Follow
Arjun Choudhary
Arjun Choudhary
Deputy Director Centre for Cyber Security, Police University, India
Verified email at policeuniversity.ac.in
Title
Cited by
Cited by
Year
De-militarized zone: A next level to network security
K Dadheech, A Choudhary, G Bhatia
2018 Second International Conference on Inventive Communication and …, 2018
342018
The road to docker: a survey
G Bhatia, A Choudhary, V Gupta
International Journal of Advanced Research in Computer Science 8 (8), 83-87, 2017
192017
Counterfeited product identification in a supply chain using blockchain technology
S Singh, G Choudhary, SK Shandilya, V Sihag, A Choudhary
Research Briefs on Information & Communication Technology Evolution 7, 3, 2021
122021
Hate and aggression detection in social media over hindi english language
K Pareek, A Choudhary, A Tripathi, KK Mishra, N Mittal
International Journal of Software Science and Computational Intelligence …, 2022
82022
Evolving evidence gathering process: cloud forensics
P Srivastava, A Choudhary
Proceedings of International Conference on Big Data, Machine Learning and …, 2021
82021
Emerging Cyber Security Challenges after COVID Pandemic: A Survey
ND A Choudhary, G Choudhary, K Pareek, C Kunndra, J Luthra
Journal of Internet Services and Information Security 2 (2), 21-50, 2022
7*2022
A survey of energy theft detection approaches in smart meters
D Lehri, A Choudhary
Intelligent Energy Management Technologies: ICAEM 2019, 9-24, 2020
62020
Behavioral analysis of docker swarm under dos/ddos attack
G Bhatia, A Choudhary, K Dadheech
2018 Second International Conference on Inventive Communication and …, 2018
62018
Comparative Analysis of Social Media Hate Detection over Code Mixed Hindi-English Language
K Pareek, A Choudhary, A Tripathi, KK Mishra
Advances in Data and Information Sciences: Proceedings of ICDIS 2021, 551-561, 2022
42022
Analyzing Skin Disease Using XCNN (eXtended Convolutional Neural Network)
A Tripathi, AK Singh, A Singh, A Choudhary, K Pareek, KK Mishra
International Journal of Software Science and Computational Intelligence …, 2022
42022
An adaptive auto incident response based security framework for wireless network systems
SN Pujar, G Choudhary, SK Shandilya, V Sihag, A Choudhary
Research Briefs on Information & Communication Technology Evolution 7, 4, 2021
32021
Emerging threats in cloud computing
A Choudhary, R Bhadada
Emerging Technology Trends in Electronics, Communication and Networking …, 2020
32020
Evolution and comparative analysis of different Cloud Access Security Brokers in current era
A Choudhary, A Tripathi, A Sharma, R Singh
2022 International Conference on Fourth Industrial Revolution Based …, 2022
22022
Approach for Ensuring Fragmentation and Integrity of Data in SEDuLOUS
AP Singh, A Choudhary
Proceedings of Second International Conference on Computing, Communications …, 2021
22021
Securing Virtual Infrstructure in Cloud Computing using Big Data Analytics
AK Gupta, A Choudhary, P Chauhan
2018 International Conference on Advances in Computing, Communication …, 2019
22019
Crypto Bank: Cryptocurrency Wallet Based on Blockchain
A Tripathi, A Choudhary, SK Arora, G Arora, G Shakya, B Rajwanshi
International Conference on Recent Trends in Image Processing and Pattern …, 2023
12023
Augmented Reality and Its Significance in Healthcare Systems
A Tripathi, N Chauhan, A Choudhary, R Singh
Meta-Learning Frameworks for Imaging Applications, 103-118, 2023
12023
CNN-LSTM: A Deep Learning Model to Detect Botnet Attacks in Internet of Things
C Kunndra, A Choudhary, P Mathur, K Pareek, G Choudhary
International Conference on Cryptology & Network Security with Machine …, 2022
12022
Insider threat detection and cloud computing
A Choudhary, R Bhadada
Advances in Data and Information Sciences: Proceedings of ICDIS 2021, 81-90, 2022
12022
Combating DoS Attack on OpenStack Using Hypervisor Based Intrusion Detection System with the Help of Machine Learning
S Mondal, A Choudhary
Proceedings of International Conference on Big Data, Machine Learning and …, 2021
12021
The system can't perform the operation now. Try again later.
Articles 1–20