Crypto-preserving investigation framework for deep learning based malware attack detection for network forensics S Bhardwaj, M Dave Wireless Personal Communications 122 (3), 2701-2722, 2022 | 18 | 2022 |
SQL Injection Attack Detection, Evidence Collection, and Notifying System Using Standard Intrusion Detection System in Network Forensics MD Sonam Bhardwaj Proceedings of International Conference on Computational Intelligence, Data …, 2021 | 8* | 2021 |
Overcoming the lack of labeled data: Training malware detection models using adversarial domain adaptation S Bhardwaj, AS Li, M Dave, E Bertino Computers & Security 140, 103769, 2024 | 6 | 2024 |
Enhanced neural network-based attack investigation framework for network forensics: Identification, detection, and analysis of the attack S Bhardwaj, M Dave Computers & Security 135, 103521, 2023 | 5 | 2023 |
Forensic investigation-based framework for SDN using blockchain S Bhardwaj, R Swami, M Dave Revolutionary applications of blockchain-enabled privacy and access control …, 2021 | 3 | 2021 |
Enhancing storage efficiency using distributed deduplication for big data storage systems N Kumar, P Malik, S Bhardwaj, SC Jain Strategies 7, 96Ŕ108, 2017 | 3 | 2017 |
Comparative analysis of deduplication techniques for enhancing storage space N Kumar, P Malik, S Bhardwaj, SC Jain 2016 Fourth International Conference on Parallel, Distributed and Grid …, 2016 | 3 | 2016 |
Machine Learning Techniques for Cybersecurity E Bertino, S Bhardwaj, F Cicala, S Gong, I Karim, C Katsis, H Lee, AS Li, ... Springer, 2023 | 2 | 2023 |
An enhanced reputation-based data forwarding mechanism for VANETs A Kumar, S Bhardwaj, P Malik, P Dabas ICCCE 2018: Proceedings of the International Conference on Communications …, 2019 | 2 | 2019 |
Integrating a Rule-Based Approach to Malware Detection with an LSTM-Based Feature Selection Technique. S Bhardwaj, D Mayank SN Computer Science 4 (5), 1-18; https://doi.org/10.1007/s42979-023, 2023 | 1 | 2023 |
Attack detection and mitigation using Intelligent attack graph model for Forensic in IoT Networks S Bhardwaj, M Dave Telecommunication Systems 85 (4), 601-621, 2024 | | 2024 |
Security Analysis of RPL-Based IoT Networks: Evaluating the Impact of Attacks on Performance Parameters H Gupta, S Bhardwaj, M Dave 2024 International Conference on Advancements in Smart, Secure and …, 2024 | | 2024 |
RAKSHAM: Responsive approach to Knock‐off scavenging hackers and attack mitigation S Bhardwaj, M Dave Transactions on Emerging Telecommunications Technologies 35 (1), e4904, 2024 | | 2024 |
Secure Electronic Transaction Based Framework for Evidence Transportation in Network Forensics S Bhardwaj, M Dave 2023 IEEE 7th Conference on Information and Communication Technology (CICT), 1-6, 2023 | | 2023 |
Challenges in the Use of ML for Security E Bertino, S Bhardwaj, F Cicala, S Gong, I Karim, C Katsis, H Lee, AS Li, ... Machine Learning Techniques for Cybersecurity, 131-143, 2023 | | 2023 |
Hardware Security Analysis E Bertino, S Bhardwaj, F Cicala, S Gong, I Karim, C Katsis, H Lee, AS Li, ... Machine Learning Techniques for Cybersecurity, 71-77, 2023 | | 2023 |
Security Policy Learning E Bertino, S Bhardwaj, F Cicala, S Gong, I Karim, C Katsis, H Lee, AS Li, ... Machine Learning Techniques for Cybersecurity, 23-45, 2023 | | 2023 |
Software Security Analysis E Bertino, S Bhardwaj, F Cicala, S Gong, I Karim, C Katsis, H Lee, AS Li, ... Machine Learning Techniques for Cybersecurity, 47-69, 2023 | | 2023 |
Background on Machine Learning Techniques E Bertino, S Bhardwaj, F Cicala, S Gong, I Karim, C Katsis, H Lee, AS Li, ... Machine Learning Techniques for Cybersecurity, 9-21, 2023 | | 2023 |
Attack Management E Bertino, S Bhardwaj, F Cicala, S Gong, I Karim, C Katsis, H Lee, AS Li, ... Machine Learning Techniques for Cybersecurity, 105-114, 2023 | | 2023 |