National Institute of Technology Sikkim
  Department of Computer Science and Engineering
  संगणक विज्ञान एवं अभियांत्रिकी विभाग

Dr. Pankaj Kumar Keserwani

Assistant Professor

pankajkeserwani.cse@nitsikkim.ac.in     +91-8967067779

Research Interest : Application of Optimization and Machine/Deep Learning

About
Publications
Extras

Experience

6 years
Teachings
Foundation of Computing (CS12101), Object Oriented System Design (CS13104), Software Engineering (CS14105), Software Project Management (CS1*111), Nature-Inspired Computing (CS1*137)
Education
MS (Indian Institute of Information Technology, Allahabad)
PhD from NIT SIKKIM
Contact Address :
Computer Science and Engineering Department.
Faculty Room-3
National Institute of Technology Sikkim-737139

REFEREED INTERNATIONAL JOURNAL PUBLICATIONS

1. Keserwani, P. K., Govil, M. C., Pilli, E. S., & Govil, P. (2021). A smart anomaly-based intrusion detection system for the Internet of Things (IoT) network using GWO-PSO-RF model. Journal of Reliable Intelligent Environments, 7(1), 3-21.

2. Pankaj Kumar Keserwani, Mahesh Chandra Govil, and Emmanuel Shubhakar Pilli, The Web Ad Click Fraud Detection Approach for Supporting to the Online Advertising System, Inderscience Publishers: International Journal Swarm Intelligence.

3. Keserwani, P. K., Govil, M. C., & Pilli, E. S. (2021). An effective NIDS framework based on a comprehensive survey of feature optimization and classification techniques ,Neural Computing and Applications, 1-21.

4. Keserwani, P. K., Govil, M. C., Pilli, E. S., & Govil, P. (2021). An Optimal NIDS for VCN using Feature Selection and Deep Learning Technique. International Journal of Digital Crime and Forensics (IJDCF).

5. Keserwani, Pankaj Kumar, Mahesh Chandra Govil, and Emmanuel S. Pilli. "An Optimal Intrusion Detection System using GWO-CSA- DSAE Model." Cyber-Physical Systems (2020): 1- 24.

6. Ray, S., Samaddar, S. G., & Keserwani, P. (2012). An Efficient Architecture of Decision Support System for Testing Potential Geographical Indication in India. In Advanced Materials Research (Vol. 403, pp. 4476-4485). Trans Tech Publications Ltd.

REFEREED INTERNATIONAL CONFERENCE PUBLICATIONS

1. Keserwani, P. K., Jha, V., Govil, M. C., \& Pilli, E. S. (2021). Clickedroid: A Methodology Based on Heuristic Approach to Detect Mobile Ad-Click Frauds. In Proceedings of the International Conference on Paradigms of Computing, Communication and Data Sciences: PCCDS 2020 (pp. 853-864). Springer Singapore.

2. Keserwani, P. K., Govil, M. C., & Shubhakar, P. E. (2020, July). Evidence Building for Ad Click or Web Access on Cloud. In International Conference on Machine Learning, Image Processing, Network Security and Data Sciences (pp. 486-500). Springer, Singapore.

3. Keserwani, P. K., & Govil, M. C. (2020, July). A Hybrid Symmetric Key Cryptography Method to Provide Secure Data Transmission. In International Conference on Machine Learning, Image Processing, Network Security and Data Sciences (pp. 461- 474). Springer, Singapore.

4. Keserwani, P. K., & Samaddar, S. G. (2017, December). An SLA Design with Digital Forensic Capabilities. In 2017 Ninth International Conference on Advanced Computing (ICoAC) (pp. 109-113). IEEE.

5. Keserwani, P. K., & Samaddar, S. G. (2017, November). Customization of Service level agreement for digital forensics as a service. In Proceedings of the 7th International Conference on Computer and Communication Technology (pp. 139- 150).

6. Keserwani, P. K., Samaddar, S. G., & Kumar, P. (2020). e-Learning Web Services and Their Composition Strategy in SOA. In Smart Computing Paradigms: New Progresses and Challenges (pp. 291-302). Springer, Singapore.

7. Mishra, A. K., Keserwani, P. K., Samaddar, S. G., Lamichaney, H. B., \& Mishra, A. K. (2018). A decision support system in healthcare prediction. In Advanced Computational and Communication Paradigms (pp. 156-167). Springer, Singapore.

8. Das, U. K., Samaddar, S. G., & Keserwani, P. K. (2018). Digital forensic enabled image authentication using least significant bit (lsb) with tamper localization based hash function. In Intelligent Communication and Computational Technologies (pp. 141- 155). Springer, Singapore.

9. Kumar, N., Keserwani, P. K., & Samaddar, S. G. (2017, December). A Comparative Study of Machine Learning Methods for Generation of Digital Forensic Validated Data. In 2017 Ninth International Conference on Advanced Computing (ICoAC) (pp. 15-20). IEEE.

10. Yadav, M. P., Keserwani, P. K., & Samaddar, S. G. (2012, March). An efficient web mining algorithm for Web Log analysis: E-Web Miner. In 2012 1st International Conference on Recent Advances in Information Technology (RAIT) (pp. 607-613). IEEE.