Follow
Dr. Hanumat G Sastry
Title
Cited by
Cited by
Year
Security algorithms for cloud computing
A Bhardwaj, GVB Subrahmanyam, V Avasthi, H Sastry
Procedia Computer Science 85, 535-542, 2016
1502016
Ransomware digital extortion: a rising new age threat
A Bhardwaj, V Avasthi, H Sastry, GVB Subrahmanyam
Indian Journal of Science and Technology 9 (14), 1-5, 2016
792016
A review on VANET routing protocols and wireless standards
GD Singh, R Tomar, HG Sastry, M Prateek
Smart Computing and Informatics: Proceedings of the First International …, 2018
472018
DDoS attacks, new DDoS taxonomy and mitigation solutions—A survey
A Bhardwaj, GVB Subrahmanyam, V Avasthi, H Sastry, S Goundar
2016 International Conference on Signal Processing, Communication, Power and …, 2016
372016
DEAL – ‘Deep Ensemble ALgorithm’ Framework for Credit Card Fraud Detection in Real-Time Data Stream with Google TensorFlow
M Arya, H Sastry G
Smart Science 8 (2), 71-83, 2020
332020
Ransomware: A rising threat of new age digital extortion
A Bhardwaj
Online banking security measures and data protection, 189-221, 2017
322017
Establishing parameters for comparative analysis of V2V communication in VANET
R Tomar, HG Sastry, M Prateek
Journal of Scientific & Industrial Research 79 (1), 26-29, 2022
302022
A novel approach to multicast in VANET using MQTT
R Tomar, M Prateek, HG Sastry
Ada User J 38 (4), 231-235, 2017
252017
A novel protocol for information dissemination in vehicular networks
R Tomar, HG Sastry, M Prateek
International Conference on Internet of Vehicles, 1-14, 2019
202019
Analysis of beaconing performance in IEEE 802.11 p on vehicular ad-hoc environment
R Tomar, M Prateek, HG Sastry
2017 4th IEEE Uttar Pradesh Section International Conference on Electrical …, 2017
202017
Semantic Information Extraction from Multi-Corpora Using Deep Learning.
S Kumar, HG Sastry, V Marriboyina, H Alshazly, SA Idris, M Verma, ...
Computers, Materials & Continua 70 (3), 2022
152022
User interface design challenges for digital libraries
H Sastry, G Manjunath, LC Reddy
International Journal of Computer Applications 15 (6), 7-13, 2011
152011
A novel business intelligence system framework
M Venkatadri, GS Hanumat, G Manjunath
Universal Journal of Computer Science and Engineering Technology 1 (2), 112-116, 2010
152010
Significance of Web 2. 0 in Digital Libraries
HG Sastry, LC Reddy
International Journal on Computer Science and Engineering 2 (6), 2010
142010
Review of solutions for securing end user data over cloud applications
A Bhardwaj, GVB Subramanyam, V Avasthi, H Sastry
International Journal of Advanced Computer Research 6 (27), 222, 2016
132016
User interface design principles for digital libraries
HG Sastry, LC Reddy
International Journal of Web Applications 1 (2), 86-91, 2009
122009
Solutions for DDoS attacks on cloud
A Bhardwaj, GVB Subrahmanyam, V Avasthi, HG Sastry
2016 6th International Conference-Cloud System and Big Data Engineering …, 2016
102016
A novel extra tree ensemble optimized dl framework (Eteodl) for early detection of diabetes
M Arya, H Sastry G, A Motwani, S Kumar, A Zaguia
Frontiers in Public Health 9, 797877, 2022
92022
Design a resilient network infrastructure security policy framework
A Bhardwaj, GVB Subrahmanyam, V Avasthi, H Sastry
Indian Journal of Science and Technology 9 (19), 9-9, 2016
92016
A V2I based approach to multicast in vehicular networks
R Tomar, HG Sastry, M Prateek
Malaysian Journal of Computer Science, 93-107, 2020
82020
The system can't perform the operation now. Try again later.
Articles 1–20