An Approach to Perceive Tabnabbing Attack RK Suri, DS Tomar, DR Sahu International Journal of Scientific & Technology Research (ISSN 2277-8616) 1 …, 2012 | 28 | 2012 |
Session Hijacking: Threat Analysis and Countermeasures V Jain, DR Sahu, DS Tomar International Confrence on Futuristic Trends in Computational Analysis and …, 2015 | 25 | 2015 |
Analysis of Web Application Code Vulnerabilities using Secure Coding Standards S Divya Rishi, T Deepak Arabian Journal for Science and Engineering, 2016 | 17* | 2016 |
Detection of Javascript Vulnerability At Client Agent S Jain, DS Tomar, DR Sahu International Journal of Scientific & Technology Research (ISSN 2277-8616) 1 …, 2012 | 13 | 2012 |
An Approach to Reveal Website Defacement RK Gurjwar, DR Sahu, DS Tomar International Journal of Computer Science and Information Security (ISSN …, 2013 | 9 | 2013 |
Evidence Gathering of Line Messenger on iPhones V Jain, DR Sahu, DS Tomar International Journal of Innovations in Engineering and Management- IJIEM …, 2015 | 8 | 2015 |
DNS Pharming through PHP Injection: Attack Scenario and Investigation DR Sahu, DS Tomar International Journal of Computer Network and Information Security (ISSN …, 2015 | 7 | 2015 |
Novel Detection Technique For Framejacking Vulnerabilities In Web Applications A Kalim, CK Jha, DS Tomar, DR Sahu 2021 2nd International Conference on Computation, Automation and Knowledge …, 2021 | 5 | 2021 |
Strategy to Handle End User Session in Web Environment DR Sahu, DS Tomar Proceedings of National Conference on Computing Concepts in Current Trends …, 2011 | 5 | 2011 |
A Framework for Web Application Vulnerability Detection A Kalim, CK Jha, DS Tomar, DR Sahu International Journal of Engineering and Advanced Technology (IJEAT) 9 (3 …, 2020 | 3 | 2020 |
End User Identification through Proactive Techniques DR Sahu, DS Tomar International Conference on Information Science 2014 (ICIS-2014), 234-238, 2014 | 3 | 2014 |
Defensive Programming to Reduce PHP Vulnerabilities DR Sahu, DS Tomar International Journal of Advances in Computer Networks and Its Security …, 2014 | 3 | 2014 |
An Approach to Identify Vulnerable Features of Instant Messenger V Jain, DR Sahu, DS Tomar Third ISEA International Conference on Security and Privacy 2020 at IIT …, 2020 | 2 | 2020 |
Challenges in Securing ESB Against Web Service Attacks RU Rahman, DR Sahu, DS Tomar Exploring Enterprise Service Bus in the Service-Oriented Architecture …, 2017 | 2 | 2017 |
Scrutinize Evidences for Android Phones P Khandelwal, DR Sahu, DS Tomar International Journal of Computer Science and Information Technologies (ISSN …, 2014 | 2 | 2014 |
Self-Attention Mechanism Based Federated Learning Model for Cross Context Recommendation System AKNGV N. K. Singh, D. S. Tomar, Mo. Shabaz, I. Keshta, M. Soni, Divya Rishi ... IEEE Transactions on Consumer Electronics, 2023 | 1 | 2023 |
Forensic Model to Classify Android Device Activities P Khandelwal, DR Sahu, DS Tomar International Journal of Frontier in Technology (ISSN: 2350-0344) 1 (1), 23-28, 2014 | 1* | 2014 |
Quantum-Resistant Cryptography to Prevent from Phishing Attack Exploiting Blockchain Wallet DR Sahu, H Tiwari, DS Tomar, RK Pateriya Sustainable security practices using blockchain, quantum, and post-quantum …, 2024 | | 2024 |
IoT System for Crop Recommendation Based on Soil and Weather Patterns H Tiwari, DR Sahu, RK Gupta Artificial Intelligence Tools and Technologies for Smart Farming and …, 2023 | | 2023 |
A system of intelligent attachment to control wheelchair by motions based on human Gesture movements and methods thereof Mr. Kuber Sharma, Dr. Divya Rishi Sahu, Dr. J. S. Chauhan, Dr. Deepak Singh ... IN Patent 457,149, 2021 | | 2021 |