Institution
Jaypee Institute of Information Technology
Education•Noida, Uttar Pradesh, India•
About: Jaypee Institute of Information Technology is a education organization based out in Noida, Uttar Pradesh, India. It is known for research contribution in the topics: Computer science & Cluster analysis. The organization has 2136 authors who have published 3435 publications receiving 31458 citations. The organization is also known as: JIIT Noida.
Papers published on a yearly basis
Papers
More filters
••
01 Jan 2015
TL;DR: An algorithm to detect not only the SQL injection attack but also detects unauthorized user by maintaining an audit record using machine learning technique (clustering).
Abstract: SQL is a database language which is used to interact with the database. SQL is a language with the help of which database could be created, modified and deleted. Nowadays every organization used to have their own databases which may keep important information which should not be shared publicly. The SQL injection technique is now one of the most common attacks on the Internet. This paper is all about SQL injection, SQL injection attacks, and more important, how to detect and correct SQL injection. This paper proposes an algorithm to detect not only the SQL injection attack but also detects unauthorized user by maintaining an audit record using machine learning technique (clustering).
12 citations
••
TL;DR: In this article, a dual band substrate integrated waveguide H plane sectoral horn antenna with reconfigurable radiation characteristics has been proposed, which acts as a perfect broadside radiator at 16.1 GHz and perfect endfire radiator at 14.4 GHz.
Abstract: A dual band substrate integrated waveguide H plane sectoral horn antenna with reconfigurable radiation characteristics has been proposed in this paper. Designed antenna acts as a perfect broadside radiator at 16.1 GHz and perfect endfire radiator at 14.4 GHz frequency. Broadside radiation has been achieved by etching rectangular slots in the flared section of horn exhibiting a gain of 8.87 dBi. To achieve perfect endfire radiation, dielectric loading is done at the edge of horn and at this frequency antenna shows a gain of 11.3 dBi. The horn and the loaded dielectric are integrated by using the same single substrate resulting in easy fabrication and low cost. The proposed design has been fabricated and measured results are in good agreement with the simulated results.
12 citations
••
TL;DR: A novel method which will categorize the text message based on the SMS contents and URL behavior, using a machine learning algorithm to classify the message on basis of malicious keywords present in the message is proposed.
Abstract: Rapid development in Information Technology has led to increased usage of smartphones. Smartphone users are storing their sensitive information like their user credentials, credit card, and debit card information in the mobile device. Moreover, mobile devices are constantly connected to the World Wide Web through packet data connection or Wifi which makes these devices prone to phishing attacks. Smishing is a combination of Sms and Phishing in which attackers target the mobile user through a text message sent to their mobile device. These text messages contain a link which will redirect the user to malicious websites. Many methods are proposed by researchers in past years to mitigate the smishing attacks which included SMS feature-based analysis, blacklisting techniques, and heuristic methods. But still, we don't have a method which reduces false positive results. Hence, We have proposed a novel method which will categorize the text message based on the SMS contents and URL behavior. SMS content analysis is performed using text pre-processing and analyzing techniques to detect the presence of URL, Phone Number, E-mail ID, and malicious keywords in the message. We have used a machine learning algorithm to classify the message on basis of malicious keywords present in the message. We have also used the techniques of form tag check and APK download check to analyze the malicious behavior of the URL. Text messages will be finally classified into a malicious and non-malicious category based on the results of the detection techniques.
12 citations
••
TL;DR: This paper first proves that detectors with imperfect precisions offer limited usefulness, then focuses on detectors with perfect precision, and conducts a comprehensive complexity analysis of this optimization problem, showing NP-completeness and designing an FPTAS (Fully Polynomial-Time Approximation Scheme).
12 citations
••
TL;DR: In this article, a scheme for the acceleration of electrons generated during the ionization of a gas by two laser pulses is proposed for accelerating the electrons generated from neutral atoms near the rising edge of the pulse.
Abstract: A scheme is proposed for the acceleration of electrons generated during the ionization of a gas by two laser pulses. The electrons created from the ionization of neutral atoms near the rising edge of the pulse do not gain sufficient energy. If a prepulse is used before the main pulse then the prepulse removes electrons from the outer shells, and the main laser pulse interacts with the electrons in the inner shells of high atomic number gases, such as krypton and argon. The electrons are generated close to the peak of the main laser pulse and gain energy in GeV with a small spread in the energy and low emittance angle.
12 citations
Authors
Showing all 2176 results
Name | H-index | Papers | Citations |
---|---|---|---|
Sanjay Gupta | 99 | 902 | 35039 |
Mohsen Guizani | 79 | 1110 | 31282 |
José M. Merigó | 55 | 361 | 10658 |
Ashish Goel | 50 | 205 | 9941 |
Avinash C. Pandey | 45 | 301 | 7576 |
Krishan Kumar | 35 | 242 | 4059 |
Yogendra Kumar Gupta | 35 | 183 | 4571 |
Nidhi Gupta | 35 | 266 | 4786 |
Anirban Pathak | 33 | 214 | 3508 |
Amanpreet Kaur | 32 | 367 | 5713 |
Navneet Sharma | 31 | 219 | 3069 |
Garima Sharma | 31 | 97 | 3348 |
Manoj Kumar | 30 | 108 | 2660 |
Rahul Sharma | 30 | 189 | 3298 |
Ghanshyam Singh | 29 | 263 | 2957 |