International Editorial Board for “ABBE-2014, Second International Conference on Advances in Bioinformatics, Bio-Technology and Environmental Engineering”, Nov. 16-17, 2014, Birmingham, UK. Visit: http://abbe.theired.org/editorial_board.html
International Editorial Board for “Second International Conference on Advances in Social Science, Economics and Management Study - SEM 2014”, 16-17, 2014 at Birmingham, UK Visit: http://sem.theired.org/editorial_board.html
International Editorial Board for “International Journal of Advancements in Mechanical and Aeronautical Engineering” 113, Barksdale Professional CTR, Newark, New Castle County, DE, United States of America. Visit: http://www.ijamae.uamae.org/editorial_board.html
Member of International Editorial Member for “International Conference on Advances in Social Sciences, Economics and Human Behavior –SHE”, 08-09, March, 2014, Kuala Lumpur, Malasiya. Visit: http://seh.theired.org/committee.html
Chair (Organizing Committee) for “2013 IEEE Second International Conference on Image Information Processing (ICIIP -2013)”, December 9-11, 2013, JUIT, Wakanghat, Solan, India. Visit: http://www.juit.ac.in/iciip_2013/tpc.php
Reviewer for 2013 3rd IEEE International conference (IACC), February 22-23, 2013, Gaziabad, India. Visit :http://www.gdeepak.com/iacc13/html/rev.html
Member of Technical / Editorial Board for First International Conference on Advances in Computing, Electronics and Communication. ACEC, 12-13 October, 2013, Zurich, Switzerland. Visit: http://acec.theired.org/editorial_board.html
Invited Speaker, SCIENCE CAMP (under INSPIRE Internship by DST, Govt. of India), during 5th – 9th August, 2013 at AIET, MIA, Alwar.
Member of Editorial Board for International Journal of Computer Networks and Communications Security (IJCNCS)”, Dubai, United Arab Emirates, 26th June 2013 to till date. Visit: http://www.ijcncs.org/editorial.php
Member of Editorial Board for “Journal of Advances in Networks” a part of Science Publishing Group, USA, 14th Dec. 2012 to till date.
Visit: http://www.sciencepublishinggroup.com/journal/editorialboard.aspx?journalid=131
-
Member of Editorial Board “COMPUSOFT-International Journal of Advanced Computer Technology (IJACT)”, UK, 6th Nov. 2012 to till date. Visit: http://ijact.in/ijact_editorial_board.php
-
Reviewer for “International Conference on Advances in Computer, Electronics and Electrical Engineering – CEEE”, 20-21 April, 2013, Mumbai, India. Visit: http://theired.org/ceee/editors.html
-
Reviewer for “The Second IEEE International Conference on Parallel, Distributed and Grid Computing - PDGC -2012”, December 6-8, 2012, JUIT, Wakanghat, Solan, India.
-
Senior Member of Universal Association of Computer and Electronics Engineers (UACEE) since 27th September 2012. Visit: http://www.uacee.org/
-
Reviewer for one of the HINDAWI International Journals named “Discrete Dynamics in Nature and Society” since 19th September, 2012.
-
CAMP Coordinator, SCIENCE CAMP (under INSPIRE Internship by DST, Govt. of India), during 6th – 10th August, 2012 at AIET, MIA, Alwar.
-
Reviewer of the “International Journal of Network Security & Its Applications (IJNSA)” since 2012 to till date.
-
Member of Advisory Committee of the National Level Mathematics Olympiad-12 during 16th – 17th March, 2012 at IET, MIA, Alwar.
-
Organizing Secretary of the National Workshop on Android Operating System and Application Development in association with EISystems during 18th – 19th February, 2012 at Alwar Institute of Engineering & Technology, MIA, Alwar.
-
Coordinator of Workshop on Information Storage & Management Sponsored by CSI, India and SRU, Alwar. Held on 23rd and 24th January 2012 at Alwar Institute of Engineering & Technology, MIA, Alwar, Rajasthan.
