Follow
Vikas Kumar Sihag
Vikas Kumar Sihag
Professor of Cyber Security, Sardar Patel University of Police, Security & Criminal Justice, Jodhpur
Verified email at policeuniversity.ac.in
Title
Cited by
Cited by
Year
A survey of android application and malware hardening
V Sihag, M Vardhan, P Singh
Computer Science Review 39, 100365, 2021
692021
De-LADY: Deep learning based Android malware detection using Dynamic features
V Sihag, M Vardhan, P Singh, G Choudhary, S Son
Journal of Internet Services and Information Security (JISIS) 11 (2), 34-45, 2021
552021
BLADE: Robust malware detection against obfuscation in android
V Sihag, M Vardhan, P Singh
Forensic Science International: Digital Investigation 38, 301176, 2021
392021
Cyber security challenges in aviation communication, navigation, and surveillance
G Dave, G Choudhary, V Sihag, I You, KKR Choo
Computers & Security 112, 102516, 2022
372022
A clustering approach for structural k-anonymity in social networks using genetic algorithm
VK Sihag
Proceedings of the CUBE international information technology conference, 701-706, 2012
362012
BERT-based transfer-learning approach for nested named-entity recognition using joint labeling
A Agrawal, S Tripathi, M Vardhan, V Sihag, G Choudhary, N Dragoni
Applied Sciences 12 (3), 976, 2022
272022
Signature based malicious behavior detection in android
V Sihag, A Swami, M Vardhan, P Singh
International Conference on Computing Science, Communication and Security …, 2020
242020
PICAndro: packet inspection-based android malware detection
V Sihag, G Choudhary, M Vardhan, P Singh, JT Seo
Security and Communication Networks 2021, 1-11, 2021
162021
An assistive tool for fileless malware detection
P Borana, V Sihag, G Choudhary, M Vardhan, P Singh
2021 World Automation Congress (WAC), 21-25, 2021
162021
A reactive approach for detection of collusion attacks in P2P trust and reputation systems
NK Saini, VK Sihag, RC Yadav
2014 IEEE International Advance Computing Conference (IACC), 312-317, 2014
152014
Detecting community structure based on traffic at node in networks
VK Sihag, A Anand, R Tomar, J Chandra, R Tiwari, A Dumka, AS Poonia
2014 IEEE Students' Conference on Electrical, Electronics and Computer …, 2014
132014
Counterfeited product identification in a supply chain using blockchain technology
S Singh, G Choudhary, SK Shandilya, V Sihag, A Choudhary
Research Briefs on Information & Communication Technology Evolution 7, 3, 2021
122021
Opcode n-gram based malware classification in android
V Sihag, A Mitharwal, M Vardhan, P Singh
2020 Fourth World Conference on Smart Trends in Systems, Security and …, 2020
122020
Graph based text document clustering by detecting initial centroids for k-means
VK Sihag, S Kumar
International Journal of Computer Applications 62 (19), 1-4, 2013
122013
Wavelength conversion and deflection routing in all-optical packet-switched networks through contention resolution: A survey
A Anand, VK Sihag, SN Gupta
Proceedings of the cube international information technology conference, 155-159, 2012
102012
A Multi-Controller Authentication approach for SDN
C Bhatt, V Sihag, G Choudhary, PV Astillo, I You
2021 International Conference on Electronics, Information, and Communication …, 2021
82021
Hybrid single sign-on protocol for lightweight devices
P Sharma, VK Sihag
2016 IEEE 6th International Conference on Advanced Computing (IACC), 679-684, 2016
82016
Cyber4Drone: A Systematic Review of Cyber Security and Forensics in Next-Generation Drones
V Sihag, G Choudhary, P Choudhary, N Dragoni
Drones 7 (7), 430, 2023
62023
Sandbox environment for real time malware analysis of IoT devices
GP Kachare, G Choudhary, SK Shandilya, V Sihag
International Conference on Computing Science, Communication and Security …, 2022
62022
Forensic analysis of fitness applications on android
R Sinha, V Sihag, G Choudhary, M Vardhan, P Singh
International Symposium on Mobile Internet Security, 222-235, 2021
62021
The system can't perform the operation now. Try again later.
Articles 1–20