Narinder Verma

ORCID: 0000-0002-9682-9205
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Advanced Malware Detection Techniques
  • Wireless Networks and Protocols
  • Anomaly Detection Techniques and Applications
  • Sentiment Analysis and Opinion Mining
  • Advanced Wireless Network Optimization
  • Internet Traffic Analysis and Secure E-voting
  • Smart Grid Security and Resilience
  • Mobile Ad Hoc Networks
  • Opportunistic and Delay-Tolerant Networks
  • Wireless Communication Networks Research

University of Jammu
2025

Central University of Jammu
2024-2025

Virginia Tech
2003-2004

ABSTRACT An ensemble‐inspired intrusion detection approach for cyber‐physical systems (CPSs) has been proposed. CPSs are susceptible to different cyber‐attacks. Attacks on result in the hindrance of critical services made available by them. To protect various (IDSs) exist. However, present IDSs have limitations constrained accuracy, high false alarm rate, and latency. A hybrid that integrates pros bagging boosting methods proposed minimize mentioned limitations. The uses AdaBoost random...

10.1002/spy2.497 article EN Security and Privacy 2025-01-01

ABSTRACT Machine learning (ML) and deep (DL) models have become vital tools in Intrusion Detection Systems (IDS), yet their effectiveness depends heavily on the quality distribution of training data. This study investigates impact dataset size balance performance ML DL using CIC‐IDS 2017 dataset. Five subsets (20%, 40%, 60%, 80%, 100% dataset) were created to assess across varying sizes. Four models, including Random Forest (RF), Artificial Neural Network, Convolutional Network (CNN),...

10.1002/spy2.70014 article EN Security and Privacy 2025-03-01

We propose and analyze a class of autonomous host-centric mobility prediction algorithms via simulation for predicting future movements mobile hosts based on recent past movement histories observed. These are 'autonomous' 'host-centric' since they require individual hosts, rather than fixed base stations, to collect maintain data, thus making them applicable both cellular ad hoc wireless networks. Each host under these is capable the probability that it will leave current location next...

10.5555/786111.786224 article EN Annual Simulation Symposium 2003-03-30

We propose and analyze call admission control algorithms integrated with pricing for revenue optimization QoS guarantee to serve multiple service classes in mobile wireless networks. Traditional make acceptance decision new handoff calls satisfy certain constraints such as the dropping probability of blocking being lower than a pre-specified threshold. class partitioning threshold-based that acceptance/rejection not only requirements but also optimize system, taking into account prices...

10.1109/icpads.2004.15 article EN International Conference on Parallel and Distributed Systems 2004-07-07

Background: The increasing integration of robotic systems across various sectors has highlighted the critical need for robust cybersecurity measures to safeguard these against cyber threats. Objective: This research presents a novel Real-Time Intrusion Detection System (IDS) framework specifically designed enhance systems. Methods: proposed IDS monitors network traffic and continuously identifies potential threats in real time. A testbed is set up using an AlphaBot device server machine...

10.2174/0126662558354644241126110555 article EN Recent Advances in Computer Science and Communications 2024-12-10
Coming Soon ...