Year Wise List of Publications (Non-SCI Journals/ Conferences)
2024
“Development and Evaluation of a Smart Agricultural Chatbot,” 2024 IEEE 15th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), Yorktown Heights, NY, USA, 2024, pp. 158 163, doi: 10.1109/UEMCON62879.2024.10754742.
2023
“Identifying bot infection using neural networks on DNS traffic.” Journal of Computer Virology and Hacking Techniques (2023): 1-15.
2021
“Evaluation of Soil Moisture for Estimation of Irrigation Pattern by Using Machine Learning Methods.” Advances in Computing and Data Sciences: 5th International Conference, ICACDS 2021, Nashik, India, April 23–24, 2021, Revised Selected Papers, Part II 5. Springer International Publishing, 2021.
2020
“Wireless sensor and actuator network (s) and its significant impact on agricultural domain.” 2020 Sixth International Conference on Parallel, Distributed and Grid Computing (PDGC). IEEE, 2020.
2019
“Forecasting soil moisture based on evaluation of time series analysis.” Advances in Power and Control Engineering: Proceedings of GUCON 2019. Springer Singapore, 2020.
“Internet of Things for Precision Agriculture Applications.” 2019 Fifth International Conference on Image Information Processing (ICIIP). IEEE, 2019.
“10 Days DNS Network Traffic from April-May 2016.” Mendeley Data 2 (2019).
“Data dimensionality reduction (DDR) scheme for intrusion detection system using ensemble and standalone classifiers.” Advances in Computing and Data Sciences: Third International Conference, ICACDS 2019, Ghaziabad, India, April 12–13, 2019, Revised Selected Papers, Part I 3. Springer Singapore, 2019.
“Revamping the doctrinal irrigation system into Smart Irrigation Framework using the concepts of Internet of Things (IoT)”, 8th Asian Australasian Conference on Precision Agriculture, Punjab Agricultural University, Ludhiana, 14t h-17th October, 2019.
2018
“Online multilingual dictionary using Hamburg notation for avatar-based Indian sign language generation system.” International Journal of Cognitive and Language Sciences 12.8 (2018): 1117-1124.
“An Efficient Hybrid Approach Using Misuse Detection and Genetic Algorithm for Network Intrusion Detection.” Advances in Computing and Data Sciences: Second International Conference, ICACDS 2018, Dehradun, India, April 20-21, 2018, Revised Selected Papers, Part I 2. Springer Singapore, 2018.
“PDD Algorithm for Balancing Medical Data.” Advances in Computing and Data Sciences: Second International Conference, ICACDS 2018, Dehradun, India, April 20-21, 2018, Revised Selected Papers, Part I 2. Springer Singapore, 2018.
“Ensemble technique based on supervised and unsupervised learning approach for intrusion detection.” Advances in Computing and Data Sciences: Second International Conference, ICACDS 2018, Dehradun, India, April 20-21, 2018, Revised Selected Papers, Part I 2. Springer Singapore, 2018.
“Intelligent Face Recognition System for Visually Impaired.” Advances in Computing and Data Sciences: Second International Conference, ICACDS 2018, Dehradun, India, April 20-21, 2018, Revised Selected Papers, Part II 2. Springer Singapore, 2018.
“Extreme gradient boosting based tuning for classification in intrusion detection systems.” Advances in Computing and Data Sciences: Second International Conference, ICACDS 2018, Dehradun, India, April 20-21, 2018, Revised Selected Papers, Part I 2. Springer Singapore, 2018.
2017
“Tension Detection in Online Social Communities using Sentiment Analysis”, The 2017 International Conference on Computational Science & Computational Intelligence (CSCI’17) December 14-16, 2017 | Las Vegas, USA
“Automatic irrigation system using Arduino UNO.” 2017 International Conference on Intelligent Computing and Control Systems (ICICCS). 2017.
“Intrusion detection for Adhoc networks in IOT.” 2017 International Conference on Intelligent Computing and Control Systems (ICICCS). IEEE, 2017.
“Design of financial inclusion system for rural India.” 2017 International Conference on Computing, Communication and Automation (ICCCA). IEEE, 2017.
2016
“Improving detection rate using misuse detection and machine learning.” 2016 SAI Computing Conference (SAI). IEEE, 2016.
“Loan approval prediction based on machine learning approach.” IOSR J. Comput. Eng 18.3 (2016): 18-21.
“A Hybrid Intrusion Detection approach using Misuse Detection and Genetic Algorithm” Poster presentation at Security and Privacy Symposium 2016, Feb 13, 2016 in IIIT Delhi.
2015
“Antispammer for mobile messages” Proceedings of the Sixth International Conference on Computer and Communication Technology 2015. 2015.
“SMS spam detection for Indian messages” 2015 1st International Conference on Next Generation Computing Technologies (NGCT). IEEE, 2015.
“A proactive framework for automatic detection of zero-day HTTP attacks on educational institutions” Computer Fraud & Security 2015.2 (2015): 10-16.
2013
“Comparative analysis of anomaly based and signature based intrusion detection systems using PHAD and Snort.” Proceeding of security and privacy symposium, Feb. Vol. 28. 2013.
“Evaluation of Rule based Machine learning algorithms on NSL-KDD dataset”, International journal of Computational Intelligence and Information Security, vol 4, no. 6, pp. 42-49, June 2013.
“Emulation of ftp service using virtual honeypot”, INTERNATIONAL CONGRESS on Innovative Trends in Information Technologies and Computing Sciences for Competitive World Order” (ITITCSCWO – 2013) held in JNU New Delhi on 2nd & 3rd March 2013″ published in International Journal of Information & Computation Technology (IJICT) Volume 3, Number 10 (spl) (2013).
Policy Scripts to Detect Network Intrusions, International Conference on Global Innovations in Technology and Science (ICGITS-2013) SAINGITS, Kottyam, Kerala from 4-4-2013 to 6-4-2013
2012
“Comparative study of different honeypots system.” International Journal of Engineering Research and Development e-ISSN (2012): 23-27.
“Snort rule Execution and front End for Snort Rule Making”, International Conference on Advanced Computing Technologies, June 2012 at Gurukul Vidyapeeth, Chandigarh.
“Intrusion Detection System Classification: A Survey”, International Conference on Advanced Computing Technologies, June 2012 at Gurukul Vidyapeeth, Chandigarh.
“Comparative Analysis of Various Misuse Detection Approaches: A Survey”, International Conference on Advanced Computing Technologies, June 2012 at Gurukul Vidyapeeth, Chandigarh.
Design and Implementation of Policy Scripts to Detect Network Intrusions using Bro IDS, International Conference On “Advanced Computing Technologies”, June 2012 at Gurukul Vidyapeeth, Chandigarh.
2010
“Spam a Major Threat to Network Security :A Review of Spam and Anti-spam Techniques”, National Conference on Advances and Research in Technology (ART-2010), Yamuna Group of Institutions, Yamuna Nagar, Haryana, India.
Removing anomalies and Merging similar Firewall Rules. National Conference on Computing, Communication & Information Technology (CCIT-2010), Sant Longowal Institute of Engineering and Technology, Longowal, Punjab, India.
2009
Intrusion Detection System and Techniques to Detect Intrusion in a Network, National Conference on Advances in Computer Networks and Information Technology (NCACNIT 2009), April 2009, Guru Jambheshwar University, Hisar.
2008
Analysis of Various Intrusion Detection Techniques, International Conference on Challenges and Developments in IT, May 2008.