Web mining: Today and tomorrow K Sharma, G Shrivastava, V Kumar 2011 3rd International Conference on Electronics Computer Technology 1, 399-403, 2011 | 158 | 2011 |
Defensive Modeling of Fake News Through Online Social Networks G Shrivastava, P Kumar, R Ojha, P Srivastava, S Mohan, G Srivastava IEEE Transactions on Computational Social Systems, 2020 | 120 | 2020 |
Architecting user-centric internet of things for smart agriculture A Sinha, G Shrivastava, P Kumar Sustainable Computing: Informatics and Systems 23, 88-102, 2019 | 107 | 2019 |
Audio Watermarking With Reduced Number of Random Samples R Anand, G Shrivastava, S Gupta, SL Peng, N Sindhwani Handbook of Research on Network Forensics and Analysis Techniques, 372-394, 2018 | 70 | 2018 |
Handbook of Research on Network Forensics and Analysis Techniques G Shrivastava, P Kumar, BB Gupta, S Bala, N Dey IGI Global, 2018 | 51 | 2018 |
Blockchain technology: A DNN token‐based approach in healthcare and COVID‐19 to generate extracted data B Mallikarjuna, G Shrivastava, M Sharma Expert Systems, e12778, 2021 | 39 | 2021 |
Cryptocurrencies and Blockchain Technology Applications G Shrivastava, DN Le, K Sharma John Wiley & Sons, 2020 | 38 | 2020 |
IoT-Based Privacy Control System through Android R Gupta, G Shrivastava, R Anand, T Tomažič Handbook of e-Business Security, 23, 2018 | 37 | 2018 |
Role of Cyber Security in Today's Scenario M Khari, G Shrivastava, S Gupta, R Gupta Detecting and Mitigating Robotic Cyber Security Risks, 177-191, 2017 | 36 | 2017 |
An Energy Efficient and Trust Aware Framework for Secure Routing in LEACH for Wireless Sensor Networks A Migla, T Bhatia, G Sharma, G Shrivastava Scalable Computing: Practice and Experience 18 (3), 207-218, 2017 | 34 | 2017 |
Big data analysis and compression for indoor air quality K Sansanwal, G Shrivastava, R Anand, K Sharma Handbook of IoT and Big Data, 1-21, 2019 | 31 | 2019 |
Role of Cyber Security and Cyber Forensics in India G Shrivastava, K Sharma, M Khari, SE Zohora Handbook of Research on Network Forensics and Analysis Techniques, 143-161, 2018 | 30 | 2018 |
SensDroid: Analysis for Malicious Activity Risk of Android Application G Shrivastava, P Kumar Multimedia Tools and Applications, 1-19, 2019 | 28 | 2019 |
Artificial intelligence based intrusion detection system to detect flooding attack in VANETs MJS Aneja, T Bhatia, G Sharma, G Shrivastava Handbook of Research on Network Forensics and Analysis Techniques, 87-100, 2018 | 28 | 2018 |
Public Key Infrastructure and Trust of Web Based Knowledge Discovery K Sharma, G Shrivastava International Journal of Engineering, Sciences and Management 4 (1), 56-60, 2014 | 27 | 2014 |
Forensic computing models: Technical overview G Shrivastava, K Sharma, A Dwivedi CCSEA, SEA, CLOUD, DKMP, CS & IT 5, 207-216, 2012 | 27 | 2012 |
The detection & defense of DoS & DDos attack: a technical overview G Shrivastava, K Sharma, S Rai International Conference in Computing, 274-282, 2010 | 27 | 2010 |
Forensic investigation in cloud computing environment A Saxena, G Shrivastava, K Sharma The International Journal of forensic computer science 2, 64-74, 2012 | 26 | 2012 |
Privacy issues of android application permissions: A literature review G Shrivastava, P Kumar, D Gupta, JJPC Rodrigues Transactions on Emerging Telecommunications Technologies, 1-14, 2019 | 25 | 2019 |
Smartphone Triggered Security Challenges ‐ Issues, Case Studies and Prevention SR Srivastava, S Dube, G Shrivastava, K Sharma Cyber Security in Parallel and Distributed Computing: Concepts, Techniques …, 2019 | 25 | 2019 |