RESEARCH PUBLICATIONS

Journal Publications ( SCIE/ SCOPUS/ WoS )


1. (Accepted Jan. 2022) -- “IFSA: An Integrated Framework for Developing IoT Linked Mobile Applications for Specially Abled People”, Wireless Networks, Springer, Netherlands, ISSN / eISSN:1022-0038 / 1572-8196, https://www.springer.com/journal/11276 [Indexed in SCI-E, SCOPUS, Impact factor=2.659]

2. "Software Quality Improvement and Validation using Reengineering", Journal of Engineering Research (JER), Vol. 9, No. 4A, pp. 59-73, DOI: 10.36909/jer.9481 , Dec. 2021 , Online ISSN: 2307-1885, https://kuwaitjournals.org/jer/index.php/JER/home [Indexed in SCI-E, SCOPUS, Impact factor=0.387]

3. "Entropy-based DDoS Attack Detection in Cluster based Mobile Ad Hoc Networks", Ad-Hoc and Sensor Wireless Networks, ISSN: 1551-9899, Vol. 49, pp. 269–288 (Indexed in SCI-E, SCOPUS, Impact Factor= 1.013)

4. Performance-Aware Approach for Software Risk Management Using Random Forest Algorithm, International Journal of Software Innovation, ISSN: 2166-7160, Vol. 9, Issue 1, January-March 2021, pp. 12-19, DOI: 10.4018/IJSI.2021010102, WOSUID: WOS:000587502700002 (Indexed in Scopus, WoS, ESCI)

5. Detection of attacks in IoT sensors networks using machine learning algorithm, Microprocessors and Microsystems, Jan. 2021, Vol. 82, 103814, ISSN: 0141-9331, pp. 1-6, Elsevier, Sciencedirect, DOI:10.1016/j.micpro.2020.103814, www.elsevier.com/locate/micpro (Indexed in SCI-E, SCOPUS, Elsevier, Sciencedirect, Impact factor=1.161 )

6. “Performance analysis of Cluster-based DDoS Defense System with different Reactive Routing Protocols”, International Journal of Sensors, Wireless Communications and Control, Bentham Science, ISSN: 2210-3287 (Online), Vol. 11, Issue 1, 2021, pp. 54-65, DOI: 10.2174/2210327910666191227125250 (Indexed in UGC, Scopus)


7. Design for software risk management using Soft Computing and Simulated Biological Approach, International Journal of Security and Privacy in Pervasive Computing, ISSN: 2643-7937, Vol. 12, Issue 2, April-June 2020, pp. 44-54, DOI: 10.4018/IJSPPC.2020040104


8. T-CAD: A threshold based collaborative DDoS attack detection in multiple autonomous Systems (2020), Journal of Information Security and Applications, Vol. 51, 102457, ISSN: 2214-2126, pp. 1-12, DOI: 10.1016/j.jisa.2020.102457, www.elsevier.com/locate/jisa (Indexed in SCI-E, Scopus, WoS, Elsevier, Impact Factor: 3.872)


9. Android application security: Detecting Android malware and evaluating anti-malware Software (2020), International Journal of Internet Technology and Secured Transactions, ISSN(online):1748-5703, Vol. 10, No. 4, April 2020, pp. 491-506, DOI: 10.1504/IJITST.2020.108142 (Indexed in Scopus, Elsevier)


10. A Pragmatic Assessment of Approaches and Paradigms in Software Risk Management Frameworks, International Journal of Natural Computing Research, ISSN: 1947-928X, Vol. 9, Issue 1, pp. 13-26, January-March 2020, DOI: 10.4018/IJNCR.2020010102 (Indexed in ACM Digital library)


11. An Empirical Evaluation of Assorted Risk Management Models and Frameworks in Software Development, International Journal of Applied Evolutionary Computation, ISSN: 1942-3594, Vol. 11, Issue 1, pp. 52-62, January-March 2020, DOI: 10.4018/IJAEC.2020010104 (Indexed in ACM Digital library)


12. Design and Development of Android Based Mobile Application for Specially Abled People, Wireless Personal Communications, e-ISSN: 1572-834X, LLC, part of Springer Nature, Springer, Dec. 2019, Vol. 111, Issue 4, pp. 2353-2367, DOI: 10.1007/s11277-019-06990-y (Indexed in SCI-E, Scopus, WoS, Springer, Impact Factor: 1.671)


13. A Novel Tweet Recommendation Framework for Twitter, International Journal of Innovative Technology and Exploring Engineering, ISSN: 2278-3075 (online), Vol. 8, Issue 10, August 2019, pp. 3188-3192, DOI: 10.35940/ijitee.J1150.0881019 (Indexed in Scopus, Elsevier)


