- Home
- About
- Courses
UG Programmes
- Academics
- Departments
- Alumni
- Placement
- Library
S.M.NIZAMUDDIN CENTRAL LIBRARY
Free E-Books
- Gallery
- Student Corner
- R&D Cell
- Contact Us
LIST OF PUBLICATIONS
Framework for surveillance of Instant Messages, International Journal of Internet Technology and Secured Transactions (IJITST), Inderscience publisher indexed in ACM and SCOPUS,March 2013. (free of cost) peer reviewed journal.
Extracting useful rules through improved decision tree induction using information entropy,published in International Journal of Information Sciences and Techniques, (IJIST) Vol.3, No.1, pages 27-41, January 2013.
APD: ARM Phishing Detector A System for Detecting Phishing in Instant Messengers,published in International Journal of Information processing. Published by IK publishers (INDIA) accessed by IIT professors. In volume 5 issue 2, pg. 12-21. August, 2011. (free of cost) peer reviewed journal link: http://ikjournals.com/ijiparchives.php; (or) http://www.getcited.org/pub/103511871
OSMD: Online Suspicious Message Detection Framework for Instant Messaging Systems,published in Advances in Engineering and Technology Book Series, 2013, Volume No:2, Page(s):380 � 385.
An approach for Deceptive Phishing Detection and Prevention in Social Networking Sites Using Data Mining and WordNet Ontology,International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO), IEEE,2015.
Framework for Surveillance of Instant Messages in Instant messengers and Social neworking sites using Data Mining and Ontology,IEEE Techsym2014, IIT Kharagpur, Feb 28th - Mar 2nd 2014. http://ewh.ieee.org/sb/kharagpur/iit/TechSym2014/doc/IEEETechSym2014_RegularTracksDecisionList.pdf (Listed among top 10 students symposiums in the world as per Google Citation reports).
Framework for Surveillance of Emails to Detect Multilingual Spam and Suspicious Messages,IEEE Workshop on Computational Intelligence: Theories, Applications and Future Directions , IIT Kanpur, India, pp. 42-56, July 2013. link http://www.iitk.ac.in/ee/courses/archives/2013/ci/Workshop-Proceedings/talks.html
Improved decision tree induction: Prioritized Height Balanced tree with entropy to find hidden rules, published in CCSEIT-2012 International conference, 26th-28th October, ACM, 2012. link:http://dl.acm.org.
Decision Tree Induction: Priority Classification, published in ICAESM-2012 (International conference, 30th-31st March, 2012, IEEE, 2012. link: IEEE Xplore - Decision tree induction: Priority.
Deceptive Phishing Detection system in Instant messengers from Audio and Text messages: A Data Mining Approach, published in PRIME-2012 (21st-23rd March) international conference, indexed in IEEE, 2012. link: IEEE Xplore - Deceptive phishing detection.
Automation of decision making process for selection of talented manpower considering risk factor: A data mining approach,International conference on Information Retrieval & Knowledge Management (CAMP-2012), Malaysia,IEEE, 2012. link: IEEE Xplore - Automation of selection (Best paper listed in 2012).
APD: ARM Deceptive Phishing Detector System Phishing Detection in Instant Messengers Using Data Mining Approach,4th International Conference (ObCom-2011),Proceedings, Part I,Springer (CCIS) in Communications in Computer and Information Science, 9th -11th December, 2011. link:http://link.springer.com/chapter/10.1007%2F978-3-642-29219-4_56?LI=true#page-2.
Decision tree construction using AVL-Tree,International conference (WORLDCOMP�09) at U.S.A, appeared in Proceedings of IKE 2009, Volume II, 459-465, 2009.
OSMD: Online Suspicious Message Detection Framework for Instant Messaging Systems,published in Advances in Engineering and Technology Book Series, 2013, Volume No:2, Page(s):380 � 385.
An approach for Deceptive Phishing Detection and Prevention in Social Networking Sites Using Data Mining and WordNet Ontology,International Conference on Electrical, Electronics, Signals, Communication and Optimization (EESCO), IEEE, 2015.
Framework for Surveillance of Instant Messages in Instant messengers and Social neworking sites using Data Mining and Ontology,IEEE Techsym2014, IIT Kharagpur, Feb 28th - Mar 2nd 2014. http://ewh.ieee.org/sb/kharagpur/iit/TechSym2014/doc/IEEETechSym2014_RegularTracksDecisionList.pdf (Listed among top 10 students symposiums in the world as per Google Citation reports).
Framework for Surveillance of Emails to Detect Multilingual Spam and Suspicious Messages,IEEE Workshop on Computational Intelligence: Theories, Applications and Future Directions , IIT Kanpur, India, pp. 42-56, July 2013. link http://www.iitk.ac.in/ee/courses/archives/2013/ci/Workshop-Proceedings/talks.html
Improved decision tree induction: Prioritized Height Balanced tree with entropy to find hidden rules,published in CCSEIT-2012 International conference, 26th-28th October, ACM, 2012. link: http://dl.acm.org.
Decision Tree Induction: Priority Classification, published in ICAESM-2012 (International conference, 30th-31st March, 2012, IEEE, 2012. link: IEEE Xplore - Decision tree induction:Priority.
Deceptive Phishing Detection system in Instant messengers from Audio and Text messages: A Data Mining Approach, published in PRIME-2012 (21st-23rd March) international conference, indexed in IEEE, 2012. link: IEEE Xplore - Deceptive phishing detection.
Automation of decision making process for selection of talented manpower considering risk factor: A data mining approach,International conference on Information Retrieval & Knowledge Management (CAMP-2012), Malaysia, IEEE, 2012. link: IEEE Xplore - Automation of selection(Best paper listed in 2012).
APD: ARM Deceptive Phishing Detector System Phishing Detection in Instant Messengers Using Data Mining Approach,4th International Conference (ObCom-2011), Proceedings, Part I, Springer (CCIS) in Communications in Computer and Information Science, 9th -11th December, 2011. link: http://link.springer.com/chapter/10.1007%2F978-3-642-29219-4_56?LI=true#page-2.
Decision tree construction using AVL-Tree,International conference (WORLDCOMP�09) at U.S.A, appeared in Proceedings of IKE 2009, Volume II, 459-465, 2009.
Data Mining, Database Management Systems, Object Oriented and System Development (UML), Software Engineering