Dependable solutions design by agile modeled layered security architectures MU Kumar, DS Kumar, BP Rani, KV Rao, AVK Prasad, D Shravani Advances in Computer Science and Information Technology. Networks and …, 2012 | 9 | 2012 |
Designing dependable web services security architecture solutions D Shravani, P Suresh Varma, B Padmaja Rani, M Upendra Kumar, ... Advances in Network Security and Applications: 4th International Conference …, 2011 | 8 | 2011 |
Android malware detection with classification based on hybrid analysis and N-gram feature extraction E Ravi, MU Kumar International Conference on Advancements in Smart Computing and Information …, 2022 | 7 | 2022 |
Ethnomedicines in the Khordha forest division of Khordha district, Odisha, India M Kumar, TA Butt, SA Hussaini, K Kumar, H Khan, ... International Journal of Current microbiology and applied sciences 3 (1 …, 2014 | 7 | 2014 |
Designing dependable business intelligence solutions using agile web services mining architectures AV Krishna Prasad, S Ramakrishna, B Padmaja Rani, M Upendra Kumar, ... Information Technology and Mobile Communication: International Conference …, 2011 | 7 | 2011 |
Nazli (2020). Emotional maturity and academic achievement among student of B. Ed. General and special education M Kumar, W Ahmad International Journal of Indian Psychology 8 (3), 148-152, 0 | 7 | |
Phytomedicines in health care among the forest ethnics of Balasore district, Orissa ZA Ali, SA Hussaini, M Kumar Hippocratic J Unani Med 5, 43-52, 2010 | 6 | 2010 |
Web services security architectures using role-based access control K Rao, M Rao, K Devi, D Kumar, M Kumar IJCSIT) International Journal of Computer Science and Information …, 2010 | 6 | 2010 |
Web services security architectures composition and contract design using RBAC D Shravani, PS Varma, BP Rani, DS Kumar, MU Kumar International Journal on Computer Science and Engineering 8 (2), 2609-2615, 2010 | 6 | 2010 |
Transformation of urban cities to sustainable smart cities-challenges and opportunities faced by saudi arabia M ANDEJANY, A MALIK, W AHMAD, DAM Alharbi, DS Umar, ... Journal of Theoretical and Applied Information Technology 101 (21), 6663-6676, 2023 | 5 | 2023 |
A comparative study on machine learning and deep learning methods for malware detection E Ravi, MU Kumar Journal of Theoretical and Applied Information Technology 100 (20), 2022 | 5 | 2022 |
Machine learning based outlier detection techniques for IoT data analysis: a comprehensive survey N Chander, MU Kumar Iaeme Publication 11, 2348-2362, 2020 | 5 | 2020 |
Metaheuristics with Deep Convolutional Neural Network for class imbalance handling with anomaly detection in industrial IoT environment N Chander, MU Kumar | 3 | 2022 |
Catalytic Reactivity Supported by Redox-Active Ligands Framing: A Mini Review M Kumar, S Ahmad, A Ali Russian Journal of Inorganic Chemistry 67 (10), 1573-1582, 2022 | 3 | 2022 |
Exergy analysis of double tube heat exchanger for parallel flow arrangement. SN Ahmad, N Priyadarshi, AK Bhoi, M Kumar, A Sharma IOP Conference Series: Materials Science and Engineering 377 (1), 012112, 2018 | 3 | 2018 |
A Novel Mechanism for Tuning Neural Network for Malware Detection in Android Device E Ravi, MU Kumar, SS Ahmad International Conference on Advancements in Smart Computing and Information …, 2023 | 2 | 2023 |
A Machine Learning Framework for Automatic Detection of Malware SS Ahmad, A Khan, P Kawadkar, I Khan, MU Kumar, D Shravani International Conference on Advancements in Smart Computing and Information …, 2022 | 2 | 2022 |
Web Services Security Architectures for Secure Service Oriented Analysis and Design,” D Shravani, PS Varma, BP Rani, KV Rao, MU Kumar International Journal of Computer Trends and Technology, ISSN, 2231-803, 2011 | 2 | 2011 |
Agile Modeling for Security Requirements–Embedded Application Case Study MU Kumar, DS Kumar, KV Rao, A MAdhuri, AVK Prasad, D Shravani International Journal of Engineering Science and Technology 2 (6), 2014-2019, 2010 | 2 | 2010 |
Software Architectures Design Patterns Mining for Security Engineering AVK Prasad, DS Ramakrishna, BP Rani, DS Kumar, MU Kumar et al./(IJCSIT) International Journal of Computer Science and Information …, 2010 | 2 | 2010 |