-
Organizing Secretary of National Conference on Recent Trends in Data Mining funded by AICTE, Govt. of India, New Delhi and CSIR, Govt. of India, New Delhi (Likely). Held on 3rd and 4th September, 2011 at Orissa Engineering College, Bhubaneswar.
-
Invited Speaker, National Conference on Communication, Network & Security, Institute of Engineering & Technology, MIA, Alwar, 26-27 February, 2011 (Topic: Cyber War, Cyber Terrorism & Cyber Espionage).
-
Organizing Secretary of the National conference “Brain Storming Session on Cyber Attacks & Defense” funded by DST, Govt. of India, New Delhi and CSIR, Govt. of India, New Delhi. Held on 7th and 8th November, 2009 at Orissa Engineering College, Bhubaneswar.
-
Reviewer of the International Journal of Taylor Frances named “Enterprise Information Systems” since 2007 to till date.
-
Member of Editorial & Advisory Board of Journal of Theoretical and Applied Information Technology (JATIT). Visit: http://www.jatit.org/Editorial_Board.php
Publications:
Journal Publications(34)
|
2015
|
Gautam Kumar, Hemraj Saini, Formal Verification on Signcryption Re-Cryptography: Secure and Efficient Approach towards Trust Problem, International Journal of Applied Engineering Research (IJAER), Volume 10, Number 24, pp 44271-44277, 2015. Available at: http://www.ripublication.com/Volume/ijaerv10n24.htm
|
Aswain Kumar Rauta, Yerra Shankar Rao, T. C. Panda, Hemraj Saini, A Probabilistic Approach Using Poisson Process for Detecting the Existence of Unknown Computer Virus in Real Time, International Journal Of Engineering And Science (IJES), Vol. 4(6), pp. 47-51, 2015. Available at: www.theijes.com/papers/v4-i6/Version-1/G0461047051.pdf
|
S.B. Dash, H. Saini, T.C. Panda, A., “Mishra, Predator-Prey model for Infectious Virtual Machines in IaaS Cloud Environment based on Lakota-Volterra Equation”, Asian Journal of Information Technology (AJIT), Vol.-xx, Issue-yy, pp.-xx-yy (To be appeared). 2015.
Available at: http://www.medwelljournals.com/journalhome.php?jid=1682-3915
|
Geetanjali Rathee, Ninni Singh, Hemraj Saini, “Efficient Shortest Path Routing (ESPR) Algorithm for Multicasting in Wireless Mesh Network", International Journal of Computer Technology & Applications (IJCTA), Vol 6 (1),pp.-111-115, 2015. Available at:
http://www.ijcta.com/documents/volumes/vol6issue1/ijcta2015060120.pdf
|
2014
|
Hemraj Saini, Sitanshu Mishra, T.C.Panda, “Proactive Security Framework for Online Business Web Portals with Implementation Details”, International Journal of Safety and Security (IJSS), Vol. 3(2), pp.-156-164, 2014. Available at: http://ijiss.org/ijiss/index.php/ijiss/article/view/63/pdf_15
|
S. B. Dash, Hemraj Saini, T.C.Panda, A. Mishra, A Theoretical Aspect of Cloud Computing Service Models and Its Security Issues: A Paradigm, International Journal of Engineering Research and Applications (IJERA), Vol. 4(6), June 2014.
Available at: http://www.ijera.com/papers/Vol4_issue6/Version%202/AJ04602248254.pdf
|
S.B.Dash, Hemraj Saini , T.C.Panda, A. Mishra, Service Level Agreement Assurance in Cloud Computing: A Trust Issue, International Journal of Computer Science and Information Technologies, Vol. 5 (3) , 2014, 2899-2906.
