Sarbjeet Singh
Orcid: 0000-0002-7603-9230
According to our database1,
Sarbjeet Singh
authored at least 51 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Entertain. Comput., 2024
2023
Pattern Recognit., August, 2023
Future Gener. Comput. Syst., June, 2023
Multim. Tools Appl., March, 2023
J. Grid Comput., 2023
2022
Recognition and Classification of Human Actions Using 2D Pose Estimation and Machine Learning.
J. Comput. Sci. Eng., December, 2022
Missing traffic data imputation using a dual-stage error-corrected boosting regressor with uncertainty estimation.
Inf. Sci., 2022
Digit. Signal Process., 2022
2021
Multi-objective Energy Aware Scheduling of Deadline Constrained Workflows in Clouds using Hybrid Approach.
Wirel. Pers. Commun., 2021
An intrinsic authorship verification technique for compromised account detection in social networks.
Soft Comput., 2021
Proceedings of the DSMLAI '21: International Conference on Data Science, Machine Learning and Artificial Intelligence, Windhoek Namibia, August 9, 2021
Proceedings of the DSMLAI '21: International Conference on Data Science, Machine Learning and Artificial Intelligence, Windhoek Namibia, August 9, 2021
Proceedings of the 19th OITS International Conference on Information Technology, 2021
Proceedings of the Fifth International Conference On Arabic Computational Linguistics, 2021
2020
TB-CoAuth: Text based continuous authentication for detecting compromised accounts in social networks.
Appl. Soft Comput., 2020
2019
Improved TOPSIS method for peak frame selection in audio-video human emotion recognition.
Multim. Tools Appl., 2019
The indirect costs assessment of railway incidents and their relationship to human error - The case of Signals Passed at Danger.
J. Rail Transp. Plan. Manag., 2019
An intelligent water drops-based approach for workflow scheduling with balanced resource utilisation in cloud computing.
Int. J. Grid Util. Comput., 2019
Int. Arab J. Inf. Technol., 2019
Concurr. Comput. Pract. Exp., 2019
MetaCom: Profiling Meta Data to Detect Compromised Accounts in Online Social Networks.
Proceedings of the Future Network Systems and Security - 5th International Conference, 2019
2018
Rise of spam and compromised accounts in online social networks: A state-of-the-art review of different combating approaches.
J. Netw. Comput. Appl., 2018
Modelling and simulation of an analytical approach to handle real-time traffic in VoIP network.
Int. J. Simul. Process. Model., 2018
AuthCom: Authorship verification and compromised account detection in online social networks using AHP-TOPSIS embedded profiling based technique.
Expert Syst. Appl., 2018
Comparison of learning techniques for prediction of customer churn in telecommunication.
Proceedings of the 28th International Telecommunication Networks and Applications Conference, 2018
Proceedings of the Intelligent Systems Design and Applications, 2018
Proceedings of the Intelligent Systems Design and Applications, 2018
2017
Ranking based comparative analysis of graph centrality measures to detect negative nodes in online social networks.
J. Comput. Sci., 2017
Fuzzy Rule-Based Expert System for Determining Trustworthiness of Cloud Service Providers.
Int. J. Fuzzy Syst., 2017
Design and Comparative Analysis of MCDM-based Multi-dimensional Trust Evaluation Schemes for Determining Trustworthiness of Cloud Service Providers.
J. Grid Comput., 2017
Improved TOPSIS Method Based Trust Evaluation Framework for Determining Trustworthiness of Cloud Service Providers.
J. Grid Comput., 2017
Compliance-based Multi-dimensional Trust Evaluation System for determining trustworthiness of Cloud Service Providers.
Future Gener. Comput. Syst., 2017
A comparative analysis of structural graph metrics to identify anomalies in online social networks.
Comput. Electr. Eng., 2017
2016
Int. J. Grid Util. Comput., 2016
Int. J. Grid Util. Comput., 2016
Int. J. Commun. Networks Distributed Syst., 2016
Int. J. Commun. Networks Distributed Syst., 2016
A dynamic, cost-aware, optimized data replication strategy for heterogeneous cloud data centers.
Future Gener. Comput. Syst., 2016
A Budget-constrained Time and Reliability Optimization BAT Algorithm for Scheduling Workflow Applications in Clouds.
Proceedings of the 7th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2016)/The 6th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2016)/Affiliated Workshops, 2016
2015
Modelling factors affecting human operator failure probability in railway maintenance tasks: an ISM-based analysis.
Int. J. Syst. Assur. Eng. Manag., 2015
Int. J. Syst. Assur. Eng. Manag., 2015
2014
Int. J. Syst. Assur. Eng. Manag., 2014
Proceedings of the Security in Computing and Communications, 2014
A Genetic Algorithm for Scheduling Workflow Applications in Unreliable Cloud Environment.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2014
Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014, 2014
Proceedings of the 5th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN-2014)/ The 4th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH 2014)/ Affiliated Workshops, 2014
2013
Proceedings of the International Conference on Advances in Computing, 2013
2011
Lumbosacral bending moment assessment and parameter optimization using Taguchi design during lifting task in a steel rolling mill.
Proceedings of the 2011 IEEE International Conference on Industrial Engineering and Engineering Management (IEEM), 2011
2009
A Comparative Study of Privacy Mechanisms and a Novel Privacy Mechanism [Short Paper].
Proceedings of the Information and Communications Security, 11th International Conference, 2009
2006
A Framework for Handling Security Problems in Grid Environment using Web Services Security Specifications.
Proceedings of the 2006 International Conference on Semantics, 2006
Proceedings of the 9th International Conference in Information Technology, 2006