Comprehensive survey on energy-aware server consolidation techniques in cloud computing N Chaurasia, M Kumar, R Chaudhry, OP Verma The Journal of Supercomputing 77, 11682-11737, 2021 | 56 | 2021 |
Journey from cloud of things to fog of things: Survey, new trends, and research directions A Chakraborty, M Kumar, N Chaurasia, SS Gill Software: Practice and Experience 53 (2), 496-551, 2023 | 23 | 2023 |
Brain tumor detection analysis using CNN: a review S Kumar, R Dhir, N Chaurasia 2021 international conference on artificial intelligence and smart systems …, 2021 | 23 | 2021 |
A survey on terrorist network mining: current trends and opportunities N Chaurasia, M Dhakar, A Tiwari, RK Gupta International Journal of Computer Science and Engineering Survey 3 (4), 59, 2012 | 22 | 2012 |
Efficient algorithm for destabilization of terrorist networks N Chaurasia, A Tiwari International Journal of Information Technology and Computer Science 5 (12 …, 2013 | 18 | 2013 |
Blockchain inspired secure and reliable data exchange architecture for cyber-physical healthcare system 4.0 M Kumar, H Raj, N Chaurasia, SS Gill Internet of Things and Cyber-Physical Systems 3, 309-322, 2023 | 17 | 2023 |
On the use of Brokerage approach to discover influencing nodes in terrorist networks N Chaurasia, A Tiwari Social Networking: Mining, Visualization, and Security, 271-295, 2014 | 10 | 2014 |
Identification of vulnerable selfish peer in P2P network using nature-inspired optimization techniques MSA Ansari, K Pal, P Govil, MC Govil, N Chaurasia, A Vidyarthi, M Alharbi Physical Communication 59, 102110, 2023 | 5 | 2023 |
A resource efficient expectation maximization clustering approach for cloud N Chaurasia, S Tapaswi, J Dhar The Computer Journal 61 (1), 95-104, 2018 | 5 | 2018 |
Exploring the current trends and future prospects in terrorist network mining N Chaurasia, M Dhakar, A Chharia, A Tiwari, RK Gupta Proceedings of The Second International Conference on Computer Science …, 2012 | 5 | 2012 |
A pareto optimal approach for optimal selection of virtual machine for migration in cloud N Chaurasia, S Tapaswi, J Dhar International Journal of Computer Science and Information Security (IJCSIS …, 2016 | 4 | 2016 |
Secure framework for IoT applications using Deep Learning in fog Computing A Chakraborty, M Kumar, N Chaurasia Journal of Information Security and Applications 77, 103569, 2023 | 3 | 2023 |
Uncovering collateral damages and advanced defense strategies in cloud environments against DDoS attacks: A comprehensive review P Verma, N Bharot, JG Breslin, M Sharma, N Chaurasia, A Vidyarthi Transactions on Emerging Telecommunications Technologies 35 (4), e4934, 2024 | 2 | 2024 |
Improved Green Cloud Computing with Reduce Fault in the Network: A Study S Kaur, N Chaurasia 2021 2nd International Conference on Secure Cyber Computing and …, 2021 | 2 | 2021 |
M-Health Android Application Using Firebase, Google APIs and Supervised Machine Learning C Nigam, M Narang, N Chaurasia, A Nanda Proceedings of the Future Technologies Conference (FTC) 2019: Volume 2, 670-681, 2020 | 2 | 2020 |
An over-utilization avoidance host selection scheme for affording workload of migrated VM N Chaurasia, S Tapaswi, J Dhar 2016 SAI Computing Conference (SAI), 553-556, 2016 | 2 | 2016 |
Novel Algorithm for Terrorist Network Mining N Chaurasia, A Tiwari International Journal of Computer Science And Communication Technologies 6 …, 2013 | 2 | 2013 |
Analysis of K2 based Intrusion Detection System M Dhakar, N Chaurasia, A Tiwari Current Research in Engineering, Science and Technology (CREST) Journals, 2013 | 2 | 2013 |
Estimating the Effectiveness of CNN and Fuzzy Logic for Signature Verification I Priya, N Chaurasia 2023 Third International Conference on Secure Cyber Computing and …, 2023 | 1 | 2023 |
An efficient and optimized Markov chain-based prediction for server consolidation in cloud environment N Chaurasia, M Kumar, A Vidyarthi, K Pal, A Alkhayyat Computers and Electrical Engineering 108, 108707, 2023 | 1 | 2023 |