关注
Divya Bansal
标题
引用次数
引用次数
年份
Malware analysis and classification: A survey
E Gandotra, D Bansal, S Sofat
Journal of Information Security 2014, 2014
5932014
Smart patrolling: An efficient road surface monitoring using smartphone sensors and crowdsourcing
G Singh, D Bansal, S Sofat, N Aggarwal
Pervasive and Mobile Computing 40, 71-88, 2017
1472017
Road condition detection using smartphone sensors: A survey
G Chugh, D Bansal, S Sofat
International Journal of Electronic and Electrical Engineering 7 (6), 595-602, 2014
922014
A smartphone based technique to monitor driving behavior using DTW and crowdsensing
G Singh, D Bansal, S Sofat
Pervasive and Mobile Computing 40, 56-70, 2017
792017
Analyzing driving and road events via smartphone
N Kalra, G Chugh, D Bansal
International Journal of Computer Applications 98 (12), 5-9, 2014
662014
Zero-day malware detection
E Gandotra, D Bansal, S Sofat
2016 Sixth international symposium on embedded computing and system design …, 2016
582016
Behavioral analysis and classification of spammers distributing pornographic content in social media
M Singh, D Bansal, S Sofat
Social Network Analysis and Mining 6, 1-18, 2016
492016
Analyzing driver behavior using smartphone sensors: a survey
N Kalra, D Bansal
Int. J. Electron. Electr. Eng 7 (7), 697-702, 2014
452014
Intelligent transportation system for developing countries-a survey
G Singh, D Bansal, S Sofat
International Journal of Computer Applications 85 (3), 34-38, 2014
452014
Who is who on twitter–spammer, fake or compromised account? a tool to reveal true identity in real-time
M Singh, D Bansal, S Sofat
Cybernetics and Systems 49 (1), 1-25, 2018
432018
Deauthentication/disassociation attack: Implementation and security in wireless mesh networks
R Cheema, D Bansal, S Sofat
International Journal of Computer Applications 23 (7), 7-15, 2011
352011
Tools and Techniques for Collection and Analysis of Internet-of-Things malware: A systematic state-of-art review
S Madan, S Sofat, D Bansal
Journal of King Saud University-Computer and Information Sciences 34 (10 …, 2022
342022
Computational techniques for predicting cyber threats
E Gandotra, D Bansal, S Sofat
Intelligent Computing, Communication and Devices: Proceedings of ICCD 2014 …, 2015
342015
Deployment and evaluation of IEEE 802.11 based wireless mesh networks in campus environment
D Bansal, S Sofat
Proceedings of the 4th ACM Workshop on Networked Systems for Developing …, 2010
342010
A review on fake news detection 3T’s: typology, time of detection, taxonomies
S Rastogi, D Bansal
International Journal of Information Security 22 (1), 177-212, 2023
322023
Performance evaluation of routing protocols based on wormhole attack in wireless mesh networks
M Arora, RK Challa, D Bansal
2010 Second International Conference on Computer and Network Technology, 102-104, 2010
312010
Integrated framework for classification of malwares
E Gandotra, D Bansal, S Sofat
Proceedings of the 7th International Conference on Security of Information …, 2014
262014
Optimized client side solution for cross site scripting
S Tiwari, R Bansal, D Bansal
2008 16th IEEE international conference on networks, 1-4, 2008
262008
Malware threat assessment using fuzzy logic paradigm
E Gandotra, D Bansal, S Sofat
Cybernetics and systems 48 (1), 29-48, 2017
252017
Non-cryptographic methods of MAC spoof detection in wireless LAN
R Bansal, S Tiwari, D Bansal
2008 16th IEEE International Conference on Networks, 1-6, 2008
252008
系统目前无法执行此操作,请稍后再试。
文章 1–20