Brief Introduction of Dr. Manju Khari

Name: Dr. Manju Khari

Affiliation: Associate Professor, School of Computer and Systems Sciences, Jawaharlal Nehru University, Delhi, India

Email: manjukhari@jnu.ac.in / manjukhari@yahoo.co.in

Institutional Profile: Visit Profile Here

ORCID Profile: Visit Profile Here

Google Scholar Profile: Visit Profile Here

SSRN Profile: Visit Profile Here

ResearchGate Profile: Visit Profile Here

Scopus Id: Visit Profile Here

Web of Science Researcher Id: Visit Profile Here

Dr. Manju Khari is Associate Professor, School of Computer and Systems Sciences, Jawaharlal Nehru University, Delhi, India

Educational Qualifications:

  • Ph. D. in Computer Science and Engineering from National Institute of Technology- Patna
  • M. Tech in Information Security from Guru Gobind Singh Indraprastha University- Delhi
  • B. Tech in Computer Science and Engineering from Indira Gandhi Institute of Technology-Delhi

Experience:

  • Associate Professor, SC&SS, JNU, New Delhi, 2021 - onwards
  • Assistant Professor Netaji Subhas University of Technology, East Campus (formally Ambedkar Institute of Advanced Communication Technologies and Research) under Govt. of NCT of Delhi, from 2007 to 2021

Areas of Interest/Specialization:

  • Information Security
  • Artificial Intelligence
  • Internet of Things
  • Cyber Forensic

Recent Peer Reviewed Journals/Books:

  • Jain, A., Crespo, R. and Khari, M. (2020). Smart Innovation of Web of Things, CRC Press. ISBN-9780367275655
  • Raj, P., Poongodi, T., Balamurugan, B., and Khari, M. (2020) The Internet of Things and Big Data Analytics: Integrated Platforms and Industry Use Cases, CRC Press, Taylor & Francis Group. ISBN: 9781003036739
  • Le, D., Kumar, R., Mishra, B.K., Chatterjee, J., and Khari, M. (Eds.). (2019). Cyber Security in Parallel and Distributed Computing: Concepts, Techniques, Applications and Case Studies. John Wiley & Sons.111948832X, ISBN: 9781119488323

Publications:

  • M Khari, AK Garg, AH Gandomi, R Gupta, R Patan, B Balusamy; Securing data in Internet of Things (IoT) using cryptography and steganography techniques
  • IEEE Transactions on Systems, Man, and Cybernetics: Systems 50 (1), 73-80
  • LH Son, S Jha, R Kumar, JM Chatterjee, M Khari; Collaborative handshaking approaches between internet of computing and internet of things towards a smart world: a review from 2009–2017 Telecommunication Systems 70 (4), 617-634
  • S Vimal, M Khari, N Dey, RG Crespo, YH Robinson; Enhanced resource allocation in mobile edge computing using reinforcement learning based MOACO algorithm for IIOT Computer Communications 151, 355-364
  • KS Sahoo, BK Tripathy, K Naik, S Ramasubbareddy, B Balusamy, M Khari; An evolutionary SVM model for DDOS attack detection in software defined networks IEEE Access 8, 132502-132513
  • F Chiclana, R Kumar, M Mittal, M Khari, JM Chatterjee, SW Baik; ARM–AMO: An efficient association rule mining algorithm based on animal migration optimization Knowledge-Based Systems 154, 68-80
  • M Khari, AK Garg, RG Crespo, E Verdú; Gesture Recognition of RGB and RGB-D Static Images Using Convolutional Neural Networks. Int. J. Interact. Multim. Artif. Intell. 5 (7), 22-27
  • S Vimal, M Khari, RG Crespo, L Kalaivani, N Dey, M Kaliappan; Energy enhancement using Multiobjective Ant colony optimization with Double Q learning algorithm for IoT based cognitive radio networks, Computer Communications 154, 481-490
  • LH Son, N Pritam, M Khari, R Kumar, PTM Phuong, PH Thong; Empirical study of software defect prediction: a systematic mapping Symmetry 11 (2), 212
  • S Jha, R Kumar, LH Son, JM Chatterjee, M Khari, N Yadav; Neutrosophic soft set decision making for stock trending analysis Evolving Systems 10 (4), 621-627
  • A Rajagopal, GP Joshi, A Ramachandran, RT Subhalakshmi, M Khari; A deep learning model based on multi-objective particle swarm optimization for scene classification in unmanned aerial vehicles. IEEE Access 8, 135383-135393
  • M Dua, R Gupta, M Khari, RG Crespo; Biometric iris recognition using radial basis function neural network. Soft Computing 23 (22), 11801-11815
  • M Khari, P Kumar; An extensive evaluation of search-based software testing: a review. Soft Computing 23 (6), 1933-1946
  • R Dalal, Y Singh, M Khari; A review on key management schemes in MANET. International Journal of Distributed and Parallel Systems 3 (4), 165
  • R Saini, M Khari; Defining malicious behavior of a node and its defensive methods in ad hoc network. International Journal of Computer Applications 20 (4), 18-21
  • M Khari, N Kumar; Comparison of six prioritization techniques for software requirements. Journal of Global Research in Computer Science 4 (1), 38-43
  • R Dalal, M Khari, Y Singh; Different ways to achieve Trust in MANET. International Journal on AdHoc Networking Systems (IJANS) 2 (2), 53-64
  • N Pritam, M Khari, R Kumar, S Jha, I Priyadarshini, M Abdel-Basset; Assessment of code smell for predicting class change proneness using machine learning. IEEE Access 7, 37414-37425
  • M Khari, P Kumar, D Burgos, RG Crespo; Optimized test suites for automated testing using different optimization techniques. Soft Computing 22 (24), 8341-8352
  • A Rajagopal, A Ramachandran, K Shankar, M Khari, S Jha, Y Lee; Fine-tuned residual network-based features with latent variable support vector machine-based optimal scene classification model for unmanned aerial vehicles. IEEE Access 8, 118396-118404
  • R Malhotra, M Khari; Heuristic search-based approach for automated test data generation: a survey. International Journal of Bio-Inspired Computation 5 (1), 1-18
  • M Khari, M Kumar, S Vij, P Pandey; Internet of Things: Proposed security aspects for digitizing the world. 2016 3rd international conference on computing for sustainable global
  • JM Chatterjee, R Kumar, M Khari, DT Hung, DN Le; Internet of Things based system for Smart Kitchen. International Journal of Engineering and Manufacturing 8 (4), 29
  • R Gupta, M Khari, D Gupta, RG Crespo; Fingerprint image enhancement and reconstruction using the orientation and phase reconstruction. Information Sciences 530, 201-218
