Recent Advances and Countermeasures Against various attacks in IOT environment SK Siddharth Gautam,Ayasha Malik,Nanhay Singh 2nd IEEE International Conference on Signal Processing and Communication …, 2019 | 47* | 2019 |
SQL Injection: Types, Methodology, Attack Queries and Prevention SK Nanhay Singh,Mohit Dayal,R.S.Raw 3rd International Conference on Computing for Sustainable Global Development …, 2016 | 44 | 2016 |
Machine learning and ontology-based novel semantic document indexing for information retrieval A Sharma, S Kumar Computers & Industrial Engineering 176, 108940, 2023 | 40 | 2023 |
Experimental Comparisons of Clustering Approaches for Data Representation SK Sanjay Kumar Anand ACM Computing Survey 55 (3), 1-33, 2022 | 32* | 2022 |
A Comparative Analysis of Keyword and Semantic-Based Search Engines SK Yogender Kumar Negi Advances in Intelligent Systems and Computing book series (AISC) 243, 727-736, 2014 | 32* | 2014 |
Comparative analysis of role base and attribute base access control model in semantic web S Verma, M Singh, S Kumar International Journal of Computer Applications 46 (18), 1-6, 2012 | 32 | 2012 |
Ontology-based semantic retrieval of documents using Word2vec model A Sharma, S Kumar Data & Knowledge Engineering 144, 102110, 2023 | 30 | 2023 |
Deep analysis for development of RDF, RDFS and OWL ontologies with protege JA Khan, S Kumar Proceedings of 3rd International Conference on Reliability, Infocom …, 2014 | 28 | 2014 |
OWL, RDF, RDFS inference derivation using Jena semantic framework & pellet reasoner SK Javed Ahmad Khan International Conference on Advances in Engineering and Technology Research …, 2014 | 24 | 2014 |
Querying RDF and OWL data source using SPARQL SK Naveen Kumar IEEE, Fourth International Conference on Computing, Communication and …, 2013 | 22* | 2013 |
OWL-based ontology indexing and retrieving algorithms for Semantic Search Engine S Kumar, M Singh, A De 2012 7th International Conference on Computing and Convergence Technology …, 2012 | 21 | 2012 |
A cryptographic algorithm analysis for security threats of Semantic E-Commerce Web (SECW) for electronic payment transaction system A Dwivedi, A Dwivedi, S Kumar, SK Pandey, P Dabra Advances in computing and information technology, 367-379, 2013 | 20 | 2013 |
Current security considerations for issues and challenges of trustworthy semantic web A Dwivedi, S Kumar, A Dwivedi, M Singh International Journal of Advanced Networking and Applications 3 (1), 978, 2011 | 20 | 2011 |
Uncertainty Analysis in Ontology-Based Knowledge Representation SK Sanjay Kumar Anand New Generation Computing 40 (1), 339-376, 2022 | 17 | 2022 |
Bayesian rough set based information retrieval A Sharma, S Kumar Journal of Statistics and Management Systems 23 (7), 1147-1158, 2020 | 17 | 2020 |
Security enforcement using PKI in semantic web S Kumar, RK Prajapati, M Singh, A De 2010 International Conference on Computer Information Systems and Industrial …, 2010 | 17 | 2010 |
Semantic Web-Based Information Retrieval Models: A Systematic Survey A Sharma, S Kumar International Conference on Recent Developments in Science, Engineering and …, 2019 | 16 | 2019 |
A Rule-based approach for extraction of link-context from anchor-text structure S Kumar, N Kumar, M Singh, A De Intelligent Informatics, 261-271, 2013 | 15 | 2013 |
Realization of threats and countermeasure in Semantic Web services MS Kumar, MRK Prajapati, M Singh, A De International Journal of Computer Theory and Engineering 2 (6), 919, 2010 | 15 | 2010 |
Semantic Web attacks and Countermeasures SK Sumit Kumar International Conference on Advances in Engineering & Technology Research …, 2014 | 12 | 2014 |