
1, Knowledge Park-II, Greater Noida, Uttar Pradesh, India
S. No. | Authors | Title | Journal/ Conference |
Journal/Conference Name | Volume | Issue | Pages | Academic Year |
---|---|---|---|---|---|---|---|---|
1 | P. Durgadevi, S.Vijayalakshmi, Munish Sabharwa | Fetal Brain Abnormality Detection through PSO (Particle Swarm Optimization) and Volume Estimation | Journal | Annals of the Romanian Society for Cell Biology | 25 | 3 | 2700-2714 | 2020-21 |
2 | Youddha Beer Singh& Shivani Goel | An efficient algorithm for recognition of emotions from speaker and language independent speech using deep learning |
Journal | Multimedia Tools and Applications | 80 | 9 | 14001–14018 | 2020-21 |
3 | Ritesh Srivastava, Vena Mittal | Empirical estimation of various data stream mining methods | Journal | International Journal of Computational Intelligence Studies | 10 | 1 | 13-26 | 2020-21 |
4 | Kamlesh Kumar Rana, Vishnu Sharma, Vishal Jain, Sanjoy Das, Gagan Tiwari and Vikram Bali | Directional Location Verification and Routing in Vehicular Ad-Hoc Network | Conference | IoT and Cloud Computing Advancements in Vehicular Ad-Hoc Networks | - | - | 1-20 | 2020-21 |
5 | T. Akilan, Rani Astya, Asish Kumar Singh, Anushka Chitransh, Annapurna Singh | Raspberry Pi Based Weather Reporting over IoT | Conference | IEEE International Conference on Advances in Computing, Communication Control and Networking (ICAC3N-20) | - | - | 540- 544 |
2020-21 |
6 | Singh, Himanshu Ambikapathy, A. Logavani, K. Arun Prasad, G. and Thangavel, Saravanan |
Plug-In Hybrid Electric Vehicles (PHEVs) | Book Chapter | Electric Vehicles: Modern Technologies and Trends | - | - | 53-72 | 2020-21 |
7 | Sahil Kansal, Harish Kumar and Sakshi Kausahl | Request allocation model for processing data in federated cloud computing | Journal | Electronic Library | 38 | 4 | 745-767 | 2020-21 |
8 | Akilan T, Satyam Chaudhary, Princi Kumari, Utkarsh Pandey | Surveillance Robot in Hazardous Place Using IoT Technology | Conference | IEEE International Conference on Advances in Computing, Communication Control and Networking (ICAC3N-20) | - | - | 775-780 | 2020-21 |
9 | Mohammad Umar, Dinesh Babu, K.M Baalamuruga, Priyamvada Singh |
Automation of Energy Conservation for Nodes in Wireless Sensor Networks | Journal | International Journal of Future Generation Communication and Networking | 13 | 3 | 2384 – 2397 |
2020-21 |
10 | T. Saravanan, Sumit Jha, Gautam Sabharwal, Shubham Narayan | Comparative Analysis of Software Life Cycle Models | Conference | IEEE International Conference on Advances in Computing, Communication Control and Networking (ICAC3N-20) | - | - | 913-916 | 2020-21 |
11 | Tanu Shree, Rajiv Kumar, Nikhil Kumar | Green Computing in Cloud Computing | Conference | IEEE International Conference on Advances in Computing, Communication Control and Networking (ICAC3N-20) | - | - | 903-905 | 2020-21 |
12 | Anam Khan, Anusha Yadav, Aman Chand Rahi, Jaya Sinha | Systematic Review on Recommendation Systems | Conference | IEEE International Conference on Advances in Computing, Communication Control and Networking (ICAC3N-20) | - | - | 959-963 | 2020-21 |
13 | Paridhi Baliyan, Prakhar Chandra, Sukriti Srivastava, Dr. Inderpreet Kaur | Survey Paper Key Generation Using Ant Colony Optimization Technique | Conference | IEEE International Conference on Advances in Computing, Communication Control and Networking (ICAC3N-20) | - | - | 809-811 | 2020-21 |
