1. Y. Ahuja, S.K. Yadav, Multiclass classification and support vector machine. Global J. Comput. Sci. Technol. Interdisc. 12(11), 14–20 (2012)
2. F.S Al-Anzi, S.K. Yadav, J. Soni, Cloud computing: security model comprising governance, risk management and compliance, in 2014 International Conference on Data Mining and Intelligent Computing (ICDMIC) (2014, September), pp. 1–6
3. G. Brambilla, M. Amoretti, F. Zanichelli, Using Block Chain for Peer-to-Peer Proof-of-Location. Arxiv Preprint arXiv:1607.00174
4. Cable News Network (CNN), http://edition.cnn.com/2012/07/26/tech/web/air-traffic-control-security/index.html
5. A. Costin, A. Francillon, Ghost in the air (Traffic): on insecurity of ADS-B protocol and practical attacks on ADS-B devices. Black Hat USA, 1–12 (2012)