Akashdeep Bhardwaj

Orcid: 0000-0001-7361-0465

According to our database1, Akashdeep Bhardwaj authored at least 32 papers between 2016 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
A novel subset-based polynomial design for enhancing the security of short message-digest with inflated avalanche and random responses.
J. King Saud Univ. Comput. Inf. Sci., January, 2023

Framework to perform taint analysis and security assessment of IoT devices in smart cities.
PeerJ Comput. Sci., 2023

Metaverse or Metaworst with Cybersecurity Attacks.
IT Prof., 2023

2022
Multinomial Naive Bayesian Classifier Framework for Systematic Analysis of Smart IoT Devices.
Sensors, 2022

Determinants of Mobile Cloud Computing Adoption by Financial Services Firms.
J. Inf. Technol. Res., 2022

Use of Artificial Neural Network for Forecasting Health Insurance Entitlements.
J. Inf. Technol. Res., 2022

Internet of Things and Its Significance on Smart Homes/Cities.
J. Inf. Technol. Res., 2022

Secure framework against cyber attacks on cyber-physical robotic systems.
J. Electronic Imaging, 2022

IAF: IoT Attack Framework and Unique Taxonomy.
J. Circuits Syst. Comput., 2022

Investigate Financial Crime Patterns Using Graph Databases.
IT Prof., 2022

Predictive Analytics-Based Cybersecurity Framework for Cloud Infrastructure.
Int. J. Cloud Appl. Comput., 2022

A novel machine learning-based framework for detecting fake Instagram profiles.
Concurr. Comput. Pract. Exp., 2022

Efficient, Lightweight Cyber Intrusion Detection System for IoT Ecosystems Using MI2G Algorithm.
Comput., 2022

2021
Penetration testing framework for smart contract Blockchain.
Peer-to-Peer Netw. Appl., 2021

Property Valuation Using Linear Regression and Random Forest Algorithm.
Int. J. Syst. Dyn. Appl., 2021

Model to enhance security posture of IoT devices and components with private APN.
Int. J. Intell. Syst. Technol. Appl., 2021

2020
Keyloggers: silent cyber security weapons.
Netw. Secur., 2020

Health Insurance Claim Prediction Using Artificial Neural Networks.
Int. J. Syst. Dyn. Appl., 2020

Capturing-the-Invisible (CTI): Behavior-Based Attacks Recognition in IoT-Oriented Industrial Control Systems.
IEEE Access, 2020

A Taxonomy of Blockchain Applications.
Proceedings of the Blockchain Technologies, Applications and Cryptocurrencies, 2020

Attack Vectors for Blockchain and Mapping OWASP Vulnerabilities to Smart Contracts.
Proceedings of the Blockchain Technologies, Applications and Cryptocurrencies, 2020

2019
A framework for effective threat hunting.
Netw. Secur., 2019

Cyber security attacks on robotic platforms.
Netw. Secur., 2019

2018
Reducing the threat surface to minimise the impact of cyber-attacks.
Netw. Secur., 2018

Algorithm for Secure Hybrid Cloud Design Against DDoS Attacks.
Int. J. Inf. Technol. Web Eng., 2018

Novel Taxonomy to Select Fog Products and Challenges Faced in Fog Environments.
Int. J. Fog Comput., 2018

Unique Taxonomy for Evaluating Fog Computing Services.
Int. J. E Bus. Res., 2018

Efficient Fault Tolerance on Cloud Environments.
Int. J. Cloud Appl. Comput., 2018

2017
Security challenges for cloud-based email infrastructure.
Netw. Secur., 2017

Comparing Single Tier and Three Tier Infrastructure Designs against DDoS Attacks.
Int. J. Cloud Appl. Comput., 2017

2016
Designing a Framework for Cloud Service Agreement for Cloud Environments.
Int. J. Cloud Appl. Comput., 2016

Three Tier Network Architecture to Mitigate DDoS Attacks on Hybrid Cloud Environments.
ICTCS, 2016


  Loading...