Study and investigation on 5G technology: A systematic review R Dangi, P Lalwani, G Choudhary, I You, G Pau Sensors 22 (1), 26, 2021 | 241 | 2021 |
Intrusion Detection Systems for Networked Unmanned Aerial Vehicles: A Survey G Choudhary, V Sharma, I You, K Yim, R Chen, JH Cho 2018 14th International Wireless Communications & Mobile Computing …, 2018 | 102 | 2018 |
Internet of Drones (IoD): threats, vulnerability, and security perspectives G Choudhary, V Sharma, T Gupta, J Kim, I You MobiSec’18: The 3rd International Symposium on Mobile Internet Security, 2018 | 98 | 2018 |
An enhanced LoRaWAN security protocol for privacy preservation in IoT with a case study on a smart factory-enabled parking system I You, S Kwon, G Choudhary, V Sharma, JT Seo Sensors 18 (6), 1888, 2018 | 71 | 2018 |
Behavior and vulnerability assessment of drones-enabled industrial internet of things (iiot) V Sharma, G Choudhary, Y Ko, I You IEEE Access 6, 43368-43383, 2018 | 69 | 2018 |
Sustainable and secure trajectories for the military Internet of Drones (IoD) through an efficient Medium Access Control (MAC) protocol G Choudhary, V Sharma, I You Computers & Electrical Engineering 74, 59-73, 2019 | 68 | 2019 |
De-LADY: Deep learning based Android malware detection using Dynamic features V Sihag, M Vardhan, P Singh, G Choudhary, S Son Journal of Internet Services and Information Security (JISIS) 11 (2), 34-45, 2021 | 57 | 2021 |
Security of 5g-mobile backhaul networks: a survey G Choudhary, J Kim, V Sharma Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable …, 2019 | 47 | 2019 |
Ml-based 5g network slicing security: A comprehensive survey R Dangi, A Jadhav, G Choudhary, N Dragoni, MK Mishra, P Lalwani Future Internet 14 (4), 116, 2022 | 44 | 2022 |
Cyber Security Challenges in Aviation Communication, Navigation, and Surveillance G Dave, G Choudhary, V Sihag, I You, KKR Choo Computers & Security, 102516, 2022 | 42 | 2022 |
Blockchain-based privacy preservation scheme for misbehavior detection in lightweight IoMT devices S Rahmadika, PV Astillo, G Choudhary, DG Duguma, V Sharma, I You IEEE Journal of Biomedical and Health Informatics 27 (2), 710-721, 2022 | 37 | 2022 |
Security of zero trust networks in cloud computing: A comparative review S Sarkar, G Choudhary, SK Shandilya, A Hussain, H Kim Sustainability 14 (18), 11213, 2022 | 35 | 2022 |
Lightweight Misbehavior Detection Management of Embedded IoT Devices in Medical Cyber Physical Systems G Choudhary, PV Astillo, I You, K Yim, R Chen, JH Cho IEEE Transactions on Network and Service Management, 2020 | 31 | 2020 |
BERT-based transfer-learning approach for nested named-entity recognition using joint labeling A Agrawal, S Tripathi, M Vardhan, V Sihag, G Choudhary, N Dragoni Applied Sciences 12 (3), 976, 2022 | 27 | 2022 |
A Survey on the Security and the Evolution of Osmotic and Catalytic Computing for 5G Networks G Choudhary, V Sharma 5G enabled secure wireless networks, 69-102, 2019 | 26 | 2019 |
Self-enforcing game theory-based resource allocation for LoRaWAN assisted public safety communications V Sharma, G Choudhary, I You, JD Lim, JN Kim Journal of Internet Technology 19 (2), 515-530, 2018 | 22 | 2018 |
Misbehavior detection of embedded IoT devices in medical cyber physical systems I You, K Yim, V Sharma, G Choudhary, IR Chen, JH Cho Proceedings of the 2018 IEEE/ACM International Conference on Connected …, 2018 | 21 | 2018 |
TrMAps: Trust management in specification-based misbehavior detection system for IMD-enabled artificial pancreas system PV Astillo, G Choudhary, DG Duguma, J Kim, I You IEEE Journal of Biomedical and Health Informatics 25 (10), 3763-3775, 2021 | 17 | 2021 |
On IoT misbehavior detection in cyber physical systems I You, K Yim, V Sharma, G Choudhary, R Chen, JH Cho 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing …, 2018 | 17 | 2018 |
PICAndro: Packet InspeCtion-Based Android Malware Detection V Sihag, G Choudhary, M Vardhan, P Singh, JT Seo Security and Communication Networks 2021, 2021 | 16 | 2021 |