Available at: http://ijcsit.com/docs/Volume%205/vol5issue03/ijcsit2014050349.pdf
|
Hemraj Saini, 1-2 Skip List Approach for Efficient Security Checks in Wireless Mesh Networks, International Journal of Electronics and Information Engineering, Vol.1(1), pp.9-15, Sept. 2014. Available at: http://isrc.ccs.asia.edu.tw/ijeie/articles/v01n01/ijeie-2014-v01-n01-p009-015.pdf
|
2013
|
Hemraj Saini, Kapil Dev Sharma, Pankaj DadheechAuthor, T.C.Panda, “Enhanced 4-way Handshake Process in IEEE802.11i with Cookies”, International Journal of Information & Network Security (IJINS), Vol.2, No.3, June 2013, pp. 229~238. Available at:
http://iaesjournal.com/online/index.php/IJINS/article/view/2088/771
|
Hemraj Saini, L.K.Sharma, T.C.Panda, H.N.Pratihari, Extended Cell Planning for Capacity Expansion and Power Optimization by Using MEMETIC Algorithm, International Journal of Wireless Networks and Broadband Technology (IJWNBT), Vol-2, Issue-2, pp.-36-46. Available at: http://www.igi-global.com/article/extended-cell-planning-for-capacity-expansion-and-power-optimization-by-using-memetic-algorithm/85004
|
S.B.Dash, Hemraj Saini, A.Sharma, T.C.Panda. Prediction of Trustworthiness in the Cloud Computing Environment using Predator-Prey Model. International Journal of Cloud Computing and Service Science (IJ-CLOSER), Vol.-2, Issue-5, pp.-336-344, DOI: 10.11591/closer.v2i5.4906. Available at: http://iaesjournal.com/online/index.php/IJ-CLOSER/article/view/4906/pdf
|
2012
|
Om Prakash Singh, Hemraj Saini, S. Kalaivani, “A USB Based ECG Portable System and Analysis of Cardiovascular Diseases”, International Journal of Scientific and Engineering Research (IJSER), Volume-3, Issue-3, pp.-1-11. Available at: http://www.ijser.org/onlineResearchPaperViewer.aspx?A-USB-Based-ECG-Portable-System-and-Analysis-of-Cardiovascular-Diseases.pdf
|
Hemraj Saini, Yerra Sankar Rao, T.C.Panda, “Cyber-Crimes and their Impacts: A Review”, International Journal of Engineering Research and Applications (IJERA), Vol. 2, Issue 2,Mar-Apr 2012, pp.202-209. Available at: http://www.ijera.com/papers/Vol2_issue2/AG22202209.pdf
|
Hemraj Saini, Varun Singhal, Lokesh Goyal, “CYBROG: A Survey” International Journal of Science Technology and Management (IJSTM), Vol.-3, Issue-1, pp. 77-86. Available at: http://www.ijstm.com/papers/ijstm_120408.pdf
|
Hemraj Saini, Sanchita Arya, “Testing for Embedded Systems with Proposed Modular Architecture of Automated Test Case Generator” International Journal of Advanced Software Engineering (IJASE), Vol.-2, Issue-1, pp. 7-18. Available At: http://www.ripublication.com/Volume/ijasev2n1.htm
|
2011
|
L.K. Sharma, H.N. Pratihari, Hemraj Saini, T.C. Panda, Mita Debgoswami, “Optimized Frequency Cell Planning for GSM”, International Journal of Environmental Engineering and Management, Volume 2, Number 1 (2011), pp. 57-67. Available at: http://www.ripublication.com/Volume/ijeemv2n1.htm
|
Hemraj Saini, Bimal Kumar Mishra, T.C.Panda “Computing a Degree of a Business Portal which Propagates the Information from the Network of Related Business Portals”, International Journal of Web Portals, Volume-3, Issue-2, pp.-14-22, April-June 2011.Available at: http://www.igi-global.com/article/international-journal-web-portals-ijwp/55108
|
Hemraj Saini, Bimal Kumar Mishra, H.N.Pratihari, T.C.Panda, “Extended Honeypot Framework to Detect Old/New Cyber Attacks, International Journal of Engineering Science & Technology, Issue-3, Number-3, pp. – 2227-2232.
