Gulshan Shrivastava
TitleCited byYear
Web mining: Today and tomorrow
K Sharma, G Shrivastava, V Kumar
2011 3rd International Conference on Electronics Computer Technology 1, 399-403, 2011
1022011
Forensic investigation in cloud computing environment
A Saxena, G Shrivastava, K Sharma
The International Journal of forensic computer science 2, 64-74, 2012
202012
The detection & defense of DoS & DDos attack: a technical overview
G Shrivastava, K Sharma, S Rai
Proceeding of ICC, 274-282, 2010
192010
Forensic computing models: Technical overview
G Shrivastava, K Sharma, A Dwivedi
CCSEA, SEA, CLOUD, DKMP, CS & IT 5, 207-216, 2012
172012
An Energy Efficient and Trust Aware Framework for Secure Routing in LEACH for Wireless Sensor Networks
A Migla, T Bhatia, G Sharma, G Shrivastava
Scalable Computing: Practice and Experience 18 (3), 207-218, 2017
152017
Public Key Infrastructure and Trust of Web Based Knowledge Discovery
G Shrivastava, K Sharma
International Journal of Engineering, Sciences and Management 4 (1), 56-60, 2014
132014
Privacy analysis of android applications: state-of-art and literary assessment
G Shrivastava, P Kumar
Scalable Computing: Practice and Experience 18 (3), 243-252, 2017
112017
An encapsulated approach of forensic model for digital investigation
G Shrivastava, BB Gupta
2014 IEEE 3rd Global Conference on Consumer Electronics (GCCE), 280-284, 2014
112014
Secure association rule mining for distributed level hierarchy in Web
G Shrivastava, V Bhatnagar
International Journal on Computer Science and Engineering 3 (6), 2240-2244, 2011
112011
Detecting a Wide Range of Flooding DDoS Attacks using Linear Prediction Model
BB Gupta, RC Joshi, M Misra, DL Meena, G Shrivastava, K Sharma
2nd International Conference on Information and Multimedia Technology (ICIMT …, 2010
112010
Role of Cyber Security in Today's Scenario
M Khari, G Shrivastava, S Gupta, R Gupta
Detecting and Mitigating Robotic Cyber Security Risks, 177-191, 2017
102017
Network Forensics: Today and Tomorrow
G Shrivastava, K Sharma, R Kumari
3rd International Conference on “Computing for Sustainable Global …, 2016
102016
Approaches of network forensic model for investigation
G Shrivastava
International Journal of Forensic Engineering 3 (3), 195-215, 2017
92017
Analyses of Algorithms and Complexity for Secure Association Rule Mining of Distributed Level Hierarchy in Web
G Shrivastava, V Bhatnagar
International Journal of Advanced Research in Computer Science 2 (4), 311-314, 2011
82011
Network forensics: Methodical literature review
G Shrivastava
2016 3rd International Conference on Computing for Sustainable Global …, 2016
72016
Steganography and its technique: Technical overview
G Shrivastava, A Pandey, K Sharma
Proceedings of the Third International Conference on Trends in Information …, 2013
62013
A new framework semantic web technology based e-learning
G Shrivastava, K Sharma, A Bawankan
2012 11th International Conference on Environment and Electrical Engineering …, 2012
52012
Handbook of Research on Network Forensics and Analysis Techniques
G Shrivastava, P Kumar, BB Gupta, S Bala, N Dey
IGI Global, 2018
42018
Role of Cyber Security and Cyber Forensics in India
G Shrivastava, K Sharma, M Khari, SE Zohora
Handbook of Research on Network Forensics and Analysis Techniques, 143-161, 2018
42018
Artificial intelligence based intrusion detection system to detect flooding attack in VANETs
MJS Aneja, T Bhatia, G Sharma, G Shrivastava
Handbook of Research on Network Forensics and Analysis Techniques, 87-100, 2018
32018
The system can't perform the operation now. Try again later.
Articles 1–20