Follow
Romil Rawat
Title
Cited by
Cited by
Year
Intrusion detection system in cloud computing environment
AM S. N. Dhage , B. B. Meshram , R. Rawat , S. Padawe , M. Paingaokar
ICWET '11: Proceedings of the International Conference & Workshop on …, 2011
150*2011
SQL injection attack Detection using SVM
R Rawat, SK Shrivastav
International Journal of Computer Applications 42 (13), 1-4, 2012
1202012
Malware Threat Affecting Financial Organization Analysis Using Machine Learning Approach
R Rawat, YN Rimal, W P., D Snehil, G Sonali, S K. Sakthidasan
International Journal of Information Technology and Web Engineering (IJITWE …, 2022
1022022
Logical concept mapping and social media analytics relating to cyber criminal activities for ontology creation
R Rawat
International Journal of Information Technology 15 (2), 893-903, 2023
802023
Mobile operating system (Android) vulnerability analysis using machine learning
V Mahor, K Pachlasiya, B Garg, M Chouhan, S Telang, R Rawat
International Conference on Network Security and Blockchain Technology, 159-169, 2021
752021
Systematic Literature Review (SLR) on Social Media and the Digital Transformation of Drug Trafficking on Darkweb
R Rawat, V Mahor, M Chouhan, K Pachlasiya, S Telang, B Garg
International Conference on Network Security and Blockchain Technology 481 …, 2022
732022
Analysis of Darknet Traffic for Criminal Activities Detection Using TF-IDF and Light Gradient Boosted Machine Learning Algorithm
AG Romil Rawat,Vinod Mahor,Sachin Chirgaiya,Rabindra Nath Shaw
2021 International Conference on Electrical and Electronics Engineering …, 2021
73*2021
Cyber threat phylogeny assessment and vulnerabilities representation at thermal power station
V Mahor, B Garg, S Telang, K Pachlasiya, M Chouhan, R Rawat
International Conference on Network Security and Blockchain Technology, 28-39, 2021
702021
Malevolent information crawling mechanism for forming structured illegal organisations in hidden networks
R Rawat, S Gupta, S Sivaranjani, OK Cu, M Kuliha, KS Sankaran
International Journal of Cyber Warfare and Terrorism (IJCWT) 12 (1), 1-14, 2022
692022
Sentiment analysis at online social network for cyber-malicious post reviews using machine learning techniques
R Rawat, V Mahor, S Chirgaiya, RN Shaw, A Ghosh
Computationally intelligent systems and their applications, 113-130, 2021
692021
IoT and artificial intelligence techniques for public safety and security
V Mahor, R Rawat, A Kumar, B Garg, K Pachlasiya
Smart urban computing applications, 111-126, 2023
662023
SCNTA: Monitoring of network availability and activity for identification of anomalies using machine learning approaches
R Rawat, B Garg, K Pachlasiya, V Mahor, S Telang, M Chouhan, ...
International Journal of Information Technology and Web Engineering (IJITWE …, 2022
662022
Organ Trafficking on the Dark Web—The Data Security and Privacy Concern in Healthcare Systems
R Rawat, B Garg, V Mahor, S Telang, K Pachlasiya, M Chouhan
Internet of Healthcare Things, 191, 2022
632022
Anonymous trading on the dark online marketplace: An exploratory study
P Vyas, G Vyas, A Chauhan, R Rawat, S Telang, M Gottumukkala
Using Computational Intelligence for the Dark Web and Illicit Behavior …, 2022
612022
Blockchain-Based Model for Expanding IoT Device Data Security
AS Rajawat, R Rawat, K Barhanpurkar, RN Shaw, A Ghosh
Advances in Applications of Data-Driven Computing, 61, 2021
612021
Intelligent fog computing surveillance system for crime and vulnerability identification and tracing
R Rawat, RK Chakrawarti, P Vyas, JLA Gonzáles, R Sikarwar, ...
International Journal of Information Security and Privacy (IJISP) 17 (1), 1-25, 2023
592023
Using Machine Intelligence: Autonomous Vehicles Volume 1
R Rawat, AM Sowjanya, SI Patel, V Jaiswal, I Khan, A Balaram
John Wiley & Sons, Incorporated, 2023
582023
Edited Book - "AUTONOMOUS VEHICLES VOLUME 2-Smart Vehicles for Communication" - https://www.scrivenerpublishing.com/cart/title.php?id=800
R Rawat, P Bhardwaj, U Kaur, S Telang, M Chouhan, KS Sankaran
https://onlinelibrary.wiley.com/doi/book/10.1002/9781394152636 2, ISBN …, 2023
55*2023
Applications of social network analysis to managing the investigation of suspicious activities in social media platforms
R Rawat, V Mahor, S Chirgaiya, AS Rathore
Advances in Cybersecurity Management, 315-335, 2021
552021
Cognitive systems for dark web cyber delinquent association malignant data crawling: A review
R Rawat, V Mahor, JD Álvarez, F Ch
Handbook of Research on War Policies, Strategies, and Cyber Wars, 45-63, 2023
512023
The system can't perform the operation now. Try again later.
Articles 1–20