Books
Edited
-
Cyberology An Optimized Approach to the Cyber-World. Chapman and Hall/CRC (Taylor & Francis Group). ISBN 9781003409571. 2025
-
Advances in Cyberology and the Advent of the Next-Gen Information Revolution. IGI Global. ISBN13: 9781668481332. 2023. (Scopus indexed)
-
Pervasive Healthcare: A Compendium of Critical Factors for Success. EAI/Springer Innovations in Communication and Computing –EAISICC (). ISBN: 978-3-030-77746-3. 2022. (Scopus indexed)
-
Critical Concepts, Standards and Techniques in Cyber Forensics. IGI Global. ISBN10: 1799815587. 2020
Authored
-
Exploring the Cybersecurity Landscape Through Cyber Forensics. IGI Global. ISBN13: 9798369329603. 2025.
-
Big Data Concepts, Technologies, and Applications. Routledge and CRC Press (Taylor & Francis Group). ISBN 9781032579184. 2023. (Scopus indexed)
-
Artificial Intelligence. Thakur Publishers, India. 2014
-
Language Independent Approach to Develop Information Retrieval System: A Case Study for Urdu Language. LAP Lambert Academic Publishing, Germany. ISBN 3659273767, 9783659273766. 2012
Articles
in
Journals
2024
-
A Deep Learning-based Approach to Predict the Flood Patterns Using Sentinel-1A Time Series Images. Journal of the Indian Society of Remote Sensing. (2024). DOI: 10.1007/s12524-024-02016-8. (WoS Q3)
-
Enhanced mechanism to prioritize the cloud data privacy factors using AHP and TOPSIS: a hybrid approach. Journal of Cloud Computing. 13, 42 (2024). DOI: 10.1186/s13677-024-00606-y. (WoS Q2)
-
Network Analysis in a Peer-to-Peer Energy Trading Model Using Blockchain and Machine Learning. Computer Standards & Interfaces, 103799. DOI: 10.1016/j.csi.2023.103799. (WoS Q1)
2023
-
A service-categorized security scheme with physical unclonable functions for internet of vehicles. Journal of Big Data. 10, 178 (2023). DOI: 10.1186/s40537-023-00865-7. (WoS Q1)
-
An Internet of Things Enabled Machine Learning Model for Energy Theft Prevention System (ETPS) in Smart Cities. Journal of Cloud Computing 12, 158 (2023). DOI: 10.1186/s13677-023-00525-4. (WoS Q2)
-
Flood Monitoring and Early Warning Systems–An IoT Based Perspective. EAI Endorsed Transactions on Internet of Things, 9(2). DOI: 10.4108/eetiot.v9i2.2968. (Scopus)
2022
-
An Empirical Approach to Monitor the Flood-Prone Regions of North India Using Sentinel-1 Images. Annals of Emerging Technologies in Computing (AETiC) 6 (4), 1-14. DOI: 10.33166/AETiC.2022.04.001. (Scopus Q3)
2021
-
Exploiting Artificial Immune System to Optimize Association Rules for Word Sense Disambiguation. International Journal of Intelligent Systems and Applications in Engineering. 9(4), 184-190. (Scopus Q4).
-
Breast Cancer Diagnosis using Wrapper-Based Feature Selection and Artificial Neural Network. Applied Computer Science, vol. 17, no. 3, pp. 19–30. (Scopus Q4).
-
An Overview of Current Multi-Attribute Techniques in Double Auction Frameworks. Turkish Journal of Computer and Mathematics Education (TURCOMAT). Vol. 12 No. 3, 877-883. (Scopus Q3).
-
A Social Media Analytics Framework to Increase Prospective Students' Interests in STEM and TVET Education. Asian Journal of University Education. Vol. 16 No. 4, 82-90. (Scopus Q2).
2020
-
Modified ISR hyper-heuristic for tuning automatic genetic clustering chromosome size. IOP Conference Series: Materials Science and Engineering. Vol. 932 No. 1 (Scopus indexed).
2018
-
Application of artificial intelligence in fighting against cybercrimes: A REVIEW. International Journal of Advanced Research in Computer Science 9 (2). 2018.
-
Analysis of mental state of users using social media to predict depression! A survey. International Journal of Advanced Research in Computer Science 9 (2), 100-106.
-
Analysis of DDOS attack detection and prevention in cloud environment: A review. International Journal of Advanced Research in Computer Science 9 (2), 107-113.
-
Expert System for Crop Selection in Agriculture: A Critical Review. International Journal of Advanced Research in Computer Science. 9 (2).
2017
-
Classification of Jobs Using Live Data in Cloud Computing. International Journal of Advanced Research in Computer Science 8 (7).
-
Opinion mining with Spam Detection using Real Time data on cloud. International Journal of Advanced Research in Computer Science 8 (7).
2016
-
CTS: A Credit Based Threshold System to Minimize the Dissemination of Faulty Data in Vehicular Adhoc Networks. International Journal of Control Theory and Applications, IJCTA. Vol 9 N0 17. 8499-8508. (Scopus Q3).
-
An Approach to Minimize Faulty Data Propagation in Vehicular Adhoc Networks. HCTL Open International Journal of Technology Innovations and Research. Volume 21, Issue 1, July 2016.
2015
-
Methodological study of opinion mining and sentiment analysis techniques. International Journal on Soft Computing (IJSC), 5(1), pp.11-21.
-
A Compendium Over Cloud Computing Cryptographic Algorithms and Security Issues. BIJIT - BVICAM’s International Journal of Information Technology 7 (1), 810-814. 2015. (Scopus Q2)
-
Automatic Question Generation from Text. International Journal for Innovations in Engineering, Science and Management 3(4), 27-31.
