Follow
Vinod Mahor
Vinod Mahor
Computer Science & Engineering
Verified email at iesbpl.ac.in - Homepage
Title
Cited by
Cited by
Year
Mobile operating system (Android) vulnerability analysis using machine learning
V Mahor, K Pachlasiya, B Garg, M Chouhan, S Telang, R Rawat
International Conference on Network Security and Blockchain Technology, 159-169, 2021
752021
Systematic literature review (SLR) on social media and the digital transformation of drug trafficking on darkweb
R Rawat, V Mahor, M Chouhan, K Pachlasiya, S Telang, B Garg
International Conference on Network Security and Blockchain Technology, 181-205, 2022
732022
Analysis of Darknet Traffic for Criminal Activities Detection Using TF-IDF and Light Gradient Boosted Machine Learning Algorithm
RRVMSCRNSA Ghosh
Innovations in Electrical and Electronic Engineering 756, 671-681, 2021
73*2021
Cyber threat phylogeny assessment and vulnerabilities representation at thermal power station
V Mahor, B Garg, S Telang, K Pachlasiya, M Chouhan, R Rawat
International Conference on Network Security and Blockchain Technology, 28-39, 2021
702021
Sentiment analysis at online social network for cyber-malicious post reviews using machine learning techniques
R Rawat, V Mahor, S Chirgaiya, RN Shaw, A Ghosh
Computationally intelligent systems and their applications, 113-130, 2021
692021
IoT and artificial intelligence techniques for public safety and security
V Mahor, R Rawat, A Kumar, B Garg, K Pachlasiya
Smart urban computing applications, 111-126, 2023
672023
SCNTA: Monitoring of network availability and activity for identification of anomalies using machine learning approaches
R Rawat, B Garg, K Pachlasiya, V Mahor, S Telang, M Chouhan, ...
International Journal of Information Technology and Web Engineering (IJITWE …, 2022
672022
Organ trafficking on the dark web—The data security and privacy concern in healthcare systems
R Rawat, B Garg, V Mahor, S Telang, K Pachlasiya, M Chouhan
Internet of Healthcare Things: Machine Learning for Security and Privacy …, 2022
632022
Applications of Social Network Analysis to Managing the Investigation of Suspicious Activities in Social Media Platforms
ASR Vinod Mahor, Romil Rawat, Sachin Chirgaiya
Advances in Cybersecurity Management. Springer, Cham. 2, 315-335, 2021
56*2021
Cognitive systems for dark web cyber delinquent association malignant data crawling: A review
R Rawat, V Mahor, JD Álvarez, F Ch
Handbook of Research on War Policies, Strategies, and Cyber Wars, 45-63, 2023
512023
Suspicious Big Text Data Analysis for Prediction—On Darkweb User Activity Using Computational Intelligence Model
SAG Anand Singh Rajawat, Romil Rawat, Vinod Mahor, Rabindra Nath
Innovations in Electrical and Electronic Engineering 756, 735-751, 2021
48*2021
Cyber warfare threat categorization on cps by dark web terrorist
V Mahor, R Rawat, A Kumar, M Chouhan, RN Shaw, A Ghosh
2021 IEEE 4th International Conference on Computing, Power and Communication …, 2021
462021
Dark Web—Onion Hidden Service Discovery and Crawling for Profiling Morphing, Unstructured Crime and Vulnerabilities Prediction
RRASRVMRNSA Ghosh
Innovations in Electrical and Electronic Engineering 756, 717-734, 2021
46*2021
Artificial cyber espionage based protection of technological enabled automated cities infrastructure by dark web cyber offender
R Rawat, V Mahor, S Chirgaiya, B Garg
Intelligence of Things: AI-IoT Based Critical-Applications and Innovations …, 2021
432021
Surveillance robot in cyber intelligence for vulnerability detection
R Rawat, AS Rajawat, V Mahor, RN Shaw, A Ghosh
Machine Learning for Robotics Applications, 107-123, 2021
432021
Digital transformation of cyber crime for chip-enabled hacking
R Rawat, V Mahor, A Rawat, B Garg, S Telang
Handbook of research on advancing cybersecurity for digital transformation …, 2021
412021
Machine learning based detection of cyber crime hub analysis using twitter data
V Mahor, R Rawat, S Telang, B Garg, D Mukhopadhyay, P Palimkar
2021 IEEE 4th International Conference on Computing, Power and Communication …, 2021
392021
Rooted learning model at fog computing analysis for crime incident surveillance
R Rawat, V Mahor, J Díaz-Álvarez, F Chávez
2022 International Conference on Smart Generation Computing, Communication …, 2022
382022
Modeling of cyber threat analysis and vulnerability in IoT-based healthcare systems during COVID
R Rawat, V Mahor, B Garg, M Chouhan, K Pachlasiya, S Telang
Lessons from COVID-19, 405-425, 2022
262022
Analyzing newspaper articles for text-related data for finding vulnerable posts over the internet that are linked to terrorist activities
R Rawat, V Mahor, B Garg, S Telang, K Pachlasiya, A Kumar, SK Shukla, ...
International Journal of Information Security and Privacy (IJISP) 16 (1), 1-14, 2022
262022
The system can't perform the operation now. Try again later.
Articles 1–20