14 | Kshitiz Singh, Gauri Mishra, Abdul Raheem, Manish Kumar Sharma | Survey Paper on Routing Protocols in VANET | Conference | IEEE International Conference on Advances in Computing, Communication Control and Networking (ICAC3N-20) | - | - | 426-429 | 2020-21 |
15 | Keerthika K, Saravanan T | Enhanced Product Recommendations based on Seasonality and Demography in Ecommerce | Conference | IEEE International Conference on Advances in Computing, Communication Control and Networking (ICAC3N-20) | - | - | 721-723 | 2020-21 |
16 | Arti Ranjan, Ashish K. S. Arya, Dr. Ravinder M. | Quantum Techniques for Image Processing | Conference | IEEE International Conference on Advances in Computing, Communication Control and Networking (ICAC3N-20) | - | - | 1035-1039 | 2020-21 |
17 | Sachin Srivastava, Sanjeev Kumar Singh, Kapil Srivastava, Vishnu Sharma | CNN based Automated Vehicle Registration Number Plate Recognition System | Conference | IEEE International Conference on Advances in Computing, Communication Control and Networking (ICAC3N-20) | - | - | 795-801 | 2020-21 |
18 | Manish Kumar Sharma, Shashank Agrahari, Shivam Tyagi, ShivamPunia | Crop Selection Using Data Analytics | Conference | IEEE International Conference on Advances in Computing, Communication Control and Networking (ICAC3N-20) | - | - | 66-70 | 2020-21 |
19 | Vikram Bali, Sonali Mathur, Vishnu Sharma, Dev Gaur | Smart Traffic Management System using IoT Enabled Technology | Conference | IEEE International Conference on Advances in Computing, Communication Control and Networking (ICAC3N-20) | - | - | 365-368 | 2020-21 |
20 | Vishnu Sharma, AkanshaVij | Routing Approach using Machine Learning in Mobile Ad-Hoc Networks | Conference | IEEE International Conference on Advances in Computing, Communication Control and Networking (ICAC3N-20) | - | - | 354-358 | 2020-21 |
21 | Anubhav Chhabra, Aryan Veer Singh, Ritesh Srivastava, Veena Mittal | Drum Instrument Classification Using Machine Learning | Conference | IEEE International Conference on Advances in Computing, Communication Control and Networking (ICAC3N-20) | - | - | 217-221 | 2020-21 |
22 | Shelja Sharma, Veena Mittal, Ritesh Srivastava, S. K. Singh | Empirical Evaluation of Various Classification Methods | Conference | IEEE International Conference on Advances in Computing, Communication Control and Networking (ICAC3N-20) | - | - | 105-109 | 2020-21 |
23 | Ankita Gupta, Dr. Vishnu Sharma, Sandeep Vishwakarma | Inclusive Development Using Connected Devices and Data Analysis | Conference | IEEE International Conference on Advances in Computing, Communication Control and Networking (ICAC3N-20) | - | - | 78-83 | 2020-21 |
24 | S. Nagraj, Apoorv Singh, Chandraket Singh, Samridhi Mishra | An Approach Towards Making Honey Encryption Easily Available | Conference | IEEE International Conference on Advances in Computing, Communication Control and Networking (ICAC3N-20) | - | - | 836-840 | 2020-21 |
25 | Dinesh Babu Mariappan, Harshit Parihar, Mohit Kumar Gautham, Deep Chandra Verma | Smart Office Area Monitoring & Control Based on IOT | Conference | IEEE International Conference on Advances in Computing, Communication Control and Networking (ICAC3N-20) | - | - | 450-453 | 2020-21 |
26 | Durgesh Kumar Yadav, Renu, Ankita, Iftisham Anjum | Accident Detection Using Deep Learning | Conference | IEEE International Conference on Advances in Computing, Communication Control and Networking (ICAC3N-20) | - | - | 232-235 | 2020-21 |
27 | Krishna Mohan Yadav, Jahanvi Gupta, Kartik Jataria, Chandra Prabha | Making cluster for Weather and disaster forecasting using DK medoid algorithm | Conference | IEEE International Conference on Advances in Computing, Communication Control and Networking (ICAC3N-20) | - | - | 32-35 | 2020-21 |
28 | Shaloni, Mayank Dixit, Shreya Agarwal, Prakhar Gupta | Building Extraction from Remote Sensing Images: A Survey | Conference | IEEE International Conference on Advances in Computing, Communication Control and Networking (ICAC3N-20) | - | - | 959-963 | 2020-21 |
29 | Mittal V., Srivastava R | Taxonomy of Methods for Handling Data Streams in Presence of Concepts Drifts | Conference | Futuristic Trends in Networks and Computing Technologies. FTNCT 2019 | 1206 | - | 521-531 | 2019-20 |
30 | S. Nagaraj & E. Mohanraj | A novel fuzzy association rule for efficient data mining of ubiquitous real-time data | Journal | Journal of Ambient Intelligence and Humanized Computing | 11 | 4753–4763 | 2019-20 | |
31 | Dinesh Babu M, R. Saminathan, Baalamurugan K.M | Sensors Working Process on Wireless Network Technology | Journal | International Journal of Scientific & Technology Research | 9 | 3 | 1775- 1778 | 2019-20 |
32 | Ms. Durga Devi .P, Vijayalakshmi, S. | Deep Survey and Comparative Analysis of Medical Image Processing | Journal | Journal of Computational and Theoretical Nanoscience | 7 | 5 | 2321-2329 | 2019-20 |
33 | Rishabh Mishra, Pradyumn Katre, Ritesh Srivastava | Social Network Analysis Using Twitter Data | Journal | International Research Journal of Engineering and Technology (IRJET) | 7 | 6 | 692-697 | 2019-20 |
34 | Krishna Mohan Yadav, Jahanvi Gupta, Kartik Jataria, Chandra Prabha | Clustering Techniques and Algorithms of Data Mining - A Review | Journal | International Journal of Research in Engineering, Science and Management | 3 | 6 | 519-523 | 2019-20 |
35 | Nikhil Yadav, Utkarsh, Chandra Prabha | Information Extraction and Analysis from Text Messages using Predictive Analysis | Journal | International Journal of Research in Engineering, Science and Management | 3 | 6 | 537-540 | 2019-20 |
36 | T. Akilan, Princi Kumari, Satyam Chaudhary, Utkarsh Pandey | A Survey on Surveillance Robot in Hazardous Place Using IoT Technology | Journal | International Journal of Research in Engineering, Science and Management | 3 | 6 | 310-314 | 2019-20 |
37 | Renu, Durgesh Kumar Yadav, Iftisham Anjum and Ankita | Accident Detection using Deep Learning: A Brief Survey | Journal | International Journal of Electronics Communication and Computer Engineering | 11 | 3 | 16-25 | 2019-20 |
38 | Anurag Kumar, Apoorv Gupta, Ayush Mohan Verma, Jaya Sinha | Face Recognition Using Machine Learning | Journal | International Journal of Research in Engineering, Science and Management | 3 | 6 | 411-413 | 2019-20 |
39 | Paridhi Baliyan, Prakhar Chandra Sukriti Srivastava and Inderpreet Kaur | Key Generation Using Ant Colony Optimization Technique | Journal | Global Scientific Journals (GSJ) | 8 | 5 | 160-165 | 2019-20 |
40 | Inderpreet Kaur, ParthPulastiya, Parth Pulastiya and Sonil Rastogi |
Key Management Using PSO in Manet | Journal | Journal of Adv Research in Dynamical &Control Systems | 12 | 1 | 746-750 | 2019-20 |
41 | Sanjay Kumar, Inderpreet Kaur and Kanika Singhal | 5G Wireless Network Security Strategies and Security Issues or its Uses in 5G Networks |
Journal | International Journal of Innovative Technology and Exploring Engineering (IJITEE) | 9 | 7 | 520-533 | 2019-20 |
42 | Pankaj Kumar, Vishnu Sharma, Tarunpreet Bhatia | An Efficient and Secure Certificateless Aggregate Signature from Bilinear Maps | Journal | International Journal of Information Security and Privacy (IJISP), IGI Global | 13 | 4 | 1-20 | 2019-20 |
43 | Abhishek Tiwari | Multidimensional Medical Imaging Analysis Alzheimer’s Disease via Image Processing and Machine Learning: A Review, Diagnosis and Challenges | Conference | International Conference nn Innovative Computing and Communication (ICICC 2020) | - | - | 2019-20 | |
44 | Shubham Gupta, Tanushree, and Amit Rai | Combined Shannon’s Entropy and Data Envelopment Analysis Model: Methods and Applications | Conference | 2020 International Conference on Contemporary Computing and Applications (IC3A) | - | - | 260-264 | 2019-20 |
45 | Abhishek Tiwari, Manisha Chaudhari, Ankita Rai | Multidisciplinary Approach of Artificial Intelligence over Medical Imaging: A Review, Challenges, Recent Opportunities for Research | Conference | 2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), IEEE | - | - | 237-242 | 2019-20 |
46 | Srivastava, R., & Mittal, V | Most preferable combination of explicit drift detection approaches with different classifiers for mining concept drifting data streams | Journal | International Journal of Data Science, Inderscience | 4 | 3 | 196-214 | 2019-20 |
47 | Nandini Tomar Ritesh Srivastava Veena Mittal |
Mining Public Opinion on Plastic Ban in India | Journal | International Conference on Futuristic Trends in Networks and Computing Technologies. Springer, Singapore, 2019. | - | - | 109-121 | 2019-20 |
48 | Sharma Vishnu Sanjeev Patel, Akash Gupta, | Network Traffic Classification Analysis Using Machine Learning Algorithms | Conference | International Conference on Advances in Computing, Communication Control and Networking- IEEE |
-- | -- | 1182 - 1187 | 2019-20 |
49 | Sharma Vishnu Sanjeev Patel, Akash Gupta, | A New Active Queue Management Algorithm: ALTDROP | Conference | International Conference on Advances in Computing, Communication Control and Networking - IEEE | --- | --- | 124 - 127 |
2019-20 |
50 | AkanshaVij, Vishnu Sharma, Parma Nand |
Selfish Node Detection using Game Theory in MANET | Conference | International Conference on Advances in Computing, Communication Control and Networking - IEEE | --- | --- | 104 - 105 |
2019-20 |
51 | Pankaj Kumar, Vishnu Sharma |
Insecurity of a Secure Certificate-Based Signature Scheme | Conference | International Conference on Advances in Computing, Communication Control and Networking- IEEE | -- | -- | 371 - 373 |
2019-20 |
52 | Pankaj Kumar, Vishnu Sharma |
Insecurity of a Certificateless Signature Scheme | Conference | International Conference on Advances in Computing, Communication Control and Networking - IEEE | -- | -- | 374 - 376 |
2019-20 |
53 | Manmohan, Vishnu Sharma | Finger Vein Recognition Using Modified Maximum Edge Position Octal Patterns | Conference | International Conference on Signal Processing and Integrated Networks (SPIN), IEEE | -- | -- | 287 - 292 |
2018-19 |
54 | Kumar, Indrajeet, Jitendra Virmani, and H. S. Bhadauria | Optimization of ROI Size for Development of Computer Assisted Framework for Breast Tissue Pattern Characterization Using Digitized Screen Film Mammograms | Journal | Machine Learning in Bio-Signal Analysis and Diagnostic Imaging, Academic Press | -- | -- | 127 - 157 |
2018-19 |
55 | Tiwari, Abhishek, Sanjeev Kumar Ojha | Design and Analysis of Intrusion Detection System via Neural Network, SVM, and Neuro-Fuzzy | Conference | Emerging Technologies in Data Mining and Information Security, Springer, Singapore, | -- | -- | 49 - 63 |