2014
-
Study of Hindi Word Sense Disambiguation Based on Hindi WorldNet. International Journal for Research in Applied Science & Engineering Technology 2 (5), 1161-1168.
2013
-
Word Sense Ambiguity: A Survey. International Journal of Computer & Information Technology 2 (6), 1161-1168.
2012
-
An Unsupervised Approach to Develop a Stemmer. International Journal on Natural Language Computing (IJNLC) 1 (2), 15-23.
Articles
in Conferences
2023
-
An Integrated Image Classification Approach to Detect the Flood Prone Areas using Sentinel-1 Images. 2023 10th International Conference on Computing for Sustainable Global Development (INDIACom), pp. 655-660. (Scopus indexed)
2022
-
Random Forest Based Flood Monitoring Using Sentinel-1 Images: A Case Study of Flood Prone Regions of North-East India. IGARSS 2022 - 2022 IEEE International Geoscience and Remote Sensing Symposium, 2022, pp. 4883-4886, doi: 10.1109/IGARSS46834.2022.9884483. (Scopus, WoS indexed)
2018
-
Crawling of Japanese Real-Estate Websites Using SCRAPY. International Conference on Advancement in Computer Engineering & Information Technology (ACEIT’18).
2016
-
Word Sense Disambiguation in Software Requirement Specifications Using WordNet and Association Mining Rule. Second International Conference on Information and Communication Technology for Competitive Strategies, published by ACM (2016). (Scopus indexed).
-
Analysis of Security Challenges in Vehicular Adhoc Network. International Conference on Advancement in Computer Engineering & Information Technology (ACEIT’16), pp 65-68, 12th March 2016.
-
Proposal for Avoiding Ambiguity in Requirement Engineering using Artificial Intelligence. proceedings of international conference on advancement in computer engineering & information technology, IJCSIT.
2015
-
Different Techniques of Load Balancing in Distributed System: A Review Paper. Global Conference on Communication Technologies (GCCT), 371-375. (Scopus, WoS indexed).
-
Big Data Classification using Evolutionary Techniques: A Survey. IEEE International Conference on Engineering and Technology (ICETECH), 243-247.
-
Comparative study of various backup and monitoring techniques. International Conference on Green Computing and Internet of Things (ICGCIoT), 1530 - 1537. (Scopus, WoS indexed)
-
Advances in Ambiguity less NL SRS: A review. IEEE International Conference on Engineering and Technology (ICETECH), 221-225.
-
A survey on elasticity in cloud computing. IEEE International Conference on Engineering and Technology (ICETECH) 248-250.
2013
-
Analytical study of feature extraction techniques in opinion mining. International Conference AIAA-2013. (pp. 85-94).
-
A Language Independent Approach to Develop URDU IR System. Computer Science & Information Technology (CS & IT).
Book
Chapters
2023
-
The Rise of Deepfake Technology: Issues, Challenges, and Countermeasures. In Advances in Cyberology and the Advent of the Next-Gen Information Revolution (pp. 178-201). IGI Global. DOI: 10.4018/978-1-6684-8133-2.ch010. (Scopus indexed)
-
A Critical Analysis of Cyber Threats and Their Global Impact. In Computational Intelligent Security in Wireless Communications (pp. 201-220). CRC Press. DOI: 10.1201/9781003323426-12
2022
-
Study of computational techniques to deal with ambiguity in SRS documents. In Computational Intelligence in Software Modeling (pp. 107-120). Berlin, Boston: De Gruyter. DOI: 10.1515/9783110709247-008
-
Security in Digital Healthcare System. Pervasive Healthcare: A Compendium of Critical Factors for Success by EAI/Springer. DOI: 10.1007/978-3-030-77746-3_15. (Scopus indexed)
2020
-
Critical Concepts and Techniques for Information Retrieval System. Natural Language Processing in Artificial Intelligence by Apple Academic Press, Taylor & Francis group. ISBN 9780367808495.
-
Nature Inspired Approach for Intrusion Detection Systems. Design & Analysis of Security Protocol for Communication by Scrivener Publishing, Wiley. DOI: 10.1002/9781119555759.ch8
-
Introduction to Email, Web, and Message Forensics. Critical Concepts, Standards and Techniques in Cyber Forensics by IGI Global. pp 174-186. ISBN10: 1799815587.
-
A Compendium of Cloud Forensics. Critical Concepts, Standards and Techniques in Cyber Forensics by IGI Global. pp. 215-227. ISBN10: 179815587.
-
Digital Forensics and Data Mining. Critical Concepts, Standards and Techniques in Cyber Forensics by IGI Global. pp. 240-247. ISBN10: 1799815587.
2019
-
Social media Analytics to predict depression level in the users. Early Detection of Neurological Disorders Using Machine Learning systems by IGI Global. DOI: 10.4018/978-1-5225-8567-1.ch011. (PsycINFO®)
2017
-
Big Data on E-Government. Securing Government Information and Data in Developing Countries by IGI Global. (Scopus indexed). DOI: 10.4018/978-1-5225-1703-0.ch002. (Scopus, WoS -BCI (Book citation Index))
-
Cloud Computing in E-Governance: Indian Perspective. Securing Government Information and Data in Developing Countries by IGI Global. (Scopus indexed). DOI: 10.4018/978-1-5225-1703-0.ch006. (Scopus, WoS -BCI (Book citation Index))
2014
-
Books Reviews using Naïve Bayes and Clustering Classifier. ERCICA 2014 ‐ Emerging Research in Computing, Information, Communication and Applications (VOL 1) published by ELSEVIER. ISBN 978951072621.
2013
-
A Language Independent Approach to Develop Urdu Stemmer. Advances in Computing and Information Technology, pp. 45-53, published by Springer. 2013. (Scopus, WoS indexed).