Follow
Mukesh Chouhan
Mukesh Chouhan
AP & HOD of Computer Science & Engineering, Government Polytechnic College, Sanawad Distt. Khargone
Verified email at mp.gov.in
Title
Cited by
Cited by
Year
Mobile operating system (Android) vulnerability analysis using machine learning
V Mahor, K Pachlasiya, B Garg, M Chouhan, S Telang, R Rawat
International Conference on Network Security and Blockchain Technology, 159-169, 2021
752021
Systematic literature review (SLR) on social media and the digital transformation of drug trafficking on darkweb
R Rawat, V Mahor, M Chouhan, K Pachlasiya, S Telang, B Garg
International Conference on Network Security and Blockchain Technology, 181-205, 2022
732022
Cyber threat phylogeny assessment and vulnerabilities representation at thermal power station
V Mahor, B Garg, S Telang, K Pachlasiya, M Chouhan, R Rawat
International Conference on Network Security and Blockchain Technology, 28-39, 2021
702021
SCNTA: Monitoring of network availability and activity for identification of anomalies using machine learning approaches
R Rawat, B Garg, K Pachlasiya, V Mahor, S Telang, M Chouhan, ...
International Journal of Information Technology and Web Engineering (IJITWE …, 2022
672022
Organ trafficking on the dark web—The data security and privacy concern in healthcare systems
R Rawat, B Garg, V Mahor, S Telang, K Pachlasiya, M Chouhan
Internet of Healthcare Things: Machine Learning for Security and Privacy …, 2022
632022
Smart vehicles for communication
R Rawat, P Bhardwaj, U Kaur, S Telang, M Chouhan, KS Sankaran
John Wiley & Sons, 2023
552023
Cyber warfare threat categorization on cps by dark web terrorist
V Mahor, R Rawat, A Kumar, M Chouhan, RN Shaw, A Ghosh
2021 IEEE 4th International Conference on Computing, Power and Communication …, 2021
462021
Modeling of cyber threat analysis and vulnerability in IoT-based healthcare systems during COVID
R Rawat, V Mahor, B Garg, M Chouhan, K Pachlasiya, S Telang
Lessons from COVID-19, 405-425, 2022
262022
Cyber Threat Exploitation and Growth during COVID-19 Times
R Rawat, B Garg, V Mahor, M Chouhan, K Pachlasiya, S Telang
Advanced Smart Computing Technologies in Cybersecurity and Forensics, 85-101, 2021
92021
Malware Inputs Detection Approach (Tool) based on Machine Learning [MIDT-SVM]
R Rawat, M Chouhan, B Garg, S TELANG, V Mahor, K Pachlasiya
Available at SSRN 3915404, 2021
22021
Conversational AI Applications in Ed‐Tech Industry: An Analysis of Its Impact and Potential in Education
D Chauhan, C Singh, R Rawat, M Chouhan
Conversational Artificial Intelligence, 411-433, 2024
2024
6 Cyber Threat
R Rawat, B Garg, V Mahor, M Chouhan, K Pachlasiya, S Telang
Advanced Smart Computing Technologies in Cybersecurity and Forensics, 85, 2021
2021
CROP SECURING INFRASTRUCTURE FROM VULNERABLE ATTACKS BY TIDDI-DAL(LOCUST) BASED ON AUDIO DESIGNED STREAMLINING USING AI(CSIVAT-AI)
R Rawat, T Shrikant, C Mukesh
IN Patent 202,111,013,344, 2021
2021
PMSAVII - PATIENT MONITORING SYSTEM BY AUDIO, VIDEO AND IMAGE, TEXT DATA ANALYSIS USING IOT AND ARTIFICIAL INTELLIGENCE
R Rawat, T Shrikant, C Mukesh
IN Patent 202,111,013,628, 2021
2021
Machine Learning based Detection of Cyber Crime Hub Analysis using Twitter Data
A Kumar, R Bharatpur, B Garg, R Rawat, M Chouhan, V Mahor, S Telang, ...
SSRN, 2021
2021
An Efficient Approach for Mining Frequent Pattern with Time over Large Database
M Chouhan, VK Verma
2017
Drug Trafficking crime analysis using Systematic literature Review (SLR) within Darkweb
R Rawat, V Mahor, A Kumar, M Chouhan, K Pachlasiya, S Telang, B Garg
The system can't perform the operation now. Try again later.
Articles 1–17