14. Escalated Methods for Software Defects Audit in Repercussion and Effects Construe to Nature Inspired and Behaviour Driven Mechanisms, International Journal of Engineering and Advanced Technology, ISSN: 2249-8958, Vol. 8, Issue 6, pp. 1779-1783, August 2019, DOI: 10.35940/ijeat.F8442.088619 (Indexed in Scopus, UGC CARE list)


15. “TrendNet Algorithm: Towards Personalization of Twitter Trends”, International Journal of Recent Technology and Engineering, ISSN: 2277-3878 (online), Vol. 8, Issue 2, July 2019, pp. 1555-1560, ISSN: 2277-3878, DOI: 10.35940/ijrte.B2240.078219 (Indexed in Scopus, Elsevier)


16. Usage Patterns and Implementation of Random Forest Methods for Software Risk and BugsPredictions, International Journal of Innovative Technology and Exploring Engineering, ISSN:2278-3075, Volume 8, Issue 9S, July 2019, pp. 927-932, DOI: 10.35940/ijitee.I1150.0789S19

(Indexed in Scopus & UGC CARE list)


16. “Reengineering Framework to Enhance the Performance of Existing Software”, International Journal of Advanced Computer Science and Applications, Vol. 10, No. 5, pp. 536-543, ISSN: 2156-5570 (Online), DOI:http://dx.doi.org/10.14569/IJACSA.2019.0100570, WOSUID: WOS:000476620600070 (Indexed in ESCI, Scopus, WoS)


17. “Reengineering Cost Estimation using Scrum Agile Methodology,” International Journal of Computer Information Systems and Industrial Management Applications, Vol. 11, pp. 208-218, ISSN: 2150-7988 (Indexed in Scopus, UGC)


18. “Reengineering framework for open source software using decision tree approach,” International Journal of Electrical and Computer Engineering, Vol. 9, No. 3, June 2019, pp. 2041-2048, ISSN:2088-8708, DOI: 10.11591/ijece.v9i3.pp2041-2048 (Indexed in Scopus, Elsevier, UGC)

19. “Clustering based Model to Provide Defense against DDoS attacks in MANETs”, Journal of Communication Engineering & Systems, Vol. 9, Issue 1, pp. 7-13, April 2019, ISSN (Online):2249-8613 (UGC)


20. “Flow-based Attack Detection and Defense Scheme against DDoS Attacks in Cluster based Ad Hoc Networks”, International Journal of Advanced Networking and Applications, Vol. 10, Issue 4, Feb. 2019, pp. 3905-3910, ISSN: 0975-0290, DOI:10.35444/IJANA.2019.10041 (UGC)


21. An Improved AES Algorithm for Enhancing Security in Cloud Environment, Journal of Computer Technology & Applications, Vol. 10, Issue 1, 2019, pp. 1-8, ISSN: 2229-6964 (online), ISSN: 2347-7229 (print)


22. “Threshold-Based Distributed DDoS Attack Detection in ISP Networks”, Turkish Journal of Electrical Engineering & Computer Sciences, Vol. 26, No. 4, pp. 1796-1811, July 2018, E-ISSN:1303-6203, DOI: 10.3906/elk-1712-3, WOSUID: WOS:000440049800010, https://journals.tubitak.gov.tr/elektrik (Indexed in WoS, Scopus, SCI-E, Thomson Reuters, Impact Factor: 0.809)


23. “Performance analysis of agent based distributed defense mechanisms against DDoS attacks”, International Journal of Computing, Vol. 17, No. 1, pp. 15-24, March 2018, Part of ISBN:23125381 17276209, Online ISSN: 2312-5381 (Scopus, WoS , Elsevier)


24. 'Android Malware Detection in Official and Third Party Application Stores’, International Journal of Advanced Networking and Applications, Vol. 9, Issue 4, 2018, pp. 3506-3509, ISSN: 0975-0290, http://www.ijana.in


25. Enhancement of Data Security using Video Steganography, International Journal of Computer Applications, Foundation of Computer Science (FCS), NY, USA, Vol. 181, No. 6, pp. 34-38, 2018, DOI: 10.5120/ijca2018917472 (ISSN: 0975-8887)


26. ROI based Enhanced Fragile Image Watermarking for Tamper Detection, Journal of Advancements in Robotics, Vol. 5, Issue 3, pp. 18-25, 2018, ISSN: 2455-1872 (Online), www.stmjournals.com


