关注
Vinod Mahor
Vinod Mahor
Computer Science & Engineering
在 iesbpl.ac.in 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Sentiment analysis at online social network for cyber-malicious post reviews using machine learning techniques
R Rawat, V Mahor, S Chirgaiya, RN Shaw, A Ghosh
Computationally intelligent systems and their applications, 113-130, 2021
632021
Analysis of Darknet Traffic for Criminal Activities Detection Using TF-IDF and Light Gradient Boosted Machine Learning Algorithm
RRVMSCRNSA Ghosh
Innovations in Electrical and Electronic Engineering 756, 671-681, 2021
58*2021
Applications of Social Network Analysis to Managing the Investigation of Suspicious Activities in Social Media Platforms
ASR Vinod Mahor, Romil Rawat, Sachin Chirgaiya
Advances in Cybersecurity Management. Springer, Cham. 2, 315-335, 2021
47*2021
Suspicious Big Text Data Analysis for Prediction—On Darkweb User Activity Using Computational Intelligence Model
SAG Anand Singh Rajawat, Romil Rawat, Vinod Mahor, Rabindra Nath
Innovations in Electrical and Electronic Engineering 756, 735-751, 2021
45*2021
Cyber warfare threat categorization on cps by dark web terrorist
V Mahor, R Rawat, A Kumar, M Chouhan, RN Shaw, A Ghosh
2021 IEEE 4th International Conference on Computing, Power and Communication …, 2021
432021
Digital transformation of cyber crime for chip-enabled hacking
R Rawat, V Mahor, A Rawat, B Garg, S Telang
Handbook of research on advancing cybersecurity for digital transformation …, 2021
412021
Artificial cyber espionage based protection of technological enabled automated cities infrastructure by dark web cyber offender
R Rawat, V Mahor, S Chirgaiya, B Garg
Intelligence of Things: AI-IoT Based Critical-Applications and Innovations …, 2021
382021
Machine learning based detection of cyber crime hub analysis using twitter data
V Mahor, R Rawat, S Telang, B Garg, D Mukhopadhyay, P Palimkar
2021 IEEE 4th International Conference on Computing, Power and Communication …, 2021
362021
Dark Web—Onion Hidden Service Discovery and Crawling for Profiling Morphing, Unstructured Crime and Vulnerabilities Prediction
RRASRVMRNSA Ghosh
Innovations in Electrical and Electronic Engineering 756, 717-734, 2021
36*2021
Surveillance robot in cyber intelligence for vulnerability detection
R Rawat, AS Rajawat, V Mahor, RN Shaw, A Ghosh
Machine Learning for Robotics Applications, 107-123, 2021
302021
Analyzing newspaper articles for text-related data for finding vulnerable posts over the internet that are linked to terrorist activities
R Rawat, V Mahor, B Garg, S Telang, K Pachlasiya, A Kumar, SK Shukla, ...
International Journal of Information Security and Privacy (IJISP) 16 (1), 1-14, 2022
262022
SCNTA: monitoring of network availability and activity for identification of anomalies using machine learning approaches
R Rawat, B Garg, K Pachlasiya, V Mahor, S Telang, M Chouhan, ...
International Journal of Information Technology and Web Engineering (IJITWE …, 2022
252022
Systematic literature Review (SLR) on social media and the Digital Transformation of Drug Trafficking on Darkweb
R Rawat, V Mahor, M Chouhan, K Pachlasiya, S Telang, B Garg
International Conference on Network Security and Blockchain Technology, 181-205, 2022
242022
Mobile Operating System (Android) Vulnerability Analysis Using Machine Learning
V Mahor, K Pachlasiya, B Garg, M Chouhan, S Telang, R Rawat
International Conference on Network Security and Blockchain Technology, 159-169, 2021
242021
Organ trafficking on the dark web—the data security and privacy concern in healthcare systems
R Rawat, B Garg, V Mahor, S Telang, K Pachlasiya, M Chouhan
Internet of Healthcare Things: Machine Learning for Security and Privacy …, 2022
232022
Cyber threat phylogeny assessment and vulnerabilities representation at thermal power station
V Mahor, B Garg, S Telang, K Pachlasiya, M Chouhan, R Rawat
International Conference on Network Security and Blockchain Technology, 28-39, 2021
232021
Modeling of cyber threat analysis and vulnerability in IoT-based healthcare systems during COVID
R Rawat, V Mahor, B Garg, M Chouhan, K Pachlasiya, S Telang
Lessons from COVID-19, 405-425, 2022
222022
An efficient fine grained access control scheme based on attributes for enterprise class applications
S Chatterjee, AK Gupta, VK Mahor, T Sarmah
2014 International Conference on Signal Propagation and Computer Technology …, 2014
102014
Iot and artificial intelligence techniques for public safety and security
V Mahor, R Rawat, A Kumar, B Garg, K Pachlasiya
Smart urban computing applications, 111-126, 2023
82023
Cyber threat exploitation and growth during COVID-19 times
R Rawat, B Garg, V Mahor, M Chouhan, K Pachlasiya, S Telang
Advanced Smart Computing Technologies in Cybersecurity and Forensics, 85-101, 2021
82021
系统目前无法执行此操作,请稍后再试。
文章 1–20