System call analysis of android malware families S Malik, K Khatter Indian Journal of Science and Technology, 2016 | 51 | 2016 |
Deep learning model for automatic classification and prediction of brain tumor S Sharma, S Gupta, D Gupta, A Juneja, H Khatter, S Malik, ZK Bitsue Journal of Sensors 2022, 1-11, 2022 | 24 | 2022 |
Malicious application detection and classification system for android mobiles S Malik, K Khatter Cognitive Analytics: Concepts, Methodologies, Tools, and Applications, 122-142, 2020 | 18 | 2020 |
Security of Wireless Ad-Hoc Network SM Manmohan Chaturvedi, Preeti Aggarwal, Shilpa.Bahl Mobile Electronic Commerce: Foundations, Development, and Applications by …, 2014 | 16* | 2014 |
Privacy and security in mobile cloud computing S Malik, MM Chaturvedi International Journal of Computer Applications 80 (11), 2013 | 14 | 2013 |
International cooperation in cyber space to combat cyber crime and terrorism M Chaturvedi, A Unal, P Aggarwal, S Bahl, S Malik 2014 IEEE Conference on Norbert Wiener in the 21st Century (21CW), 1-4, 2014 | 12 | 2014 |
Exploration of crucial factors involved in plants development using the fuzzy AHP Method H Upadhyay, A Juneja, H Turabieh, S Malik, A Gupta, ZK Bitsue, ... Mathematical Problems in Engineering 2022, 2022 | 9 | 2022 |
Android system call analysis for malicious application detection S Malik International Journal of Computer Sciences and Engineering 5 (11), 105-108, 2017 | 9 | 2017 |
AndroData: a tool for static & dynamic feature extraction of android apps S Malik, K Khatter International Journal of Applied Engineering Research 10 (94), 98-102, 2015 | 9 | 2015 |
BEHAVIOUR ANALYSIS OF ANDROID APPLICATION S Malik, K Khatter | 8 | 2016 |
Privacy & Security of Mobile Cloud Computing M Chaturvedi, S Malik, P Aggarwal, S Bahl Ansal University, Sector 55, 2013 | 4 | 2013 |
Malware detection in Android phones S Malik diplom. de, 2017 | 2 | 2017 |
Ranking and Risk Factor Scheme for Malicious applications detection and Classifications K Khatter, S Malik International Journal of Information System Modeling and Design (IJISMD) 9 …, 2018 | 1 | 2018 |
Anomaly based Intrusion Detection in Android Mobiles: A Review S Malik international journal of engineering and technical research 8 (10), 698-710, 2019 | | 2019 |
Security of wireless ad hoc network M Chaturvedi, P Aggarwal, S Bahl, S Malik Mobile Electronic Commerce: Foundations, Development, and Applications, 73, 2014 | | 2014 |
Hybrid features analysis for intrusion detection in android mobiles S Malik Gurgaon, 0 | | |