A survey on machine learning-based malware detection in executable files J Singh, J Singh Journal of Systems Architecture 112, 101861, 2021 | 230 | 2021 |
Challenges of Malware Analysis: Obfuscation Techniques JS Jagsir Singh International Journal of Information Security Science 7 (3), 100-110, 2018 | 83* | 2018 |
Detection of malicious software by analyzing the behavioral artifacts using machine learning algorithms J Singh, J Singh Information and Software Technology 121, 106273, 2020 | 69 | 2020 |
Assessment of supervised machine learning algorithms using dynamic API calls for malware detection J Singh, J Singh International Journal of Computers and Applications 44 (3), 270-277, 2022 | 31 | 2022 |
Performance Comparison of OLSR, GRP and TORA using OPNET JS Harmanpreet Kaur International Journal of Advanced Research in Computer Science And Software …, 2012 | 19 | 2012 |
Mobility Models for MANET: Mathematical Perspective GJ Apurva, Jaswinder Singh International Journal of Advanced Research in Engineering and Applied …, 2013 | 13* | 2013 |
Analysis of Multi Cloud Storage applications for resource constrained mobile devices SKG Rajeev Kumar Bedi, Jaswinder Singh Elsevier journal Perspectives in Science. 8, 279-282, 2016 | 11* | 2016 |
MWC: An Efficient and Secure Multi Cloud Storage Approach to Leverage Augmentation of Multi Cloud Storage Services on Mobile Devices using Fog Computing SKG Rajeev Kumar Bedi , Jaswinder Singh Journal of Super Computing (Springer, SCI Journal, I.F 2.157, UGC Approved …, 2019 | 9* | 2019 |
Toward Normalizing Romanized Gurumukhi Text from Social Media JK Jaswinder Singh Indian Journal of Science and Technology, 8 (27), 1-6, 2015 | 8 | 2015 |
MANET: A Study of Challenges and Routing Principles JS Gurpinder Singh International Journal of Advanced and Innovative Research 1 (1), 2012 | 8 | 2012 |
Malware classification using multi-layer perceptron model J Singh, J Singh International Conference on Innovative Computing and Communications …, 2021 | 5 | 2021 |
An Efficient and Secure Privacy Preserving Multi Cloud Storage Framework for Mobile Devices SKG Rajeev Kumar Bedi, Jaswinder Singh International Journal of Computers and Applications, 2019 | 5* | 2019 |
Proposed Security System to Embed Fingerprinting and Voice Recognition for ATMs JK Jaswinder Singh International Journal of Advanced Research in Computer Science and Software …, 2015 | 5 | 2015 |
Ransomware : An Illustration of Malicious Cryptography JS Jagsir Singh International Journal of Recent Technology and Engineering 8 (2), 1608-1611, 2019 | 4* | 2019 |
Current trends in Cloud Storage for resource constrained mobile devices SKG Jaswinder Singh, Rajeev Kumar Bedi IEEE International Conference on Wireless communications Signal Processing …, 2016 | 4* | 2016 |
Evaluation of Penetration Testing Tools of KALI LINUX JS Gurdeep Singh International Journal of Innovations & Advancement in Computer Science …, 2016 | 4* | 2016 |
Hybrid computer aided diagnostic system designs for screen film mammograms using DL‐based feature extraction and ML‐based classifiers J Rani, J Singh, J Virmani Expert Systems 40 (7), e13309, 2023 | 3 | 2023 |
Design and implementation of an efficient multi cloud storage approach for resource constrained mobile devices SKG RK Bedi, J Singh Cluster Computing (Springer, SCI Journal, I.F. 2.04, , UGC Approved),, 1-15, 2017 | 3* | 2017 |
A Novel Approach for Multi-Cloud Storage for Mobile Devices RK Bedi, J Singh, SK Gupta International Journal of Information Technology and Web Engineering (IJITWE …, 2018 | 2 | 2018 |
Hybridization of Particle Swarm Optimization - A Survey JS Geetika International Journal of Science and Research 4 (1), 2015 | 2 | 2015 |