Awadhesh Kumar Singh
According to our database1,
Awadhesh Kumar Singh
authored at least 64 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Multim. Tools Appl., April, 2024
EEG-based emotion recognition using MobileNet Recurrent Neural Network with time-frequency features.
Appl. Soft Comput., 2024
2023
Scalable Comput. Pract. Exp., November, 2023
SN Comput. Sci., September, 2023
Advanced Persistent Threats (APT): evolution, anatomy, attribution and countermeasures.
J. Ambient Intell. Humaniz. Comput., July, 2023
Adaptive cross-site scripting attack detection framework for smart devices security using intelligent filters and attack ontology.
Soft Comput., 2023
A novel approach for detection of APT malware using multi-dimensional hybrid Bayesian belief network.
Int. J. Inf. Sec., 2023
2022
Implementing attack detection system using filter-based feature selection methods for fog-enabled IoT networks.
Telecommun. Syst., 2022
A hybrid approach towards reduced checkpointing overhead in cloud-based applications.
Peer-to-Peer Netw. Appl., 2022
XSS Armor: Constructing XSS Defensive Framework for Preserving Big Data Privacy in Internet-of-Things (IoT) Networks.
J. Circuits Syst. Comput., 2022
Int. J. Semantic Web Inf. Syst., 2022
Int. J. Commun. Syst., 2022
Orchestration of APT malware evasive manoeuvers employed for eluding anti-virus and sandbox defense.
Comput. Secur., 2022
A systematic survey on security concerns in cryptocurrencies: State-of-the-art and perspectives.
Comput. Secur., 2022
Securing heterogeneous embedded devices against XSS attack in intelligent IoT system.
Comput. Secur., 2022
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2022
2021
J. King Saud Univ. Comput. Inf. Sci., 2021
J. King Saud Univ. Comput. Inf. Sci., 2021
Blockchain based audit trailing of XAI decisions: Storing on IPFS and Ethereum Blockchain.
Proceedings of the 13th International Conference on COMmunication Systems & NETworkS, 2021
2020
Int. J. Commun. Syst., 2020
Proceedings of the Handbook of Computer Networks and Cyber Security, 2020
2019
Wirel. Pers. Commun., 2019
Speedy leader election to avoid application discontinuity in cognitive radio networks.
Telecommun. Syst., 2019
J. Ambient Intell. Humaniz. Comput., 2019
Clust. Comput., 2019
2018
An election algorithm to ensure the high availability of leader in large mobile ad hoc networks.
Int. J. Parallel Emergent Distributed Syst., 2018
2017
A logical structure based fault tolerant approach to handle leader election in mobile ad hoc networks.
J. King Saud Univ. Comput. Inf. Sci., 2017
2016
J. King Saud Univ. Comput. Inf. Sci., 2016
2015
Wirel. Pers. Commun., 2015
J. King Saud Univ. Comput. Inf. Sci., 2015
Authentication and privacy preserving message transfer scheme for vehicular ad hoc networks (VANETs).
Proceedings of the 12th ACM International Conference on Computing Frontiers, 2015
2014
Multi-objective workflow grid scheduling using ε-fuzzy dominance sort based discrete particle swarm optimization.
J. Supercomput., 2014
J. Inf. Sci. Eng., 2014
J. Inf. Process. Syst., 2014
Int. J. Commun. Networks Distributed Syst., 2014
2013
J. Inf. Sci. Eng., 2013
2012
Int. J. Appl. Evol. Comput., 2012
2011
Message efficient global snapshot recording using a self stabilizing spanning tree in a MANET.
Int. J. Commun. Networks Inf. Secur., 2011
Multi-objective Workflow Grid Scheduling Based on Discrete Particle Swarm Optimization.
Proceedings of the Swarm, Evolutionary, and Memetic Computing, 2011
Proceedings of the 10th International Symposium on Parallel and Distributed Computing, 2011
Proceedings of the 31st IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2011 Workshops), 2011
Proceedings of the High Performance Architecture and Grid Computing, 2011
Proceedings of the Third International Conference on Communication Systems and Networks, 2011
An Agreement Protocol to Handle Byzantine Failures in Authenticated Hierarchical Configuration.
Proceedings of the Advanced Computing, Networking and Security - International Conference, 2011
Proceedings of the International Conference on Advances in Computing and Artificial Intelligence, 2011
Proceedings of the International Conference on Advances in Computing and Artificial Intelligence, 2011
Proceedings of the International Conference on Advances in Computing and Artificial Intelligence, 2011
2010
IEEE Signal Process. Lett., 2010
J. Inf. Sci. Eng., 2010
A Token-Based Solution to the Group Mutual l-Exclusion Problem in Message Passing Distributed Systems.
Proceedings of the Distributed Computing and Networking, 11th International Conference, 2010
Proceedings of the Distributed Computing and Networking, 11th International Conference, 2010
Proceedings of the Contemporary Computing - Third International Conference, 2010
2009
A Hierarchical Approach to Handle Group Mutual Exclusion Problem in Distributed Systems.
Proceedings of the Distributed Computing and Networking, 10th International Conference, 2009
Proceedings of the Distributed Computing and Networking, 10th International Conference, 2009
2008
Proceedings of the First International Conference on Emerging Trends in Engineering and Technology, 2008
2005
Rev. Colomb. de Computación, 2005
2004
J. Comput. Sci. Technol., 2004