Comprehensive survey on energy-aware server consolidation techniques in cloud computing N Chaurasia, M Kumar, R Chaudhry, OP Verma The Journal of Supercomputing 77, 11682-11737, 2021 | 57 | 2021 |
A survey on terrorist network mining: current trends and opportunities N Chaurasia, M Dhakar, A Tiwari, RK Gupta International Journal of Computer Science and Engineering Survey 3 (4), 59, 2012 | 23 | 2012 |
Brain tumor detection analysis using CNN: a review S Kumar, R Dhir, N Chaurasia 2021 international conference on artificial intelligence and smart systems …, 2021 | 22 | 2021 |
Journey from cloud of things to fog of things: Survey, new trends, and research directions A Chakraborty, M Kumar, N Chaurasia, SS Gill Software: Practice and Experience 53 (2), 496-551, 2023 | 19 | 2023 |
Efficient algorithm for destabilization of terrorist networks N Chaurasia, A Tiwari International Journal of Information Technology and Computer Science 5 (12 …, 2013 | 19 | 2013 |
Blockchain inspired secure and reliable data exchange architecture for cyber-physical healthcare system 4.0 M Kumar, H Raj, N Chaurasia, SS Gill Internet of Things and Cyber-Physical Systems 3, 309-322, 2023 | 13 | 2023 |
On the use of Brokerage approach to discover influencing nodes in terrorist networks N Chaurasia, A Tiwari Social Networking: Mining, Visualization, and Security, 271-295, 2014 | 10 | 2014 |
Identification of vulnerable selfish peer in P2P network using nature-inspired optimization techniques MSA Ansari, K Pal, P Govil, MC Govil, N Chaurasia, A Vidyarthi, M Alharbi Physical Communication 59, 102110, 2023 | 5 | 2023 |
Exploring the current trends and future prospects in terrorist network mining N Chaurasia, M Dhakar, A Chharia, A Tiwari, RK Gupta Proceedings of The Second International Conference on Computer Science …, 2012 | 5 | 2012 |
A resource efficient expectation maximization clustering approach for cloud N Chaurasia, S Tapaswi, J Dhar The Computer Journal 61 (1), 95-104, 2018 | 4 | 2018 |
A pareto optimal approach for optimal selection of virtual machine for migration in cloud N Chaurasia, S Tapaswi, J Dhar International Journal of Computer Science and Information Security (IJCSIS …, 2016 | 3 | 2016 |
Secure framework for IoT applications using Deep Learning in fog Computing A Chakraborty, M Kumar, N Chaurasia Journal of Information Security and Applications 77, 103569, 2023 | 2 | 2023 |
Improved Green Cloud Computing with Reduce Fault in the Network: A Study S Kaur, N Chaurasia 2021 2nd International Conference on Secure Cyber Computing and …, 2021 | 2 | 2021 |
M-Health Android Application Using Firebase, Google APIs and Supervised Machine Learning C Nigam, M Narang, N Chaurasia, A Nanda Proceedings of the Future Technologies Conference (FTC) 2019: Volume 2, 670-681, 2020 | 2 | 2020 |
An over-utilization avoidance host selection scheme for affording workload of migrated VM N Chaurasia, S Tapaswi, J Dhar 2016 SAI Computing Conference (SAI), 553-556, 2016 | 2 | 2016 |
Novel Algorithm for Terrorist Network Mining N Chaurasia, A Tiwari International Journal of Computer Science And Communication Technologies 6 …, 2013 | 2 | 2013 |
Analysis of K2 based Intrusion Detection System M Dhakar, N Chaurasia, A Tiwari Current Research in Engineering, Science and Technology (CREST) Journals, 2013 | 2 | 2013 |
Uncovering collateral damages and advanced defense strategies in cloud environments against DDoS attacks: A comprehensive review P Verma, N Bharot, JG Breslin, M Sharma, N Chaurasia, A Vidyarthi Transactions on Emerging Telecommunications Technologies, e4934, 2024 | 1 | 2024 |
A Comprehensive Review: Sugarcane Disease Detection Using Intelligent Approaches G Tomar, N Chaurasia 2022 International Conference on Advancements in Smart, Secure and …, 2022 | 1 | 2022 |
Dialect Translation of English Language to Telangana H Sutharapu, A Duggal, S Tiwari, N Chaurasia, F Ortiz-Rodriguez Proceedings http://ceur-ws. org ISSN 1613, 0073, 2022 | 1 | 2022 |