Analysis of KDD-Cup’99, NSL-KDD and UNSW-NB15 datasets using deep learning in IoT S Choudhary, N Kesswani Procedia Computer Science 167, 1561-1573, 2020 | 183 | 2020 |
A survey: Intrusion detection techniques for internet of things S Choudhary, N Kesswani International Journal of Information Security and Privacy (IJISP) 13 (1), 86-105, 2019 | 42 | 2019 |
Detection and prevention of routing attacks in internet of things S Choudhary, N Kesswani 2018 17th IEEE international conference on trust, security and privacy in …, 2018 | 38 | 2018 |
Understanding captcha: text and audio based captcha with its applications S Choudhary, R Saroha, Y Dahiya, S Choudhary International Journal of Advanced Research in Computer Science and Software …, 2013 | 26 | 2013 |
Cluster-based intrusion detection method for internet of things S Choudhary, N Kesswani 2019 IEEE/ACS 16th International Conference on Computer Systems and …, 2019 | 18 | 2019 |
Biometric authentication in internet of things: A conceptual view G Meena, S Choudhary Journal of Statistics and Management Systems 22 (4), 643-652, 2019 | 18 | 2019 |
E-mail security: Issues and solutions S Choudhary, R Ghusinga International Journal of Computer Information Systems 7 (4), 42-63, 2013 | 12 | 2013 |
A hybrid classification approach for intrusion detection in iot network S Choudhary, N Kesswani Journal of Scientific & Industrial Research 80 (09), 809-816, 2021 | 10 | 2021 |
Internet of Things: Protocols, Applications and Security Issues S Choudhary, G Meena Procedia Computer Science 215, 274-288, 2022 | 9 | 2022 |
CRIDS: Correlation and regression-based network intrusion detection system for IoT S Choudhary, A Dey, N Kesswani SN Computer Science 2 (3), 168, 2021 | 8 | 2021 |
How Anti-virus Software Works?? S Choudhary, R Saroha, MS Beniwal International Journal 3 (4), 483-484, 2013 | 7 | 2013 |
Program and data protection: Copyright, patent, trade secret and trademark S Choudhary, R Saroha Indian Journal of Computer Science and Engineering 4 (3), 235-239, 2013 | 7 | 2013 |
An ensemble intrusion detection model for internet of things network S Choudhary, N Kesswani, S Majhi | 4 | 2021 |
Study of different Data Mining system & Platform N Rathee, S Choudhary International Research Journal of Engineering and Technology 2 (1), 2015 | 4 | 2015 |
Developing and Enhancing the Security of Digital Evidence Bag Y Dahiya, MS Sangwan International Journal of Research Studies in Computer Science and …, 2014 | 4 | 2014 |
Mrs. Sonal Beniwal,“How Anti-virus Software Works??” S Choudhary, R Saroha International Journal of Advanced Research in Computer Science and Published …, 2016 | 2 | 2016 |
Big data: challenges and prospects S Choudhary, R Saroha, Y Dahiya International Conference on Recent Trends in Engineering Science and …, 2015 | 2 | 2015 |
Review of Sockets Used for Commu-nication Purpose S Choudhary, R Saroha, S Beniwal International Journal 3 (3), 2013 | 2 | 2013 |
Saliency Detection in Text Documents using Policy-Driven Reinforcement Learning Methodologies G Meena, S Choudhary, RR Choudhary IOP Conference Series: Materials Science and Engineering 1020 (1), 012019, 2021 | | 2021 |
Security of Graphical Passwords Using PCCP S Choudhary, A Singh International Journal of Science, Engineering and Computer Technology 4 (5), 143, 2014 | | 2014 |