Cloud business intelligence–is what business need today YS Gurjar, VS Rathore International Journal of Recent Technology and Engineering 1 (6), 81-86, 2013 | 77 | 2013 |
Efficient capabilities of processing of big data using hadoop map reduce P Kumar, DVS Rathore International Journal of Advanced Research in Computer and Communication …, 2014 | 23 | 2014 |
Analysis of different vulnerabilities in auto teller machine transactions N Sharma, DVS Rathore International Journal of Global Research in Computer Science (UGC Approved …, 2012 | 21 | 2012 |
Analysis and Comparative Exploration of Elastic Search, MongoDB and Hadoop Big Data Processing P Kumar, P Kumar, N Zaidi, VS Rathore Soft Computing: Theories and Applications, 605-615, 2018 | 20 | 2018 |
Improvising and optimizing resource utilization in big data processing P Kumar, VS Rathore Proceedings of Fifth International Conference on Soft Computing for Problem …, 2016 | 15 | 2016 |
Present and future access methodologies of big data P Kumar, B Dhruv, S Rawat, VS Rathore Int J Adv Res Sci Eng 8354 (3), 541-547, 2014 | 12 | 2014 |
Role of biometric technology over advanced security and protection in auto teller machine transaction N Sharma, VS Rathore International Journal of Engineering and Advanced Technology (IJEAT) 1 (6 …, 2012 | 10 | 2012 |
Design and Performance Evaluation of Hybrid Wired-Wireless Network on Chip Interconnect Architectures P Mitra, B Sharma, VK Chandna, VS Rathore Third International Congress on Information and Communication Technology …, 2019 | 8 | 2019 |
Rebalancing the IT equation with cloud computing to drive business agility. YS Gurjar, VS Rathore International Journal of Innovative Technology and Exploring Engineering 2 …, 2013 | 7 | 2013 |
Different Data Encryption Methods Used in Secure Auto Teller Machine Transactions N Sharma, VS Rathore International Journal of Engineering and Advanced Technology (IJEAT) 1 (4 …, 2012 | 7 | 2012 |
Analysis of Load Balancing Algorithms Using Cloud Analyst J Rathore, B Keswani, VS Rathore Emerging Trends in Expert Applications and Security, 291-298, 2019 | 6 | 2019 |
A Framework for Safe Mode Alarm REporting Technique (SMART) in ATMs DVSR Madhu Sharma International Journal of Computer Applications 96 (1), 10-12, 2014 | 6 | 2014 |
Study & Analysis of Secured E-Commerce Transactions Information ProtocolsPurchasing Order D Saini, DVS Rathore IJCSMS 12 (03), 2231-5268, 2012 | 6 | 2012 |
Importance of ICT and e-Governance Security in Punjab J Kaur, DVS Rathore Global Journal of Computer Science and Technology 12 (2), 63-69, 2012 | 6 | 2012 |
Coronavirus (COVID-19) in India-Statistics & Facts VS Rathore, V Kumawat, B Umamaheswari 2020 Fourth World Conference on Smart Trends in Systems, Security and …, 2020 | 5 | 2020 |
A Review on Security and Reporting Mechanisms for Coerced Cash Withdrawal from ATM M Sharma, VS Rathore International Journal of Enhanced Research in Science & Technology 3 (5 …, 2014 | 5 | 2014 |
Assessment of SEcurity in Mobile AdHoc Networks D Chayal, DVS Rathore Journal of Global research in Computer Science 2 (6), 137-139, 2011 | 5 | 2011 |
The Rising of Blockchain Technology and Its Adoption in India VS Rathore, V Kumawat, B Umamaheswari Rising Threats in Expert Applications and Solutions, 351-357, 2020 | 4 | 2020 |
Emerging Trends in Expert Applications and Security: Proceedings of ICETEAS 2018 VS Rathore, M Worring, DK Mishra, A Joshi, S Maheshwari Springer, 2018 | 4* | 2018 |
Emerging Trends in Expert Applications and Security VS Rathore, M Worring, DK Mishra, A Joshi, S Maheshwari | 4 | 2018 |