  • M khari, G Shrivastava, S Gupta, G Rashmi; Role of Cyber Security in Today’s Scenario Detecting and Mitigating Robotic Cyber Security Risks, 177
  • YH Robinson, S Vimal, M Khari, FCL Hernández, RG Crespo; Tree-based convolutional neural networks for object classification in segmented satellite images. The International Journal of High-Performance Computing Applications …
  • V Shanmuganathan, HR Yesudhas, MS Khan, M Khari, AH Gandomi; R-CNN and wavelet feature extraction for hand gesture recognition with EMG signals. Neural Computing and Applications 32 (21), 16723-16736
  • VE Balas, VK Solanki, R Kumar, M Khari; Internet of things and big data analytics for smart generation. Springer 154, 309
  • R Dalal, M Khari, Y Singh; Survey of Trust Schemes on Ad-hoc Network. Social Informatics and Telecommunications Engineering, Springer 84, 170 - 184
  • M Khari, A Sinha, E Verdu, RG Crespo; Performance analysis of six meta-heuristic algorithms over automated test suite generation for path coverage-based optimization. Soft Computing 24 (12), 9143-9160
  • JM Chatterjee, LH Son, S Ghatak, R Kumar, M Khari; BitCoin exclusively informational money: a valuable review from 2010 to 2017. Quality & Quantity 52 (5), 2037-2054
  • G Shrivastava, K Sharma, M Khari, SE Zohora; Role of cyber security and cyber forensics in India Handbook of Research on Network Forensics and Analysis Techniques, 143-161
  • A Rajagopal, A Ramachandran, K Shankar, M Khari, S Jha, GP Joshi; Optimal routing strategy based on extreme learning machine with beetle antennae search algorithm for Low Earth Orbit satellite communication networks. International Journal of Satellite Communications and Networking 39 (3), 305-317
  • HMR Afzal, S Luo, MK Afzal, G Chaudhary, M Khari, SAP Kumar; 3D face reconstruction from single 2D image using distinctive features. IEEE Access 8, 180681-180689
  • R Malhotra, M Khari; Test suite optimization using mutated artificial bee colony. Proc. of Int. Conf. on Advances in Communication, Network, and Computing
  • HV Long, LH Son, M Khari, K Arora, S Chopra, R Kumar, T Le, SW Baik (2019); A new approach for construction of geodemographic segmentation model and prediction analysis. Computational intelligence and neuroscience
  • M Khari, P Kumar; An effective meta-heuristic cuckoo search algorithm for test suite optimization. Informatica 41 (3)
  • S Pasupathi, S Vimal, Y Harold-Robinson, M Khari, E Verdú, RG Crespo; Energy efficiency maximization algorithm for underwater Mobile sensor networks. Earth Science Informatics 14 (1), 215-225
  • A Jain, M Khari, E Verdú, S Omatsu, RG Crespo; A route selection approach for variable data transmission in wireless sensor networks. Cluster Computing 23 (3), 1697-1709
  • M Khari; Mobile ad hoc networks security attacks and secured routing protocols: A survey. International Conference on Computer Science and Information Technology, 119-124
  • M Khari, A Karar; Analysis on intrusion detection by machine learning techniques: a review. Int. J. Adv. Res. Comput. Sci. Softw. Eng 3 (4), 1-4
  • M Gupta, R Jain, S Taneja, G Chaudhary, M Khari, E Verdú; Real-time measurement of the uncertain epidemiological appearances of COVID-19 infections. Applied Soft Computing 101, 107039
  • YH Robinson, S Vimal, EG Julie, M Khari, C Expósito-Izquierdo; Hybrid optimization routing management for autonomous underwater vehicle in the internet of underwater things. Earth Science Informatics 14 (1), 441-456
  • A Agarwal, M Khari, R Singh; Detection of DDOS attack using deep learning model in cloud storage application. Wireless Personal Communications, 1-21
  • M Khari, P Kumar; Embedding security in software development life cycle (sdlc). 2016 3rd International Conference on Computing for Sustainable Global
  • M Khari, M Gaur, Y Tuteja; Meticulous study of firewall using security detec-tion tools. Int. J. Comp. Appl. Inform. Technol 2 (1), 1-9
  • M Khari; Comprehensive study of cloud computing and related security issues. Big Data Analytics, 699-707