2018-19 |
56 | Abhishek Tiwari, Sanjeev Kumar Ojha, Dmitry Pantiukhin | An effective approach for secure video watermarking based on H. 264 coding standard. | Conference | 3rd International Conference on Computational Intelligence & Communication Technology (CICT), IEEE | -- | -- | 1 - 5 |
2017-18 |
57 | Tiwari, Abhishek | Real-Time Intrusion Detection System Using Computational Intelligence and Neural Network: Review, Analysis and Anticipated Solution of Machine Learning | Conference | Information Technology and Applied Mathematics, Springer | -- | -- | 153 - 161 |
2017-18 |
58 | Pankaj Kumar, Saru Kumari, Vishnu Sharma, Xiong Li, Arun Kumar Sangaiah & SK Hafizul Islam |
Secure CLS and CL-AS schemes designed for VANETs | Journal | Journal Supercomputing, Springer | 75 | 3076-3098 | 2017-18 | |
59 | Kumar, Indrajeet, H. S. Bhadauria, and Jitendra Virmani | A computerized framework for prediction of fatty and dense breast tissue using principal component analysis and multi-resolution texture descriptors | Journal | International Journal of Computational Systems Engineering | 4 | 2-3 | 73 - 85 |
2017-18 |
60 | Manish Kumar, S. Pathak, N. Singh, M. Kasera | A distributed approach to adhoc on demand vector link routing protocol for vanet | Journal | International Journal of Engineering Research & Technology | 7 | 4 | 467 - 472 |
2017-18 |
61 | Kamlesh Kumar Rana, Sachin Tripathi and Ram Shringar Raw | Analysis of Expected Progress Distance in Vehicular Ad-Hoc Network using Greedy Forwarding | Conference | 2017 4th International Conference on “Computing for Sustainable Global Development”, 01st - 03rd March, 2017 Bharati Vidyapeeth's Institute of Computer Applications and Management (BVICAM), New Delhi (INDIA), | -- | -- | 5171 - 5175 |
2017-18 |
62 | Rana, Kamlesh Kumar, Sachin Tripathi, and Ram Shringar Raw | Analytical Analysis of Improved Directional Location Added Routing Protocol for VANETS. | Journal | Wireless Personal Communications, Springer | 98 | 2 | 2403 - 2426 |
2017-18 |
63 | Kumar, Indrajeet, Jitendra Virmani, Harvendra S. Bhadauria, and Manoj K. Panda. | Classification of Breast Density Patterns Using PNN, NFC, and SVM Classifiers | Journal | Soft Computing Based Medical Image AnalysisAcademic Press | -- | -- | 223 - 243 |
2017-18 |
64 | S. Gupta, T. Bansal, Manish Kumar Sharma | Deep Learning based English Handwritten Character Recognition | Journal | International Journal of Science and Research | 7 | 4 | 1402 - 1404 |
2017-18 |
65 | Kamlesh Kumar Rana, Sachin Tripathi and Ram Shringar Raw | Feasibility Analysis of Directional-Location Aided Routing Protocol for Vehicular Ad-hoc Networks | Journal | International Journal of Computer Science and Information Security | 16 | 4 | 214 - 225 |
2017-18 |
66 | Kaur, Inderpreet | Secure Key Management schemes for optimizing the Energy of Manets | Journal | International Journal of Computer Science and Information Security | 15 | 10 | 249 - 252 |
2017-18 |
67 | Pankaj Kumar and S K Singh | Architectural Development of E-Learning Application using Aspect-Oriented Programming (AOP) Principles | Journal | International Journal of Computer Applications | 180 | 2 | 21 - 25 |
2017-18 |
68 | Baranwal, Aastha, Gunjan Gaur, and Rishabh Jain | Spam Filtration using Boyer Moore Algorithm and Naïve Method | Journal | International Journal of Computer Applications | 180 | 42 | 35 - 38 |
2017-18 |
