default search action
Gaurav Varshney
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j14]Gaurav Varshney, Rahul Kumawat, Vijay Varadharajan, Udaya Kiran Tupakula, Chandranshu Gupta:
Anti-phishing: A comprehensive perspective. Expert Syst. Appl. 238(Part F): 122199 (2024) - [j13]Sanjeev Shukla, Manoj Misra, Gaurav Varshney:
HTTP header based phishing attack detection using machine learning. Trans. Emerg. Telecommun. Technol. 35(1) (2024) - [j12]Sanjeev Shukla, Manoj Misra, Gaurav Varshney:
Email bombing attack detection and mitigation using machine learning. Int. J. Inf. Sec. 23(4): 2939-2949 (2024) - 2023
- [j11]Chandranshu Gupta, Gaurav Varshney:
An improved authentication scheme for BLE devices with no I/O capabilities. Comput. Commun. 200: 42-53 (2023) - [j10]Mohd Farman Ali, Aarika Srivastava, Shreya Vijayvargiya, Gaurav Varshney:
Compact tunable terahertz self-diplexing antenna with high isolation. Nano Commun. Networks 35: 100432 (2023) - [j9]Naveen Kumar Maurya, Sadhana Kumari, Prakash Pareek, Gaurav Varshney:
Highly-efficient tunable dipole-driven Yagi-Uda antenna with end-fire radiation for terahertz application. Nano Commun. Networks 38: 100480 (2023) - 2022
- [j8]Vishwanath, Gaurav Varshney, Bikash Chandra Sahana:
Implementing the single/multiport tunable terahertz circularly polarized dielectric resonator antenna. Nano Commun. Networks 32-33: 100408 (2022) - [j7]Durgesh Kumar, Vivek Kumar, Yadav Anand Subhash, Pushpa Giri, Gaurav Varshney:
Tuning the higher to lower order resonance frequency ratio and implementing the tunable THz MIMO/self-diplexing antenna. Nano Commun. Networks 34: 100419 (2022) - [j6]Ahmed A. Ibrahim, Hijab Zahra, Syed Muzahir Abbas, Mohamed I. Ahmed, Gaurav Varshney, Subhas Mukhopadhyay, Abd-Elhady Mahmoud:
Compact Four-Port Circularly Polarized MIMO X-Band DRA. Sensors 22(12): 4461 (2022) - 2021
- [j5]Mohd Farman Ali, Rajarshi Bhattacharya, Gaurav Varshney:
Graphene-based tunable terahertz self-diplexing/MIMO-STAR antenna with pattern diversity. Nano Commun. Networks 30: 100378 (2021) - 2019
- [j4]Gaurav Varshney, Shailza Gotra, V. S. Pandey, Rajveer S. Yaduvanshi:
Proximity-coupled two-port multi-input-multi-output graphene antenna with pattern diversity for THz applications. Nano Commun. Networks 21 (2019) - 2018
- [j3]Gaurav Varshney, Manoj Misra, Pradeep K. Atrey:
Secure authentication scheme to thwart RT MITM, CR MITM and malicious browser extension based phishing attacks. J. Inf. Secur. Appl. 42: 1-17 (2018) - 2016
- [j2]Gaurav Varshney, Manoj Misra, Pradeep K. Atrey:
A phish detector using lightweight search features. Comput. Secur. 62: 213-228 (2016) - [j1]Gaurav Varshney, Manoj Misra, Pradeep K. Atrey:
A survey and classification of web phishing detection schemes. Secur. Commun. Networks 9(18): 6266-6284 (2016)
Conference and Workshop Papers
- 2024
- [c21]Priyanka Das, T. Aishwarya, Amit Kumar Singh, Gaurav Varshney:
Design of Slotted Patch Based Conformal Cloaks. NCC 2024: 1-5 - [c20]Chandranshu Gupta, Gaurav Varshney:
Securing Web Access: PUF-Driven Two-Factor Authentication for Enhanced Protection. SAFECOMP (Workshops) 2024: 74-87 - [c19]Anshul Bhaware, Gaurav Varshney, Jaswinder Kour, Tejaswi Bishnoi, Mudit Jain, Dalchandra Sharma:
A Privacy Preserving Context Sensitive Kernel. WiseML@WiSec 2024: 20-25 - 2022
- [c18]Sanjeev Shukla, Manoj Misra, Gaurav Varshney:
Forensic Analysis and Detection of Spoofing Based Email Attack Using Memory Forensics and Machine Learning. SecureComm 2022: 491-509 - 2021
- [c17]Gaurav Varshney, R. Padmavathi Iyer, Pradeep K. Atrey, Manoj Misra:
Evading DoH via Live Memory Forensics for Phishing Detection and Content Filtering. COMSNETS 2021: 1-4 - [c16]Gaurav Varshney, Naman Shah:
A DNS Security Policy for Timely Detection of Malicious Modification on Webpages. ICT 2021: 1-5 - [c15]Prince Mishra, Vishwas Modanwal, Harkeerat Kaur, Gaurav Varshney:
Pseudo-Biometric Identity Framework: Achieving Self-Sovereignity for Biometrics on Blockchain. SMC 2021: 945-951 - 2020
- [c14]Jai Mangal, Gaurav Varshney, N. Anveshkumar:
Miniaturization of a Conventional WLAN 2.45GHz Patch Antenna using Slot Insertion Technique. ICCCNT 2020: 1-7 - [c13]Sanjeev Shukla, Manoj Misra, Gaurav Varshney:
Identification of Spoofed Emails by applying Email Forensics and Memory Forensics. ICCNS 2020: 109-114 - [c12]Abhi Chitkara, Deepti Singh, Ashish Gupta, Gaurav Varshney:
IntelliSpect: Personal Information Search Tool. ICOIN 2020: 556-561 - [c11]Awaneesh Kumar Yadav, Manoj Misra, Madhusanka Liyanage, Gaurav Varshney:
Secure and User Efficient EAP-based Authentication Protocol for IEEE 802.11 Wireless LANs. MASS 2020: 576-584 - 2018
- [c10]Gaurav Varshney, Sumant Bagade, Shreya Sinha:
Malicious browser extensions: A growing threat: A case study on Google Chrome: Ongoing work in progress. ICOIN 2018: 188-193 - [c9]Gaurav Varshney, Pawel Szalachowski:
A Metapolicy Framework for Enhancing Domain Expressiveness on the Internet. SecureComm (2) 2018: 155-170 - 2017
- [c8]Gaurav Varshney, Manoj Misra, Pradeep K. Atrey:
Detecting Spying and Fraud Browser Extensions: Short Paper. MPS@CCS 2017: 45-52 - [c7]R. Padmavathi Iyer, Pradeep K. Atrey, Gaurav Varshney, Manoj Misra:
Email spoofing detection using volatile memory forensics. CNS 2017: 619-625 - 2016
- [c6]Shashank Arora, Gaurav Varshney, Pradeep K. Atrey, Manoj Mishra:
SecureCEdit: An approach for secure cloud-based document editing. CNS 2016: 561-564 - [c5]Gaurav Varshney, Manoj Misra, Pradeep K. Atrey:
Improving the accuracy of Search Engine based anti-phishing solutions using lightweight features. ICITST 2016: 365-370 - 2012
- [c4]Gaurav Varshney, Ramesh Chandra Joshi, Anjali Sardana:
Personal Secret Information Based Authentication towards Preventing Phishing Attacks. ACITY (1) 2012: 31-42 - [c3]Gaurav Varshney, Anjali Sardana, Ramesh Chandra Joshi:
Secret information display based authentication technique towards preventing phishing attacks. ICACCI 2012: 602-608 - 2011
- [c2]Gaurav Varshney, Ramesh Chandra Joshi, Anjali Sardana:
Unified Modeling Technique for Threat Cause Ranking, Mitigation and Testing. IC3 2011: 491-500 - 2008
- [c1]Ajit Gupte, Mohit Sharma, Gaurav Varshney, Lakshmikantha Holla, Parvinder Rana, H. Udayakumar:
Memory Power Modeling - A Novel Approach. ISVLSI 2008: 263-268
Informal and Other Publications
- 2024
- [i7]Sneha Shukla, Gaurav Varshney, Shreya Singh, Swati Goel:
A Passwordless MFA Utlizing Biometrics, Proximity and Contactless Communication. CoRR abs/2406.09000 (2024) - [i6]Janardhan Kalikiri, Gaurav Varshney, Jaswinder Kour, Tarandeep Singh:
Privacy Aware Memory Forensics. CoRR abs/2406.09005 (2024) - 2023
- [i5]Chandranshu Gupta, Gaurav Varshney:
A Lightweight and Secure PUF-Based Authentication and Key-exchange Protocol for IoT Devices. CoRR abs/2311.04078 (2023) - 2022
- [i4]Chandranshu Gupta, Gaurav Varshney:
An Improved Authentication Scheme for BLE Devices with no I/O Capabilities. CoRR abs/2204.13640 (2022) - 2020
- [i3]Isha Pali, Lisa Krishania, Divya Chadha, Asmita Kandar, Gaurav Varshney, Sneha Shukla:
A Comprehensive Survey of Aadhar and Security Issues. CoRR abs/2007.09409 (2020) - 2019
- [i2]Gourang Aggarwal, Vimal Patel, Gaurav Varshney, Kimberly Oostman:
Understanding the Social Factors Affecting the Cryptocurrency Market. CoRR abs/1901.06245 (2019) - 2018
- [i1]Gaurav Varshney, Pawel Szalachowski:
A Metapolicy Framework for Enhancing Domain Expressiveness on the Internet. CoRR abs/1804.04274 (2018)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint