Follow
Sam Goundar
Title
Cited by
Cited by
Year
Core elements of exemplary academic integrity policy in Australian higher education
T Bretag, S Goundar, S Mahmud, M Wallace
International Journal for Educational Integrity 7 (2), 2011
1152011
What is the potential impact of using mobile devices in education
S Goundar
Proceedings of SIG GlobDev Fourth Annual Workshop 3, 1-30, 2011
1082011
The distraction of technology in the classroom
S Goundar
Journal of Education & Human Development 3 (1), 211-229, 2014
642014
Chapter 3. Research Methodology and Research Method
S Goundar
ResearchGate, 2012
402012
Cloud computing: Opportunities and issues for developing countries
S Goundar
DiploFoundation: Internet governance research paper, 2010
362010
Research Methodology and Research Method
S Goundar
Victoria University of Wellington, 2013
342013
Impact of social networking on Indian youth-A survey
A Bhardwaj, V Avasthi, S Goundar
International Journal of Electronics and Information Engineering 7 (1), 41-51, 2017
272017
DDoS attacks, new DDoS taxonomy and mitigation solutions—a survey
A Bhardwaj, GVB Subrahmanyam, V Avasthi, H Sastry, S Goundar
2016 International Conference on Signal Processing, Communication, Power and …, 2016
182016
Cloud computing: Understanding the technology before getting “clouded”
S Goundar
Recent Progress in Data Engineering and Internet Technology, 217-222, 2012
172012
AI, IoT, Big data, and technologies in digital economy with blockchain at sustainable work satisfaction to smart mankind: Access to 6th dimension of human rights
AR Garcia, S Goundar
Smart governance for cities: Perspectives and experiences, 83-131, 2020
152020
Internet of things and fog computing applications in intelligent transportation systems
KVR Kumar, S Goundar, KD Kumar, RK Poluru, SM Basha, MPK Reddy
Architecture and Security Issues in Fog Computing Applications, 131-150, 2020
142020
Cyber security attacks on robotic platforms
A Bhardwaj, V Avasthi, S Goundar
Network Security 2019 (10), 13-19, 2019
142019
An overview of food supply chain virtualisation and granular traceability using blockchain technology
J Yadav, M Misra, S Goundar
International Journal of Blockchains and Cryptocurrencies 1 (2), 154-178, 2020
122020
A framework for effective threat hunting
A Bhardwaj, S Goundar
Network Security 2019 (6), 15-19, 2019
122019
A framework to define the relationship between cyber security and cloud performance
A Bhardwaj, S Goundar
Computer Fraud & Security 2019 (2), 12-19, 2019
122019
An evaluation of Fiji’s e-government status: Assessed according to UN report on benchmarking e-government progress
S Goundar
Proceedings of the Assocition for Information Systems Special Interest Group …, 2009
122009
Towards complex dynamic fog network orchestration using embedded neural switch
KC Okafor, GC Ononiwu, S Goundar, VC Chijindu, CC Udeze
International Journal of Computers and Applications 43 (2), 91-108, 2021
112021
Security challenges for cloud-based email infrastructure
A Bhardwaj, S Goundar
Network Security 2017 (11), 8-15, 2017
112017
Efficient fault tolerance on cloud environments
S Goundar, A Bhardwaj
International Journal of Cloud Applications and Computing (IJCAC) 8 (3), 20-31, 2018
102018
Comparing single tier and three tier infrastructure designs against ddos attacks
A Bhardwaj, S Goundar
Research Anthology on Combating Denial-of-Service Attacks, 541-558, 2021
92021
The system can't perform the operation now. Try again later.
Articles 1–20