  • MS Pillai, G Chaudhary, M Khari, RG Crespo; Real-time image enhancement for an automatic automobile accident detection through CCTV using deep learning. Soft Computing 25 (18), 11929-11940
  • R Raj, P Rajiv, P Kumar, M Khari, E Verdú, RG Crespo, G Manogaran, Feature based video stabilization based on boosted HAAR Cascade and representative point matching algorithm Image and Vision Computing 101, 103957
  • Sonam, M Khari; Wireless Sensor Networks: A Technical Survey. Handbook of Research on Network Forensics and Analysis Techniques, 1-18
  • M Khari, S Gupta, M Kumar; Security outlook for cloud computing: A proposed architectural-based security classification for cloud computing. 2016 3rd International Conference on Computing for Sustainable Global
  • M Khari, C Bajaj; Detecting Computer Viruses. International Journal of Advanced Research in Computer Engineering (2014)
  • R Saini, M Khari; Defining Malicious Behavior of a Node and its Defensive Techniques in Ad Hoc Networks. Journal of Smart Sensors and Adhoc Networks (IJSSAN) 1, 18-21
  • M Khari, R Dalal, P Rohilla; Extended paradigms for botnets with WoT applications: a review. Smart Innovation of Web of Things, 105-122
  • M Khari; Empirical evaluation of automated test suite generation and optimization. Arabian Journal for Science and Engineering 45 (4), 2407-2423
  • G Srivastava, LH Son, R Kumar, M Khari; A dual band notched ultra-wideband antenna. Wireless Personal Communications 110 (2), 1021-1032
  • M Khari, P Kumar; Evolutionary computation-based techniques over multiple data sets: an empirical assessment. Arabian Journal for Science and Engineering 43 (8), 3875-3885
  • P Singh, M Khari, S Vimal; EESSMT: an energy efficient hybrid scheme for securing mobile ad hoc networks using IoT. Wireless Personal Communications, 1-25
  • M Khari, P Sangwan (2016); Web-application attacks: A survey. 2016 3rd International Conference on Computing for Sustainable Global
  • M Khari, M Kumar, Comprehensive study of web application attacks and classification. 2016 3rd International Conference on Computing for Sustainable Global
  • M Khari, N Singh; An Overview of Black Box Web Vulnerability Scanners. International Journal of Advanced Research in Computer Science and Software
  • P Singh, M Khari; Empirical analysis of energy-efficient hybrid protocol under black hole attack in manets. Research in intelligent and computing in engineering, 725-734
  • NS Bhati, M Khari; A survey on hybrid intrusion detection techniques. Research in Intelligent and Computing in Engineering, 815-825
  • NS Bhati, M Khari, V García-Díaz, E Verdú; A review on intrusion detection systems and techniques. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems
  • M Khari, R Dalal, U Misra, A Kumar; AndroSet: An automated tool to create datasets for android malware detection and functioning with WoT. Smart Innovation of Web of Things, 187-206
  • R Gupta, M Khari, V Gupta, E Verdú, X Wu, E Herrera-Viedma (2020); Fast single image haze removal method for inhomogeneous environment using variable scattering coefficient. CMES-Computer Modeling in Engineering and Sciences
  • VE Balas, VK Solanki, R Kumar, M Khari; Handbook of data science approaches for biomedical engineering. Academic Press
  • M Khari, P Kumar, G Shrivastava; Enhanced approach for test suite optimisation using genetic algorithm. International Journal of Computer Aided Engineering and Technology 11 (6)
  • M Khari, P Kumar; A novel approach for software test data generation using cuckoo algorithm. Proceedings of the second international conference on information……
  • R Dalal, M Khari, Y Singh; Authenticity check to provide trusted platform in MANET (ACTP). Proceedings of the second international conference on computational science
  • NS Bhati, M Khari; A new ensemble based approach for intrusion detection system using voting. Journal of Intelligent & Fuzzy Systems 42 (2), 969-979
  • G Chaudhary, M Khari; M Elhoseny, Digital Twin Technology. CRC Press
  • M Khari, R Kumar, DN Le, JM Chatterjee; Interconnect Network on Chip Topology in Multi-core Processors: A Comparative Study. International Journal of Computer Network & Information Security 9 (11)
