Gaurav Varshney

Orcid: 0000-0002-7001-9095

According to our database1, Gaurav Varshney authored at least 35 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Anti-phishing: A comprehensive perspective.
Expert Syst. Appl., March, 2024

HTTP header based phishing attack detection using machine learning.
Trans. Emerg. Telecommun. Technol., January, 2024

Design of Slotted Patch Based Conformal Cloaks.
Proceedings of the National Conference on Communications, 2024

2023
Highly-efficient tunable dipole-driven Yagi-Uda antenna with end-fire radiation for terahertz application.
Nano Commun. Networks, December, 2023

Compact tunable terahertz self-diplexing antenna with high isolation.
Nano Commun. Networks, March, 2023

An improved authentication scheme for BLE devices with no I/O capabilities.
Comput. Commun., February, 2023

A Lightweight and Secure PUF-Based Authentication and Key-exchange Protocol for IoT Devices.
CoRR, 2023

2022
Tuning the higher to lower order resonance frequency ratio and implementing the tunable THz MIMO/self-diplexing antenna.
Nano Commun. Networks, December, 2022

Compact Four-Port Circularly Polarized MIMO X-Band DRA.
Sensors, 2022

Implementing the single/multiport tunable terahertz circularly polarized dielectric resonator antenna.
Nano Commun. Networks, 2022

Forensic Analysis and Detection of Spoofing Based Email Attack Using Memory Forensics and Machine Learning.
Proceedings of the Security and Privacy in Communication Networks, 2022

2021
Graphene-based tunable terahertz self-diplexing/MIMO-STAR antenna with pattern diversity.
Nano Commun. Networks, 2021

Pseudo-Biometric Identity Framework: Achieving Self-Sovereignity for Biometrics on Blockchain.
Proceedings of the 2021 IEEE International Conference on Systems, Man, and Cybernetics, 2021

A DNS Security Policy for Timely Detection of Malicious Modification on Webpages.
Proceedings of the 28th International Conference on Telecommunications, 2021

Evading DoH via Live Memory Forensics for Phishing Detection and Content Filtering.
Proceedings of the 13th International Conference on COMmunication Systems & NETworkS, 2021

2020
A Comprehensive Survey of Aadhar and Security Issues.
CoRR, 2020

Secure and User Efficient EAP-based Authentication Protocol for IEEE 802.11 Wireless LANs.
Proceedings of the 17th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2020

IntelliSpect: Personal Information Search Tool.
Proceedings of the 2020 International Conference on Information Networking, 2020

Identification of Spoofed Emails by applying Email Forensics and Memory Forensics.
Proceedings of the ICCNS 2020: The 10th International Conference on Communication and Network Security, 2020

Miniaturization of a Conventional WLAN 2.45GHz Patch Antenna using Slot Insertion Technique.
Proceedings of the 11th International Conference on Computing, 2020

2019
Proximity-coupled two-port multi-input-multi-output graphene antenna with pattern diversity for THz applications.
Nano Commun. Networks, 2019

Understanding the Social Factors Affecting the Cryptocurrency Market.
CoRR, 2019

2018
Secure authentication scheme to thwart RT MITM, CR MITM and malicious browser extension based phishing attacks.
J. Inf. Secur. Appl., 2018

A Metapolicy Framework for Enhancing Domain Expressiveness on the Internet.
Proceedings of the Security and Privacy in Communication Networks, 2018

Malicious browser extensions: A growing threat: A case study on Google Chrome: Ongoing work in progress.
Proceedings of the 2018 International Conference on Information Networking, 2018

2017
Email spoofing detection using volatile memory forensics.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

Detecting Spying and Fraud Browser Extensions: Short Paper.
Proceedings of the 2017 on Multimedia Privacy and Security, 2017

2016
A survey and classification of web phishing detection schemes.
Secur. Commun. Networks, 2016

A phish detector using lightweight search features.
Comput. Secur., 2016

Improving the accuracy of Search Engine based anti-phishing solutions using lightweight features.
Proceedings of the 11th International Conference for Internet Technology and Secured Transactions, 2016

SecureCEdit: An approach for secure cloud-based document editing.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

2012
Secret information display based authentication technique towards preventing phishing attacks.
Proceedings of the 2012 International Conference on Advances in Computing, 2012

Personal Secret Information Based Authentication towards Preventing Phishing Attacks.
Proceedings of the Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India, 2012

2011
Unified Modeling Technique for Threat Cause Ranking, Mitigation and Testing.
Proceedings of the Contemporary Computing - 4th International Conference, 2011

2008
Memory Power Modeling - A Novel Approach.
Proceedings of the IEEE Computer Society Annual Symposium on VLSI, 2008


  Loading...