An efficient method to factorize the RSA public key encryption BR Ambedkar, A Gupta, P Gautam, SS Bedi 2011 International Conference on Communication Systems and Network …, 2011 | 51 | 2011 |
Enhanced security for electronic health care information using obfuscation and RSA algorithm in cloud computing P Gautam, MD Ansari, SK Sharma International Journal of Information Security and Privacy (IJISP) 13 (1), 59-69, 2019 | 45 | 2019 |
Various code clone detection techniques and tools: a comprehensive survey P Gautam, H Saini Smart Trends in Information Technology and Computer Communications: First …, 2016 | 28 | 2016 |
A novel software protection approach for code obfuscation to enhance software security P Gautam, H Saini International Journal of Mobile Computing and Multimedia Communications …, 2017 | 8 | 2017 |
Effect of machine learning techniques for efficient classification of EMG patterns in gait disorders M Kumar, P Gautam, VB Semwal International Journal of Electrical and Electronics Research 10 (2), 117-121, 2022 | 6 | 2022 |
Dimensionality reduction-based discriminatory classification of human activity recognition using machine learning M Kumar, P Gautam, VB Semwal Proceedings of Third International Conference on Computing, Communications …, 2022 | 5 | 2022 |
A review of computational model for bipedal robot walking using gait analysis M Kumar, P Gautam, VB Semwal 2020 International Conference on Emerging Smart Computing and Informatics …, 2020 | 5 | 2020 |
Non-trivial software clone detection using program dependency graph P Gautam, H Saini International Journal of Open Source Software and Processes 8 (2), 1-24, 2017 | 3 | 2017 |
Mutation testing-based evaluation framework for evaluating software clone detection tools P Gautam, H Saini Reliability and Risk Assessment in Engineering: Proceedings of INCRS 2018, 21-35, 2020 | 2 | 2020 |
DDoS Detection and Prediction Techniques-A Survey A Goyal, P Matta, P Gautam 2023 International Conference on Computational Intelligence and Sustainable …, 2023 | 1 | 2023 |
Intrusion Detection in Health Care System: A logistic Regression Approach A Tuteja, P Matta, S Sharma, K Nandan, P Gautam 2022 5th International Conference on Contemporary Computing and Informatics …, 2022 | 1 | 2022 |
A Mutation Operator-Based Scenario for Evaluating Software Clone Detection Tools and Techniques P Gautam, H Saini International Journal of Information Security and Privacy (IJISP) 13 (1), 30-45, 2019 | 1 | 2019 |
Correlation and Performance Estimation of Clone Detection Tools P Gautam, H Saini International Journal of Open Source Software and Processes (IJOSSP) 9 (2 …, 2018 | 1 | 2018 |
Type-2 software cone detection using directed acyclic graph P Gautam, H Saini 2017 Fourth International Conference on Image Information Processing (ICIIP …, 2017 | 1 | 2017 |
A hybrid approach for detection of Type-1 software clones P Gautam, H Saini 2017 4th International Conference on Signal Processing, Computing and …, 2017 | 1 | 2017 |
LSTM Approach for Efficient Stock Market Prediction S Kumar, U Aggarwal, P Gautam, A Tuteja, P Matta, S Maurya 2023 3rd International Conference on Intelligent Technologies (CONIT), 1-5, 2023 | | 2023 |
An Introspective Approach to Fathom Human-Inspired Bipedal Walk Using Gait Analysis for the Matrix of Cyber-Physical System M Kumar, P Gautam, VB Semwal Artificial Intelligence in Cyber-Physical Systems, 213-223, 2023 | | 2023 |
In Cloud Computing Detection of DDoS Attack Using AI-Based Ensembled Techniques A Shrivastava, P Gautam International Conference on Communications and Cyber Physical Engineering …, 2023 | | 2023 |
Intensification of Software Security using Secure Obfuscation with Injecting and Detecting Code Clones P Gautam, H Saini Jaypee University of Information Technology, Solan, HP, 2019 | | 2019 |
A Survey in Recent Trends and Techniques in Image Segmentation RK Sah, P Gautam, S Ahsan | | |