default search action
Divya Bansal
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j27]Jaspal Kaur Saini, Divya Bansal:
Computational techniques to counter terrorism: a systematic survey. Multim. Tools Appl. 83(1): 1189-1214 (2024) - 2023
- [j26]Chesta Sofat, Divya Bansal:
RadScore: An Automated Technique to Measure Radicalness Score of Online Social Media Users. Cybern. Syst. 54(4): 406-431 (2023) - [j25]Shubhangi Rastogi, Divya Bansal:
A review on fake news detection 3T's: typology, time of detection, taxonomies. Int. J. Inf. Sec. 22(1): 177-212 (2023) - 2022
- [j24]Megha Chaudhary, Sachin Vashistha, Divya Bansal:
Automated Detection of Anti-National Textual Response to Terroristic Events on Online Media. Cybern. Syst. 53(8): 702-715 (2022) - [j23]Sanjay Madan, Sanjeev Sofat, Divya Bansal:
Tools and Techniques for Collection and Analysis of Internet-of-Things malware: A systematic state-of-art review. J. King Saud Univ. Comput. Inf. Sci. 34(10 Part B): 9867-9888 (2022) - [j22]Shubhangi Rastogi, Divya Bansal:
Disinformation detection on social media: An integrated approach. Multim. Tools Appl. 81(28): 40675-40707 (2022) - [j21]Megha Chaudhary, Divya Bansal:
Open source intelligence extraction for terrorism-related information: A review. WIREs Data Mining Knowl. Discov. 12(5) (2022) - [c23]Chesta Sofat, Shabeg Singh Gill, Divya Bansal:
Full/Regular Research Paper submission to (CSCI-RTCW): Multi Class Classification of Online Radicalization Using Transformer Models. CSCI 2022: 1034-1038 - 2021
- [j20]Shubhangi Rastogi, Divya Bansal:
Visualization of Twitter Sentiments on Kashmir Territorial Conflict. Cybern. Syst. 52(8): 642-669 (2021) - [j19]Amardeep Singh, Monika Singh, Divya Bansal, Sanjeev Sofat:
Optimised K-anonymisation technique to deal with mutual friends and degree attacks. Int. J. Inf. Comput. Secur. 14(3/4): 281-299 (2021) - [j18]Parmod Kalia, Divya Bansal, Sanjeev Sofat:
A hybrid approach for preserving privacy for real estate data. Int. J. Inf. Comput. Secur. 15(4): 400-410 (2021) - [j17]Parmod Kalia, Divya Bansal, Sanjeev Sofat:
Privacy Preservation in Cloud Computing Using Randomized Encoding. Wirel. Pers. Commun. 120(4): 2847-2859 (2021) - [c22]Shubhangi Rastogi, Shabeg Singh Gill, Divya Bansal:
An Adaptive Approach for Fake News Detection in Social Media: Single vs Cross Domain. CSCI 2021: 1401-1405 - [c21]Shubhangi Rastogi, Divya Bansal:
Time is Important in Fake News Detection: a short review. CSCI 2021: 1441-1443 - 2020
- [j16]Anuj Dimri, Harsimran Singh, Naveen Aggarwal, Bhaskaran Raman, K. K. Ramakrishnan, Divya Bansal:
BaroSense: Using Barometer for Road Traffic Congestion Detection and Path Estimation with Crowdsourcing. ACM Trans. Sens. Networks 16(1): 4:1-4:24 (2020)
2010 – 2019
- 2019
- [j15]Arushi Sharma, Ekta Gandotra, Divya Bansal, Deepak Gupta:
Malware Capability Assessment using Fuzzy Logic. Cybern. Syst. 50(4): 323-338 (2019) - [j14]Monika Singh, Amardeep Singh, Divya Bansal, Sanjeev Sofat:
