![](/sites/default/files/styles/height/public/team/mmprofile.jpg?itok=BnoSdf0w)
Contact Info
Er. Meenakshi
Email
meenakshi@cup.edu.in
Department of Computer Science and Technology, Central University of Punjab
Er. Meenakshi
Qualification
M.E.
Experience
Teaching Experience
8
Research Area
Network Security and Cryptography
Publications
Papers
- Mittal, M., Kumar, K. & Behal, S. Deep learning approaches for detecting DDoS attacks: a systematic review. Soft Comput (2022). https://doi.org/10.1007/s00500-021-06608-1. Impact Factor: 3.732.
- Mittal, M., Kumar, K. & Behal, S. Distributed Denial of Service Attack Detection using Deep Learning Approaches. 8th International Conference on Computing for Sustainable Global Development (INDIACom) (2021) pp. 491-495.
- Itoo, F., Meenakshi & Singh, S. Comparison and analysis of logistic regression, Naïve Bayes and KNN machine learning algorithms for credit card fraud detection. Int. j. inf. tecnol. 13, 1503–1511 (2021). https://doi.org/10.1007/s41870-020-00430-y
- Singh, T., Meenakshi Prevention of session hijacking using token and session id reset approach. Int. j. inf. tecnol. 12, 781–788 (2020). https://doi.org/10.1007/s41870-020-00486-w.
- Tanuja, Mittal, M. (2019). Implementation and analysis of enhanced obfuscation technique for data security. Int. J. Recent Technol. Eng., vol. 8, no. 3, pp. 6107–6115.
- Sharma, S., Mittal, M. (2019). Detection and prevention of de-authentication attack in real-time scenario. Int. J. Innov. Technol. Explor. Eng., vol. 8, no. 10, pp. 3324–3330.
- Raj, P., Mittal, M. (2018). Detection of Phishing URLs using Bayes Net and Naïve Bayes and evaluating the risk assessment using Attributable Risk. International Journal of Computer Sciences and Engineering, pp. 750-755, Vol.-6, Issue-5, May 2018, E-ISSN: 2347-2693.
- Kaur, H., Mittal, M. (2017). Analysis of VANET Geographic Routing Protocols on Real City Map," in IEEE International Conference On Recent Trends In Electronics Information Communication Technology, pp. 887-891, ISBN no. 978-1-5090-3704-9.
- Sharma, H., Mittal, M. and Bhatia, S. K. (2017). A Comparative Analysis and Awareness Survey of Phishing Detection Tools,” in IEEE International Conference On Recent Trends In Electronics Information Communication Technology, pp. 1424-1429, ISBN no. 978-1-5090-3704-9.
- Priya, A., Mittal, M. (2017). Detection of Phishing Websites using C4.5 Data Mining Algorithm. IEEE International Conference On Recent Trends In Electronics Information Communication Technology, pp. 1453-1457, ISBN no. 978-1-5090-3704-9.
- Thakur, S., Mittal, M., Priya, A. (2017). Detection of Malicious URLs In Big Data Using Ripper Algorithm. IEEE International Conference On Recent Trends In Electronics Information Communication Technology, pp. 1286-1291, ISBN no. 978-1-5090-3704-9.
- Sharma, S., Mittal, M. (2015). Prevention of Blackhole Attack over AODV and DSR MANET Routing Protocol. International Journal Of Engineering And Computer Science ISSN: 2319-7242 Volume 4 Issue, Page No. 14698-14709.
- Rani, K., Mittal, M. (2015). Prevention of Denial of Service Attack on Dynamic Source Routing VANET Protocol. IJRET: International Journal of Research in Engineering and Technology Volume: 04 Issue: 09, pp. 251-255. eISSN: 2319-1163 | pISSN: 2321-7308
- Kaur, A., Mittal, M. (2014). A Comprehensive Review on Performance of AODV and DSDV Protocol Using Manhattan Grid Mobility Model. IJRET: International Journal of Research in Engineering and Technology Volume 3, Issue 3; March 2014 pp.496-505. eISSN: 2319-1163 | pISSN: 2321-7308
- Goel, R., Mittal, M. (2014). Comparative Review Study of Security of ARAN and AODV Routing Protocols in MANETs. IJRET: International Journal of Research in Engineering and Technology Volume 3, Issue 6; June 2014 pp.192-199. eISSN: 2319-1163 | pISSN: 2321-7308
- Kaur, A., Mittal, M. (2014). Influence of Link Sensing Mechanism of IMEP on the Performance of TORA under Different Mobility Models. International Conference on Parallel, Distributed and Grid Computing. IEEE. pp.16-21. Print ISBN: 978-1-4799-7682-9 and DOI: 10.1109/PDGC.2014.7030708.
- Kansal, S., Mittal, M. December 2014. Performance evaluation of various symmetric encryption algorithms. International Conference on Parallel, Distributed and Grid Computing. IEEE. pp. 105-109. DOI: 10.1109/PDGC.2014.7030724.
Book Chapters
- Mishra, H.K., Mittal, M. (2020). Analysis of Wormhole Attack on AODV and DSR Protocols Over Live Network Data. In: Somani, A.K., Shekhawat, R.S., Mundra, A., Srivastava, S., Verma, V.K. (eds) Smart Systems and IoT: Innovations in Computing. Smart Innovation, Systems and Technologies, vol 141. Springer, Singapore. https://doi.org/10.1007/978-981-13-8406-6_64
Research Guidance
M.Tech.: 33
Conference/ Workshops/Seminars Attended
National
Conference/ Workshops/Seminars Organised