A survey and classification of web phishing detection schemes G Varshney, M Misra, PK Atrey Security and Communication Networks 9 (2016), 6266-6284, 2016 | 165 | 2016 |
A phish detector using lightweight search features G Varshney, AP Misra Manoj Computer & Security 62 (September 2016), 213-228, 2016 | 93 | 2016 |
Understanding the Social Factors Affecting the Cryptocurrency Market G Aggarwal, V Patel, G Varshney, K Oostman The 13th International Conference for Internet Technology and Secured …, 2019 | 36 | 2019 |
Email spoofing detection using volatile memory forensics P Iyer, P Atrey, G Varshney, M Misra 2017 IEEE Conference on Communications and Network Security (CNS), 619-625, 2017 | 16 | 2017 |
Malicious browser extensions: A growing threat: A case study on Google Chrome: Ongoing work in progress G Varshney, S Bagade, S Sinha 2018 International Conference on Information Networking (ICOIN), 188-193, 2018 | 14 | 2018 |
An improved authentication scheme for BLE devices with no I/O capabilities C Gupta, G Varshney Computer Communications 200, 42-53, 2023 | 12 | 2023 |
Secure authentication scheme to thwart RT MITM, CR MITM and malicious browser extension based phishing attacks G Varshney, M Misra, P Atrey Journal of Information Security and Applications 42 (October 2018), 1-17, 2018 | 12 | 2018 |
Push notification based login using BLE devices G Varshney, M Mishra 2017 2nd International conferences on Information Technology, Information …, 2018 | 12 | 2018 |
Personal secret information based authentication towards preventing phishing attacks G Varshney, RC Joshi, A Sardana Advances in Computing and Information Technology: Proceedings of the Second …, 2012 | 12 | 2012 |
Identification of spoofed emails by applying email forensics and memory forensics S Shukla, M Misra, G Varshney Proceedings of the 2020 10th International Conference on Communication and …, 2020 | 10 | 2020 |
Improving the accuracy of search engine based anti-phishing solutions using lightweight features G Varshney, M Misra, PK Atrey 2016 11th International Conference for Internet Technology and Secured …, 2016 | 10 | 2016 |
Secret information display based authentication technique towards preventing phishing attacks G Varshney, A Sardana, RC Joshi Proceedings of the International Conference on Advances in Computing …, 2012 | 10 | 2012 |
Anti-phishing: A comprehensive perspective G Varshney, R Kumawat, V Varadharajan, U Tupakula, C Gupta Expert Systems with Applications 238, 122199, 2024 | 9 | 2024 |
HTTP header based phishing attack detection using machine learning S Shukla, M Misra, G Varshney Transactions on Emerging Telecommunications Technologies 35 (1), e4872, 2024 | 9 | 2024 |
A Comprehensive Survey of Aadhar and Security Issues I Pali, L Krishania, D Chadha, A Kandar, G Varshney, S Shukla https://arxiv.org/abs/2007.09409, 2020 | 9 | 2020 |
Detecting Spying and Fraud Browser Extensions: Short Paper G Varshney, M Misra, P Atrey MPS '17@ACM CCS Proceedings of the 2017 on Multimedia Privacy and Security …, 2017 | 9 | 2017 |
Evading DoH via live memory forensics for phishing detection and content filtering G Varshney, P Iyer, P Atrey, M Misra 2021 International Conference on COMmunication Systems & NETworkS (COMSNETS …, 2021 | 8 | 2021 |
Browshing a new way of phishing using a malicious browser extension G Varshney, M Manoj, P Atrey 2017 Innovations in Power and Advanced Computing Technologies (i-PACT), 2018 | 7 | 2018 |
A new secure authentication scheme for web login using BLE smart devices G Varshney, M Misra, P Atrey 2017 11th IEEE International Conference on Anti-counterfeiting, Security …, 2017 | 7 | 2017 |
SecureCEdit: An approach for secure cloud-based document editing S Arora, G Varshney, PK Atrey, M Mishra 2016 IEEE Conference on Communications and Network Security (CNS), 561-564, 2016 | 6 | 2016 |