Web mining: Today and tomorrow K Sharma, G Shrivastava, V Kumar 2011 3rd International Conference on Electronics Computer Technology 1, 399-403, 2011 | 156 | 2011 |
Defensive Modeling of Fake News Through Online Social Networks G Shrivastava, P Kumar, R Ojha, P Srivastava, S Mohan, G Srivastava IEEE Transactions on Computational Social Systems, 2020 | 127 | 2020 |
Architecting user-centric internet of things for smart agriculture A Sinha, G Shrivastava, P Kumar Sustainable Computing: Informatics and Systems 23, 88-102, 2019 | 112 | 2019 |
Audio Watermarking With Reduced Number of Random Samples R Anand, G Shrivastava, S Gupta, SL Peng, N Sindhwani Handbook of Research on Network Forensics and Analysis Techniques, 372-394, 2018 | 75 | 2018 |
Handbook of Research on Network Forensics and Analysis Techniques G Shrivastava, P Kumar, BB Gupta, S Bala, N Dey IGI Global, 2018 | 50 | 2018 |
Big data analysis and compression for indoor air quality K Sansanwal, G Shrivastava, R Anand, K Sharma Handbook of IoT and Big Data, 1-21, 2019 | 41 | 2019 |
Blockchain technology: A DNN token‐based approach in healthcare and COVID‐19 to generate extracted data B Mallikarjuna, G Shrivastava, M Sharma Expert Systems, e12778, 2021 | 40 | 2021 |
Cryptocurrencies and Blockchain Technology Applications G Shrivastava, DN Le, K Sharma John Wiley & Sons, 2020 | 40* | 2020 |
IoT-Based Privacy Control System through Android R Gupta, G Shrivastava, R Anand, T Tomažič Handbook of e-Business Security, 23, 2018 | 38 | 2018 |
Role of Cyber Security in Today's Scenario M Khari, G Shrivastava, S Gupta, R Gupta Detecting and Mitigating Robotic Cyber Security Risks, 177-191, 2017 | 37 | 2017 |
An Energy Efficient and Trust Aware Framework for Secure Routing in LEACH for Wireless Sensor Networks A Migla, T Bhatia, G Sharma, G Shrivastava Scalable Computing: Practice and Experience 18 (3), 207-218, 2017 | 33 | 2017 |
Role of Cyber Security and Cyber Forensics in India G Shrivastava, K Sharma, M Khari, SE Zohora Handbook of Research on Network Forensics and Analysis Techniques, 143-161, 2018 | 31 | 2018 |
SensDroid: Analysis for Malicious Activity Risk of Android Application G Shrivastava, P Kumar Multimedia Tools and Applications, 1-19, 2019 | 29 | 2019 |
Artificial intelligence based intrusion detection system to detect flooding attack in VANETs MJS Aneja, T Bhatia, G Sharma, G Shrivastava Handbook of Research on Network Forensics and Analysis Techniques, 87-100, 2018 | 28 | 2018 |
Forensic computing models: Technical overview G Shrivastava, K Sharma, A Dwivedi CCSEA, SEA, CLOUD, DKMP, CS & IT 5, 207-216, 2012 | 28 | 2012 |
Privacy issues of android application permissions: A literature review G Shrivastava, P Kumar, D Gupta, JJPC Rodrigues Transactions on Emerging Telecommunications Technologies, 1-14, 2019 | 27 | 2019 |
Network forensics: Methodical literature review G Shrivastava 2016 3rd International Conference on Computing for Sustainable Global …, 2016 | 27 | 2016 |
Public Key Infrastructure and Trust of Web Based Knowledge Discovery K Sharma, G Shrivastava International Journal of Engineering, Sciences and Management 4 (1), 56-60, 2014 | 27 | 2014 |
Forensic investigation in cloud computing environment A Saxena, G Shrivastava, K Sharma The International Journal of forensic computer science 2, 64-74, 2012 | 27 | 2012 |
The detection & defense of DoS & DDos attack: a technical overview G Shrivastava, K Sharma, S Rai International Conference in Computing, 274-282, 2010 | 27 | 2010 |