69 | Kumar, Indrajeet, H. S. Bhadauria, Jitendra Virmani, and Shruti Thakur | A classification framework for prediction of breast density using an ensemble of neural network classifiers | Journal | Biocybernetics and Biomedical Engineering, Elsevier | 37 | 1 | 217 - 228 |
2016-17 |
70 | Kumar, Pankaj, and S. K. Singh | A framework for assessing the evolvability characteristics along with sub-characteristics in AOSQ model using fuzzy logic tool | Conference | International Conference on Computing, Communication and Automation (ICCCA), IEEE | -- | -- | 339 - 344 |
2016-17 |
71 | Garima Jain, Bhawna Mallick | A Study of Time Series Models ARIMA and ETS | Journal | International Journal of Modern Education and Computer Science | 9 | 4 | 57 - 63 |
2016-17 |
72 | Kaur, Inderpreet, A. L. N. Rao | A Framework to improve the Network Security with Less Mobility in MANET. | Journal | International Journal of Computer Applications | 167 | 10 | 21 - 24 |
2016-17 |
73 | Kumar, Indrajeet, H. S. Bhadauria, Jitendra Virmani, and Shruti Thakur | A hybrid hierarchical framework for classification of breast density using digitized film screen mammograms | Journal | Multimedia Tools and Applications, springer | 76 | 18 | 18789-18813 | 2016-17 |
74 | Dhyani, Isha, Neha Goel, Gaurav Sharma, and Bhawna Mallick | A reliable tactic for detecting black hole attack in vehicular ad hoc networks | Conference | Advances in Computer and Computational Sciences, Springer | -- | -- | 333 - 343 |
2016-17 |
75 | Surbhi Chandhok, Romil Anand, Soumay Gupta, and Aatif Jamshed | An Analysis of Sentimental Data using Machine Learning Techniques | Journal | International Journal of Computer Applications | 166 | 3 | 35 - 39 |
2016-17 |
76 | Satyam Singh, Rishabh Goyal, MohdArif, Rishabh Jain | An Approach to Intrusion Detection System in Mobile Ad Hoc Networks | Journal | International Journal of Engineering Science and Computing) | -- | -- | 6607 - 6610 |
2016-17 |
77 | Chandhok, Surbhi, Romil Anand, Soumay Gupta, andAatif Jamshed | Analysis of Sequential Mining Algorithms. | Journal | International Journal of Computer Applications | 165 | 12 | 14 - 16 |
2016-17 |
78 | Devendra Kumar | Analytical approach of design LIFE BAND for human | Journal | International Journal of Distributed Computing and Technology | 3 | 2 | 41 - 44 |
2016-17 |
79 | Gulshan Shrivastava | Approaches of network forensic model for investigation | Journal | International Journal of Forensic Engineering, Inderscience Publishers | 3 | 3 | 195 - 215 |
2016-17 |
80 | N. Kumar, N. A. Singh, R. Pal and Manish Kumar Sharma | Automated Traffic Management System Using Image Processing | Journal | International Journal of Advanced Research in Electronics and Communication Engineering | 6 | 4 | 291 - 297 |
2016-17 |
81 | Mittal, Kirti, Abhishek Shekhar, Prashant Singh, and Manish Kumar | Brain Tumour Extraction using Otsu Based Threshold Segmentation | Journal | International Journal of Advanced Research in Computer Science and Software Engineering | 7 | 4 | 159 - 163 |
2016-17 |
82 | U. Dwivedi, P. Rajput and Manish Kumar Sharma | Cursive Handwriting Recognition System Using Feature Extraction and Artificial Neural Network | Journal | International Research Journal of Engineering and Technology | 4 | 3 | 2202 - 2206 |
2016-17 |
83 | Madhusudan Chandak, Devendra Kumar | D-Crush: A Stronger Approach Towards Web Security | Journal | International Journal of Software Computing and Testing | 3 | 2 | 6 - 12 |
2016-17 |