  • A Jain, DK Tayal, M Khari, S Vij; A novel method for test path prioritization using centrality measures. International Journal of Open Source Software and Processes (IJOSSP) 7 (4)
  • M Khari, M Kumar, S Vij, P Pandey; Smart Cities: A Secure Data Transmission Model. Proceedings of the Second International Conference on Information and …
  • R Dalal, M Khari, Y Singh; The New Approach to provide Trusted Platform in MANET
  • KM Supriya, M Khari; MANET Security breaches: threat to a secure communication platform. International Journal on AdHoc Networking Systems (IJANS) 2 (2), 45-51
  • R Saini, M Khari; An algorithm to detect attacks in mobile ad hoc network. International Conference on Software Engineering and Computer Systems, 336-341
  • M Wadhwa, M Khari; Security holes in contrast to the new features emerging in the next generation protocol. International Journal of Computer Applications 20 (3), 35-39
  • R Yousef, G Gupta, N Yousef, M Khari; A holistic overview of deep learning approach in medical imaging. Multimedia Systems, 1-34
  • R Dalal, M Khari; Empirical analysis of routing protocols in opportunistic network. Research in Intelligent and Computing in Engineering, 695-703
  • P Gulia, M Khari, S Patel; Metrics analysis in object oriented and aspect oriented programming. Recent Patents on Engineering 13 (2), 117-122
  • M Khari, P Kumar; Empirical Evaluation of Hill Climbing Algorithm. International Journal of Applied Metaheuristic Computing (IJAMC) 8 (4), 27-40
  • P Kumar, M Khari (2017); An investigating approach for optimization of software test suite. Recent Advances in Communications and Networking Technology
  • M Khari, N Singh; Web Services Vulnerability Testing Using Open source Security Scanners: An experimental Study. International Journal of Advanced Engineering and Global Technology 2 (7)
  • R Dalal, M Khari, JP Anzola, V García-Díaz; Proliferation of Opportunistic Routing: A Systematic Review. IEEE Access (2021)
  • A Rajagopal, S Jha, M Khari, S Ahmad, B Alouffi, A Alharbi; A novel approach in prediction of crop production using recurrent cuckoo search optimization neural networks. Applied Sciences 11 (21), 9816
  • K Ahmad, A Kamal, KAB Ahmad, M Khari, RG Crespo; Fast hybrid-MixNet for security and privacy using NTRU algorithm. Journal of Information Security and Applications 60, 102872
  • M Khari, P Kumar, G Shrivastava; Test optimisation: an approach based on modified algorithm for software network. International Journal of Advanced Intelligence Paradigms 17 (3-4), 208-237
  • VE Balas, S Jha, M Khari, R Kumar; Internet of things in biomedical engineering. Academic Press (2019)
  • A Dwivedi, RP Pant, M Khari, S Pandey, L Mohan, M Pande (2019); E-governance and big data framework for e-governance and use of sentiment analysis. International Conference on Advances in Engineering Science Management
  • M Khari, M Kumar (2016); Secure data transference architecture for cloud computing using cryptography algorithms. 2016 3rd International Conference on Computing for Sustainable Global …
  • M Chandra, P Saini, M Khari, CS Vinitha; Clustering In Wireless Sensor Networks: Performance Comparison Of Leach And Multi-Hop Leach Protocols. Proceedings of 24th IRF International Conference, 3rd May
  • M Khari, C Bajaj; Motivation For Security Testing. International Journal of Advanced Engineering and Global Technology 2 (7)
  • R Saini, M Wadhwa, M Khari; Vulnerabilities and Attacks in Global System for Mobile Communication (GSM). International Journal of Advanced Research in Computer Science 2 (3)
  • S Srivastava, M Khari, RG Crespo, G Chaudhary, P Arora (2021); Concepts and Real-Time Applications of Deep Learning. Springer International Publishing
  • R Dalal, M Khari; Persuasive simulation of optimized protocol for OppNet. Dynamic Systems and Applications 30 (5), 865-900
  • P Kumar, M Dayal, M Khari, G Fenza, M Gallo (2021); Nsl-bp: A meta classifier model based prediction of amazon product reviews. International Journal of Interactive Multimedia and Artificial Intelligence …
