Aanshi Bhardwaj

ORCID: 0000-0002-0968-5718
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Advanced Malware Detection Techniques
  • Internet Traffic Analysis and Secure E-voting
  • Anomaly Detection Techniques and Applications
  • Web Data Mining and Analysis
  • User Authentication and Security Systems
  • Artificial Intelligence in Healthcare
  • ECG Monitoring and Analysis
  • Web visibility and informetrics
  • Software System Performance and Reliability

Panjab University
2014-2021

Cloud computing has very attractive features like elastic, on demand and fully managed computer system resources services. However, due to its distributed dynamic nature as well vulnerabilities in virtualization implementation, the cloud environment is prone various cyber-attacks security issues related model. Some of them are inability access data coming from service, theft misuse hosted, no control over sensitive access, advance threats malware injection attack, wrapping attacks, virtual...

10.1109/access.2020.3028690 article EN cc-by IEEE Access 2020-01-01

The rapid development of the internet and web publishing techniques create numerous information sources published as HTML pages on World Wide Web. However, there is lot redundant irrelevant also pages. Navigation panels, Table content (TOC), advertisements, copyright statements, service catalogs, privacy policies etc. are considered relevant content. Such makes various mining tasks such page crawling, classification, link based ranking, topic distillation complex. This paper discusses...

10.1109/raecs.2014.6799616 article EN 2014-03-01

World Wide Web (WWW) is now a famous medium by which people all around the world can spread and gather information of kind. However, there large amount irrelevant redundant on web pages also. Such makes various mining tasks page crawling, classification, link based ranking topic distillation complex. Previously, relevant content was extracted only from textual part pages. But now-a-days not in text form but also as an image, video or audio. This paper proposes improved algorithm for...

10.4304/jetwi.6.2.226-230 article EN Journal of Emerging Technologies in Web Intelligence 2014-05-01

Distributed Denial of Service Attack (DDoS) is a deadliest weapon which overwhelm the server or network by sending flood packets towards it. The attack disrupts services running on target thereby blocking legitimate traffic accessing its services. Various advanced machine learning techniques have been applied for detection different types DDoS attacks but still remains potential threat to world. There are mainly two broad categories techniques: supervised approach and unsupervised approach....

10.35940/ijitee.l2994.129219 article EN International Journal of Innovative Technology and Exploring Engineering 2019-12-30

Every year, a significant number of individuals lose their lives to catastrophic heart condition referred as Sudden Cardiac Arrest (SCA), often caused by Arrhythmia. Henceforth, the possibility early prediction or diagnosis SCA holds potential prevent numerous fatalities. The objective our research is create an efficient approach that conserves both space and computation time for real-time categorization SCA. To accomplish this, novel strategy has been proposed integrating transfer learning...

10.1109/iciip61524.2023.10537783 article EN 2023-11-22
Coming Soon ...