84 | Ashwani Kumar Maurya, Akash Varshney, Ashish Bhasin, Bhawna Mallick | Energy Optimization of Heterogeneous Wireless Sensor Network under Distance, Residual Energy and Interference Constraints | Journal | Ever Science Publications | 5 | -- | 46 - 54 |
2016-17 |
85 | U. Dwivedi, P. Rajput and Manish Kumar Sharma | License Plate Recognition System for Moving Vehicles Using Laplacian Edge Detector and Feature Extraction | Journal | International Research Journal of Engineering and Technology | 4 | 3 | 407 - 412 |
2016-17 |
86 | Garima Jain and Bhawna Mallick | Predicting the Temperature using Sliding Window Algorithm | Journal | International Journal of Research in computer and communication Technology | 6 | -- | 99-105 | 2016-17 |
87 | Sharma, Lokesh Kumar, and Namita Mittal | Prominent feature extraction for evidence gathering in question answering | Journal | Journal of Intelligent &Fuzzy Systems | 32, | 4 | 2923-2932 | 2016-17 |
88 | Garg, Somya, Tarun Garg, and Bhawna Mallick | Secure Message Transfer using Triple DES | Journal | International Journal of Computer Applications | 165 | 8 | 1-4. | 2016-17 |
89 | Sonakshi, Rakesh Kumar, Girdhar Gopal | CASE STUDY OF SQL INJECTION ATTACKS | Journal | International Journal of Engineering Sciences & Research Technology | -- | -- | 176 - 189 |
2016-17 |
90 | Tiwari, Abhishek, and Ankit Vidyarthi | Semantically ontology merging with intelligent information retrieval using SPARQL on education domain | Conference | Communication and Computing Systems: Proceedings of the International Conference on Communication and Computing Systems (ICCCS 2016), Gurgaon, India, 9-11 September, 2016, CRC Press | -- | -- | 457 - 461 |
2016-17 |
91 | Sonakshi, Rakesh Kumar, Girdhar Gopal Bansal | SQL Injection Attacks: Vulnerabilities, Detection and Prevention Techniques | Journal | International Journal of Scientific & Engineering Research | 7 | -- | 422 - 427 |
2016-17 |
92 | Seema, Bhavana Malik | Flexible Traffic Engineering with Tunnelling and Ontology in IPV4/IPV6 | Journal | International Journal of Scientific Progress and Research | 19 | 3 | 98 - 101 |
2016-17 |
93 | Anupam Sakhi, Bhawna Mallick | High Performance Intrusion Detection using Modified K-Mean & Naïve Bayes | Journal | International Journal of Research in Engineering and Technology | 5 | -- | 135 - 137 |
2016-17 |
94 | Abhijeet Mishra, Arjun Aggarwal, Gaurav Singhal, Sushil Kr. Saroj | Mobile Computing for Sensitive Data Storage Using Multi-Clouds | Journal | International Journal of Advanced Research in Computer Science and Software Engineering | 6 | -- | 380 - 382 |
2015-16 |
95 | Gulshan Shrivastava | Network forensics: Methodical literature review | Conference | 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), IEEE | -- | -- | 2203 - 2208 |
2015-16 |
96 | Gulshan Shrivastava, Kavita Sharma, Reema Kumari | Network forensics: Today and tomorrow | Conference | 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), IEEE | -- | -- | 2234 - 2238 |
2015-16 |
97 | Priyaneet Bhatia, Bhawna Mallick | Presiding Hadoop Stipulations within Virtualization Ambience | Journal | International Journal of Innovative Research in Computer and Communication Engineering |
4 | -- | 3467 - 3472 |
2015-16 |
98 | Sonakshi, Rakesh Kumar, Girdhar Gopal | Prevention of SQL Injection Attacks using RC4 and Blowfish Encryption Techniques | Journal | International Journal of Engineering Research & Technology | 5 | -- | 25 - 29 |
2015-16 |
99 | Manmeet Kaur, Bhawna Mallick | Privacy and Secure Data Retrival for Decentralized Military Network | Journal | International Journal of Computer Applications | 141 | 6 | 12 - 16 |
2015-16 |
100 | Saluja, Ritu, S. K. Singh, and Arun K. Chaturvedi | Security checking in ABPMN | Conference | 2016 International Conference on Computing, Communication and Automation - IEEE | -- | -- | 449 - 454 |
2015-16 |
101 | Sachin Kathuria, Ankit Rai, Aniket Rai, Nritant Singh | Sliding Window Based Weighted Maximal Frequent Pattern Mining | Journal | International Journal of Innovative Research in Computer and Communication Engineering |
4 | -- | 7034 - 7040 |
2015-16 |
102 | Ritu Singh, Rohini Kumari, Rohit Kumar, Tanushree | Dynamic Load Balancing in Distributed Systems Using Biasing and Round Robin | Journal | International Journal of Engineering Science and Computing | 6 | -- | 4337 - 4340 |
2015-16 |
103 | Akhilesh Yadav, Manish, Rani Tiwari and Rishabh Jain | Securing Cloud Computing Environment using Quantum Key Distribution | Journal | International Journal of Computer Applications | 180 | 41 | 43-45 | 2015-16 |
104 | Pankaj Kumar, S. K. Singh | A systematic assessment of aspect-oriented software development (AOSD) using JHotDraw application | Conference | International Conference on Computing, Communication and Automation (ICCCA2016), IEEE | -- | -- | 779 - 784 |
2015-16 |
105 | Prachi Gupta, Manish Singh | Application of Soft Computing for Performance Analysis of Routing Protocol in MANET | Journal | International Journal of Scientific Progress and Research | 21 | 5 | 253 - 257 |
2015-16 |
106 | Prashant Jeet Singh, Virendra Kumar, Sanchita Mishra, Shilpi Srivastava, Santosh Kumar Upadhyay | DNS Tunneling Misuses | Journal | International Journal for Scientific Research & Development| | 4 | -- | 953 - 955 |
2015-16 |
107 | Seema, Bhawna Mallick | Bi-Directional Mapping with Threat Ontology | Journal | International Journal of Scientific Progress and Research | 22 | 3 | 151 - 153 |
2015-16 |
108 | Priyaneet Bhatia, Bhawna Mallick | Critique of Wordcount Blueprint by Virtue of MapReduce Postulate | Journal | International Journal of Advanced Research in Computer and Communication Engineering | 5 | -- | 122 - 129 |
2015-16 |
109 | SachinKathuria, Utkarsh Tiwary, VishvendraIndolia, Kaushlendra Kumar Pal | Voice Compression on VOIP Platform | Journal | International Journal of Computer Networks and Wireless Communications | 6 | 2 | 102 - 104 |
2015-16 |
Name of Faculty Member | Name of the Book | Publication Name | Year of Publication |
---|---|---|---|
Dr. Vishnu Sharma | Fundamental of Cyber Security and Law | International Publisher Staredu, California, USA | 2018-19 |
Indrajeet Kumar | Machine Learning in Bio-Signal Analysis and Diagnostic Imaging | Elsevier | 2018 |
Mr. Rajkumar Singh Rathore & Aatif Jamshed | BPB Publication | Fundamentals of Cyber Security | 2017 |
Mr. Rajkumar Singh Rathore & Aatif Jamshed | Asian Books Pvt. Ltd. | Information Security & Cyber Laws | 2014 |
Garima Verma | BPB Publication | Distributed System | 2014 |
Garima Verma | BPB Publication | Operating System | 2014 |
Mr. Rajkumar Singh Rathore & Sandeep Saxena | S. Chand, New Delhi | Compiler Design | 2013 |
Mr. Rajkumar Singh Rathore & Aatif Jamshed | UDH Publication, New Delhi | Information Technology & Infrastructure Management | 2013 |
Kamlesh Rana | Vayu education of India | C-Programming | 2013 |
Kamlesh Rana | Vayu education of India | Java-Programming | 2013 |
Kamlesh Rana | Vayu education of India | Mobile Computing | 2013 |