Sangeeta Mittal

Orcid: 0000-0002-8323-7681

According to our database1, Sangeeta Mittal authored at least 33 papers between 2011 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A fully flexible key delegation mechanism with efficient fine-grained access control in CP-ABE.
J. Ambient Intell. Humaniz. Comput., 2023

Explaining URL Phishing Detection by Glass Box Models.
Proceedings of the 2023 Fifteenth International Conference on Contemporary Computing, 2023

2022
Comparative Study of the Different Variants of the DV-Hop Based Node Localization Algorithms for Wireless Sensor Networks.
Wirel. Pers. Commun., 2022

Design and Implementation of a Quantitative Network Health Monitoring and Recovery System.
Wirel. Pers. Commun., 2022

HE3: A hierarchical attribute based secure and efficient things-to-fog content sharing protocol.
J. King Saud Univ. Comput. Inf. Sci., 2022

Bayesian Nash Equilibrium based Gaming Model for Eco-safe Driving.
J. King Saud Univ. Comput. Inf. Sci., 2022

A machine learning pipeline for fuel-economical driving model.
Int. J. Intell. Comput. Cybern., 2022

Energy-Efficient Node Localization Algorithm Based on Gauss-Newton Method and Grey Wolf Optimization Algorithm: Node Localization Algorithm.
Int. J. Fuzzy Syst. Appl., 2022

Authority revocation scheme for MA-CP-ABE-based secure communication in IoMT ecosystem.
Int. J. Appl. Cryptogr., 2022

Internet of Medical Things (IoMT) Security and Privacy: A Survey of Recent Advances and Enabling Technologies.
Proceedings of the 2022 Fourteenth International Conference on Contemporary Computing, 2022

2021
iABC-AL: Active learning-based privacy leaks threat detection for iOS applications.
J. King Saud Univ. Comput. Inf. Sci., 2021

A survey of node localisation algorithms in wireless sensor networks.
Int. J. High Perform. Comput. Netw., 2021

A Novel Threshold Secret Sharing Scheme for CP-ABE: A secret sharing approach for CP-ABE.
Proceedings of the IC3 2021: Thirteenth International Conference on Contemporary Computing, Noida, India, August 5, 2021

2020
A Privacy Preserving and Efficient Multi Authority - CP-ABE Scheme for Secure Cloud Communication.
J. Cyber Secur. Mobil., 2020

Computational Techniques for Real-Time Credit Card Fraud Detection.
Proceedings of the Handbook of Computer Networks and Cyber Security, 2020

2019
A Novel Data Mining Approach for Analysis and Pattern Recognition of Active Fingerprinting Components.
Wirel. Pers. Commun., 2019

iShield: A Framework for Preserving Privacyof iOS App User.
J. Cyber Secur. Mobil., 2019

Real Time License Plate Recognition from Video Streams using Deep Learning.
Int. J. Inf. Retr. Res., 2019

A Secure Key Delegation Mechanism for Fog Networking.
Proceedings of the 2019 Twelfth International Conference on Contemporary Computing, 2019

2018
iABC: Towards a hybrid framework for analyzing and classifying behaviour of iOS applications using static and dynamic analysis.
J. Inf. Secur. Appl., 2018

Robust Real Time Breaking of Image CAPTCHAs Using Inception v3 Model.
Proceedings of the 2018 Eleventh International Conference on Contemporary Computing, 2018

Determination of Optimal Thread Pool for Cloud Based Concurrent Enhanced No-Escape Search.
Proceedings of the 2018 Eleventh International Conference on Contemporary Computing, 2018

Network Forensics Analysis of iOS Social Networking and Messaging Apps.
Proceedings of the 2018 Eleventh International Conference on Contemporary Computing, 2018

2017
Development of Computer Algorithm for Editing of Next Generation Sequencing Metagenome Data.
J. Comput. Biol., 2017

Performance Evaluation of Openflow SDN Controllers.
Proceedings of the Intelligent Systems Design and Applications, 2017

Implementation of Ciphertext Policy-Attribute Based Encryption (CP-ABE) for fine grained access control of university data.
Proceedings of the Tenth International Conference on Contemporary Computing, 2017

Disassembling and patching iOS applications at assembly level.
Proceedings of the Tenth International Conference on Contemporary Computing, 2017

No-escape search: Design and implementation ofcloud based directory content search.
Proceedings of the Tenth International Conference on Contemporary Computing, 2017

2016
Unmasking non-simultaneous sybils in mobile opportunistic networks.
Proceedings of the Ninth International Conference on Contemporary Computing, 2016

2014
Effect of Choice of Discretization Methods on Context Extraction from Sensor Data - An Empirical Evaluation.
Proceedings of the Distributed Computing and Internet Technology, 2014

A novel Bayesian Belief Network structure learning algorithm based on bio-inspired monkey search meta heuristic.
Proceedings of the Seventh International Conference on Contemporary Computing, 2014

2012
Situation recognition in sensor based environments using concept lattices.
Proceedings of the CUBE International IT Conference & Exhibition, 2012

2011
A review of some Bayesian Belief Network structure learning algorithms.
Proceedings of the 8th International Conference on Information, 2011


  Loading...