Maninder Singh
Orcid: 0000-0001-8489-8759
According to our database1,
Maninder Singh
authored at least 84 papers
between 2009 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Enhancing healthcare security: Time-based authentication for privacy-preserving IoMT sensor monitoring framework leveraging blockchain technology.
Concurr. Comput. Pract. Exp., October, 2024
Design and implementation of blockchain-based supply chain framework with improved traceability, privacy, and ownership.
Clust. Comput., June, 2024
Clust. Comput., June, 2024
Trans. Emerg. Telecommun. Technol., January, 2024
Proceedings of the IEEE International Conference on Electro Information Technology, 2024
2023
J. Comput. Virol. Hacking Tech., November, 2023
Performance Analysis of a Lightweight Robust Chaotic Image Re-encryption Scheme for 5G Heterogeneous Networks.
Wirel. Pers. Commun., April, 2023
Mutual Coupling Reduction Techniques for UWB - MIMO Antenna for Band Notch Characteristics: A Comprehensive Review.
Wirel. Pers. Commun., 2023
Equivalent circuit model-based design and analysis of microstrip line fed electrically small patch antenna for sub-6 GHz 5G applications.
Int. J. Commun. Syst., 2023
Framework of Geofence Service using Dummy Location Privacy Preservation in Vehicular Cloud Network.
Int. Arab J. Inf. Technol., 2023
Development and Validation of Artery-Vein Ratio Measurement Based on Deep Learning Architectures.
Proceedings of the IEEE Region 10 Conference, 2023
Improving Delivery of UML Class Diagrams Concepts in Computer Science Education Through Collaborative Learning.
Proceedings of the IEEE Frontiers in Education Conference, 2023
2022
Post-quantum cryptography techniques for secure communication in resource-constrained Internet of Things devices: A comprehensive survey.
Softw. Pract. Exp., 2022
Good view frames from ultrasonography (USG) video containing ONS diameter using state-of-the-art deep learning architectures.
Medical Biol. Eng. Comput., 2022
Signature based Merkle Hash Multiplication algorithm to secure the communication in IoT devices.
Knowl. Based Syst., 2022
Framework of data privacy preservation and location obfuscation in vehicular cloud networks.
Concurr. Comput. Pract. Exp., 2022
A post-quantum lattice based lightweight authentication and code-based hybrid encryption scheme for IoT devices.
Comput. Networks, 2022
Design and implementation of transaction privacy by virtue of ownership and traceability in blockchain based supply chain.
Clust. Comput., 2022
Proceedings of the 32nd Conference of Open Innovations Association, 2022
Development of an Automated Algorithm to Quantify Optic Nerve Diameter Using Ultrasound Measures: Implications for Optic Neuropathies.
Proceedings of the Computer Vision and Machine Intelligence, 2022
2021
Breast Cancer Detection Based on Feature Selection Using Enhanced Grey Wolf Optimizer and Support Vector Machine Algorithms.
Vietnam. J. Comput. Sci., 2021
J. Intell. Syst., 2021
Multicriteria decision making based optimum virtual machine selection technique for smart cloud environment.
J. Ambient Intell. Smart Environ., 2021
Int. J. Comput. Appl. Technol., 2021
Performance Analysis of Target Information Recognition System for Agricultural Robots.
Int. J. Agric. Environ. Inf. Syst., 2021
Trans. Emerg. Telecommun. Technol., 2021
Classification of Testable and Valuable User Stories by using Supervised Machine Learning Classifiers.
Proceedings of the IEEE International Symposium on Software Reliability Engineering, 2021
Automating Key Phrase Extraction from Fault Logs to Support Post-Inspection Repair of Software Requirements.
Proceedings of the ISEC 2021: 14th Innovations in Software Engineering Conference, 2021
Application of back-translation: a transfer learning approach to identify ambiguous software requirements.
Proceedings of the ACM SE '21: 2021 ACM Southeast Conference, 2021
Proceedings of the ACM SE '21: 2021 ACM Southeast Conference, 2021
2020
Hybrid intrusion detection and signature generation using Deep Recurrent Neural Networks.
Neural Comput. Appl., 2020
Cyber forensics framework for big data analytics in IoT environment using machine learning.
Multim. Tools Appl., 2020
Computational Design of Biologically Active Anticancer Peptides and Their Interactions with Heterogeneous POPC/POPS Lipid Membranes.
J. Chem. Inf. Model., 2020
Orientation-based Ant colony algorithm for synthesizing the test scenarios in UML activity diagram.
Inf. Softw. Technol., 2020
Using Semantic Analysis and Graph Mining Approaches to Support Software Fault Fixation.
Proceedings of the 2020 IEEE International Symposium on Software Reliability Engineering Workshops, 2020
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020
2019
Using Natural Language Processing and Graph Mining to Explore Inter- Related Requirements in Software Artefacts.
ACM SIGSOFT Softw. Eng. Notes, 2019
RADAR: Self-configuring and self-healing in resource management for enhancing quality of cloud services.
Concurr. Comput. Pract. Exp., 2019
A novel clustering technique for efficient clustering of big data in Hadoop Ecosystem.
Big Data Min. Anal., 2019
Big Data Min. Anal., 2019
Using Association Rule Mining Algorithm to Improve the Order of Content Delivery in CS1 Course.
Proceedings of the IEEE Frontiers in Education Conference, 2019
Using Peer Code Review to Support Pedagogy in an Introductory Computer Programming Course.
Proceedings of the IEEE Frontiers in Education Conference, 2019
2018
Semantic code clone detection for Internet of Things applications using reaching definition and liveness analysis.
J. Supercomput., 2018
BULLET: Particle Swarm Optimization Based Scheduling Technique for Provisioned Cloud Resources.
J. Netw. Syst. Manag., 2018
Int. J. Online Mark., 2018
Int. J. Inf. Commun. Technol., 2018
CHOPPER: an intelligent QoS-aware autonomic resource management approach for cloud computing.
Clust. Comput., 2018
Proceedings of the 26th IEEE International Requirements Engineering Conference, 2018
Proceedings of the 2018 IEEE International Symposium on Software Reliability Engineering Workshops, 2018
Proceedings of the Security and Privacy - Second ISEA International Conference, 2018
Proceedings of the IEEE International Symposium on Circuits and Systems, 2018
Validating Requirements Reviews by Introducing Fault-Type Level Granularity: A Machine Learning Approach.
Proceedings of the 11th Innovations in Software Engineering Conference, ISEC 2018, Hyderabad, India, February 09, 2018
2017
Int. J. Secur. Networks, 2017
Comput. Lang. Syst. Struct., 2017
Comput. Electr. Eng., 2017
2016
J. Intell. Fuzzy Syst., 2016
Concurr. Comput. Pract. Exp., 2016
Impairment Aware Routing and Wavelength Assignment model employing binary logic operators.
Proceedings of the 2016 International Conference on Optical Network Design and Modeling, 2016
Integrating 'State of the Network' information into impairment model using binary logic operators.
Proceedings of the 2016 International Conference on Computing, 2016
2015
Data mining-based integrated network traffic visualization framework for threat detection.
Neural Comput. Appl., 2015
Proceedings of the 2015 International Conference on Advances in Computing, 2015
Proceedings of the Eighth International Conference on Contemporary Computing, 2015
2014
SHAPE - an approach for self-healing and self-protection in complex distributed networks.
J. Supercomput., 2014
IEEE Commun. Surv. Tutorials, 2014
Automatic Evaluation and Signature Generation Technique for Thwarting Zero-Day Attacks.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2014
Routing multiple services in Optical Transport Network environment using mixed line rates.
Proceedings of the 2014 International Conference on Advances in Computing, 2014
Pattern matching algorithms for intrusion detection and prevention system: A comparative analysis.
Proceedings of the 2014 International Conference on Advances in Computing, 2014
Proceedings of the Risks and Security of Internet and Systems, 2014
2013
2012
Proceedings of the Information Systems, Technology and Management, 2012
2011
Adv. Fuzzy Syst., 2011
Proceedings of the Information Intelligence, Systems, Technology and Management, 2011
2010
Scalable Comput. Pract. Exp., 2010
Proceedings of the ICWET '10 International Conference & Workshop on Emerging Trends in Technology, Mumbai, Maharashtra, India, February 26, 2010
2009
Proceedings of the ARTCom 2009, 2009