scispace - formally typeset
Search or ask a question
Institution

Jaypee Institute of Information Technology

EducationNoida, Uttar Pradesh, India
About: Jaypee Institute of Information Technology is a education organization based out in Noida, Uttar Pradesh, India. It is known for research contribution in the topics: Computer science & Cluster analysis. The organization has 2136 authors who have published 3435 publications receiving 31458 citations. The organization is also known as: JIIT Noida.


Papers
More filters
Book ChapterDOI
01 Jan 2015
TL;DR: An algorithm to detect not only the SQL injection attack but also detects unauthorized user by maintaining an audit record using machine learning technique (clustering).
Abstract: SQL is a database language which is used to interact with the database. SQL is a language with the help of which database could be created, modified and deleted. Nowadays every organization used to have their own databases which may keep important information which should not be shared publicly. The SQL injection technique is now one of the most common attacks on the Internet. This paper is all about SQL injection, SQL injection attacks, and more important, how to detect and correct SQL injection. This paper proposes an algorithm to detect not only the SQL injection attack but also detects unauthorized user by maintaining an audit record using machine learning technique (clustering).

12 citations

Journal ArticleDOI
TL;DR: In this article, a dual band substrate integrated waveguide H plane sectoral horn antenna with reconfigurable radiation characteristics has been proposed, which acts as a perfect broadside radiator at 16.1 GHz and perfect endfire radiator at 14.4 GHz.
Abstract: A dual band substrate integrated waveguide H plane sectoral horn antenna with reconfigurable radiation characteristics has been proposed in this paper. Designed antenna acts as a perfect broadside radiator at 16.1 GHz and perfect endfire radiator at 14.4 GHz frequency. Broadside radiation has been achieved by etching rectangular slots in the flared section of horn exhibiting a gain of 8.87 dBi. To achieve perfect endfire radiation, dielectric loading is done at the edge of horn and at this frequency antenna shows a gain of 11.3 dBi. The horn and the loaded dielectric are integrated by using the same single substrate resulting in easy fabrication and low cost. The proposed design has been fabricated and measured results are in good agreement with the simulated results.

12 citations

Journal ArticleDOI
TL;DR: A novel method which will categorize the text message based on the SMS contents and URL behavior, using a machine learning algorithm to classify the message on basis of malicious keywords present in the message is proposed.
Abstract: Rapid development in Information Technology has led to increased usage of smartphones. Smartphone users are storing their sensitive information like their user credentials, credit card, and debit card information in the mobile device. Moreover, mobile devices are constantly connected to the World Wide Web through packet data connection or Wifi which makes these devices prone to phishing attacks. Smishing is a combination of Sms and Phishing in which attackers target the mobile user through a text message sent to their mobile device. These text messages contain a link which will redirect the user to malicious websites. Many methods are proposed by researchers in past years to mitigate the smishing attacks which included SMS feature-based analysis, blacklisting techniques, and heuristic methods. But still, we don't have a method which reduces false positive results. Hence, We have proposed a novel method which will categorize the text message based on the SMS contents and URL behavior. SMS content analysis is performed using text pre-processing and analyzing techniques to detect the presence of URL, Phone Number, E-mail ID, and malicious keywords in the message. We have used a machine learning algorithm to classify the message on basis of malicious keywords present in the message. We have also used the techniques of form tag check and APK download check to analyze the malicious behavior of the URL. Text messages will be finally classified into a malicious and non-malicious category based on the results of the detection techniques.

12 citations

Journal ArticleDOI
TL;DR: This paper first proves that detectors with imperfect precisions offer limited usefulness, then focuses on detectors with perfect precision, and conducts a comprehensive complexity analysis of this optimization problem, showing NP-completeness and designing an FPTAS (Fully Polynomial-Time Approximation Scheme).

12 citations

Journal ArticleDOI
TL;DR: In this article, a scheme for the acceleration of electrons generated during the ionization of a gas by two laser pulses is proposed for accelerating the electrons generated from neutral atoms near the rising edge of the pulse.
Abstract: A scheme is proposed for the acceleration of electrons generated during the ionization of a gas by two laser pulses. The electrons created from the ionization of neutral atoms near the rising edge of the pulse do not gain sufficient energy. If a prepulse is used before the main pulse then the prepulse removes electrons from the outer shells, and the main laser pulse interacts with the electrons in the inner shells of high atomic number gases, such as krypton and argon. The electrons are generated close to the peak of the main laser pulse and gain energy in GeV with a small spread in the energy and low emittance angle.

12 citations


Authors

Showing all 2176 results

NameH-indexPapersCitations
Sanjay Gupta9990235039
Mohsen Guizani79111031282
José M. Merigó5536110658
Ashish Goel502059941
Avinash C. Pandey453017576
Krishan Kumar352424059
Yogendra Kumar Gupta351834571
Nidhi Gupta352664786
Anirban Pathak332143508
Amanpreet Kaur323675713
Navneet Sharma312193069
Garima Sharma31973348
Manoj Kumar301082660
Rahul Sharma301893298
Ghanshyam Singh292632957
Network Information
Related Institutions (5)
Birla Institute of Technology and Science
13.9K papers, 170K citations

90% related

Indian Institute of Technology Roorkee
21.4K papers, 419.9K citations

89% related

Jadavpur University
27.6K papers, 422K citations

89% related

VIT University
24.4K papers, 261.8K citations

89% related

Indian Institute of Technology Guwahati
17.1K papers, 257.3K citations

88% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
202321
202258
2021401
2020395
2019464
2018366