Follow
Sonam Bhardwaj
Sonam Bhardwaj
Other namesbhardw24@purdue.edu
NIT Kurukshetra; Purdue University; Bennett University
Verified email at nitkkr.ac.in
Title
Cited by
Cited by
Year
Crypto-preserving investigation framework for deep learning based malware attack detection for network forensics
S Bhardwaj, M Dave
Wireless Personal Communications 122 (3), 2701-2722, 2022
182022
SQL Injection Attack Detection, Evidence Collection, and Notifying System Using Standard Intrusion Detection System in Network Forensics
MD Sonam Bhardwaj
Proceedings of International Conference on Computational Intelligence, Data …, 2021
8*2021
Overcoming the lack of labeled data: Training malware detection models using adversarial domain adaptation
S Bhardwaj, AS Li, M Dave, E Bertino
Computers & Security 140, 103769, 2024
62024
Enhanced neural network-based attack investigation framework for network forensics: Identification, detection, and analysis of the attack
S Bhardwaj, M Dave
Computers & Security 135, 103521, 2023
52023
Forensic investigation-based framework for SDN using blockchain
S Bhardwaj, R Swami, M Dave
Revolutionary applications of blockchain-enabled privacy and access control …, 2021
32021
Enhancing storage efficiency using distributed deduplication for big data storage systems
N Kumar, P Malik, S Bhardwaj, SC Jain
Strategies 7, 96Ŕ108, 2017
32017
Comparative analysis of deduplication techniques for enhancing storage space
N Kumar, P Malik, S Bhardwaj, SC Jain
2016 Fourth International Conference on Parallel, Distributed and Grid …, 2016
32016
Machine Learning Techniques for Cybersecurity
E Bertino, S Bhardwaj, F Cicala, S Gong, I Karim, C Katsis, H Lee, AS Li, ...
Springer, 2023
22023
An enhanced reputation-based data forwarding mechanism for VANETs
A Kumar, S Bhardwaj, P Malik, P Dabas
ICCCE 2018: Proceedings of the International Conference on Communications …, 2019
22019
Integrating a Rule-Based Approach to Malware Detection with an LSTM-Based Feature Selection Technique.
S Bhardwaj, D Mayank
SN Computer Science 4 (5), 1-18; https://doi.org/10.1007/s42979-023, 2023
12023
Attack detection and mitigation using Intelligent attack graph model for Forensic in IoT Networks
S Bhardwaj, M Dave
Telecommunication Systems 85 (4), 601-621, 2024
2024
Security Analysis of RPL-Based IoT Networks: Evaluating the Impact of Attacks on Performance Parameters
H Gupta, S Bhardwaj, M Dave
2024 International Conference on Advancements in Smart, Secure and …, 2024
2024
RAKSHAM: Responsive approach to Knock‐off scavenging hackers and attack mitigation
S Bhardwaj, M Dave
Transactions on Emerging Telecommunications Technologies 35 (1), e4904, 2024
2024
Secure Electronic Transaction Based Framework for Evidence Transportation in Network Forensics
S Bhardwaj, M Dave
2023 IEEE 7th Conference on Information and Communication Technology (CICT), 1-6, 2023
2023
Challenges in the Use of ML for Security
E Bertino, S Bhardwaj, F Cicala, S Gong, I Karim, C Katsis, H Lee, AS Li, ...
Machine Learning Techniques for Cybersecurity, 131-143, 2023
2023
Hardware Security Analysis
E Bertino, S Bhardwaj, F Cicala, S Gong, I Karim, C Katsis, H Lee, AS Li, ...
Machine Learning Techniques for Cybersecurity, 71-77, 2023
2023
Security Policy Learning
E Bertino, S Bhardwaj, F Cicala, S Gong, I Karim, C Katsis, H Lee, AS Li, ...
Machine Learning Techniques for Cybersecurity, 23-45, 2023
2023
Software Security Analysis
E Bertino, S Bhardwaj, F Cicala, S Gong, I Karim, C Katsis, H Lee, AS Li, ...
Machine Learning Techniques for Cybersecurity, 47-69, 2023
2023
Background on Machine Learning Techniques
E Bertino, S Bhardwaj, F Cicala, S Gong, I Karim, C Katsis, H Lee, AS Li, ...
Machine Learning Techniques for Cybersecurity, 9-21, 2023
2023
Attack Management
E Bertino, S Bhardwaj, F Cicala, S Gong, I Karim, C Katsis, H Lee, AS Li, ...
Machine Learning Techniques for Cybersecurity, 105-114, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–20