Umashankar Rawat
Orcid: 0000-0002-1293-1836
According to our database1,
Umashankar Rawat
authored at least 19 papers
between 2009 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
SOCIET: Second-order cellular automata and chaotic map-based hybrid image encryption technique.
Multim. Tools Appl., March, 2024
SORCHIC: A Hybrid Image Cipher for IoT Applications Using Second Order Reversible Cellular Automata.
IEEE Access, 2024
IEEE Access, 2024
2023
An Energy Efficient, Robust, Sustainable, and Low Computational Cost Method for Mobile Malware Detection.
Appl. Comput. Intell. Soft Comput., 2023
Proceedings of the 16th International Conference on Security of Information and Networks, 2023
Defending the Cloud: Understanding the Role of Explainable AI in Intrusion Detection Systems.
Proceedings of the 16th International Conference on Security of Information and Networks, 2023
2022
A Low Computational Cost Method for Mobile Malware Detection Using Transfer Learning and Familial Classification Using Topic Modelling.
Appl. Comput. Intell. Soft Comput., 2022
Proceedings of the 8th International Conference on Advanced Intelligent Systems and Informatics, 2022
2021
Secur. Commun. Networks, 2021
IEVCA: An efficient image encryption technique for IoT applications using 2-D Von-Neumann cellular automata.
Multim. Tools Appl., 2021
J. Inf. Secur. Appl., 2021
2020
IECA: an efficient IoT friendly image encryption technique using programmable cellular automata.
J. Ambient Intell. Humaniz. Comput., 2020
PCHET: An efficient programmable cellular automata based hybrid encryption technique for multi-chat client-server applications.
J. Inf. Secur. Appl., 2020
Color image encryption using non-dominated sorting genetic algorithm with local chaotic search based 5D chaotic map.
Future Gener. Comput. Syst., 2020
2019
Wirel. Networks, 2019
IEEE Access, 2019
2016
Chaotic Map for Securing Digital Content: A Progressive Visual Cryptography Approach.
Int. J. Rough Sets Data Anal., 2016
2012
Int. J. Inf. Secur. Priv., 2012
2009
CoRR, 2009