Skip to main content

previous disabled Page of 3
and
  1. No Access

    Article

    HMS-IDS: Threat Intelligence Integration for Zero-Day Exploits and Advanced Persistent Threats in IIoT

    Critical Industries such as Manufacturing, Power, and Intelligent Transportation are increasingly using IIoT systems, making them more susceptible to cyberattacks. To counter these cyberattacks, policymakers h...

    Kumar Saurabh, Vaidik Sharma, Uphar Singh in Arabian Journal for Science and Engineering (2024)

  2. No Access

    Article

    TMAP: A Threat Modeling and Attack Path Analysis Framework for Industrial IoT Systems (A Case Study of IoM and IoP)

    Industrial cyber-physical systems (ICPS) are gradually integrating Information Technology (IT) and automating industrial processes, leading systems to become more vulnerable to malicious actors. Thus, to deplo...

    Kumar Saurabh, Deepak Gajjala, Krishna Kaipa in Arabian Journal for Science and Engineering (2024)

  3. No Access

    Chapter and Conference Paper

    An Enhancement in Accuracy for Breast Cancer Prediction Using Machine Learning and Deep Learning Model

    As we are all aware, the population is growing rapidly in this modern period, placing a demand on the healthcare system to identify illnesses in the populace. This creates a major issue for eradicating large-s...

    Subham Panda, Bagesh Kumar, Chandan Kumar, Vaidik Sharma in Data Science and Communication (2024)

  4. No Access

    Chapter and Conference Paper

    A Lightweight Intrusion Detection and Electricity Theft Detection System for Smart Grid

    Smart grid systems have improved networking for power systems and many other industrial systems, but they still have many vulnerabilities, making them an easy target for cyber attacks. Recently, the number of ...

    Ayush Sinha, Ashutosh Kaushik, Ranjana Vyas in Information Security, Privacy and Digital … (2024)

  5. No Access

    Chapter and Conference Paper

    Exploring Object Centric Process Mining with MIMIC IV: Unlocking Insights in Healthcare

    The vast Medical Information Mart for Intensive Care (MIMIC IV) dataset offers a goldmine for process mining in healthcare, yet traditional approaches often struggle with complex object interactions like patie...

    Anukriti Tripathi, Aneesh, Yuvraj Shivam in Advanced Information Systems Engineering W… (2024)

  6. No Access

    Chapter and Conference Paper

    Unveiling AI Efficiency: Loan Application Process Optimization Using PM4PY Tool

    These days, financial institutions strive to streamline their loan processes for cost reduction, improved customer satisfaction, and enhanced overall efficiency. Process Mining (PM) offers a data-driven approa...

    Anukriti Tripathi, Aditi Rai, Uphar Singh, Ranjana Vyas, O. P. Vyas in Advanced Computing (2024)

  7. No Access

    Article

    Distributed hyperparameter optimization based multivariate time series forecasting

    Various domains generate continuous data in the form of multivariate time series (MTS), including electricity and stock trading. It is difficult to maintain a low variance in forecasting error while forecastin...

    Tinku Singh, Ayush Sinha, Satakshi Singh, O. P. Vyas in Multimedia Tools and Applications (2024)

  8. Article

    Motion-compensated online object tracking for activity detection and crowd behavior analysis

    It is a nontrivial task to manage crowds in public places and recognize unacceptable behavior (such as violating social distancing norms during the COVID-19 pandemic). In such situations, people should avoid l...

    Ashish Singh Patel, Ranjana Vyas, O. P. Vyas, Muneendra Ojha in The Visual Computer (2023)

  9. No Access

    Chapter and Conference Paper

    Biometric Iris Identifier Recognition with Privacy Preserving Phenomenon: A Federated Learning Approach

    As technology is getting advanced day by day, the concern of security, authentication, and identification are also becoming important in every domain. Apart from other identifiers used for authentication, a bi...

    Harshit Gupta, Tarun Kumar Rajput, Ranjana Vyas in Neural Information Processing (2023)

  10. No Access

    Chapter and Conference Paper

    Anomaly Classification to Enable Self-healing in Cyber Physical Systems Using Process Mining

    Industrial Cyber Physical Systems (CPS) are large-scale critical infrastructures that are vulnerable to cyberattacks with wide-ranging consequences. Being a combination of heterogeneous devices and protocols, ...