  • M Khari, A Sinha, E Herrerra-Viedma, RG Crespo; On the use of meta-heuristic algorithms for automated test suite generation in software testing. Toward Humanoid Robots: The Role of Fuzzy Sets, 149-197
  • V Jain, MS Pillai, L Chandra, R Kumar, M Khari, A Jain; CamAspect: an intelligent automated real-time surveillance system with smartphone indexing. IEEE Sensors Letters 4 (10), 1-4
  • M Khari, G Shrivastava; Recent research in network security analytics. International Journal of Sensors Wireless Communications and Control 8 (1), 2-4
  • DN Le, M Khari, JM Chetterjee (2018); Cyber Security in Parallel and Distributed Computing
  • M Khari, A Jain, S Vij, M Kumar (2016); Analysis of various information retrieval models. 2016 3rd International Conference on Computing for Sustainable Global …
  • M Khari, C Bajaj; Near field communication technology benefitted for metro rides. International Journals of Advanced Engineering and Global Technology 10 (7)
  • M Khari, N Kumar; Comparisons of techniques of requirement prioritization. J. Glob. Res. Comput. Sci 4 (1), 38-43
  • M Khari, A Karar; Preventing SQL-Based Attacks Using Intrusion Detection. International Journal of Science and Engineering Applications 2 (6), 145-150
  • M Khari, N Kumar; User Authentication Method against SQL Injection Attack. International Journal of Scientific & Engineering Research 4 (6), 1649-1653
  • M Wadhwa, M Khari (2011); Prevention algorithm against the vulnerability of type 0 routing header in IPv6. 2011 International Conference on Computational Intelligence and …
  • S Saif, P Das, S Biswas, M Khari, V Shanmuganathan (2022); HIIDS: Hybrid intelligent intrusion detection system empowered with machine learning and metaheuristic algorithms for application in IoT based healthcare. Microprocessors and Microsystems, 104622
  • U Sugandh, M Khari, S Nigam (2022); The integration of blockchain and IoT edge devices for smart agriculture: The challenges and use cases. Elsevier
  • A Atri, A Bansal, M Khari, S Vimal (2022); De-CAPTCHA: A novel DFS based approach to solve CAPTCHA schemes. Computers & Electrical Engineering 97, 107593
  • U Sugandh, M Khari, S Nigam (2022); How Blockchain Technology Can Transfigure the Indian Agriculture Sector: A Review. Handbook of Green Computing and Blockchain Technologies, 69-88
  • K Saini, M Khari (2021); Handbook of Green Computing and Blockchain Technologies. CRC Press
  • R Dalal, M Khari, A Garg, D Gupta, A Gautam (2021); False Media Detection by Using Deep Learning. Multimodal Biometric Systems, 79-88
  • V Srivastava, S Gupta, G Chaudhary, A Balodi, M Khari, V García-Díaz (2021); An Enhanced Texture-Based Feature Extraction Approach for Classification of Biomedical Images of CT-Scan of Lungs. International Journal of Interactive Multimedia and Artificial Intelligence …
  • NS Kaundanya, M Khari (2021); Applications of virtual reality in a cloud-based learning environment: A review. Research in Intelligent and Computing in Engineering, 787-794
  • NS Bhati, M Khari (2020); A New Intrusion Detection Scheme Using CatBoost Classifier. International Conference on Forthcoming Networks and Sustainability in the…
  • JMRS Tavares, BK Mishra, R Kumar, N Zaman, M Khari (2018); Handbook of E-business Security. CRC Press
  • P Pandey, M Khari, R Kumar, DN Le (2018); Automatic Generation of Synsets for Wordnet of Hindi Language. International Journal of Natural Computing Research (IJNCR) 7 (2), 31-47
  • RGM Dua, DGM Khari (2017); Hindi Optical Character Recognition and Its Applications. Detecting and Mitigating Robotic Cyber Security Risks, 28
  • M Khari, M Kumar (2016); Analysis of software security testing using metaheuristic search technique. 2016 3rd International Conference on Computing for Sustainable Global …
  • M Dayal, A Chawla, M Khari, AN Mahajan (2023); Artificial Intelligence-Based Smart Packet Filter. Proceedings of Third International Conference on Computing, Communications …
  • K Kanwar, S Kaushal, H Kumar, G Gupta, M Khari; BC DCN : a new edge centrality measure to identify and rank critical edges pertaining to SIR diffusion in complex networks. Social Network Analysis and Mining 12 (1), 1-14
