A. International Journals [SCI]
- Chaurasiya, V.K., Lal, N., A Popularity based Content Eviction scheme via Betweenness-centrality caching Approach for Content-centric Networking (CCN), under review in IEEE Transactions on Cloud Computing.
- Chaurasiya, V.K. and Saxena, "A novel multi-resolution approach for fingerprint based age-group estimation using Gabor wavelet", Under review in International Journal of Pattern Recognition and Artificial Intelligence, World Scientific.
- Chaurasiya, V.K. and Saxena, A.K., 2017. Multi-resolution texture analysis for fingerprint based age-group estimation. Multimedia Tools and Applications, pp.1-27.
- Chaurasiya, V.K., Jain, N. and Nandi, G.C., 2014. A novel distance estimation approach for 3D localization in wireless sensor network using multi dimensional scaling. Information Fusion, 15, pp.5-18.
- Chaurasiya V.K., Kesarwani A., Gupta C., Tripathi M.M., Gupta V., Gupta R., (2011) Integrating ILM, E-Discovery and DPA 1998 for Effective Information Processing. In: Venugopal K.R., Patnaik L.M. (eds) Computer Networks and Intelligent Computing. Communications in Computer and Information Science, vol 157. Springer, Berlin, Heidelberg.
B. International Journals [SCOPUS]
- Chaurasiya, V.K., Saxena, A.K. and Sharma, S., 2015. Neural network based human age-group estimation in curvelet domain. Procedia Computer Science, 54, pp.781-789.
- Chaurasiya, V.K., Lal, N., Kumar, S. and Saxena, A., 2015. Detection of malicious node behaviour via I-watchdog protocol in mobile Ad Hoc network with DSDV routing scheme. Procedia Computer Science, 49, pp.264-273.
- Chaurasiya, V.K., Gupta, R., Pinto, A.A., Verma, S., Singh, S. and Srivastava, P., 2011, Securing Cloud System via Internal Control Management, in Proceedings of the World Congress on Engineering 2011, Vol I, pp.481-484.
C. International Journals [Others]
- Chaurasiya, V.K. and Kumar, S., Prevention of Denial-of-Service Attack in Wireless Sensor Network via NS-2, published in: International Journal of Computer and Communication System Engineering (IJCCSE), Vol. 2 (5), 2015, 708-715.
- Chaurasiya, V.K., Samvedi, A. and Owlak, S. and, 2014. Improved Secure Address Resolution Protocol. arXiv preprint arXiv:1406.2930.
- Chaurasiya, V.K., Chaturvedi, T., Dwivedi, P. and Singh, N., 2013. Whistleblowers' Protection Act 2011, India: A Critical Analysis. International Journal of Advanced Research in Computer Science, 4(8). [UGC Approved Journal, indexed in EBSCO, DOAJ etc]
- Chaurasiya, V.K., Singh, S.P. and Sethi, J., 2014. Need of Impact Calculation and Measured for Healthcare Privacy Breaches in India, published in: The ISSA Journal, Volume 12, Issue 5, pp 32-38, May 2014.
- Chaurasiya, V.K., Dwivedi, S. and Gupta, W., 2013. Mapping of Data Security Council of India Security Framework with ISO/IEC 27002:2005 and COBIT 4.1, Journal of Global Research in Computer Science, Volume 4, No. 4, 147-154, 2013. [indexed in DOAJ].
- Chaurasiya, V.K., Govil, S.B., Thyagarajan, K., Srinivasan, K., and Das, S., 2012. An approach to identify the optimal cloud in cloud federation. International Journal of Cloud Computing and Services Science, 1(1), p.35. [indexed in CiteFactor].
- .K. Chaurasiya, J. Thomas, K. Raman, S. Das, Resource Leasing Cloud Computing Model: A Win-Win Strategy for Resource Owners and Cloud Service Providers, Published in: Journal of Computing. Volume 4, Issue 5, May 2012. [DOAJ Journal]
- Chaurasiya, V.K., Sinha, A., Jaiswal, A. and Gupta, R., 2011. SAS 70 TO SSAE 16/ISAE 3402: An Insight into Outsourcing Security and Process Controls and Significance of New Service Audit Standards. ISSN 1931-0285 CD ISSN 1941-9589 ONLINE, p.315. [Indexed in American Economic Association’s Econlit, e-JEL and JEL].
- Chaurasiya, V.K., Ardhapurkar, S., Srivastava, T., Sharma, S., and Vaish, A., 2010. Privacy and data protection in cyberspace in Indian environment. International Journal of Engineering Science and Technology. [DOAJ Journal].
D. International Conferences
- Chaurasiya, V.K., Saxena, A.K. and Sharma, S., 2015, May. Human age-group estimation using curvelet features. In Advances in Computing and Communication Engineering (ICACCE), 2015 Second International Conference on (pp. 610-615). IEEE.
- Chaurasiya, V.K., and Saxena, A.K., 2014, December. Fingerprint based human age group estimation. In India Conference (INDICON), 2014 Annual IEEE (pp. 1-4). IEEE.
- Chaurasiya, V.K., Diwakar, A., Kumar, V., 2014, A quantized Model for Computer Forensic Investigation, published in: Proceedings of 6th IRF International Conference, Chennai, India, 10th May. 2014, pp. 20-25.
- Chaurasiya, V.K., Raman, S. and Venkatesan, S., 2012, October. Performance comparison of various information retrieval models used in search engines. In Communication, Information & Computing Technology (ICCICT), 2012 International Conference on (pp. 1-4). IEEE.
- Chaurasiya, V.K., Kumar, A., Srivastava, A., Bansal, S. and Raheja, M., 2012, Basel III and the Requirement for Capital Inclusion: A Case of India, Published in: 5th International Conference on Management and Behavioral Sciences, “An Interdisciplinary Conference” June, 2012, Society of Management and Behavioral Sciences.
- Chaurasiya, V.K., Chandra, M., Kumar, N., Gupta, R., Kumar, S. and Srivastava, V., 2011, April. Protection from paging and signaling attack in 3G CDMA networks. In Emerging Trends in Networks and Computer Communications (ETNCC), 2011 International Conference on (pp. 406-410). IEEE.
- Chaurasiya, V.K., Srivastava, V., Keshri, A.K., Roy, A.D. and Gupta, R., 2011, April. Advanced port knocking authentication scheme with QRC using AES. In Emerging Trends in Networks and Computer Communications (ETNCC), 2011 International Conference on (pp. 159-163). IEEE.
- Chaurasiya, V.K., Kesarwani, A., Gupta, C., Tripathi, M.M., Gupta, V. and Gupta, R., 2011, April. Implementation of Chinese wall model in cloud computing for enhanced security. In Emerging trends in networks and computer communications (etncc), 2011 international conference on (pp. 411-413). IEEE.
- Chaurasiya, V.K., Gupta, R., Banerji, S.G. and S. Mohanty, 2011, Information Security Governance is Critical to Wider Corporate Governance Demands - An Indian Perspective, in Proceedings of International Conference on Economics, Trade and Development, (ICETD 2011), Vol. 7, pp:65-68, Bali, Indonesia, April 1-3, 2011.
- Chaurasiya, V.K., Srivastava, P., Singh, S., Pinto, A.A., Verma, S. and Gupta, R., 2011, June. An architecture based on proactive model for security in cloud computing. In Recent Trends in Information Technology (ICRTIT), 2011 International Conference on (pp. 661-666). IEEE.
- Chaurasiya, V.K., Srivastava, S., Chandra, S. and Saxena, S., 2010, Honeypot Placement in Network Architecture to Enhancing the Efficiency of IDS System, in Proceedings of First International Conference On Management Of Technologies & Information security “ICMIS 2010”. Jan 21-24, 2010, IIIT Allahabad, India.
- Chaurasiya, V.K., Lavavanshi, R.L., Verma, S., Nandi, G.C. and Srivastava, A.K., 2009, March. Localization in wireless sensor networks using directional antenna. In Advance Computing Conference, 2009. IACC 2009. IEEE International (pp. 131-134). IEEE.
- Chaurasiya, V.K., Pathak, A., Biswas, A., Dev, S. and Srivastava, A., 2009, A different approach to risk assessment, in Proceedings of International Conference on Management Technology and Applications (ICMTA 2009), 8-11 Aug,2009, Beijing, China.
- Chaurasiya, V.K., Kumar, S.R., Verma, S. and Nandi, G.C., 2008, December. Traffic based clustering in wireless sensor network. In Wireless Communication and Sensor Networks, 2008. WCSN 2008. Fourth International Conference on (pp. 83-88). IEEE.
- Chaurasiya, V.K., Dhiwal, A.D., Gautam, S. and Singh, A.K., 2008, December. MailZoro-email based P2P file sharing. In Networks, 2008. ICON 2008. 16th IEEE International Conference on (pp. 1-5). IEEE. [Tier 1 Conference].
- Chaurasiya, V.K., Dhyani, P. and Munot, S., 2007, December. Linux highly available (HA) fault-tolerant servers. In Information Technology,(ICIT 2007). 10th International Conference on (pp. 223-226). IEEE. [Tier 1 Conference].
- Chaurasiya, V.K., Dwivedi, S., Shah, Homana, A.M. and Herbst, L., 2006, Heterogeneous Wireless Devices: Networking for Monitoring Application, in Proceedings of International conference on Wireless Communication and Sensor Networks( WCSN), 2006, Allahabad, India.
- Chaurasiya, V.K. and Dwivedi, S., 2005, Managing and Accessing Sensor Network from Internet Browser, in Proceedings of International conference on Wireless Communication and Sensor Networks (WCSN), 2005, Allahabad, India.
|