1. Shukla, S. K., Rawat, R., & Murthy, C. (2012). Web Attacking Parameters Filtration: A Approach For Attack Signature Verification.
2. Dhariwal, S., Patearia, N., & Rawat, R. (2011). C-Queued Technique against SQL injection attack. International Journal of Advanced Research in Computer Science, 2(5). https://doi.org/10.26483/ijarcs.v2i5.737
3. Rawat, R., Patearia, N., & Dhariwal, S. (2011). Key generator based secured system against SQL-injection attack. International Journal of Advanced Research in Computer Science, 2(5).
4. Nayyar, A., Puri, V., & Le, D. N. (2017). Internet of nano things (IoNT): Next evolutionary step in nanotechnology. Nanoscience and Nanotechnology, 7(1), 4–8.
5. Turing, A. M. (2009). Computing machinery and intelligence BT–parsing the Turing test. In R. Epstein, G. Roberts, & G. Beber (Eds.), Philosophical and methodological issues in the quest for the thinking computer. Springer.