  • A Dass, S Srivastava, M Gupta, M Khari, J Parra Fuente, E Verdú (2022); Modelling and control of fuzzy‐based systems using intelligent water drop algorithm. Expert Systems, e13124
  • DK Sharma, U Sinha, A Gupta, M Khari, Modified minimum spanning tree based vertical fragmentation, allocation and replication approach in distributed multimedia databases. Multimedia Tools and Applications, 1-18 (2022)
  • HM Afzal, S Luo, S Ramadan, M Khari, G Chaudhary, J Lechner-Scott (2022); Prediction of Conversion from CIS to Clinically Definite Multiple Sclerosis Using Convolutional Neural Networks. Computational and Mathematical Methods in Medicine
  • S Jayant, G Srivastava, M Khari; 8-Port MIMO Antenna Having Two Notched Bands for Chipless UWB-RFID Tags. IEEE Journal of Radio Frequency Identification 6, 355-360
  • H Bansal, K Sharma, M Khari; Crowd analytics: literature and technological assessment. Multimedia Tools and Applications 81 (11), 15249-15283
  • A Agarwal, R Singh, M Khari; Detection of DDOS Attack Using IDS Mechanism: A Review. 2022 International Conference on Informatics (ICI), 36-46
  • A Panwar, V Bhatnagar, M Khari, AW Salehi, G Gupta (2022); A Blockchain Framework to Secure Personal Health Record (PHR) in IBM Cloud-Based Data Lake. Computational Intelligence and Neuroscience
  • A Agrawal, R Singh, M Khari, S Vimal, S Lim (2022); Autoencoder for Design of Mitigation Model for DDOS Attacks via M-DBNN. Wireless Communications and Mobile Computing
  • NS Bhati, M Khari, An Ensemble Model for Network Intrusion Detection Using AdaBoost, Random Forest and Logistic Regression. Applications of Artificial Intelligence and Machine Learning, 777-789
  • R Dalal, M Khari (2022); Peculiar Effectual Approach: Q-Routing in Opportunistic Network. Proceedings of International Conference on Industrial Instrumentation and …
  • R Dalal, M Khari, A Kumar, DK Sharma; Evaluation of assocation rule-based routing protocol for oppnet. Mechatron. Syst. Control. 50 (2)
  • M Dayal, A Chawla, M Khar; Coalescence of Neural Networks and Blockchain. Handbook of Green Computing and Blockchain Technologies, 31-44
  • M Dayal, A Chawla, M Khari; 3 Coalescence of Neural. Handbook of Green Computing and Blockchain Technologies, 31
  • R Dalal, M Khari, D Chandra; Evaluation of Software Fault Proneness with a Support Vector Machine and Biomedical Applications. Bioelectronics and Medical Devices, 77-103
  • S Sharma, M Khari; Machine Learning Implementations in Bioinformatics and Its Application. Bioelectronics and Medical Devices, 187-205
  • G Srivastava, M Khari (2021); Bioelectronics and Medical Devices: Applications and Technology. CRC Press
  • S Kaur, G Chaudhary, S Srivastava, M Khari, RG Crespo, JD Kumar (2021); Exploiting feature space using overlapping windows for improving biometric recognition. Computers & Electrical Engineering 96, 107552
  • G Chaudhary, PS Lamba, HS Jolly, S Poply, M Khari, E Verdú (2021); Predictive text analysis using eye blinks. Computers & Electrical Engineering 96, 107554
  • NS Bhati, M Khari (2021); Comparative Analysis of Classification Based Intrusion Detection Techniques. 2021 5th International Conference on Information Systems and Computer …
  • K Kumar, M Khari (2021) Architecture of Digital. Digital Twin Technology, 83
  • M Khari, R Dalal, A Sharma, A Dubey (2021); Evaluation of Multimodal Biometric Systems: Security and Applications
  • M Khari, R Dalal, A Sharma, B Mehta (2021); Person Identification in UAV Shot Videos by Using Machine Learning. Multimodal Biometric Systems, 45-60
  • R Dalal, M Khari, MN Arbab, H Maheshwari, A Barnwal (2021); Smart Metro Ticket Management by Using Biometric. Multimodal Biometric Systems, 101-110
  • M Khari, R Dalal, A Sharma, A Dubey (2021); Evaluation of Text-Summarization Technique. Multimodal Biometric Systems, 89-100
  • R Gupta, M Khari (2021); Multimodal Biometric Systems: Security and Applications. CRC Press
