Cyber Crime: Challenges and its classification AS Poonia International Journal of Emerging Trends & Technology in Computer Science …, 2014 | 42 | 2014 |
The pollination biology of onion (Allium cepa L.)-A Review S Devi, R Gulati, K Tehri, A Poonia Agricultural Reviews 36 (1), 1-13, 2015 | 33 | 2015 |
Cyber Crime: Practices and Policies for Its Prevention AS Poonia, A Bhardwaj, GS Dangayach The First International Conference on Interdisciplinary Research and …, 2011 | 18 | 2011 |
Tyrophagus putrescentiae (Schrank)(Acari: Acaridae) as a pest of grains: a review A Malik, R Gulati, K Duhan, A Poonia J. Entomol. Zool. Stud 6 (2543), e2550, 2018 | 11 | 2018 |
Termites (Insecta: Isoptera) of Haryana present state of knowledge-A review A Poonia Agricultural reviews 40 (1), 59-64, 2019 | 8 | 2019 |
Vulnerability identification and misuse case classification framework AS Poonia, C Banerjee, A Banerjee, SK Sharma Soft Computing: Theories and Applications: Proceedings of SoCTA 2016, Volume …, 2018 | 7 | 2018 |
Security threats of social networking sites: An analytical approach A Banerjee, C Banerjee, A Poonia network 13 (12), 16, 2014 | 7 | 2014 |
Data wiping and anti forensic techniques AS Poonia Compusoft 3 (12), 1374, 2014 | 7 | 2014 |
Effect of environmental factors on the population of Varroa destructor in Apis mellifera L. colonies A Poonia, R Gulati, SK Sharma The Ecoscan 8, 23-25, 2014 | 7 | 2014 |
Termite gut: home to microbiome A Kumar, A Poonia, R Sharma, M Jangra, R Sehrawat, R Sansanwal Uttar Pradesh Journal of Zoology 41 (22), 9-23, 2020 | 6 | 2020 |
Proposed algorithm for identification of vulnerabilities and associated misuse cases using CVSS, CVE standards during security requirements elicitation phase C Banerjee, A Banerjee, AS Poonia, SK Sharma Soft Computing: Theories and Applications: Proceedings of SoCTA 2016, Volume …, 2018 | 6 | 2018 |
Effect of different modes of pollination on yield parameters of Allium cepa L. S Devi, R Gulati, A Poonia Journal of Entomological Research 39 (2), 111-117, 2015 | 6 | 2015 |
Malware detection by token counting AS Poonia, S Singh 2014 International Conference on Contemporary Computing and Informatics …, 2014 | 6 | 2014 |
Security issues in Internet of Things (IoT)-enabled systems: problem and prospects AS Poonia, C Banerjee, A Banerjee, SK Sharma Soft Computing: Theories and Applications: Proceedings of SoCTA 2018, 1419-1423, 2020 | 5 | 2020 |
Comparative efficacy of different concentrations of Withania somnifera, Pongamia pinnata and Azadirachta indica against Tyrophagus putrescentiae (Schrank)(Acari: Acaridae) in … A Malik, R Gulati, K Duhan, A Poonia Journal of Entomology and Zoology Studies 5 (4), 996-1001, 2017 | 4 | 2017 |
Development of iMACOQR metrics framework for quantification of software security A Banerjee, C Banerjee, SK Pandey, AS Poonia Proceedings of Fifth International Conference on Soft Computing for Problem …, 2016 | 4 | 2016 |
Ethical values and practices for cyber society AS Poonia, A Bhardwaj, GS Dangayach 2009 International Conference on the Current Trends in Information …, 2009 | 4 | 2009 |
Live forensics analysis: Violations of business security policy GS Tanwar, AS Poonia 2014 International Conference on Contemporary Computing and Informatics …, 2014 | 3 | 2014 |
Audit tools for cyber crime investigation AS Poonia International Journal of Enhanced Research in Science Technology …, 2014 | 3 | 2014 |
Integrating and teaching cyber ethics in eLearning environment AS Poonia, G Dangayach, A Bhardwaj Int. J. Comput. Integrated Manuf 20, 1-6, 2012 | 3 | 2012 |