Tools and Techniques for Collection and Analysis of Internet-of-Things malware: A systematic state-of-art review S Madan, S Sofat, D Bansal Journal of King Saud University-Computer and Information Sciences, 2022 | 42 | 2022 |
ADoCW: An automated method for detection of concealed weapon G Raturi, P Rani, S Madan, S Dosanjh 2019 Fifth International Conference on Image Information Processing (ICIIP …, 2019 | 14 | 2019 |
UAC: A Lightweight and Scalable Approach to Detect Malicious Web Pages H Kaur, S Madan, RK Sehgal Modern Trends and Techniques in Computer Science, 241-261, 2014 | 6 | 2014 |
Discrete Characterization of Domain Using Semantic Clustering S Madan, S Batra Journal of Advances in Information Technology 1 (3), 127-132, 2010 | 6 | 2010 |
How Efficient Is Blockchain While Dealing with Android Malware? A Review Paper JS Wadali, S Madan, PK Khosla International Conference on Emerging Trends and Technologies on Intelligent …, 2021 | 2 | 2021 |
Classification of IOT-Malware using Machine Learning S Madan, M Singh 2021 International Conference on Technological Advancements and Innovations …, 2021 | 1 | 2021 |
Bot attack detection using various machine learning algorithms S Madan, S Arya, D Bansal, S Sofat Artificial Intelligence and Speech Technology, 53-61, 2021 | 1 | 2021 |
Detecting Domain From Source Code Using Semantic Clustering S Madan, S Batra | | 2009 |
Visualizing the Domain in 3-Dimension Using Semantic Clustering S Madan, P Ahuja, S Batra Data Mining and Knowledge Engineering 1 (3), 102-106, 2009 | | 2009 |
Comparative Analysis of various Active Queue Management Algorithms under Flooding based LDDoS Attack B Jain, S Madan | | |
Anomaly Detection in Network Traffic from Large Dataset A Bali, S Madan, RK Sehgal, N Sharma | | |
An Enhanced Approach towards Detection of Malicious PDF Files G Singh, S Madan, RK Sehgal, N Sharma | | |
Journal of Advances in Information Technology NK Nehra, P Chaudhuri, K Kumar, AK Verma, RB Patel, R Iqbal, A James, ... | | |