Available at: http://www.ijest.info/docs/IJEST11-03-03-239.pdf
|
Hemraj Saini, H.N.Pratihari, “Extending the Performance and quality of Search Engine via Software Test Case Generation”, International Journal of Computer Science and Engineering Research and Development (IJCSERD), ISSN 2248-9363 (Print), ISSN 2248-9371 (Online) Volume 1, Number 2, May-October (2011), pp.-8-27. Available at: http://www.prjpublication.com/Abstract.asp
|
Hemraj Saini, Sitansu Mishra, Priyabrata Sahoo, “Defense against Trojans by using Honeypots”, IUP Journal of Science & Technology, Vol. 7, No. 3, September 2011, pp. 49-61, 2011.Available at: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2101622
|
Hemraj Saini, T. C. Panda, Minaketan Panda, “Prediction of Malicious Objects in Computer Network and Defense”, International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, November 2011, pp.-161-171, 2011. Available at: http://airccse.org/journal/nsa/1111nsa12.pdf
|
Hemraj Saini, H.N.Paratihari, “Dynamic Population Models for Single Species of Malicious Objects”, International Journal of Information Science and Computer Mathematics, Volume 4, Issue 1,pp.-29 - 38.
Available at: http://www.pphmj.com/article.php?act=art_abstract_show&art_id=6406&flag=prev
|
2010
|
Bimal Kumar Mishra, Hemraj Saini, “Cyber Attack Classification by Game Theoretic Weighted Metrics Approach”, World Appl. Science Journal, 7 (Special Issue of Computer & IT) [ISSN 1818.4952], pp. 206-215, 2009. Available at: http://www.idosi.org/wasj/wasj7(c&it)/27.pdf
|
Hemraj Saini, T.C.Panda, Bimal Kumar Mishra, Minaketan Panda, “Dynamics for Proactive Defense through Self-hardening in the Presence or Absence of Anti Malicious Software”, International Journal of Computer Applications [ISSN: 0975 – 8887], Volume 1 – No. 14, pp. 81-85, February 2010. Available at: http://www.ijcaonline.org/archives /number14/296-460
|
Hemraj Saini, T.C.Panda, “Extended Cyber Defense Architecture for a University –A Case study”, The IUP Journal of Science & Technology [ISSN: 0973-2268], Vol. 6, No. 2, pp. 33-47, June 2010,
Available at: http://www.iupindia.org/Science_Technology. asp
|
L.K.Sharma, Hemraj Saini, T.C.Panda, H.N.Pratihari, “Taxonomy of Cell Planning”, International Journal on reviews on Computing, Vol. 3, Issue-3, pp. 66-74, June 2010.
Available at: www.ijric.org
|
B.K. Mishra, Hemraj Saini, T.C.Panda, “Region-Based Centralized Decentralized Cooperative Audit (RBCDCA) Framework for Large Computer Networks”, International Journal of Mathematical Modeling Simulation and Application, Vol.-3, Issue-3, pp. 14-23, July, 2010.
Available at: www.sites.google.com/site/ijmmsa
|
2009
|
H. Saini, D. Saini, N. Gupta, “E-Business System Development: Review on Methods, Design Factors, Techniques and Tools with an Extensive Case Study for Secure Online Retail Selling Industry” Indian Journal of Science and Technology, Vol.2 No 5 (May 2009), [ISSN: 0974-6846], PP. 82-90.
Available at: http://www.indjst.org/current/may09 sainis.pdf
|
Hemraj Saini, “Queuing Model for Malicious Attack Detection” (June 17, 2009). The Icfai University Journal of Information Technology [ISSN: 0973-2896], Vol. V, No. 2, pp. 16-27, June 2009.
