Divya Bansal

According to our database1, Divya Bansal authored at least 51 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Computational techniques to counter terrorism: a systematic survey.
Multim. Tools Appl., January, 2024

2023
RadScore: An Automated Technique to Measure Radicalness Score of Online Social Media Users.
Cybern. Syst., May, 2023

A review on fake news detection 3T's: typology, time of detection, taxonomies.
Int. J. Inf. Sec., 2023

2022
Tools and Techniques for Collection and Analysis of Internet-of-Things malware: A systematic state-of-art review.
J. King Saud Univ. Comput. Inf. Sci., November, 2022

Open source intelligence extraction for terrorism-related information: A review.
WIREs Data Mining Knowl. Discov., 2022

Disinformation detection on social media: An integrated approach.
Multim. Tools Appl., 2022

Automated Detection of Anti-National Textual Response to Terroristic Events on Online Media.
Cybern. Syst., 2022

Full/Regular Research Paper submission to (CSCI-RTCW): Multi Class Classification of Online Radicalization Using Transformer Models.
Proceedings of the International Conference on Computational Science and Computational Intelligence, 2022

2021
Privacy Preservation in Cloud Computing Using Randomized Encoding.
Wirel. Pers. Commun., 2021

Optimised K-anonymisation technique to deal with mutual friends and degree attacks.
Int. J. Inf. Comput. Secur., 2021

A hybrid approach for preserving privacy for real estate data.
Int. J. Inf. Comput. Secur., 2021

Visualization of Twitter Sentiments on Kashmir Territorial Conflict.
Cybern. Syst., 2021

An Adaptive Approach for Fake News Detection in Social Media: Single vs Cross Domain.
Proceedings of the International Conference on Computational Science and Computational Intelligence, 2021

Time is Important in Fake News Detection: a short review.
Proceedings of the International Conference on Computational Science and Computational Intelligence, 2021

2020
BaroSense: Using Barometer for Road Traffic Congestion Detection and Path Estimation with Crowdsourcing.
ACM Trans. Sens. Networks, 2020

2019
Malware intelligence: beyond malware analysis.
Int. J. Adv. Intell. Paradigms, 2019

Detecting Radical Text over Online Media using Deep Learning.
CoRR, 2019

An Analytical Model for Identifying Suspected Users on Twitter.
Cybern. Syst., 2019

Malware Capability Assessment using Fuzzy Logic.
Cybern. Syst., 2019

A Comparative Study and Automated Detection of Illegal Weapon Procurement over Dark Web.
Cybern. Syst., 2019

2018
CrowdLoc: Cellular Fingerprinting for Crowds by Crowds.
ACM Trans. Sens. Networks, 2018

What about Privacy of My OSN Data?
Cybern. Syst., 2018

Who is Who on Twitter-Spammer, Fake or Compromised Account? A Tool to Reveal True Identity in Real-Time.
Cybern. Syst., 2018

2017
A Framework for Generating Malware Threat Intelligence.
Scalable Comput. Pract. Exp., 2017

Smart patrolling: An efficient road surface monitoring using smartphone sensors and crowdsourcing.
Pervasive Mob. Comput., 2017

A smartphone based technique to monitor driving behavior using DTW and crowdsensing.
Pervasive Mob. Comput., 2017

Malware Threat Assessment Using Fuzzy Logic Paradigm.
Cybern. Syst., 2017

Quantifying Personal Exposure to Spatio-Temporally Distributed Air Pollutants using Mobile Sensors.
Proceedings of the First ACM Workshop on Mobile Crowdsensing Systems and Applications, 2017

2016
Behavioral analysis and classification of spammers distributing pornographic content in social media.
Soc. Netw. Anal. Min., 2016

Tools & Techniques for Malware Analysis and Classification.
Int. J. Next Gener. Comput., 2016

Preventing Identity Disclosure in Social Networks Using Intersected Node.
Int. J. Inf. Secur. Priv., 2016

Followers or Fradulents? An Analysis and Classification of Twitter Followers Market Merchants.
Cybern. Syst., 2016

Poster: SmartTrafMoniSys: Smartphone based Traffic Monitoring and Management System.
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016

Poster: Air Quality Friendly Route Recommendation System.
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016

Poster: Smart-Phones as Active Sensing Platform for Road Safety Solutions.
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016

Zero-day malware detection.
Proceedings of the Sixth International Symposium on Embedded Computing and System Design, 2016

Finding occupancy in buses using crowdsourced data from smartphones.
Proceedings of the 17th International Conference on Distributed Computing and Networking, 2016

A Novel Approach to Evade Attacks in Online Social Networks.
Proceedings of the 6th International Conference on Communication and Network Security, 2016

A Novel Technique to Characterize Social Network Users: Comparative Study.
Proceedings of the 6th International Conference on Communication and Network Security, 2016

2015
EEG based detection of area of interest in a web page.
Proceedings of the 2015 International Conference on Advances in Computing, 2015

Improving public transportation through crowd-sourcing.
Proceedings of the 7th International Conference on Communication Systems and Networks, 2015

GSM-based positioning for public transportation commuters.
Proceedings of the 7th International Conference on Communication Systems and Networks, 2015

2014
Detecting Malicious Users in Twitter using Classifiers.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

An Approach of Privacy Preserving based Publishing in Twitter.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

Classification of PE Files using Static Analysis.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

Integrated Framework for Classification of Malwares.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

Friend or Foe: Twitter Users under Magnification.
Proceedings of the Distributed Computing and Internet Technology, 2014

2010
Deployment and evaluation of IEEE 802.11 based wireless mesh networks in campus environment.
Proceedings of the 4th ACM Workshop on Networked Systems for Developing Regions, 2010

2008
Optimized client side solution for cross site scripting.
Proceedings of the 16th International Conference on Networks, 2008

Non-cryptographic methods of MAC spoof detection in wireless LAN.
Proceedings of the 16th International Conference on Networks, 2008

2006
Dynamic Data-Driven Application Systems for Empty Houses, Contaminat Tracking, and Wildland Fireline Prediction.
Proceedings of the Grid-Based Problem Solving Environments, 2006


  Loading...