| Core elements of exemplary academic integrity policy in Australian higher education T Bretag, S Goundar, S Mahmud, M Wallace International Journal for Educational Integrity 7 (2), 2011 | 115 | 2011 |
| What is the potential impact of using mobile devices in education S Goundar Proceedings of SIG GlobDev Fourth Annual Workshop 3, 1-30, 2011 | 108 | 2011 |
| The distraction of technology in the classroom S Goundar Journal of Education & Human Development 3 (1), 211-229, 2014 | 64 | 2014 |
| Chapter 3. Research Methodology and Research Method S Goundar ResearchGate, 2012 | 40 | 2012 |
| Cloud computing: Opportunities and issues for developing countries S Goundar DiploFoundation: Internet governance research paper, 2010 | 36 | 2010 |
| Research Methodology and Research Method S Goundar Victoria University of Wellington, 2013 | 34 | 2013 |
| Impact of social networking on Indian youth-A survey A Bhardwaj, V Avasthi, S Goundar International Journal of Electronics and Information Engineering 7 (1), 41-51, 2017 | 27 | 2017 |
| DDoS attacks, new DDoS taxonomy and mitigation solutions—a survey A Bhardwaj, GVB Subrahmanyam, V Avasthi, H Sastry, S Goundar 2016 International Conference on Signal Processing, Communication, Power and …, 2016 | 18 | 2016 |
| Cloud computing: Understanding the technology before getting “clouded” S Goundar Recent Progress in Data Engineering and Internet Technology, 217-222, 2012 | 17 | 2012 |
| AI, IoT, Big data, and technologies in digital economy with blockchain at sustainable work satisfaction to smart mankind: Access to 6th dimension of human rights AR Garcia, S Goundar Smart governance for cities: Perspectives and experiences, 83-131, 2020 | 15 | 2020 |
| Internet of things and fog computing applications in intelligent transportation systems KVR Kumar, S Goundar, KD Kumar, RK Poluru, SM Basha, MPK Reddy Architecture and Security Issues in Fog Computing Applications, 131-150, 2020 | 14 | 2020 |
| Cyber security attacks on robotic platforms A Bhardwaj, V Avasthi, S Goundar Network Security 2019 (10), 13-19, 2019 | 14 | 2019 |
| An overview of food supply chain virtualisation and granular traceability using blockchain technology J Yadav, M Misra, S Goundar International Journal of Blockchains and Cryptocurrencies 1 (2), 154-178, 2020 | 12 | 2020 |
| A framework for effective threat hunting A Bhardwaj, S Goundar Network Security 2019 (6), 15-19, 2019 | 12 | 2019 |
| A framework to define the relationship between cyber security and cloud performance A Bhardwaj, S Goundar Computer Fraud & Security 2019 (2), 12-19, 2019 | 12 | 2019 |
| An evaluation of Fiji’s e-government status: Assessed according to UN report on benchmarking e-government progress S Goundar Proceedings of the Assocition for Information Systems Special Interest Group …, 2009 | 12 | 2009 |
| Towards complex dynamic fog network orchestration using embedded neural switch KC Okafor, GC Ononiwu, S Goundar, VC Chijindu, CC Udeze International Journal of Computers and Applications 43 (2), 91-108, 2021 | 11 | 2021 |
| Security challenges for cloud-based email infrastructure A Bhardwaj, S Goundar Network Security 2017 (11), 8-15, 2017 | 11 | 2017 |
| Efficient fault tolerance on cloud environments S Goundar, A Bhardwaj International Journal of Cloud Applications and Computing (IJCAC) 8 (3), 20-31, 2018 | 10 | 2018 |
| Comparing single tier and three tier infrastructure designs against ddos attacks A Bhardwaj, S Goundar Research Anthology on Combating Denial-of-Service Attacks, 541-558, 2021 | 9 | 2021 |