term memory
PK Gupta, V Avasthi
International Journal of Information Technology 15 (3), 1709-1717, 2023
32023
Scrutinizing Lean Thinking and Agile Methodologies from Practitioner’ s Point of View
S Kaushik, V Avasthi, A Bharadwaj
Indian Journal of Science and Technology, 2016
32016
Lightweight authentication scheme based on modified EAP security for CoAP protocol-based IoMT applications
PS Salankar, V Avasthi, A Pasricha
International Journal of Information and Computer Security 20 (1-2), 176-198, 2023
22023
Fuzzy based image edge detection using improved cuckoo search optimization algorithms
R Ranjan, V Avasthi
2022 2nd International Conference on Emerging Frontiers in Electrical and …, 2022
22022
The system can't perform the operation now. Try again later.
Articles 1–20