    Uphar Singh, Deepak Gajjala in Learning and Intelligent Optimization (2023)

  11. No Access

    Chapter and Conference Paper

    Generating Textual Description Using Modified Beam Search

    Generating textual descriptions of images by describing them in words is a fundamental problem that connects computer vision and natural language processing. A single image may include several entities, their ...

    Divyansh Rai, Arpit Agarwal, Bagesh Kumar, O. P. Vyas in Neural Information Processing (2023)

  12. No Access

    Chapter and Conference Paper

    A Short Survey of Elucidating the Emotion Recognition Methodologies Using Facial Images and EEG Signals

    Since the high demand for Human–Computer Interaction (HCI), develo** an automated model for recognizing facial gestures or emotions becomes challenging. Some experts have used facial images as a constructive...

    Dilsheen Kaur, Anuradha Misra, O. P. Vyas in Advanced Computational and Communication P… (2023)

  13. No Access

    Chapter and Conference Paper

    A Methodological Review of Time Series Forecasting with Deep Learning Model: A Case Study on Electricity Load and Price Prediction

    Today, the world experiences a surge in adoption of renewable electricity generation methods. As a consequence to this, the dependence of electricity supply and demand has parallelly seen a dramatic increase o...

    Ayush Sinha, Tinku Singh, Ranjana Vyas in Machine Learning, Image Processing, Networ… (2023)

  14. No Access

    Chapter and Conference Paper

    A Machine Learning Framework for Breast Cancer Detection and Classification

    Breast cancer is a very frequently seen type of cancer. It is one of the biggest contributors to new cancer cases and death as shown by the world dataset, making it a major medical concern. This makes the rese...

    Bagesh Kumar, Pradumna Tamkute, Kumar Saurabh in Robotics, Control and Computer Vision (2023)

  15. No Access

    Chapter and Conference Paper

    Classification of Indoor–Outdoor Scene Using Deep Learning Techniques

    Scene classification is a process in which a computer’s visualizations of a scene are mapped to segments. Then, the machine applies deep learning to do the task. Indoor scene classification is more challenging...

    Bagesh Kumar, Harshit Gupta in Machine Learning, Image Processing, Networ… (2023)

  16. No Access

    Chapter and Conference Paper

    Commissioning Random Matrix Theory and Synthetic Minority Oversampling Technique for Power System Faults Detection and Classification

    The fast paced innovation in communication and computation capabilities has laid the foundation of sophisticated transformation from legacy power systems to smart grid (SG) infrastructure. So, Providing the ef...

    Ayush Sinha, Shubham Dwivedi, Sandeep Kumar Shukla in Neural Information Processing (2023)

  17. No Access

    Article

    A study on video semantics; overview, challenges, and applications

    Due to the increase in surveillance systems, there is a massive increase in surveillance data. As of now, the key challenge for video surveillance systems is analyzing these large video clips. It, therefore, h...

    Ashish Singh Patel, Ranjana Vyas, O. P. Vyas in Multimedia Tools and Applications (2022)

  18. No Access

    Chapter and Conference Paper

    Lane Detection for Autonomous Vehicle in Hazy Environment with Optimized Deep Learning Techniques

    In this technological era, the devices are getting more intelligent and smarter with the advent of artificial intelligence and related technologies. The autonomous vehicle is one of the emerging and important...

    Bagesh Kumar, Harshit Gupta, Ayush Sinha in Advanced Network Technologies and Intellig… (2022)

  19. No Access

    Chapter and Conference Paper

    Exploiting Vulnerabilities in the SCADA Modbus Protocol: An ICT-Reliant Perspective

    Industrial plants like power, gas, water, and transport are controlled remotely and managed by a protocol like Modbus-TCP which has a significant contribution towards Industrial Control systems (ICS) and Super...

    Ayush Sinha, Saurabh Singh Patel in Advanced Network Technologies and Intellig… (2022)

  20. No Access

    Chapter and Conference Paper

    A Multi Agent Framework to Detect in Progress False Data Injection Attacks for Smart Grid

    With the rapid growth in the use of the internet and the rapid digitization of the energy services, telecommunication and other critical infrastructures, there is a proportionate growth in the magnitude and th...

    Ayush Sinha, Ashrith Reddy Thukkaraju in Advanced Network Technologies and Intellig… (2022)

previous disabled Page of 3