Vineeta Singh & Vandana Dixit Kaushik. 2023. Exploring Cyber Criminals and Data Privacy Measures. Exploring Cyber Criminals and Data Privacy Measures
40
64
.
Keith S. Jones, Natalie R. Lodinger, Benjamin P. Widlus, Akbar Siami Namin, Emily Maw & Miriam Armstrong. (2022) Grouping and Determining Perceived Severity of Cyber-Attack Consequences: Gaining Information Needed to Sonify Cyber-Attacks. Journal on Multimodal User Interfaces 16:4, pages 399-412.
Crossref
Monica Malik, Khushi Gandhi & Bhawna Narwal. (2022) AMAKA. International Journal of Information Security and Privacy 16:1, pages 1-31.
Crossref
Mohamed Abdel-Basset, Nour Moustafa, Hossam Hawash & Weiping DingMohamed Abdel-Basset, Nour Moustafa, Hossam Hawash & Weiping Ding. 2022. Deep Learning Techniques for IoT Security and Privacy. Deep Learning Techniques for IoT Security and Privacy
113
130
.
Darshini P, Mohana Kumar S, CG Raghavendra, Krishna Prasad SJ, Kavitha H & Divakara SS. (2021) Cyber Security Threats Detection Analysis and Remediation. Cyber Security Threats Detection Analysis and Remediation.
Bhawna Narwal & Amar Kumar Mohapatra. (2021) SAMAKA: Secure and Anonymous Mutual Authentication and Key Agreement Scheme for Wireless Body Area Networks. Arabian Journal for Science and Engineering 46:9, pages 9197-9219.
Crossref
Upasna Singh & Bhawna Narwal. 2021. Progress in Advanced Computing and Intelligent Engineering. Progress in Advanced Computing and Intelligent Engineering
295
305
.
Monica Malik & Bhawna Narwal. 2021. Next Generation Information Processing System. Next Generation Information Processing System
82
90
.
Nishtha Mehndiratta. (2020) A Yoking-Proof and PUF-based Mutual Authentication Scheme for Cloud-aided Wearable Devices. A Yoking-Proof and PUF-based Mutual Authentication Scheme for Cloud-aided Wearable Devices.
Mrinal Kaushik, Monica Malik & Bhawna Narwal. (2020) Developing Malware and Analyzing it Afore & After Steganography with OSINTs. Developing Malware and Analyzing it Afore & After Steganography with OSINTs.
Bhawna Narwal, Arushi Ojha, Nimisha Goel & Sudipti Dhawan. (2020) A Yoking-Proof Based Remote Authentication Scheme for Cloud-Aided Wearable Devices (YPACW). A Yoking-Proof Based Remote Authentication Scheme for Cloud-Aided Wearable Devices (YPACW).
. 2020. Cybersecurity in Humanities and Social Sciences. Cybersecurity in Humanities and Social Sciences
25
66
.
Bhawna Narwal & Amar Kumar Mohapatra. (2020) A Survey on Security and Authentication in Wireless Body Area Networks. Journal of Systems Architecture, pages 101883.
Crossref
Bhawna Narwal & Amar Kumar Mohapatra. (2020) SEEMAKA: Secured Energy-Efficient Mutual Authentication and Key Agreement Scheme for Wireless Body Area Networks. Wireless Personal Communications 113:4, pages 1985-2008.
Crossref
Justinas Rastenis, Simona Ramanauskaitė, Justinas Janulevičius, Antanas Čenys, Asta Slotkienė & Kęstutis Pakrijauskas. (2020) E-mail-Based Phishing Attack Taxonomy. Applied Sciences 10:7, pages 2363.
Crossref
Kamran Shaukat, Suhuai Luo, Vijay Varadharajan, Ibrahim A. Hameed & Min Xu. (2020) A Survey on Machine Learning Techniques for Cyber Security in the Last Decade. IEEE Access 8, pages 222310-222354.
Crossref
Sudipti Dhawan, Shubhra Shah & Bhawna Narwal. 2020. Data Science and Analytics. Data Science and Analytics
14
25
.
Bhawna Narwal. (2019) Security Analysis and Verification of Authenticated Mobile Payment Protocols. Security Analysis and Verification of Authenticated Mobile Payment Protocols.
Bhushan Manjre & Krishan Goyal. (2022) Essential Components of Software Framework for Mobile Forensic Tool to Extract and Decode the Mobile Artifacts. SSRN Electronic Journal.
Crossref