Malware analysis and classification: A survey E Gandotra, D Bansal, S Sofat Journal of Information Security 2014, 2014 | 593 | 2014 |
Smart patrolling: An efficient road surface monitoring using smartphone sensors and crowdsourcing G Singh, D Bansal, S Sofat, N Aggarwal Pervasive and Mobile Computing 40, 71-88, 2017 | 147 | 2017 |
Road condition detection using smartphone sensors: A survey G Chugh, D Bansal, S Sofat International Journal of Electronic and Electrical Engineering 7 (6), 595-602, 2014 | 92 | 2014 |
A smartphone based technique to monitor driving behavior using DTW and crowdsensing G Singh, D Bansal, S Sofat Pervasive and Mobile Computing 40, 56-70, 2017 | 79 | 2017 |
Analyzing driving and road events via smartphone N Kalra, G Chugh, D Bansal International Journal of Computer Applications 98 (12), 5-9, 2014 | 66 | 2014 |
Zero-day malware detection E Gandotra, D Bansal, S Sofat 2016 Sixth international symposium on embedded computing and system design …, 2016 | 58 | 2016 |
Behavioral analysis and classification of spammers distributing pornographic content in social media M Singh, D Bansal, S Sofat Social Network Analysis and Mining 6, 1-18, 2016 | 49 | 2016 |
Analyzing driver behavior using smartphone sensors: a survey N Kalra, D Bansal Int. J. Electron. Electr. Eng 7 (7), 697-702, 2014 | 45 | 2014 |
Intelligent transportation system for developing countries-a survey G Singh, D Bansal, S Sofat International Journal of Computer Applications 85 (3), 34-38, 2014 | 45 | 2014 |
Who is who on twitter–spammer, fake or compromised account? a tool to reveal true identity in real-time M Singh, D Bansal, S Sofat Cybernetics and Systems 49 (1), 1-25, 2018 | 43 | 2018 |
Deauthentication/disassociation attack: Implementation and security in wireless mesh networks R Cheema, D Bansal, S Sofat International Journal of Computer Applications 23 (7), 7-15, 2011 | 35 | 2011 |
Tools and Techniques for Collection and Analysis of Internet-of-Things malware: A systematic state-of-art review S Madan, S Sofat, D Bansal Journal of King Saud University-Computer and Information Sciences 34 (10 …, 2022 | 34 | 2022 |
Computational techniques for predicting cyber threats E Gandotra, D Bansal, S Sofat Intelligent Computing, Communication and Devices: Proceedings of ICCD 2014 …, 2015 | 34 | 2015 |
Deployment and evaluation of IEEE 802.11 based wireless mesh networks in campus environment D Bansal, S Sofat Proceedings of the 4th ACM Workshop on Networked Systems for Developing …, 2010 | 34 | 2010 |
A review on fake news detection 3T’s: typology, time of detection, taxonomies S Rastogi, D Bansal International Journal of Information Security 22 (1), 177-212, 2023 | 32 | 2023 |
Performance evaluation of routing protocols based on wormhole attack in wireless mesh networks M Arora, RK Challa, D Bansal 2010 Second International Conference on Computer and Network Technology, 102-104, 2010 | 31 | 2010 |
Integrated framework for classification of malwares E Gandotra, D Bansal, S Sofat Proceedings of the 7th International Conference on Security of Information …, 2014 | 26 | 2014 |
Optimized client side solution for cross site scripting S Tiwari, R Bansal, D Bansal 2008 16th IEEE international conference on networks, 1-4, 2008 | 26 | 2008 |
Malware threat assessment using fuzzy logic paradigm E Gandotra, D Bansal, S Sofat Cybernetics and systems 48 (1), 29-48, 2017 | 25 | 2017 |
Non-cryptographic methods of MAC spoof detection in wireless LAN R Bansal, S Tiwari, D Bansal 2008 16th IEEE International Conference on Networks, 1-6, 2008 | 25 | 2008 |