De-militarized zone: A next level to network security K Dadheech, A Choudhary, G Bhatia 2018 Second International Conference on Inventive Communication and …, 2018 | 38 | 2018 |
Emerging Cyber Security Challenges after COVID Pandemic: A Survey ND A Choudhary, G Choudhary, K Pareek, C Kunndra, J Luthra Journal of Internet Services and Information Security 2 (2), 21-50, 2022 | 20* | 2022 |
The road to docker: a survey G Bhatia, A Choudhary, V Gupta International Journal of Advanced Research in Computer Science 8 (8), 83-87, 2017 | 19 | 2017 |
Counterfeited product identification in a supply chain using blockchain technology S Singh, G Choudhary, SK Shandilya, V Sihag, A Choudhary Research Briefs on Information & Communication Technology Evolution 7, 3, 2021 | 14 | 2021 |
Hate and aggression detection in social media over hindi english language K Pareek, A Choudhary, A Tripathi, KK Mishra, N Mittal International Journal of Software Science and Computational Intelligence …, 2022 | 10 | 2022 |
Evolving evidence gathering process: cloud forensics P Srivastava, A Choudhary Proceedings of International Conference on Big Data, Machine Learning and …, 2021 | 10 | 2021 |
Analyzing skin disease using XCNN (extended convolutional neural network) A Tripathi, AK Singh, A Singh, A Choudhary, K Pareek, KK Mishra International Journal of Software Science and Computational Intelligence …, 2022 | 8 | 2022 |
A survey of energy theft detection approaches in smart meters D Lehri, A Choudhary Intelligent Energy Management Technologies: ICAEM 2019, 9-24, 2020 | 7 | 2020 |
Behavioral analysis of docker swarm under dos/ddos attack G Bhatia, A Choudhary, K Dadheech 2018 Second International Conference on Inventive Communication and …, 2018 | 6 | 2018 |
Comparative Analysis of Social Media Hate Detection over Code Mixed Hindi-English Language K Pareek, A Choudhary, A Tripathi, KK Mishra Advances in Data and Information Sciences: Proceedings of ICDIS 2021, 551-561, 2022 | 4 | 2022 |
Emerging threats in cloud computing A Choudhary, R Bhadada Emerging Technology Trends in Electronics, Communication and Networking …, 2020 | 4 | 2020 |
Evolution and comparative analysis of different Cloud Access Security Brokers in current era A Choudhary, A Tripathi, A Sharma, R Singh 2022 International Conference on Fourth Industrial Revolution Based …, 2022 | 3 | 2022 |
An adaptive auto incident response based security framework for wireless network systems SN Pujar, G Choudhary, SK Shandilya, V Sihag, A Choudhary Research Briefs on Information & Communication Technology Evolution 7, 4, 2021 | 3 | 2021 |
Approach for Ensuring Fragmentation and Integrity of Data in SEDuLOUS AP Singh, A Choudhary Proceedings of Second International Conference on Computing, Communications …, 2021 | 3 | 2021 |
Crypto Bank: Cryptocurrency Wallet Based on Blockchain A Tripathi, A Choudhary, SK Arora, G Arora, G Shakya, B Rajwanshi International Conference on Recent Trends in Image Processing and Pattern …, 2023 | 2 | 2023 |
CNN-LSTM: A Deep Learning Model to Detect Botnet Attacks in Internet of Things C Kunndra, A Choudhary, P Mathur, K Pareek, G Choudhary International Conference on Cryptology & Network Security with Machine …, 2022 | 2 | 2022 |
Insider threat detection and cloud computing A Choudhary, R Bhadada Advances in Data and Information Sciences: Proceedings of ICDIS 2021, 81-90, 2022 | 2 | 2022 |
Combating DoS Attack on OpenStack Using Hypervisor Based Intrusion Detection System with the Help of Machine Learning S Mondal, A Choudhary Proceedings of International Conference on Big Data, Machine Learning and …, 2021 | 2 | 2021 |
Securing Virtual Infrstructure in Cloud Computing using Big Data Analytics AK Gupta, A Choudhary, P Chauhan 2018 International Conference on Advances in Computing, Communication …, 2019 | 2 | 2019 |
Augmented Reality and Its Significance in Healthcare Systems A Tripathi, N Chauhan, A Choudhary, R Singh Meta-Learning Frameworks for Imaging Applications, 103-118, 2023 | 1 | 2023 |