Follow
Dr Deepak Singh Tomar
Dr Deepak Singh Tomar
Professor ,CSE, MA National Institute of Technology, Bhopal
Verified email at manit.ac.in - Homepage
Title
Cited by
Cited by
Year
Sentiment analysis: a review and comparative analysis over social media
NK Singh, DS Tomar, AK Sangaiah
Journal of Ambient Intelligence and Humanized Computing 11 (1), 97-117, 2020
1132020
Effective focused crawling based on content and link structure analysis
A Pal, DS Tomar, SC Shrivastava
arXiv preprint arXiv:0906.5034, 2009
802009
An approach to understand the end user behavior through log analysis
NK Singh, DS Tomar, BN Roy
International Journal of Computer Applications 5 (11), 27-34, 2010
452010
Architecture, enabling technologies, security and privacy, and applications of internet of things: A survey
K Singh, DS Tomar
2018 2nd International Conference on I-SMAC (IoT in Social, Mobile …, 2018
382018
A new web forensic framework for bot crime investigation
RU Rahman, DS Tomar
Forensic Science International: Digital Investigation 33, 300943, 2020
282020
An approach to perceive tabnabbing attack
RK Suri, DS Tomar, DR Sahu
Int. J. Sci. Technol. Res 1 (6), 90-94, 2012
282012
Session hijacking: Threat analysis and countermeasures
V Jain, DR Sahu, DS Tomar
Int. Conf. on Futuristic Trends in Computational Analysis and Knowledge …, 2015
252015
Dynamic image based captcha
R ur Rahman, DS Tomar, S Das
2012 International Conference on Communication Systems and Network …, 2012
252012
Threats of price scraping on e-commerce websites: attack model and its detection using neural network
RU Rahman, DS Tomar
Journal of Computer Virology and Hacking Techniques 17, 75-89, 2021
232021
A multipath location based hybrid DMR protocol in MANET
G Soni, MK Jhariya, K Chandravanshi, D Tomar
2020 3rd International Conference on Emerging Technologies in Computer …, 2020
192020
Security attacks on wireless networks and their detection techniques
RU Rahman, DS Tomar
Emerging Wireless Communication and Network Technologies: Principle …, 2018
182018
Network forensics: detection and analysis of stealth port scanning attack
RR Singh, DS Tomar
International Journal of Computer Networks and Communications Security 3 (2 …, 2015
182015
Analysis of web application code vulnerabilities using secure coding standards
DR Sahu, DS Tomar
Arabian Journal for Science and Engineering 42, 885-895, 2017
172017
New biostatistics features for detecting web bot activity on web applications
RU Rahman, DS Tomar
Computers & Security 97, 102001, 2020
162020
Detection of javascript vulnerability at Client Agen
S Jain, DS Tomar, DR Sahu
International Journal of Scientific & Technology Research 1 (7), 36-41, 2012
132012
Botnet threats to e-commerce web applications and their detection
RU Rahman, DS Tomar
Research Anthology on Combating Denial-of-Service Attacks, 104-137, 2021
122021
A practical approach for evidence gathering in Windows environment
K Dashora, DS Tomar, JL Rana
International Journal of Computer Applications 5 (10), 21-27, 2010
122010
2014 IEEE Students' Conference on Electrical, Electronics and Computer Science
P Omer, J Kumar, BS Surjan
102014
Approaches for user profile investigation in orkut social network
RR Singh, DS Tomar
arXiv preprint arXiv:0912.1008, 2009
102009
Big data Analytics of cyber attacks: a review
MV Suraj, NK Singh, DS Tomar
2018 IEEE international conference on system, computation, automation and …, 2018
92018
The system can't perform the operation now. Try again later.
Articles 1–20