Available at SSRN: http://ssrn.com/abstract=1421597
|
Hemraj Saini, Dinesh Kumar Saini, Nirmal Gupta, “Cyber Defense Architecture in Campus Wide Network System” International Journal of Theoretical and Applied Information Technology (JATIT)-(E-ISSN 1817-3195, ISSN 1992-8645) (Accepted).
Available at: http://www.jatit.org/index.php
|
2008
|
Hemraj Saini, Dinesh Saini, "VAIN: A Stochastic Model for Dynamics of Malicious Objects" ICFAI journal of Systems Management [ISSN: 0972-6896], Vol. 6, No. 1, February 2008, pp. 14-28.
Available at: http://www.iupindia.org /208/ijsym.asp?mag=http://www.iupindia.org/208/ijsym_sub.asp
|
N. Gupta, D. Saini, H. Saini, “Class Level Test Case Generation in Object Oriented Software Testing” International Journal of Information Technology and Web Engineering [ISSN: 1554-1045; EISSN: 1554-1053], 3(2), 18-26, April-June 2008. Available at:
http://www.igiglobal.com/journals/details.asp?ID=4768&mode=toc&volume= International +Journal+of+Information+Technology+and+Web+Engineering,+Vol.++3,+Issue+2
|
2007
|
Hemraj Saini, Dinesh Saini, "Malicious Object dynamics in the presence of Anti Malicious Software" European Journal of Scientific Research, [ISSN: 1450-216X], October 2007, volume-18, Issue-3, pp.-491-499. Available at: http://www.eurojournals.com/ejsr%2018%203.pdf
|
Hemraj Saini, Dinesh Saini, "Proactive cyber Defense and Reconfigurable Framework of Cyber Security" International journal named International Review on Computer and Software (IRECOS), [ISSN: 1828-6003], Volume-2, Issue-2, March, 2007, pp.-89-97. Available at: http://www.praiseworthyprize.com/IRECOS_ vol_2_n_2.html#Proactive_Cyber_Defense_and_Reconfigurable_Framework_for_Cyber_Security
|
Conference Publications (28)
|
2015
|
Geetanjali Rathee, Hemraj Saini, On Reduced Computational Cost, Efficient and Secure Routing (ESR) for Wireless Mesh Network, Proceedia Computer Science Journal (Elsevier), Second International Symposium on Computer Vision and the Internet (VisionNet’15), 10-13 August, 2015, SCMS Group of Institutions, Corporate Office Campus, Prathap Nagar , Muttom, Aluva, Kochi (Ernakulam) , Kerala , India, Vol. 58, pp.333-341.
|
Gautam Kumar, Hemraj Saini, Secure Composition of ECC-PAKE Protocol for Multilayer Consensus using Signcryption, Fifth IEEE International Conference on Communication Systems and Network Technologies (CSNT-2015), 4-6 April, 2015, Machine Intelligence research Labs, Gwalior and Sponsored by ShriRam Group of Institutes, Gwalior, pp.xx-yy. IEEE Explorer
|
Geetanjali Rathee, Hemraj Saini, Satya Prakash Ghrera, Secured Authentication and Signature Routing Protocol for WMN (SASR), 2nd International Conference on Computer and Communication Technologies - IC3T 2015, 24-26 July, 2015, CMR Technical Campus, Affiliated to JNTUH, Hyderabad- 501401, Telengana, India, pp.xx-yy. IEEE Explorer
|
Ninni Singh, Hemraj Saini, Formal Verification of Secure Authentication in Wireless Mesh Network (SAWMN), 2nd International Conference on Computer and Communication Technologies - IC3T 2015, 24-26 July, 2015, CMR Technical Campus, Affiliated to JNTUH, Hyderabad- 501401, Telengana, India, pp.xx-yy. IEEE Explorer
|
2014
|
Hemraj Saini, Predator-Prey Model Dynamics of Exposed Computer Nodes and Infectious Computer Nodes in a Computer Network, 4th IEEE International Advance Computing Conference (IEEE IACC-2014), ITM University, Gurgaon, 21-22 February, 2014, pp.-985-990. DOI: 10.1109/IAdCC.2014.6779457
Note: Proceeding are on IEEE Explorer
|
Tanu Bharadwaj, Hemraj Saini, Effective Detection of Jamming in WiMAX Based Communication Systems, IEEE International Conference On Recent Advances and Innovations in Engineering (ICRAIE-2014), 09-11, May – 2014 (Accepted).
