Intrusion detection system in cloud computing environment AM S. N. Dhage , B. B. Meshram , R. Rawat , S. Padawe , M. Paingaokar ICWET '11: Proceedings of the International Conference & Workshop on …, 2011 | 150* | 2011 |
SQL injection attack detection using SVM R Rawat, SK Shrivastav International Journal of Computer Applications 42 (13), 1-4, 2012 | 124 | 2012 |
Malware Threat Affecting Financial Organization Analysis Using Machine Learning Approach R Rawat, YN Rimal, W P., D Snehil, G Sonali, S K. Sakthidasan International Journal of Information Technology and Web Engineering (IJITWE …, 2022 | 112 | 2022 |
Association rule learning for threat analysis using traffic analysis and packet filtering approach R Rawat, RK Chakrawarti, ASA Raj, G Mani, K Chidambarathanu, ... International Journal of Information Technology 15 (6), 3245-3255, 2023 | 91 | 2023 |
Logical concept mapping and social media analytics relating to cyber criminal activities for ontology creation R Rawat International Journal of Information Technology 15 (2), 893-903, 2023 | 91 | 2023 |
IoT and artificial intelligence techniques for public safety and security V Mahor, R Rawat, A Kumar, B Garg, K Pachlasiya Smart urban computing applications, 111-126, 2023 | 88 | 2023 |
Analysis of Darknet Traffic for Criminal Activities Detection Using TF-IDF and Light Gradient Boosted Machine Learning Algorithm AG Romil Rawat,Vinod Mahor,Sachin Chirgaiya,Rabindra Nath Shaw 2021 International Conference on Electrical and Electronics Engineering …, 2021 | 86* | 2021 |
Mobile operating system (Android) vulnerability analysis using machine learning V Mahor, K Pachlasiya, B Garg, M Chouhan, S Telang, R Rawat International Conference on Network Security and Blockchain Technology, 159-169, 2021 | 80 | 2021 |
Big data: Big data analysis, issues and challenges and technologies R Rawat, R Yadav IOP Conference Series: Materials Science and Engineering 1022 (1), 012014, 2021 | 79 | 2021 |
Sentiment analysis at online social network for cyber-malicious post reviews using machine learning techniques R Rawat, V Mahor, S Chirgaiya, RN Shaw, A Ghosh Computationally intelligent systems and their applications, 113-130, 2021 | 78 | 2021 |
Systematic Literature Review (SLR) on Social Media and the Digital Transformation of Drug Trafficking on Darkweb R Rawat, V Mahor, M Chouhan, K Pachlasiya, S Telang, B Garg International Conference on Network Security and Blockchain Technology 481 …, 2022 | 77 | 2022 |
Cyber threat phylogeny assessment and vulnerabilities representation at thermal power station V Mahor, B Garg, S Telang, K Pachlasiya, M Chouhan, R Rawat International Conference on Network Security and Blockchain Technology, 28-39, 2021 | 76 | 2021 |
Malevolent information crawling mechanism for forming structured illegal organisations in hidden networks R Rawat, S Gupta, S Sivaranjani, OK Cu, M Kuliha, KS Sankaran International Journal of Cyber Warfare and Terrorism (IJCWT) 12 (1), 1-14, 2022 | 73 | 2022 |
Techniques for predicting dark web events focused on the delivery of illicit products and ordered crime SA Ajagbe, R Rawat, OA Oki, S Sankaran, H Florez International Journal of Electrical and Computer Engineering (IJECE …, 2023 | 71* | 2023 |
SCNTA: Monitoring of network availability and activity for identification of anomalies using machine learning approaches R Rawat, B Garg, K Pachlasiya, V Mahor, S Telang, M Chouhan, ... International Journal of Information Technology and Web Engineering (IJITWE …, 2022 | 70 | 2022 |
Organ Trafficking on the Dark Web—The Data Security and Privacy Concern in Healthcare Systems R Rawat, B Garg, V Mahor, S Telang, K Pachlasiya, M Chouhan Internet of Healthcare Things, 191, 2022 | 70 | 2022 |
Blockchain-Based Model for Expanding IoT Device Data Security AS Rajawat, R Rawat, K Barhanpurkar, RN Shaw, A Ghosh Advances in Applications of Data-Driven Computing, 61, 2021 | 69 | 2021 |
Intelligent fog computing surveillance system for crime and vulnerability identification and tracing R Rawat, RK Chakrawarti, P Vyas, JLA Gonzáles, R Sikarwar, ... International Journal of Information Security and Privacy (IJISP) 17 (1), 1-25, 2023 | 67 | 2023 |
Anonymous trading on the dark online marketplace: An exploratory study P Vyas, G Vyas, A Chauhan, R Rawat, S Telang, M Gottumukkala Using Computational Intelligence for the Dark Web and Illicit Behavior …, 2022 | 63 | 2022 |
A new solution for cyber security in big data using machine learning approach R Rawat, OA Oki, KS Sankaran, O Olasupo, GN Ebong, SA Ajagbe Mobile Computing and Sustainable Informatics: Proceedings of ICMCSI 2023 …, 2023 | 60 | 2023 |