Analysis of different vulnerabilities in auto teller machine transactions N Sharma Journal of Global Research in Computer Science 3 (3), 38-40, 2012 | 25 | 2012 |
Role of biometric technology over advanced security and protection in auto teller machine transaction N Sharma, VS Rathore International Journal of Engineering and Advanced Technology (IJEAT) 1 (6 …, 2012 | 12 | 2012 |
Different data encryption methods used in secure auto teller machine transactions N Sharma, VS Rathore International Journal of Engineering and Advanced Technology (IJEAT) 1 (4), 2012 | 7 | 2012 |
Phishing website prediction by using cuckoo search as a feature selection and random forest and BF-tree classifier as a classification method A Saxena, N Sharma, P Agarwal, R Barotia Rising Threats in Expert Applications and Solutions: Proceedings of FICR …, 2020 | 6 | 2020 |
A Review and Comparative Study of Framework for E-Commerce Application Service on to the Public Cloud Environment M Sharma, N Sharma Rising Threats in Expert Applications and Solutions: Proceedings of FICR …, 2020 | 3 | 2020 |
Financial data mining: appropriate selection of tools, techniques and algorithms A Saxena, N Sharma, K Saxena, SM Parikh Smart Trends in Information Technology and Computer Communications: Second …, 2018 | 3 | 2018 |
A Proposed Structure, Primarily Based Totally on Cloud Computing for Enhancing Electronic Commerce Applications N Tiwari, N Sharma Rising Threats in Expert Applications and Solutions: Proceedings of FICR …, 2022 | 2 | 2022 |
Docker Security Analysis Mechanism with Linux Platform D Saxena, N Sharma Rising Threats in Expert Applications and Solutions: Proceedings of FICR …, 2021 | 2 | 2021 |
Analysis of Docker Performance in Cloud Environment D Saxena, N Sharma Advances in Information Communication Technology and Computing: Proceedings …, 2021 | 2 | 2021 |
Investigation of privacy-preserving data models and contributions K Ahuja, N Sharma, DK Mishra, RK Vyas 2019 6th International Conference on Computing for Sustainable Global …, 2019 | 2 | 2019 |
A study on benefits and classification of load balancing in cloud computing environment A Saxena, N Sharma, J Goyal, S Saxena Proceedings of 3rd International Conference on Internet of Things and …, 2018 | 2 | 2018 |
Machine learning model matters its accuracy: a comparative study of ensemble learning and automl using heart disease prediction Y Rimal, S Paudel, N Sharma, A Alsadoon Multimedia Tools and Applications 83 (12), 35025-35042, 2024 | 1 | 2024 |
An optimal approach for e-commerce application service on to the public cloud environment M Sharma, N Sharma 2021 Third International Conference on Intelligent Communication …, 2021 | 1 | 2021 |
Rising Threats in Expert Applications and Solutions Proceedings of FICR-TEAS 2020 VS Rathore, N Dey, V Piuri, R Babo, Z Polkowski, JMRS Tavares Proceedings of FICR-TEAS, 1, 2020 | 1 | 2020 |
Toward adapting metamodeling approach for legacy to cloud migration P Parnami, A Jain, N Sharma Ambient Communications and Computer Systems: RACCCS-2018, 275-284, 2019 | 1 | 2019 |
Information Technology A Tool of Managing HR RK Tailor, N Sharma Inspira J Modern Manag Entrepreneurship 5 (1), 111-6, 2015 | 1 | 2015 |
Vulnerability and security issues in Auto teller machine transactions N Sharma Natl. Conf. Secur. Data Commun. Networks, 2011 | 1 | 2011 |
Classification for EEG Signals Using Machine Learning Algorithm GTNS Shirish Mohan Dubey, Budesh Kanwer Communications in Computer and Information Science book series, 2023 | | 2023 |
Consideration for NoSQL Databases Technical Consolidation AS Bais, N Sharma Proceedings of Seventh International Congress on Information and …, 2022 | | 2022 |
Comparative Study of Error Tolerance Technology in Cloud Website and Related Application NTDN Sharma NeuroQuantology 20 (6), 4642, 2022 | | 2022 |