27. Efficient Task Scheduling using Load Balancing in Cloud Computing, International Journal of Advanced Networking and Applications, Vol. 10, Issue 03, pp. 3888-3892, 2018, ISSN: 0975-0290


28. Zero Watermarking for Energy Efficiency in Wireless Sensor Networks, Journal of Web Engineering & Technology, Vol. 5, Issue 3, pp. 1-9, 2018, ISSN: 2455-1880 (Online), www.stmjournals.com


29. “Deployment of Agent-Based Distributed Defense Mechanism against DDoS Attacks in Multiple ISP Networks”, International Journal on Information Technologies & Security, Vol. 9, No. 4, pp. 123-134, Dec. 2017, ISSN: 1313-8251, WOSUID: WOS:000418155600010 (Indexed in WoS, ESCI, Thomson Reuters, IF: 1.449)


30. ‘Behavioral Characterization of Android Malware to Detect Similar Malware’, International Journal of Research in Electronics and Computer Engineering, Vol. 5, Issue 4, Oct.-Dec. 2017, pp. 509-514, ISSN: 2348-2281 (Online)


31. Study of Existing Design Architectures and Frameworks in Twitter, Global Journal of Enterprise Information System, Vol. 9, Issue 4, pp. 52-56, Oct.-Dec.17, Online ISSN: 0975-1432, DOI: 10.18311/gjeis/2017/18138


32. Sentiment Classification of Tweets, Supervised Learning Approach by Effective Feature Selection, International Journal Of Research In Electronics and Computer Engineering, Vol. 5, Issue 4, pp. 221-224, Oct-Dec. 2017, ISSN:2393-9028 (Print), ISSN:2348-2281(Online)


33. Critical Path Based Ant Colony Optimization for Cloud Computing using meta heuristic approach, International Journal Of Research In Electronics and Computer Engineering, Vol. 5, Issue 4, pp. 225-230, Oct-Dec. 2017, ISSN: 2393-9028(Print),ISSN:2348-2281(Online)


34. “Coordinator-Agent Based Distributed Defense against DDoS Attacks in Transit-Stub Networks”, International Journal of Future Generation Communication and Networking, Vol. 10, No. 10, pp. 51-64, Oct. 2017, ISSN: 2233-7857 (Online), DOI: 10.14257/ijfgcn.2017.10.10.05, WOSUID: WOS:000416443300005 (Indexed in WoS, ESCI, Thomson Reuters, Scopus)


35. "A Load Balancing Based Improved Task Scheduling Algorithm in Cloud Computing", International Journal for Research in Applied Science and Engineering Technology, Vol. 5, Issue 9, Sept. 2017, pp. 161-170, ISSN: 2321-9653


36. “Collaborative Agent-based Model for Distributed Defense against DDoS Attacks in ISP Networks”, International Journal of Security and its Applications, MECS, Vol. 11, No. 8, pp. 1-12, Aug. 2017, ISSN: 1738-9976, DOI: 10.14257/ijsia.2017.11.8.01, WOSUID: WOS:000409232100001 (Indexed in Scopus, WoS, ESCI, Thomson Reuters)


37. Comparison of Job Scheduling Algorithms in Cloud Computing, Asian Journal of Multidimensional Research, Vol. 6, Issue 8, pp. 82-90, Aug. 2017, ISSN (online): 2278-4853


38. “Distributed Defense: An Edge over Centralized Defense against DDoS Attacks”, International Journal of Computer Network and Information Security, Vol. 9, Issue 3, pp. 36-44, March 2017, ISSN: 2074-9104 (Online), DOI: 10.5815/ijcnis.2017.03.05 (Scopus, Inspec, IET)


39. ‘A Model of Mobile Commerce Practices in the State of Punjab: An Empirical Investigation’, International Journal of Indian Culture and Business Management (IJICBM), Inderscience Journals, Switzerland, ISSN:1753-0806, Vol. 10, No. 4, April 2015, pp. 494-520, DOI: 10.1504/IJICBM.2015.069651 (ESCI, WoS, Clarivate Analytics)


40. ‘Design of E-Land Record Information System with Google Map using Mobile Commerce’, Journal of Software Engineering and Applications, USA, ISSN (Print): 1945-3116, Vol.6, No.4, 2013, pp. 221-228, DOI: 10.4236/jsea.2013.64027 [Impact Factor: 0.99]


41. ‘Analytical and Comparative Study of Data Mining Algorithms Using TANAGRA Tool for Farm DSS’, International Review on Computers and Software (I.RE.CO.S), Naples, Italy, ISSN Print: 1828-6003, Vol.4, No.5, Sept. 2009, pp. 563-566 (SCOPUS)