Comparison and analysis of logistic regression, Naïve Bayes and KNN machine learning algorithms for credit card fraud detection F itoo, Meenakshi, S Singh International Journal of Information Technology 13, 1503–1511, 2020 | 204 | 2020 |
Performance evaluation of various symmetric encryption algorithms S Kansal, M Mittal 2014 international conference on parallel, distributed and grid computing …, 2014 | 155 | 2014 |
Deep learning approaches for detecting DDoS attacks: A systematic review M Mittal, K Kumar, S Behal Soft computing 27 (18), 13039-13075, 2023 | 97 | 2023 |
Analysis of VANET Geographic Routing Protocols on Real City Map H Kaur, Meenakshi 2nd IEEE International Conference on Recent Trends in Electronics …, 2017 | 42 | 2017 |
A Comparative Analysis and Awareness Survey of Phishing Detection Tools H Sharma, Meenakshi, SK Bhatia 2nd IEEE International Conference on Recent Trends in Electronics …, 2017 | 39 | 2017 |
Detection of phishing websites using C4.5 data mining algorithm A Priya, Meenakshi 2nd IEEE International Conference on Recent Trends in Electronics …, 2017 | 20 | 2017 |
Detection of Malicious URLs In Big Data Using Ripper Algorithm S Thakur, Meenakshi, A Priya 2nd IEEE International Conference on Recent Trends in Electronics …, 2017 | 19 | 2017 |
Distributed Denial of Service Attack Detection using Deep Learning Approaches Meenakshi, K Kumar, S Behal 8th International Conference on Computing for Sustainable Global Development …, 2021 | 15 | 2021 |
Detection and prevention of de-authentication attack in real-time scenario S Sharma, M Mittal Int. J. Innov. Technol. Explor. Eng. 8 (10), 3324-3330, 2019 | 10 | 2019 |
Prevention of session hijacking using token and session id reset approach T Singh, Meenakshi International Journal of Information Technology volume 12, 781–788, 2020 | 5 | 2020 |
Influence of link sensing mechanism of IMEP on the performance of TORA under different mobility models A Kaur, M Mittal 2014 International Conference on Parallel, Distributed and Grid Computing, 16-21, 2014 | 5 | 2014 |
A comprehensive review on performance of AODV and DSDV protocol using manhattan grid mobility model A Kaur, M Mittal International Journal of Research in Engineering and Technology 3, 496-505, 2014 | 4 | 2014 |
DDoS-AT-2022: a distributed denial of service attack dataset for evaluating DDoS defense system M Mittal, K Kumar, S Behal Proceedings of the Indian National Science Academy, 2023 | 3 | 2023 |
DL-2P-DDoSADF: Deep learning-based two-phase DDoS attack detection framework M Mittal, K Kumar, S Behal Journal of Information Security and Applications 78, 103609, 2023 | 2 | 2023 |
Distributed spark framework based DDoS attacks detection approach J Chandel, NV Patil, Meenakshi, K Kumar AIP Conference Proceedings 28 April 2023; 2724 (1): 040001, 2023 | 2 | 2023 |
Detection of Phishing URLs using Bayes Net and Naïve Bayes and evaluating the risk assessment using Attributable Risk P Raj, Meenakshi International Journal of Computer Sciences and Engineering O 6, 2018 | 2 | 2018 |
Analysis of Wormhole Attack on AODV and DSR Protocols Over Live Network Data HK Mishra, M Mittal Smart Systems and IoT: Innovations in Computing: Proceeding of SSIC 2019 …, 2020 | 1 | 2020 |
Prevention of black hole attack over AODV and DSR MANET routing protocol S Sharma, M Mittal WARSE, 2015 | 1 | 2015 |
Defence Mechanism of Distributed Reflective Denial of Service (DRDOS) Attack by using Hybrid (CPU-GPU) Computing System M Mittal IJCTT, 2015 | 1 | 2015 |
Prevention of Denial of Service Attack on Dynamic Source Routing VANET Protocol. K Rani, M Mittal IJRET, 2015 | 1 | 2015 |