- Network Security and Intrusion Detection
- Advanced Malware Detection Techniques
- Internet Traffic Analysis and Secure E-voting
- Anomaly Detection Techniques and Applications
- Web Data Mining and Analysis
- User Authentication and Security Systems
- Artificial Intelligence in Healthcare
- ECG Monitoring and Analysis
- Web visibility and informetrics
- Software System Performance and Reliability
Panjab University
2014-2021
Cloud computing has very attractive features like elastic, on demand and fully managed computer system resources services. However, due to its distributed dynamic nature as well vulnerabilities in virtualization implementation, the cloud environment is prone various cyber-attacks security issues related model. Some of them are inability access data coming from service, theft misuse hosted, no control over sensitive access, advance threats malware injection attack, wrapping attacks, virtual...
The rapid development of the internet and web publishing techniques create numerous information sources published as HTML pages on World Wide Web. However, there is lot redundant irrelevant also pages. Navigation panels, Table content (TOC), advertisements, copyright statements, service catalogs, privacy policies etc. are considered relevant content. Such makes various mining tasks such page crawling, classification, link based ranking, topic distillation complex. This paper discusses...
World Wide Web (WWW) is now a famous medium by which people all around the world can spread and gather information of kind. However, there large amount irrelevant redundant on web pages also. Such makes various mining tasks page crawling, classification, link based ranking topic distillation complex. Previously, relevant content was extracted only from textual part pages. But now-a-days not in text form but also as an image, video or audio. This paper proposes improved algorithm for...
Distributed Denial of Service Attack (DDoS) is a deadliest weapon which overwhelm the server or network by sending flood packets towards it. The attack disrupts services running on target thereby blocking legitimate traffic accessing its services. Various advanced machine learning techniques have been applied for detection different types DDoS attacks but still remains potential threat to world. There are mainly two broad categories techniques: supervised approach and unsupervised approach....
Every year, a significant number of individuals lose their lives to catastrophic heart condition referred as Sudden Cardiac Arrest (SCA), often caused by Arrhythmia. Henceforth, the possibility early prediction or diagnosis SCA holds potential prevent numerous fatalities. The objective our research is create an efficient approach that conserves both space and computation time for real-time categorization SCA. To accomplish this, novel strategy has been proposed integrating transfer learning...