PermPair: Android Malware Detection Using Permission Pairs A Arora, SK Peddoju, M Conti IEEE Transactions on Information Forensics and Security 15, 1968-1982, 2019 | 180 | 2019 |
Malware detection using network traffic analysis in android based mobile devices A Arora, S Garg, SK Peddoju Next Generation Mobile Apps, Services and Technologies (NGMAST), 2014 Eighth …, 2014 | 165 | 2014 |
Minimizing Network Traffic Features for Android Mobile Malware Detection A Arora, SK Peddoju Proceedings of the 18th International Conference on Distributed Computing …, 2017 | 83 | 2017 |
IPDroid: Android Malware Detection using Intents and Permissions K Khariwal, J Singh, A Arora 2020 Fourth World Conference on Smart Trends in Systems, Security and …, 2020 | 75 | 2020 |
NTPDroid: A Hybrid Android Malware Detector Using Network Traffic and System Permissions A Arora, SK Peddoju 2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018 | 66 | 2018 |
Poster: Hybrid Android Malware Detection by Combining Supervised and Unsupervised Learning A Arora, SK Peddoju, V Chouhan, A Chaudhary Proceedings of the 24th Annual International Conference on Mobile Computing …, 2018 | 48 | 2018 |
RPNDroid: Android Malware Detection using Ranked Permissions and Network Traffic M Upadhayay, A Sharma, G Garg, A Arora 2021 Fifth World Conference on Smart Trends in Systems Security and …, 2021 | 23 | 2021 |
Video Fraud Detection using Blockchain A Dhiran, D Kumar, A Arora 2020 Second International Conference on Inventive Research in Computing …, 2020 | 15 | 2020 |
Blockchain-based secure and transparent election and vote counting mechanism using secret sharing scheme V Chouhan, A Arora Journal of Ambient Intelligence and Humanized Computing 14 (10), 14009-14027, 2023 | 13 | 2023 |
Detecting fake drugs using blockchain A Sanghi, AK Aayush, A Arora, A Kaushik International Journal of Recent Technology and Engineering (IJRTE) 10 (1 …, 2021 | 11 | 2021 |
An Enhanced Intrusion Detection System Using Combinational Feature Ranking and Machine Learning Algorithms SK Jha, A Arora 2022 2nd International Conference on Intelligent Technologies (CONIT), 1-8, 2022 | 8 | 2022 |
Blockchain based detection of android malware using ranked permissions S Gupta, S Sethi, S Chaudhary, A Arora Int. J. Eng. Adv. Technol 10, 68-75, 2021 | 8 | 2021 |
Feature Ranking using Statistical Techniques for Computer Networks Intrusion Detection Y Sharma, S Sharma, A Arora 2022 7th International Conference on Communication and Electronics Systems …, 2022 | 7 | 2022 |
SFDroid: android malware detection using ranked static features G Garg, A Sharma, A Arora International Journal of Recent Technology and Engineering 10 (1), 142-152, 2021 | 7 | 2021 |
A comprehensive review on permissions-based Android malware detection Y Sharma, A Arora International Journal of Information Security 23 (3), 1877-1912, 2024 | 6 | 2024 |
An Unsupervised Based Enhanced Anomaly Detection Model Using Features Importance N Sushmakar, N Oberoi, S Gupta, A Arora 2022 2nd International Conference on Intelligent Technologies (CONIT), 1-7, 2022 | 6 | 2022 |
R-mfdroid: Android malware detection using ranked manifest file components K Khariwal, R Gupta, J Singh, A Arora International Journal of Innovative Technology and Exploring Engineering 10 …, 2021 | 5 | 2021 |
IPAnalyzer: A novel Android malware detection system using ranked Intents and Permissions Y Sharma, A Arora Multimedia Tools and Applications 83 (33), 78957-79008, 2024 | 3 | 2024 |
A Blockchain-based Decentralized Framework for Carbon Accounting, Trading and Governance V Rawat, N Dahiya, S Rai, A Arora Proceedings of the 2022 8th International Conference on Computer Technology …, 2022 | 3 | 2022 |
Impact of Feature Selection Algorithms on Network Intrusion Detection S Jain, S Bihani, S Jaiswal, A Arora 2023 IEEE Symposium on Wireless Technology & Applications (ISWTA), 66-71, 2023 | 2 | 2023 |