Note: Proceeding will be on IEEE Explorer
|
2013
|
Hemraj Saini, Kapil Dev sharma, T.C.Panda (2013), Enhanced Cooperative Agent Framework with Security and Increased Performance of the Computer Network, 2013 IEEE International Conference on Information Systems & Computer Networks (ISCON), GLA University, Mathura, 9-10 March, 2013, pp.-191-194.
Note: Proceeding are on IEEE Explorer
|
Hemraj Saini, L.K.Sharma, T.C.Panda, H.N.Pratihari (2013), Extended Cell Planning for Capacity Expansion and Power Optimization by Using MEMETIC Algorithm, 2nd International Conference on Eco-friendly Computing and Communication Systems (ICECCS), JUIT, Wakanaghat, Solan. (Accepted and Withdrawn)
Note: Proceeding will be on Communications in Computer and Information Science (CCIS) and hosted in the Springer Link digital library
|
2012
|
Hemraj Saini, Enhanced Cooperative Agent Framework with Increases Performance of the Computer Network, 1st Bi-Annual Conference of Jharkhand Society of Mathematical Sciences, November, 22-23, 2012, UGC Academic Staff College, Ranchi University, Morabadi Campus, Ranchi.
|
Hemraj Saini, Sitansu Mishra, T.C.Panda (2012), Secure compression of Bitmap Charater in Transmission with the help of Neural Networks. National Conference on Science for Shaping the Furure (On the occassion of Odisha Bigyan Congress), October 18-19, 2012, Departmetn of Geology, Utkal University, Bhubaneswar.
|
Hemraj Saini (2012), Identification of Malicious Traffic Using Data Classification Through Modified Teaching Learning Based Optimization. National Conference on Recent Trends in Mathematics and their Applications, Vinoba Bhave University, Hazaribagh, Jharkhand, 21-22 December, 2012.
|
2011
|
Hemraj Saini, T.C.Panda, L.K. Sharma, “Detecting Attacks by Shared Double Honeypots to Secure the Processing of Consumer Electronic”, Proceedings of the Conference on Communication, Network & Security, Institute of Engineering & Technology, MIA, Alwar, 26-27 February, 2011, pp.-25-29.
|
Saini, Dinesh Kumar Maskari, Sanad Al Saini, Hemraj, “Malicious Objects Trafficking in the Network”, Digital Content, Multimedia Technology and its Applications (IDCTA), 2011 7th International Conference on (At IEEE Explorer), 16-18 Aug. 2011, Busan, Korea (South), pp.- 64 – 69.
|
Hemraj Saini, Bimal Kumar Mishra, T.C.Panda, FUZZY LOGIC APPROACH TO ESTIMATING IN TRAFFIC BEHAVIOR, Conference on Mathematical & Statistical Modeling in Innovative Areas (MASTMIA’11), 19-20 October, 2011, Birla Institute of Technology, Ranchi, pp.-136-143.
|
L.K.Sharma, Hemraj Saini, H.N.Pratihari, T.C.Panda, Interoperability between 3G Systems to GSM, Proceedings of International Conference on VCAN, IET, MIA, Alwar, December, 24-25, 2011, Vol.1, pp. 161-173.