An Analytical Model for Identifying Suspected Users on Twitter. Cybern. Syst. 50(4): 383-404 (2019) - [j13]Jaspal Kaur Saini, Divya Bansal:
A Comparative Study and Automated Detection of Illegal Weapon Procurement over Dark Web. Cybern. Syst. 50(5): 405-416 (2019) - [j12]Ekta Gandotra, Divya Bansal, Sanjeev Sofat:
Malware intelligence: beyond malware analysis. Int. J. Adv. Intell. Paradigms 13(1/2): 80-100 (2019) - [i1]Armaan Kaur, Jaspal Kaur Saini, Divya Bansal:
Detecting Radical Text over Online Media using Deep Learning. CoRR abs/1907.12368 (2019) - 2018
- [j11]Monika Singh, Divya Bansal, Sanjeev Sofat:
Who is Who on Twitter-Spammer, Fake or Compromised Account? A Tool to Reveal True Identity in Real-Time. Cybern. Syst. 49(1): 1-25 (2018) - [j10]Amardeep Singh, Divya Bansal, Sanjeev Sofat:
What about Privacy of My OSN Data? Cybern. Syst. 49(1): 44-63 (2018) - [j9]Ravi Bhandari, Bhaskaran Raman, K. K. Ramakrishnan, Deepthi Chander, Naveen Aggarwal, Divya Bansal, Mahima Choudhary, Nisha Moond, Aneesh Bansal, Megha Chaudhary:
CrowdLoc: Cellular Fingerprinting for Crowds by Crowds. ACM Trans. Sens. Networks 14(1): 4:1-4:36 (2018) - 2017
- [j8]Ekta Gandotra, Divya Bansal, Sanjeev Sofat:
Malware Threat Assessment Using Fuzzy Logic Paradigm. Cybern. Syst. 48(1): 29-48 (2017) - [j7]Gurdit Singh, Divya Bansal, Sanjeev Sofat:
A smartphone based technique to monitor driving behavior using DTW and crowdsensing. Pervasive Mob. Comput. 40: 56-70 (2017) - [j6]Gurdit Singh, Divya Bansal, Sanjeev Sofat, Naveen Aggarwal:
Smart patrolling: An efficient road surface monitoring using smartphone sensors and crowdsourcing. Pervasive Mob. Comput. 40: 71-88 (2017) - [j5]Ekta Gandotra, Divya Bansal, Sanjeev Sofat:
A Framework for Generating Malware Threat Intelligence. Scalable Comput. Pract. Exp. 18(3): 195-206 (2017) - [c20]Amanpreet Kaur, Savina Singla, Divya Bansal:
Quantifying Personal Exposure to Spatio-Temporally Distributed Air Pollutants using Mobile Sensors. CrowdSenSys@SenSys 2017: 1-6 - 2016
- [j4]Monika Singh, Divya Bansal, Sanjeev Sofat:
Followers or Fradulents? An Analysis and Classification of Twitter Followers Market Merchants. Cybern. Syst. 47(8): 674-689 (2016) - [j3]Amardeep Singh, Divya Bansal, Sanjeev Sofat:
Preventing Identity Disclosure in Social Networks Using Intersected Node. Int. J. Inf. Secur. Priv. 10(3): 25-41 (2016) - [j2]Ekta Gandotra, Divya Bansal, Sanjeev Sofat:
Tools & Techniques for Malware Analysis and Classification. Int. J. Next Gener. Comput. 7(3) (2016) - [j1]Monika Singh, Divya Bansal, Sanjeev Sofat:
Behavioral analysis and classification of spammers distributing pornographic content in social media. Soc. Netw. Anal. Min. 6(1): 41:1-41:18 (2016) - [c19]Amardeep Singh, Divya Bansal, Sanjeev Sofat:
A Novel Approach to Evade Attacks in Online Social Networks. ICCNS 2016: 70-74 - [c18]Monika Singh, Divya Bansal, Sanjeev Sofat:
A Novel Technique to Characterize Social Network Users: Comparative Study. ICCNS 2016: 75-79 - [c17]Megha Chaudhary, Aneesh Bansal, Divya Bansal, Bhaskaran Raman, K. K. Ramakrishnan, Naveen Aggarwal:
Finding occupancy in buses using crowdsourced data from smartphones. ICDCN 2016: 35:1-35:4 - [c16]Ekta Gandotra, Divya Bansal, Sanjeev Sofat:
Zero-day malware detection. ISED 2016: 171-175 - [c15]Ashutosh Raina, Divya Bansal:
Poster: Smart-Phones as Active Sensing Platform for Road Safety Solutions. MobiSys (Companion Volume) 2016: 74 - [c14]Savina Singla, Divya Bansal, Archan Misra:
Poster: Air Quality Friendly Route Recommendation System. MobiSys (Companion Volume) 2016: 79 - [c13]Chesta Sofat, Divya Bansal:
Poster: SmartTrafMoniSys: Smartphone based Traffic Monitoring and Management System. MobiSys (Companion Volume) 2016: 80 - 2015
- [c12]Ravi Bhandari, Megha Chaudhary, Aneesh Bansal, Bhaskaran Raman, Naveen Aggarwal, Divya Bansal, K. K. Ramakrishnan:
GSM-based positioning for public transportation commuters. COMSNETS 2015: 1-5 - [c11]Anirudh Vemula, Nikhil Patil, Vivek Paharia, Aneesh Bansal, Megha Chaudhary, Naveen Aggarwal, Divya Bansal, K. K. Ramakrishnan, Bhaskaran Raman:
Improving public transportation through crowd-sourcing. COMSNETS 2015: 1-6 - [c10]Divya Bansal, Joy Bose, Ankit Kumar:
EEG based detection of area of interest in a web page. ICACCI 2015: 1320-1325 - 2014
- [c9]Arjun Datt Sharma, Ansuya Ahluwalia, Shaleen Deep, Divya Bansal:
Friend or Foe: Twitter Users under Magnification. ICDCIT 2014: 251-262 - [c8]Amardeep Singh, Divya Bansal, Sanjeev Sofat:
An Approach of Privacy Preserving based Publishing in Twitter. SIN 2014: 39 - [c7]Monika Singh, Divya Bansal, Sanjeev Sofat:
Detecting Malicious Users in Twitter using Classifiers. SIN 2014: 247 - [c6]Ekta Gandotra, Divya Bansal, Sanjeev Sofat:
Integrated Framework for Classification of Malwares. SIN 2014: 417 - [c5]Ashish Saini, Ekta Gandotra, Divya Bansal, Sanjeev Sofat:
Classification of PE Files using Static Analysis. SIN 2014: 429 - 2010
- [c4]Divya Bansal, Sanjeev Sofat:
Deployment and evaluation of IEEE 802.11 based wireless mesh networks in campus environment. NSDR 2010: 15
2000 – 2009
- 2008
- [c3]Richa Bansal, Siddharth Tiwari, Divya Bansal:
Non-cryptographic methods of MAC spoof detection in wireless LAN. ICON 2008: 1-6 - [c2]Siddharth Tiwari, Richa Bansal, Divya Bansal:
Optimized client side solution for cross site scripting. ICON 2008: 1-4 - 2006
- [c1]Craig C. Douglas, Divya Bansal, Jonathan D. Beezley, Lynn S. Bennethum, Soham Chakraborty, Janice L. Coen, Yalchin Efendiev, Richard E. Ewing, Jay Hatcher, Mohamed Iskandarani, Christopher R. Johnson, Deng Li, Minjeong Kim, Robert A. Lodder, Jan Mandel, Guan Qin, Anthony Vodacek:
Dynamic Data-Driven Application Systems for Empty Houses, Contaminat Tracking, and Wildland Fireline Prediction. Grid-Based Problem Solving Environments 2006: 255-272
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint