| Authentication issues and techniques in cloud computing security: A review A Sharma, B Keshwani, P Dadheech Proceedings of International Conference on Sustainable Computing in Science …, 2019 | 9 | 2019 |
| Optimization of docker container security and its performance evaluation BKAS Aakriti Sharma Journal of Discrete Mathematical Sciences and Cryptography 24, 2365–2375, 2021 | 5 | 2021 |
| A novel Framework for Docker and Container Security and their risk Assessment A Sharma, B Keswani, PK Gupta (An International Bi‐Annual Journal) 8 (1), 28-42, 2022 | 3 | 2022 |
| Optimization of secure communication channel over the volunteer cloud and cloud computing BKAS Aakriti Sharma Journal of Discrete Mathematical Sciences and Cryptograph 24, 2257-2266,, 2021 | 1 | 2021 |
| Development o f Top K-Association Rule Mining for Discovering pattern in Medical Dataset A Sharma, A Sangwan, B Thankchan, S Jain, V Singh, S Saurabh European Journal of Molecular & Clinical Medicine 7 (4), 2020, 2020 | 1 | 2020 |
| A STUDY, ANALYSIS AND DEEP DIVE ON DOCKER SECURITY VULNERABILITIES AND THEIR PERFORMANCE ISSUE A Sharma, R Hussain Advances in Mathematics: Scientific Journal 9(2020) 9 (ISSN: 1857-8365 …, 2020 | | 2020 |
| Bio-Medical Mining and Summarization using KEA-Means and Lexical Analysis H Chaudhary Department of Computer Science & Engineering, 2017 | | 2017 |
| PHRASE BASED CLUSTERING IN BIO MEDICAL TEXT MINING AAKRITI IJFTRIE 4 (7), 5, 2017 | | 2017 |
| Comparison of the parallel programming models based on shared memory A Sharma Computer Scinece & Engineering, 2014 | | 2014 |