|
2010
|
Dinesh Kumar Saini, Osama A. Rahmeh, Hemraj Saini, “Extended Secure Architecture of HIS: HL7”, DBLP Proceedings of The BIOCOMP 2010, pp.- 617-623, Monte Carlo Resort, Las Vegas, Nevada, USA, 12th-15th July, 2010. http://www.informatik.uni-trier.de/~ley/db/conf/biocomp/biocomp2010.html#SainiRS10
|
Dinesh Kumar Saini, Wail M. Omar, Hemraj Saini, “Cyber Defense Architecture for Campus Intranet”, DBLP Proceedings of The SAM'10 - International Conference on Security and Management, 2010, pp.- 87-93, Monte Carlo Resort, Las Vegas, Nevada, USA, 12th-15th July, 2010
http://www.informatik.uni-trier.de/~ley/db/conf/csreaSAM/csreaSAM2010.html# SainiOS10
|
Hemraj Saini, Bimal Kumar Mishra, “Computing a Degree of a Business Portal which Propagates the Information from the Network of Related Business Portals”, 12th International Conference of International Academy of Physical Sciences, December 22-24, 2010, University of Rajasthan, Jaipur (Abstract pp.-38)
|
2009
|
Hemraj Saini, “Malicious Object Dynamics in the Presence of Anti Malicious Software”, Nat. Brain Storming Session on Cyber Attacks & Defense, Sponsored by DST, Govt. of India and CSIR, Govt. of India, 7th-8th Nov., 2009.
|
2008
|
Hemraj Saini, “Cyber Threats and Their Rescue”, A Nat. Sem. at Higher Institute of Electronics, Libya, 22-01-08.
|
2007
|
Rakesh Kumar Sharma, L.K. Sharma, Shirshu Varma, Hemraj Saini, “Performance Evaluation of Approximate DCT Algorithms for Fast Image Coding” Proceedings of IEEE Sponsored International Conference on Recent Applications of Soft Computing In Engineering and Technology (RASIET-07), pp. 369-373, Dec. 22-23, 2007, Alwar (India)
|
Anil Kumar, Hemraj Saini, Rakesh Sharma, "Modified Robust and Secret Data Transmission over the Noisy Channel", Proceedings of IEEE Sponsored International Conference on Recent Applications of Soft Computing in Engineering and Technology (RASIET-07), pp.313-318, Dec. 22-23, 2007, Alwar (India)
|
2006
|
Hemraj Saini, Dinesh Saini, "Cyber Wars and Defense: an Introduction" National Symposium on cyber forensics and computer crimes, 11-13 August, 2006, Punjabi university (Patiala)-Punjab
|
Hemraj Saini, Dinesh Saini, "Cyber Defense: mathematical Modeling and Simulation" National conference on mathematical analysis and its real time applications, 16-17 September, 2006, University of Berhampur (Berhempur) - Orissa, pp. 106-111.
|
Hemraj Saini, Dinesh Saini, "Cyber Defense Architecture in Campus Wide Network," 3rd International Conference on Quality, Reliability and INFOCOM Technology (Trends and Future Directions), 2-4 December, 2006, Indian National Sciences and Academics, New Delhi (India)
|
Hemraj Saini, Dinesh Saini, "Cyber Defense: Use of AI Techniques," 3rd International Conference on Quality, Reliability and INFOCOM Technology (Trends and Future Directions), 2-4 December, 2006, Indian National Sciences and Academics, New Delhi (India)
|
Hemraj Saini, Dinesh Saini, "Malicious Object dynamics in the presence of Anti Malicious Software" International Conference on Computer and Information Sciences, Barcelona 2006, October 22-24, 2006 (Accepted)
|
Dinesh Kumar Saini, Hemraj Saini, “A Study on Cyber Crime in India” National Seminar on Mathematics and Computer Science, 29th -30th November 2006, S D (P G) College, Muzaffarnagar (UP)
|
Share with your friends: |