Mobile operating system (Android) vulnerability analysis using machine learning V Mahor, K Pachlasiya, B Garg, M Chouhan, S Telang, R Rawat International Conference on Network Security and Blockchain Technology, 159-169, 2021 | 80 | 2021 |
Systematic literature review (SLR) on social media and the digital transformation of drug trafficking on darkweb R Rawat, V Mahor, M Chouhan, K Pachlasiya, S Telang, B Garg International Conference on Network Security and Blockchain Technology, 181-205, 2022 | 77 | 2022 |
Cyber threat phylogeny assessment and vulnerabilities representation at thermal power station V Mahor, B Garg, S Telang, K Pachlasiya, M Chouhan, R Rawat International Conference on Network Security and Blockchain Technology, 28-39, 2021 | 76 | 2021 |
Organ trafficking on the dark web—The data security and privacy concern in healthcare systems R Rawat, B Garg, V Mahor, S Telang, K Pachlasiya, M Chouhan Internet of Healthcare Things: Machine Learning for Security and Privacy …, 2022 | 70 | 2022 |
SCNTA: Monitoring of network availability and activity for identification of anomalies using machine learning approaches R Rawat, B Garg, K Pachlasiya, V Mahor, S Telang, M Chouhan, ... International Journal of Information Technology and Web Engineering (IJITWE …, 2022 | 70 | 2022 |
Smart vehicles for communication R Rawat, P Bhardwaj, U Kaur, S Telang, M Chouhan, KS Sankaran John Wiley & Sons, 2023 | 58 | 2023 |
Cyber warfare threat categorization on cps by dark web terrorist V Mahor, R Rawat, A Kumar, M Chouhan, RN Shaw, A Ghosh 2021 IEEE 4th International Conference on Computing, Power and Communication …, 2021 | 47 | 2021 |
Modeling of cyber threat analysis and vulnerability in IoT-based healthcare systems during COVID R Rawat, V Mahor, B Garg, M Chouhan, K Pachlasiya, S Telang Lessons from COVID-19, 405-425, 2022 | 32 | 2022 |
Conversational AI Applications in Ed‐Tech Industry: An Analysis of Its Impact and Potential in Education D Chauhan, C Singh, R Rawat, M Chouhan Conversational Artificial Intelligence, 411-433, 2024 | 18 | 2024 |
Cyber Threat Exploitation and Growth during COVID-19 Times R Rawat, B Garg, V Mahor, M Chouhan, K Pachlasiya, S Telang Advanced Smart Computing Technologies in Cybersecurity and Forensics, 85-101, 2021 | 10 | 2021 |
Malware Inputs Detection Approach (Tool) based on Machine Learning [MIDT-SVM] R Rawat, M Chouhan, B Garg, S TELANG, V Mahor, K Pachlasiya Available at SSRN 3915404, 2021 | 2 | 2021 |
6 Cyber Threat R Rawat, B Garg, V Mahor, M Chouhan, K Pachlasiya, S Telang Advanced Smart Computing Technologies in Cybersecurity and Forensics, 85, 2021 | | 2021 |
CROP SECURING INFRASTRUCTURE FROM VULNERABLE ATTACKS BY TIDDI-DAL(LOCUST) BASED ON AUDIO DESIGNED STREAMLINING USING AI(CSIVAT-AI) R Rawat, T Shrikant, C Mukesh IN Patent 202,111,013,344, 2021 | | 2021 |
PMSAVII - PATIENT MONITORING SYSTEM BY AUDIO, VIDEO AND IMAGE, TEXT DATA ANALYSIS USING IOT AND ARTIFICIAL INTELLIGENCE R Rawat, T Shrikant, C Mukesh IN Patent 202,111,013,628, 2021 | | 2021 |
Machine Learning based Detection of Cyber Crime Hub Analysis using Twitter Data A Kumar, R Bharatpur, B Garg, R Rawat, M Chouhan, V Mahor, S Telang, ... SSRN, 2021 | | 2021 |
An Efficient Approach for Mining Frequent Pattern with Time over Large Database M Chouhan, VK Verma | | 2017 |
Drug Trafficking crime analysis using Systematic literature Review (SLR) within Darkweb R Rawat, V Mahor, A Kumar, M Chouhan, K Pachlasiya, S Telang, B Garg | | |