关注
Dr. Nisha Chaurasia
Dr. Nisha Chaurasia
Assistant Professor (Information Technology)
在 nitj.ac.in 的电子邮件经过验证
标题
引用次数
引用次数
年份
Comprehensive survey on energy-aware server consolidation techniques in cloud computing
N Chaurasia, M Kumar, R Chaudhry, OP Verma
The Journal of Supercomputing 77, 11682-11737, 2021
562021
Journey from cloud of things to fog of things: Survey, new trends, and research directions
A Chakraborty, M Kumar, N Chaurasia, SS Gill
Software: Practice and Experience 53 (2), 496-551, 2023
232023
Brain tumor detection analysis using CNN: a review
S Kumar, R Dhir, N Chaurasia
2021 international conference on artificial intelligence and smart systems …, 2021
232021
A survey on terrorist network mining: current trends and opportunities
N Chaurasia, M Dhakar, A Tiwari, RK Gupta
International Journal of Computer Science and Engineering Survey 3 (4), 59, 2012
222012
Efficient algorithm for destabilization of terrorist networks
N Chaurasia, A Tiwari
International Journal of Information Technology and Computer Science 5 (12 …, 2013
182013
Blockchain inspired secure and reliable data exchange architecture for cyber-physical healthcare system 4.0
M Kumar, H Raj, N Chaurasia, SS Gill
Internet of Things and Cyber-Physical Systems 3, 309-322, 2023
172023
On the use of Brokerage approach to discover influencing nodes in terrorist networks
N Chaurasia, A Tiwari
Social Networking: Mining, Visualization, and Security, 271-295, 2014
102014
Identification of vulnerable selfish peer in P2P network using nature-inspired optimization techniques
MSA Ansari, K Pal, P Govil, MC Govil, N Chaurasia, A Vidyarthi, M Alharbi
Physical Communication 59, 102110, 2023
52023
A resource efficient expectation maximization clustering approach for cloud
N Chaurasia, S Tapaswi, J Dhar
The Computer Journal 61 (1), 95-104, 2018
52018
Exploring the current trends and future prospects in terrorist network mining
N Chaurasia, M Dhakar, A Chharia, A Tiwari, RK Gupta
Proceedings of The Second International Conference on Computer Science …, 2012
52012
A pareto optimal approach for optimal selection of virtual machine for migration in cloud
N Chaurasia, S Tapaswi, J Dhar
International Journal of Computer Science and Information Security (IJCSIS …, 2016
42016
Secure framework for IoT applications using Deep Learning in fog Computing
A Chakraborty, M Kumar, N Chaurasia
Journal of Information Security and Applications 77, 103569, 2023
32023
Uncovering collateral damages and advanced defense strategies in cloud environments against DDoS attacks: A comprehensive review
P Verma, N Bharot, JG Breslin, M Sharma, N Chaurasia, A Vidyarthi
Transactions on Emerging Telecommunications Technologies 35 (4), e4934, 2024
22024
Improved Green Cloud Computing with Reduce Fault in the Network: A Study
S Kaur, N Chaurasia
2021 2nd International Conference on Secure Cyber Computing and …, 2021
22021
M-Health Android Application Using Firebase, Google APIs and Supervised Machine Learning
C Nigam, M Narang, N Chaurasia, A Nanda
Proceedings of the Future Technologies Conference (FTC) 2019: Volume 2, 670-681, 2020
22020
An over-utilization avoidance host selection scheme for affording workload of migrated VM
N Chaurasia, S Tapaswi, J Dhar
2016 SAI Computing Conference (SAI), 553-556, 2016
22016
Novel Algorithm for Terrorist Network Mining
N Chaurasia, A Tiwari
International Journal of Computer Science And Communication Technologies 6 …, 2013
22013
Analysis of K2 based Intrusion Detection System
M Dhakar, N Chaurasia, A Tiwari
Current Research in Engineering, Science and Technology (CREST) Journals, 2013
22013
Estimating the Effectiveness of CNN and Fuzzy Logic for Signature Verification
I Priya, N Chaurasia
2023 Third International Conference on Secure Cyber Computing and …, 2023
12023
An efficient and optimized Markov chain-based prediction for server consolidation in cloud environment
N Chaurasia, M Kumar, A Vidyarthi, K Pal, A Alkhayyat
Computers and Electrical Engineering 108, 108707, 2023
12023
系统目前无法执行此操作,请稍后再试。
文章 1–20