  • K Ahmad, A Kamal, KAB Ahmad, M Khari, RG Crespo (2021); Corrigendum to Fast hybrid-MixNet for security and privacy using NTRU algorithm::[Journal of Information Security and Applications, Volume 60, August 2021, Start page–End page …
  • R Dalal, M Khari (2021); Factual Demonstration of Blockchain Routing in Delay Tolerant Network
  • G Srivastava, M Khari (2021); An Elliptical CPW Fed UWB Slot Antenna
  • P Singh, M Khari, NS Kaundanya (2021); Impact of Group Theory in Cryptosystem. Functional Encryption, 19-36
  • M Gupta, S Srivastava, G Chaudhary, M Khari, JP Fuente (2020); Voltage Regulation using Probabilistic and Fuzzy Controlled Dynamic Voltage Restorer for Oil and Gas Industry. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems…
  • A Garg, M Khari (2020); Emergence of the Web of Things: A Survey. Smart Innovation of Web of Things, 1-20
  • M Khari, P Kumar (2019); Correction to: Evolutionary Computation-Based Techniques Over Multiple Data Sets: An Empirical Assessment. Arabian Journal for Science & Engineering (Springer Science & Business Media…
  • R González-Crespo, E Verdú, M Khari, AK Garg (2019); Gesture Recognition of RGB and RGB-D Static Images Using Convolutional Neural Networks. International Journal of Interactive Multimedia and Artificial Intelligence …
  • M Khari (2019); Gulshan Shrivastava and Prabhat Kumar. Int. J. Advanced Intelligence Paradigms 13 (1/2), 1
  • M Khari, M Kumar (2019); Search-Based Secure Software Testing: A Survey. Software Engineering, 375-381
  • S Jha, R Kumar, M Khari, J Chatterjee (2018); Electronic Wastage: Prospects and Challenges for the Next Generation. Handbook of e-Business Security, 259-284
  • M Khari (2018); IJIMAI Editor's Note-Vol. 5 Issue 1 International Journal of Interactive Multimedia and Artificial Intelligence …
  • N Krishnaveni, S Nagaprasad, M Khari, VA Devi (2018) Improved Data integrity and Storage security in Cloud Computing. International Journal of Pure and Applied Mathematics 119 (15), 2889-2897
  • M Khari, SL Peng, K Chamnongthai (2017); Foreword: Special Issue for ICSEC 2015. Journal of Internet Technology 18 (4), 897-898
  • P Kumar, G Shrivastava, M Khari (2017); Opportunity for publication in scopus
  • M Khari, P Kumar, G Shrivastava (2016); Special Session on “Security Trends in Mobile/Web Analytics and IoT (STMWAIoT’16)”
  • A Dev, M Khari, R Dalal (2015); Efficient Clustering using MNPA in WSM. 2015 2nd International Conference on Computing for Sustainable Global …
  • M Kumar, M Khari, P Kumar (2014); Web Applications: Students Handbook (Class XII). Central Board Of Secondary Education
  • M Khari, D Nigam (2014); Advanced Security Metric Model: ASM. International Journal of Advanced Engineering and Global Technology 2 (6)
  • M Khari, N Kumar (2013); SQLIA Detection and Prevention Approaches: A Survey. International Journal of Computer Science & Information Technology 3 (5)
  • K Kumar, M Khari, A Kumar; Comprehensive Method of Distributed Denial of Service Detection by Artificial Neural Network. Wireless Communication with Artificial Intelligence, 27-43
  • P Kabisatpathy, BK Misra, S Anitha, A Misra, AB Sammadar, AK Saraf,… Technical Paper Reviewer
  • A Sharma, DS Rajpoot, D Aggarwal, K Banerjee, V Bali, M Gupta, ……(2022) 1 st International Conference on Informatics (ICI)
  • S Nigam, U Sugandh, M Khari; The integration of blockchain and IoT edge devices for smart agriculture: Challenges and use cases
  • M Mittal, M Khari, JM Chatterjee, SW Baik; ARM-AMO: An Efficient Association Rule Mining Algorithm Based on Animal Migration Optimization
  • M Khari; An Algorithm to Detect Attacks in Mobile Ad Hoc Network
  • DN Le, R Kumar, BK Mishra, M Khari, JM Chatterjee; Cyber Security in Parallel and Distributed Computing
  • M Khari, A Singh; A Survey on DNA-based Cryptography: Applications, Challenges and Future Vision
  • RG M. Khari, G. Shrivastava, S. Gupta; Role of Cyber Security in Today's Scenario
  • M Khari; Vulnerability Of IPv6 Type 0 Routing Header And It’s Prevention Algorithm
  • D Meana-Llorián, CG García, JP Espada, M Khari, VB Semwal; Bilrost: Connecting the Internet of Things through human Social Networks with a Domain-Specific