default search action
Keshav Kaushik
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Keshav Kaushik, Vinayak Naik:
Detecting faults in the cooling systems by monitoring temperature and energy. Energy Inform. 7(1): 46 (2024) - [j12]Ashutosh Dhar Dwivedi, Rajani Singh, Keshav Kaushik, Raghava Rao Mukkamala, Waleed S. Alnumay:
Blockchain and artificial intelligence for 5G-enabled Internet of Things: Challenges, opportunities, and solutions. Trans. Emerg. Telecommun. Technol. 35(4) (2024) - [c16]Keshav Kaushik, Vinayak Naik:
MaOC: Model-Assisted Optimal Control for Ductless-Split Cooling Systems in Building Environments. COMSNETS 2024: 790-797 - 2023
- [j11]Akashdeep Bhardwaj, Keshav Kaushik:
Metaverse or Metaworst with Cybersecurity Attacks. IT Prof. 25(3): 54-60 (2023) - [j10]Keshav Kaushik, Adarsh Kumar:
Demystifying quantum blockchain for healthcare. Secur. Priv. 6(3) (2023) - [c15]Keshav Kaushik, Vinayak Naik:
Making Ductless-split Cooling Systems Energy Efficient using IoT. COMSNETS 2023: 471-473 - [c14]Keshav Kaushik, Vinayak Naik:
OCSRL: An Model-Based Reinforcement Learning Approach to Optimize Energy Consumption of Cooling Systems. e-Science 2023: 1-10 - [c13]Keshav Kaushik, Vinayak Naik:
A Real-Time Non-Invasive Anomaly Detection Technique for Cooling Systems. EI.A 2023: 135-151 - [c12]Ishu Sharma, Keshav Kaushik, Gunjan Chhabra:
Investigating Patterns of UAV Attacks for Building Secure UAV Network. IC3I 2023: 136-141 - [c11]Jyoti Verma, Monika Sethi, Snehi Manish, Ishu Sharma, Keshav Kaushik:
Optimizing Real- Time Threat Detection with Feature Engineering Strategies for Intelligent NIDS. IC3I 2023: 416-421 - [c10]Salma El Hajjami, Hicham Amellal, Abdelkarim El-Hajjami, Keshav Kaushik, Inam Ullah Khan:
Improving Imbalanced Data Classification Through Integrated Data-Level and Algorithm-Level Techniques. IC3I 2023: 442-449 - [c9]Hicham Amellal, Salma El Hajjami, Keshav Kaushik, Gunjan Chhabra, Suman Avdhesh Yadav:
Quantum Man-in-the-Middle Attacks on QKD Protocols: Proposal of a Novel Attack Strategy. IC3I 2023: 513-519 - [c8]Ishu Sharma, Keshav Kaushik, Vanshika Pahuja, Gunjan Chhabra:
Employing Convolutional Neural Network for IoT Healthcare Attack Detection in Intensive Care Unit. IC3I 2023: 798-803 - [c7]Keshav Kaushik, Prabhutva Agrawal, Vinayak Naik:
A Dynamic Scheduling Technique to Optimize Energy Consumption by Ductless-split ACs. ICOIN 2023: 692-697 - [c6]Keshav Kaushik, Vinayak Naik:
An Energy Consumption Dataset for Ductless-split Cooling Systems to Train Large Models. BuildSys@SenSys 2023: 216-219 - [c5]Keshav Kaushik, Govind Sharma, Preeti Narooka, Gunjan Chhabra, Ankit Vishnoi:
HTML Smuggling: Attack and Mitigation. SIN 2023: 1-5 - 2022
- [j9]Keshav Kaushik, Akashdeep Bhardwaj, Manoj Kumar, Sachin Kumar Gupta, Abhishek Gupta:
A novel machine learning-based framework for detecting fake Instagram profiles. Concurr. Comput. Pract. Exp. 34(28) (2022) - [j8]Akashdeep Bhardwaj, Keshav Kaushik:
Predictive Analytics-Based Cybersecurity Framework for Cloud Infrastructure. Int. J. Cloud Appl. Comput. 12(1): 1-20 (2022) - [j7]Akashdeep Bhardwaj, Keshav Kaushik:
Investigate Financial Crime Patterns Using Graph Databases. IT Prof. 24(4): 27-36 (2022) - [j6]Akashdeep Bhardwaj, Mohammad Dahman Alshehri, Keshav Kaushik, Hasan J. Alyamani, Manoj Kumar:
Secure framework against cyber attacks on cyber-physical robotic systems. J. Electronic Imaging 31(6) (2022) - [j5]Keshav Kaushik:
Demystifying Blockchain in 5G and Beyond Technologies. J. Mobile Multimedia 18(5): 1379-1398 (2022) - [j4]Keshav Kaushik, Akashdeep Bhardwaj, Susheela Dahiya, Mashael S. Maashi, Moteeb Al Moteri, Mohammed Aljebreen, Salil Bharany:
Multinomial Naive Bayesian Classifier Framework for Systematic Analysis of Smart IoT Devices. Sensors 22(19): 7318 (2022) - [j3]Adarsh Kumar, Diego Augusto de Jesus Pacheco, Keshav Kaushik, Joel J. P. C. Rodrigues:
Futuristic view of the Internet of Quantum Drones: Review, challenges and research agenda. Veh. Commun. 36: 100487 (2022) - [c4]Keshav Kaushik, Rahul Negi, Prabhav Dev:
An electronic warfare approach for deploying a software-based Wi-Fi jammer. IC3I 2022: 43-47 - [c3]Keshav Kaushik, Suman Avdhesh Yadav, Vikas Chauhan, Aditya Rana:
An Approach for Implementing Comprehensive Reconnaissance for Bug Bounty Hunters. IC3I 2022: 189-193 - [c2]Keshav Kaushik, Ishika Punhani, Smita Sharma, Mamta Martolia:
An Advanced Approach for performing Cyber Fraud using Banner Grabbing. IC3I 2022: 298-302 - [i2]Keshav Kaushik, Adarsh Kumar:
Demystifying Quantum Blockchain for Healthcare. CoRR abs/2210.03638 (2022) - [i1]Keshav Kaushik, Rahul Negi, Prabhav Dev:
An electronic warfare approach for deploying a software-based Wi-Fi jammer. CoRR abs/2212.14470 (2022) - 2021
- [j2]Adarsh Kumar, Rajalakshmi Krishnamurthi, Surbhi Bhatia, Keshav Kaushik, Neelu Jyothi Ahuja, Anand Nayyar, Mehedi Masud:
Blended Learning Tools and Practices: A Comprehensive Analysis. IEEE Access 9: 85151-85197 (2021) - [j1]Adarsh Kumar, Surbhi Bhatia, Keshav Kaushik, S. Manjula Gandhi, S. Gayathri Devi, Diego Augusto de Jesus Pacheco, Arwa A. Mashat:
Survey of Promising Technologies for Quantum Drones and Networks. IEEE Access 9: 125868-125911 (2021) - 2020
- [c1]Keshav Kaushik, Susheela Dahiya, Rajani Singh, Ashutosh Dhar Dwivedi:
Role of Blockchain in Forestalling Pandemics. MASS 2020: 32-37
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint