A New Approach for the Security of VPN KK VV Singh, H Gupta ACM Second Internatonal Conference on Information and Communication …, 2016 | 60* | 2016 |
A security model for the enhancement of data privacy in cloud computing Y Sharma, H Gupta, SK Khatri 2019 Amity International Conference on Artificial Intelligence (AICAI), 898-902, 2019 | 54 | 2019 |
Role of multiple encryption in secure electronic transaction H Gupta, VK Sharma International Journal of Network Security & Its Applications 3 (6), 89, 2011 | 51 | 2011 |
Multiphase encryption: A new concept in modern cryptography H Gupta, VK Sharma International Journal of Computer Theory and Engineering 5 (4), 638, 2013 | 47 | 2013 |
A security framework for IOT devices against wireless threats G Varshney, H Gupta 2017 2nd International Conference on Telecommunication and Networks (TEL-NET …, 2017 | 38 | 2017 |
USSD—Architecture analysis, security threats, issues and enhancements KK Lakshmi, H Gupta, J Ranjan 2017 international conference on infocom technologies and unmanned systems …, 2017 | 27 | 2017 |
Protection against penetration attacks using Metasploit H Gupta, R Kumar 2015 4th international conference on reliability, Infocom technologies and …, 2015 | 21 | 2015 |
UPI based mobile banking applications–security analysis and enhancements KK Lakshmi, H Gupta, J Ranjan 2019 Amity International Conference on Artificial Intelligence (AICAI), 1-6, 2019 | 19 | 2019 |
Impact of SQL injection in database security H Gupta, S Mondal, S Ray, B Giri, R Majumdar, VP Mishra 2019 International Conference on Computational Intelligence and Knowledge …, 2019 | 16 | 2019 |
A proposed framework for controlling cyber-crime GO Boussi, H Gupta 2020 8th International Conference on Reliability, Infocom Technologies and …, 2020 | 15 | 2020 |
SQL Filtering: An Effective Technique to Prevent SQL Injection Attack H Gupta, R Dubey IEEE International Conference on Reliability, Infocom Technologies and …, 2016 | 14* | 2016 |
Performance analysis of network intrusion detection systems using j48 and naive bayes algorithms S Razdan, H Gupta, A Seth 2021 6th International Conference for Convergence in Technology (I2CT), 1-7, 2021 | 13 | 2021 |
Impact of side channel attack in information security H Gupta, S Mondal, R Majumdar, NS Ghosh, SS Khan, NE Kwanyu, ... 2019 International Conference on Computational Intelligence and Knowledge …, 2019 | 13 | 2019 |
Agent based security model for cloud big data S Kumar, J Shekhar, H Gupta Proceedings of the Second International Conference on Information and …, 2016 | 13 | 2016 |
A model for biometric security using visual cryptography H Gupta, N Sharma 2016 5th International Conference on Reliability, Infocom Technologies and …, 2016 | 10 | 2016 |
Privacy, security of cookies in HTTP transmission SL Velagapudi, H Gupta 2019 4th International Conference on Information Systems and Computer …, 2019 | 9 | 2019 |
An innovative model for the enhancement of IoT device using lightweight cryptography S Thapliyal, H Gupta, SK Khatri 2019 Amity International Conference on Artificial Intelligence (AICAI), 887-892, 2019 | 8 | 2019 |
Automated Verification in Cryptography System NI Jebadurai, H Gupta Proceedings of the Second International Conference on Information and …, 2016 | 7 | 2016 |
Analysis of social engineering attack on cryptographic algorithm S Gupta, A Bhattacharya, H Gupta 2021 9th International Conference on Reliability, Infocom Technologies and …, 2021 | 6 | 2021 |
Cyber Security Model for Threat Hunting A Agarwal, H Walia, H Gupta 2021 9th International Conference on Reliability, Infocom Technologies and …, 2021 | 5 | 2021 |