Skip to main content
Contact Info
Er. Meenakshi
Department of Computer Science and Technology, Central University of Punjab
Er. Meenakshi
Qualification

M.E.

Experience
Teaching Experience
8
Research Area

Network Security and Cryptography

Publications
Papers
  1. Mittal, M., Kumar, K. & Behal, S. Deep learning approaches for detecting DDoS attacks: a systematic review. Soft Comput (2022). https://doi.org/10.1007/s00500-021-06608-1. Impact Factor: 3.732.
  2. Mittal, M., Kumar, K. & Behal, S. Distributed Denial of Service Attack Detection using Deep Learning Approaches. 8th International Conference on Computing for Sustainable Global Development (INDIACom) (2021) pp. 491-495.
  3. Itoo, F., Meenakshi & Singh, S. Comparison and analysis of logistic regression, Naïve Bayes and KNN machine learning algorithms for credit card fraud detection. Int. j. inf. tecnol. 13, 1503–1511 (2021). https://doi.org/10.1007/s41870-020-00430-y
  4. Singh, T., Meenakshi Prevention of session hijacking using token and session id reset approach. Int. j. inf. tecnol. 12, 781–788 (2020). https://doi.org/10.1007/s41870-020-00486-w.
  5. Tanuja, Mittal, M.  (2019).  Implementation and analysis of enhanced obfuscation technique for data security. Int. J. Recent Technol. Eng., vol. 8, no. 3, pp. 6107–6115.
  6. Sharma, S., Mittal, M. (2019). Detection and prevention of de-authentication attack in real-time scenario. Int. J. Innov. Technol. Explor. Eng., vol. 8, no. 10, pp. 3324–3330.
  7. Raj, P., Mittal, M. (2018). Detection of Phishing URLs using Bayes Net and Naïve Bayes and evaluating the risk assessment using Attributable Risk. International Journal of Computer Sciences and Engineering, pp. 750-755, Vol.-6, Issue-5, May 2018, E-ISSN: 2347-2693.
  8. Kaur, H., Mittal, M. (2017). Analysis of VANET Geographic Routing Protocols on Real City Map," in IEEE International Conference On Recent Trends In Electronics Information Communication Technology, pp. 887-891, ISBN no. 978-1-5090-3704-9.
  9. Sharma, H., Mittal, M. and Bhatia, S. K. (2017). A Comparative Analysis and Awareness Survey of Phishing Detection Tools,” in IEEE International Conference On Recent Trends In Electronics Information Communication Technology, pp. 1424-1429, ISBN no. 978-1-5090-3704-9.
  10. Priya, A., Mittal, M. (2017). Detection of Phishing Websites using C4.5 Data Mining Algorithm.  IEEE International Conference On Recent Trends In Electronics Information Communication Technology, pp. 1453-1457, ISBN no. 978-1-5090-3704-9.
  11. Thakur, S., Mittal, M., Priya, A. (2017). Detection of Malicious URLs In Big Data Using Ripper Algorithm. IEEE International Conference On Recent Trends In Electronics Information Communication Technology, pp. 1286-1291, ISBN no. 978-1-5090-3704-9.
  12. Sharma, S., Mittal, M. (2015). Prevention of Blackhole Attack over AODV and DSR MANET Routing Protocol. International Journal Of Engineering And Computer Science ISSN: 2319-7242 Volume 4 Issue, Page No. 14698-14709.
  13. Rani, K.,  Mittal, M. (2015). Prevention of Denial of Service Attack on Dynamic Source Routing VANET Protocol. IJRET: International Journal of Research in Engineering and Technology Volume: 04 Issue: 09, pp. 251-255. eISSN: 2319-1163 | pISSN: 2321-7308
  14. Kaur, A., Mittal, M. (2014). A Comprehensive Review on Performance of AODV and DSDV Protocol Using Manhattan Grid Mobility Model. IJRET: International Journal of Research in Engineering and Technology Volume 3, Issue 3; March 2014 pp.496-505. eISSN: 2319-1163 | pISSN: 2321-7308
  15. Goel, R., Mittal, M. (2014). Comparative Review Study of Security of ARAN and AODV Routing Protocols in MANETs. IJRET: International Journal of Research in Engineering and Technology Volume 3, Issue 6; June 2014 pp.192-199. eISSN: 2319-1163 | pISSN: 2321-7308
  16.  Kaur, A., Mittal, M. (2014). Influence of Link Sensing Mechanism of IMEP on the Performance of TORA under Different Mobility Models. International Conference on Parallel, Distributed and Grid Computing. IEEE. pp.16-21. Print ISBN: 978-1-4799-7682-9 and DOI: 10.1109/PDGC.2014.7030708.
  17. Kansal, S., Mittal, M. December 2014. Performance evaluation of various symmetric encryption algorithms. International Conference on Parallel, Distributed and Grid Computing. IEEE. pp. 105-109. DOI: 10.1109/PDGC.2014.7030724.
Book Chapters
  1. Mishra, H.K., Mittal, M. (2020). Analysis of Wormhole Attack on AODV and DSR Protocols Over Live Network Data. In: Somani, A.K., Shekhawat, R.S., Mundra, A., Srivastava, S., Verma, V.K. (eds) Smart Systems and IoT: Innovations in Computing. Smart Innovation, Systems and Technologies, vol 141. Springer, Singapore. https://doi.org/10.1007/978-981-13-8406-6_64

 

Research Guidance

M.Tech.: 33 

Conference/ Workshops/Seminars Attended
National
Conference/ Workshops/Seminars Organised