Sentiment analysis: a review and comparative analysis over social media NK Singh, DS Tomar, AK Sangaiah Journal of Ambient Intelligence and Humanized Computing 11 (1), 97-117, 2020 | 113 | 2020 |
Effective focused crawling based on content and link structure analysis A Pal, DS Tomar, SC Shrivastava arXiv preprint arXiv:0906.5034, 2009 | 80 | 2009 |
An approach to understand the end user behavior through log analysis NK Singh, DS Tomar, BN Roy International Journal of Computer Applications 5 (11), 27-34, 2010 | 45 | 2010 |
Architecture, enabling technologies, security and privacy, and applications of internet of things: A survey K Singh, DS Tomar 2018 2nd International Conference on I-SMAC (IoT in Social, Mobile …, 2018 | 38 | 2018 |
A new web forensic framework for bot crime investigation RU Rahman, DS Tomar Forensic Science International: Digital Investigation 33, 300943, 2020 | 28 | 2020 |
An approach to perceive tabnabbing attack RK Suri, DS Tomar, DR Sahu Int. J. Sci. Technol. Res 1 (6), 90-94, 2012 | 28 | 2012 |
Session hijacking: Threat analysis and countermeasures V Jain, DR Sahu, DS Tomar Int. Conf. on Futuristic Trends in Computational Analysis and Knowledge …, 2015 | 25 | 2015 |
Dynamic image based captcha R ur Rahman, DS Tomar, S Das 2012 International Conference on Communication Systems and Network …, 2012 | 25 | 2012 |
Threats of price scraping on e-commerce websites: attack model and its detection using neural network RU Rahman, DS Tomar Journal of Computer Virology and Hacking Techniques 17, 75-89, 2021 | 23 | 2021 |
A multipath location based hybrid DMR protocol in MANET G Soni, MK Jhariya, K Chandravanshi, D Tomar 2020 3rd International Conference on Emerging Technologies in Computer …, 2020 | 19 | 2020 |
Security attacks on wireless networks and their detection techniques RU Rahman, DS Tomar Emerging Wireless Communication and Network Technologies: Principle …, 2018 | 18 | 2018 |
Network forensics: detection and analysis of stealth port scanning attack RR Singh, DS Tomar International Journal of Computer Networks and Communications Security 3 (2 …, 2015 | 18 | 2015 |
Analysis of web application code vulnerabilities using secure coding standards DR Sahu, DS Tomar Arabian Journal for Science and Engineering 42, 885-895, 2017 | 17 | 2017 |
New biostatistics features for detecting web bot activity on web applications RU Rahman, DS Tomar Computers & Security 97, 102001, 2020 | 16 | 2020 |
Detection of javascript vulnerability at Client Agen S Jain, DS Tomar, DR Sahu International Journal of Scientific & Technology Research 1 (7), 36-41, 2012 | 13 | 2012 |
Botnet threats to e-commerce web applications and their detection RU Rahman, DS Tomar Research Anthology on Combating Denial-of-Service Attacks, 104-137, 2021 | 12 | 2021 |
A practical approach for evidence gathering in Windows environment K Dashora, DS Tomar, JL Rana International Journal of Computer Applications 5 (10), 21-27, 2010 | 12 | 2010 |
2014 IEEE Students' Conference on Electrical, Electronics and Computer Science P Omer, J Kumar, BS Surjan | 10 | 2014 |
Approaches for user profile investigation in orkut social network RR Singh, DS Tomar arXiv preprint arXiv:0912.1008, 2009 | 10 | 2009 |
Big data Analytics of cyber attacks: a review MV Suraj, NK Singh, DS Tomar 2018 IEEE international conference on system, computation, automation and …, 2018 | 9 | 2018 |