Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Sumit Miglani is active.

Publication


Featured researches published by Sumit Miglani.


advances in computing and communications | 2015

Mining Professional's Data from LinkedIn

Puneet Garg; Rinkle Rani; Sumit Miglani

Social media has become very popular communication tool among internet users in the recent years. A large unstructured data is available for analysis on the social web. The data available on these sites have redundancies as users are free to enter the data according to their knowledge and interest. This data needs to be normalized before doing any analysis due to the presence of various redundancies in it. In this paper, LinkedIn data is extracted by using LinkedIn API and normalized by removing redundancies. Further, data is also normalized according to locations of LinkedIn connections using geo coordinates provided by Microsoft Bing. Then, clustering of this normalized data set is done according to job title, company names and geographic locations using Greedy, Hierarchical and K-Means clustering algorithms and clusters are visualized to have a better insight into them.


international conference on recent advances and innovations in engineering | 2014

ADS: Protecting NTFS from hacking

Ruhi Mahajan; Maninder Singh; Sumit Miglani

Alternate Data Streams is one of the possible ways to hide data in NTFS file system in Windows. It was introduced to make Windows NTFS compatible with HFS file system of Macintosh. This paper explains what exactly alternate data streams are, their requirement and their functionality. It also explains whether alternate data streams is a feature or a vulnerability of NTFS file system. It explains how hacker can utilize this functionality of NTFS to hide malicious codes in victims machine so as to compromise it. All possible ways of hiding data and techniques for detecting and removing ADS are also explained. It mainly focuses on criminals who use various data hiding techniques in order to hide their data from the forensic analysts. Finally its main focus is on explaining an ADS Tool that is a graphical tool which enables user to create, start, detect and delete ADS.


international conference on inventive computation technologies | 2016

Efficient and secure message transfer in VANET

Rajeev Singh; Sumit Miglani

Wireless medium shows a key role from past few years in the world of communication. Mobile Adhoc Network (MANET) is an important field of wireless communication. Vehicular Adhoc Network (VANET) is a new area of MANET in which a car acts as node communicator with rest of the cars and road side infrastructure in the network. Security is a major issue in VANET as it provide safety as well as non safety application to the users. Varied works have already been done by researchers for the security in VANET but securing the message communication between cars still poses an issue. From this paper, we introduce a model which provides a secure communication between cars. In our model, RSUs acts as a Certificate Authority(CA) which will generate the key using Elliptic Curve Cryptography(ECC) for the cars and after that communication between cars takes place using Elliptic Curve Diffie Hellman (ECDH).


Archive | 2016

Analysis and Visualization of Professional’s LinkedIn Data

Puneet Garg; Rinkle Rani; Sumit Miglani

Social media has become very popular communication tool among internet users in the recent years. A large unstructured data is available for analysis on the social web. The data available on these sites have redundancies as users are free to enter the data according to their knowledge and interest. This data needs to be normalized before doing any analysis due to the presence of various redundancies in it. In this paper, LinkedIn data is extracted by using LinkedIn API and normalized by removing redundancies. Further, data is also normalized according to locations of LinkedIn connections using geo coordinates provided by Microsoft Bing. Then, clustering of this normalized data set is done according to job title, company names and geographic locations using Greedy, Hierarchical and K-Means clustering algorithms and clusters are visualized to have a better insight into them.


Archive | 2013

Feasibility analysis of different methods for prevention against ARP spoofing

Sumit Miglani; Inderjeet Kaur


Archive | 2015

Mixed Based Classifier Approach for Sentiment Analysis

Sudhanhsu Bhatia; Ashutosh Mishra; Sumit Miglani


Archive | 2015

A Hybrid Approach for Image Security by Combining Watermarking with Encryption

Pushpak Yadav; Sumit Miglani; Maggi Bansal


Archive | 2015

Analysis and Visualization of Social Data

Puneet Garg; Rinkle Rani; Sumit Miglani


Archive | 2014

Performance Monitoring and Analyzer Tool for CG SCADA

Shailendra Rathore; Sumit Miglani


Archive | 2014

XSS Proof of Concept Implementation, Analysis and Countermeasures

Richa Singla; Sumit Miglani; Maninder Singh

Collaboration


Dive into the Sumit Miglani's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge