Security Algorithms for Cloud Computing A Bhardwaj, GVB Subrahmanyam, V Avasthi, H Sastry Procedia Science Direct (Elsevier) 85 (2016), 535-542, 2016 | 152 | 2016 |
Penetration testing framework for smart contract blockchain A Bhardwaj, SBH Shah, A Shankar, M Alazab, M Kumar, TR Gadekallu Peer-to-Peer Networking and Applications 14, 2635-2650, 2021 | 93 | 2021 |
Ransomware Digital Extortion: A Rising New Age Threat A Bhardwaj, V Avasthi, H Sastry, GVB Subrahmanyam Indian Journal of Science and Technology (INDJST) 9 (14), 5, 2016 | 80 | 2016 |
Detecting ransomware using process behavior analysis A Arabo, R Dijoux, T Poulain, G Chevalier Procedia Computer Science 168, 289-296, 2020 | 70 | 2020 |
Smart IoT and machine learning-based framework for water quality assessment and device component monitoring A Bhardwaj, V Dagar, MO Khan, A Aggarwal, R Alvarado, M Kumar, ... Environmental Science and Pollution Research 29 (30), 46018-46036, 2022 | 57 | 2022 |
Why is phishing still successful? A Bhardwaj, V Sapra, A Kumar, N Kumar, S Aarthi Computer Fraud & Security 2020 (9), 15-19, 2020 | 57 | 2020 |
Cloud and IoT based smart architecture for desalination water treatment M Alshehri, A Bhardwaj, M Kumar, S Mishra, J Gyani Environmental research 195, 110812, 2021 | 48 | 2021 |
Impact of social networking on Indian youth-A survey A Bhardwaj, V Avasthi, S Goundar International Journal of Electronics and Information Engineering 7 (1), 41-51, 2017 | 47 | 2017 |
Capturing-the-invisible (CTI): Behavior-based attacks recognition in IoT-oriented industrial control systems A Bhardwaj, F Al-Turjman, M Kumar, T Stephan, L Mostarda IEEE access 8, 104956-104966, 2020 | 46 | 2020 |
Machine Learning-Based Regression Framework to Predict Health Insurance Premiums K Kaushik, A Bhardwaj, AD Dwivedi, R Singh International Journal of Environmental Research and Publich Health, 2022 | 44 | 2022 |
DDoS Attacks, New DDoS Taxonomy and Mitigation Solutions - A Survey A Bhardwaj, GVB Subrahmanyam, V Avasthi, H Sastry, S Goundar IEEE Xplore 1 (78-1-5090-4620-1/16), 793-798, 2016 | 37 | 2016 |
Deep Learning Based Approach to Classify Saline Particles in Sea Water M Alshehri, M Kumar, A Bhardwaj, S Mishra, S Gyani MDPI Water 13, 2021 | 32 | 2021 |
Cyber security attacks on robotic platforms A Bhardwaj, V Avasthi, S Goundar Network Security 2019 (10), 13-19, 2019 | 32 | 2019 |
Ransomware: A rising threat of new age digital extortion A Bhardwaj Online Banking Security Measures and Data Protection, 189-221, 2017 | 32 | 2017 |
Keyloggers: silent cyber security weapons A Bhardwaj, S Goundar Network Security 2020 (2), 14-19, 2020 | 31 | 2020 |
A framework for effective threat hunting A Bhardwaj, S Goundar Network Security 2019 (6), 15-19, 2019 | 28 | 2019 |
Health insurance claim prediction using artificial neural networks S Goundar, S Prakash, P Sadal, A Bhardwaj International Journal of System Dynamics Applications (IJSDA) 9 (3), 40-57, 2020 | 25 | 2020 |
Privacy-aware detection framework to mitigate new-age phishing attacks A Bhardwaj, F Al-Turjman, V Sapra, M Kumar, T Stephan Computers & Electrical Engineering 96, 107546, 2021 | 24 | 2021 |
Framework to define relationship between Cyber Security and Cloud Performance A Bhardwaj, S Goundar Elsevier Computer Fraud and Security, 2018 | 24 | 2018 |
Predictive analytics-based cybersecurity framework for cloud infrastructure A Bhardwaj, K Kaushik International Journal of Cloud Applications and Computing (IJCAC) 12 (1), 1-20, 2022 | 22 | 2022 |