— “Optimised Intrusion Detection System in Fog Computing Environment using Automatic Termination –based Whale optimisation with ELM”, International journal of Computer Information and Network Security( Accepted), Scopus Indexed.
— ”FogNet: Custom CNN with optimal feature selection-based combat model for secured fog computing environment”, International journal of Recent and Innovation Trends in Computing and Communication( Accepted), Scopus Indexed.
— ”Security Threats in Fog computing environment: Enhancing multimodal biometric authentication by feature level optimisation in edge and fog paradigm”, International Journal of Innovation Engineering and Management Research, Vol.12, Issue: 7, PP.121-134(2023).
— “Outlier Detection Using Convolutional Neural Network for Wireless Sensor Network”, International Journal of Business Data Communications and Networking, IGI-GLOBAL (SCOPUS INDEXED), Volume 17 • Issue 2 (2021), ISSN: 1548-0631, DOI: 10.4018/IJBDCN.286705
— “Outlier detection technique for wireless sensor network using GAN with autoencoder to increase the network lifetime”, International Journal of Computer Network and Information Security(IJCNIS) , MECS PRESS, (SCOPUS INDEXED), ISSN: 2074-9090 (Print), ISSN: 2074-9104 (Online), Volume 15 • Issue 2, Page: 26-38, (2023), DOI: 10.5815/ijcnis.2023.01.03
— “Implementation of a secure Electronic Contract”, IJST, ISSN: 0974-6846, (2018) (Thompson Reuter) (Indian Journal of Science and Technology, Vol 11(16), DOI: 10.17485/ijst/2018/v11i16/122032, April 2018. ISSN(Print) : 0974-6846. ISSN (Online) : 0974-5645)
— “A study for the compliance of Universal E-contract framework with e-business website”, IJST, ISSN: 0974-6846. Vol 11(5), DOI: 10.17485/ijst/2018/v11i5/120437 (2018)(Thompson Reuter).
— “A Novel approach of study of Universal E-Contract Framework for Ecommerce”, IJESMA, IGI, ISSN:1941-627X, Vol:10, Issue:1, pp.47-66 (2018) (SCOPUS,IET, ACM )
— “A Generalized Framework for E-Contract”, IJSSMET,IGI, ISSN:1947-959X, Vol:8, Issue:4, 1-18(2017). (SCOPUS,ACM )
— “Spiral security Model to counter the Threats due to human factors in Web Applications”, published in International Journal of research in Computer application and management, IJRCM, ISSN 2231-1009, Volume :3, Issue :11, pp:36-39(2013) (UGC Approved ).
–“Protective measures in e-commerce to deal with security threats arising out of social issues – A Framework published in International journal of Computer Engineering & Technology (IJCET), ISSN 0976–6367, Volume 4, Issue 1 ( 2013 ).(Thomson Reuter).
— ”Security threats in fog computing environment: Enhancing multimodal biometric authentication by feature level optimisation in edge and fog paradigm”, Proceedings of ICRAST’23, ISBN: 978-93-5915-119-9 ( Elsevier SSRN)
— ” Enhancing resource utilisation and performance in IoT with fog computing: A novel data migration approach using SCCSO and SCPSO”, Proceedings of IMCCRT’23, ISBN: 979-88-5644-922-7 (Published in IJARST)
— “Deep learning based approach for outlier detection in WSN”, 3rd International conference Computational Intelligence (ICCI-2022), Accepted. To published in Springer Book Series “Algorithms for Intelligent Systems”, Awarded as the best paper by SCRS(Soft computing Research Society), New Delhi.
— “A study on outlier detection techniques for wireless sensor network with CNN approach”, Taylor-Francis , ISBN : 9781003145028, (2021)
— Outlier detection in Wireless Sensor Network for Health Care: A statistical approach, 2022 International Conference for Advancement in Technology (ICONAT), Date of Conference: 21-22 Jan. 2022, Conference Location: Goa, India, IEEE Xplore, DOI: 1109/ICONAT53423.2022.9725817
— “A survey on limitations of traditional outlier detection techniques for wireless sensor networks” presented at International Conference in Computer Science, Soft Computing & Information Technology(ICSSCI2019) from 20-22 December 2019, Bhubaneswar, India, ICSSCI2019 Proceedings, sponsored by TEQIP-III(BPUT,Odisha) and organised by GITA, Bhubaneswar, pp-182-187.
— “A general study on feature selection for cancer classification” presented at International Conference in Computer Science, Soft Computing & Information Technology(ICSSCI2019) from 20-22 December 2019, Bhubaneswar, India, ICSSCI2019 Proceedings, pp-71-72.
— “A Critical Analysis of the Cyber Contract Using Electronic Mail” presented at International Conference ICTCS-2016 from 4-5 March 2016, Udaipur, India. Conference Proceedings by ACM– ICPS ISBN 978-1-4503-3962-9.
— “Cyber Contract- A generalized frame work” published in International Conference on Web Engineering & Application, Macmillan, ISBN- 10:0230-63032-4, P:270-278.,2006.
DRIEMS, a Premier Technical Institute of India with the highest ‘A’ Grade by NAAC (under UGC) has grown from strength to strength since its inception in 1999.
© 2025 DRIEMS University | All Rights Reserved
You can see how this popup was set up in our step-by-step guide: https://wppopupmaker.com/guides/auto-opening-announcement-popups/