A survey of android application and malware hardening V Sihag, M Vardhan, P Singh Computer Science Review 39, 100365, 2021 | 74 | 2021 |
De-LADY: Deep learning based Android malware detection using Dynamic features V Sihag, M Vardhan, P Singh, G Choudhary, S Son Journal of Internet Services and Information Security (JISIS) 11 (2), 34-45, 2021 | 62 | 2021 |
Cyber security challenges in aviation communication, navigation, and surveillance G Dave, G Choudhary, V Sihag, I You, KKR Choo Computers & Security 112, 102516, 2022 | 47 | 2022 |
BLADE: Robust malware detection against obfuscation in android V Sihag, M Vardhan, P Singh Forensic Science International: Digital Investigation 38, 301176, 2021 | 41 | 2021 |
A clustering approach for structural k-anonymity in social networks using genetic algorithm VK Sihag Proceedings of the CUBE international information technology conference, 701-706, 2012 | 37 | 2012 |
BERT-based transfer-learning approach for nested named-entity recognition using joint labeling A Agrawal, S Tripathi, M Vardhan, V Sihag, G Choudhary, N Dragoni Applied Sciences 12 (3), 976, 2022 | 30 | 2022 |
Signature based malicious behavior detection in android V Sihag, A Swami, M Vardhan, P Singh International Conference on Computing Science, Communication and Security …, 2020 | 26 | 2020 |
PICAndro: Packet InspeCtion‐Based Android Malware Detection V Sihag, G Choudhary, M Vardhan, P Singh, JT Seo Security and Communication Networks 2021 (1), 9099476, 2021 | 16 | 2021 |
An assistive tool for fileless malware detection P Borana, V Sihag, G Choudhary, M Vardhan, P Singh 2021 World Automation Congress (WAC), 21-25, 2021 | 15 | 2021 |
A reactive approach for detection of collusion attacks in P2P trust and reputation systems NK Saini, VK Sihag, RC Yadav 2014 IEEE International Advance Computing Conference (IACC), 312-317, 2014 | 15 | 2014 |
Opcode n-gram based malware classification in android V Sihag, A Mitharwal, M Vardhan, P Singh 2020 Fourth World Conference on Smart Trends in Systems, Security and …, 2020 | 13 | 2020 |
Detecting community structure based on traffic at node in networks VK Sihag, A Anand, R Tomar, J Chandra, R Tiwari, A Dumka, AS Poonia 2014 IEEE Students' Conference on Electrical, Electronics and Computer …, 2014 | 13 | 2014 |
Counterfeited product identification in a supply chain using blockchain technology S Singh, G Choudhary, SK Shandilya, V Sihag, A Choudhary Research Briefs on Information & Communication Technology Evolution 7, 3, 2021 | 12 | 2021 |
Graph based text document clustering by detecting initial centroids for k-means VK Sihag, S Kumar International Journal of Computer Applications 62 (19), 1-4, 2013 | 12 | 2013 |
Cyber4drone: A systematic review of cyber security and forensics in next-generation drones V Sihag, G Choudhary, P Choudhary, N Dragoni Drones 7 (7), 430, 2023 | 11 | 2023 |
Wavelength conversion and deflection routing in all-optical packet-switched networks through contention resolution: A survey A Anand, VK Sihag, SN Gupta Proceedings of the cube international information technology conference, 155-159, 2012 | 10 | 2012 |
A Multi-Controller Authentication approach for SDN C Bhatt, V Sihag, G Choudhary, PV Astillo, I You 2021 International Conference on Electronics, Information, and Communication …, 2021 | 9 | 2021 |
Hybrid single sign-on protocol for lightweight devices P Sharma, VK Sihag 2016 IEEE 6th International Conference on Advanced Computing (IACC), 679-684, 2016 | 8 | 2016 |
Sandbox environment for real time malware analysis of IoT devices GP Kachare, G Choudhary, SK Shandilya, V Sihag International Conference on Computing Science, Communication and Security …, 2022 | 7 | 2022 |
Forensic analysis of fitness applications on android R Sinha, V Sihag, G Choudhary, M Vardhan, P Singh International Symposium on Mobile Internet Security, 222-235, 2021 | 6 | 2021 |