Systematic review of security vulnerabilities in ethereum blockchain smart contract SS Kushwaha, S Joshi, D Singh, M Kaur, HN Lee IEEE Access 10, 6605-6621, 2022 | 188 | 2022 |
Dingo optimizer: a nature-inspired metaheuristic approach for engineering problems AK Bairwa, S Joshi, D Singh Mathematical Problems in Engineering 2021, 1-12, 2021 | 119 | 2021 |
A review on localization in wireless sensor networks J Kuriakose, S Joshi, R Vikram Raju, A Kilaru Advances in signal processing and intelligent recognition systems, 599-610, 2014 | 109 | 2014 |
Ethereum smart contract analysis tools: A systematic review SS Kushwaha, S Joshi, D Singh, M Kaur, HN Lee Ieee Access 10, 57037-57062, 2022 | 72 | 2022 |
Localization in wireless sensor networks: a survey J Kuriakose, S Joshi, VI George arXiv preprint arXiv:1410.8713, 2014 | 33 | 2014 |
Data security for software as a service PK Tiwari, S Joshi Web-based services: Concepts, methodologies, tools, and applications, 864-880, 2016 | 27 | 2016 |
Mutual authentication of nodes using session token with fingerprint and MAC address validation AK Bairwa, S Joshi Egyptian Informatics Journal 22 (4), 479-491, 2021 | 18 | 2021 |
An overview of blockchain-based smart contract SS Kushwaha, S Joshi Computer Networks and Inventive Communication Technologies: Proceedings of …, 2021 | 15 | 2021 |
Dynamic weighted virtual machine live migration mechanism to manages load balancing in cloud computing PK Tiwari, S Joshi 2016 IEEE International Conference on Computational Intelligence and …, 2016 | 15 | 2016 |
Detection of malware in downloaded files using various machine learning models A Kamboj, P Kumar, AK Bairwa, S Joshi Egyptian Informatics Journal 24 (1), 81-94, 2023 | 12 | 2023 |
Mla-rpm: A machine learning approach to enhance trust for secure routing protocol in mobile ad hoc networks AK Bairwa, S Joshi Int J Adv Sci Technol 29 (04), 11265-11274, 2020 | 12 | 2020 |
A review on load balancing of virtual machine resources in cloud computing PK Tiwari, S Joshi Proceedings of First International Conference on Information and …, 2016 | 12 | 2016 |
Comprehensive review of orthogonal regression and its applications in different domains Pallavi, S Joshi, D Singh, M Kaur, HN Lee Archives of Computational Methods in Engineering 29 (6), 4027-4047, 2022 | 10 | 2022 |
Color image watermarking with watermark authentication against false positive detection using SVD N Singh, S Joshi, S Birla International Conference on Sustainable Computing in Science, Technology and …, 2019 | 10 | 2019 |
An agent based routing search methodology for improving QoS in MANET AK Bairwa, S Joshi Ingeniare: Revista Chilena de Ingenieria 28 (4), 558-564, 2020 | 9 | 2020 |
A review of data security and privacy issues over SaaS PK Tiwari, S Joshi 2014 IEEE International Conference on Computational Intelligence and …, 2014 | 9 | 2014 |
Blockchain ecosystem for credit transfer in education R Manoj, S Joshi, U Dabholkar, G Prakash Panicker, K Peter Kuriakose, ... Mathematical Problems in Engineering 2021, 1-12, 2021 | 8 | 2021 |
Suitability of singular value decomposition for image watermarking N Singh, S Joshi, S Birla 2019 6th International Conference on Signal Processing and Integrated …, 2019 | 8 | 2019 |
Comprehensive analysis of advanced techniques and vital tools for detecting malware intrusion V Vasani, AK Bairwa, S Joshi, A Pljonkin, M Kaur, M Amoon Electronics 12 (20), 4299, 2023 | 7 | 2023 |
Data security using multiple image steganography and hybrid data encryption techniques R Joshi, AK Bairwa, V Soni, S Joshi 2022 International Conference for Advancement in Technology (ICONAT), 1-7, 2022 | 7 | 2022 |