关注
Raman Singh
Raman Singh
在 uws.ac.uk 的电子邮件经过验证
标题
引用次数
引用次数
年份
An Intrusion Detection System using Network Traffic Profiling and Online Sequential Extreme Learning Machine
R Singh, H Kumar, RK Singla
Expert Systems with Applications, 2015
3002015
Deep learning-based object detection in low-altitude UAV datasets: A survey
P Mittal, R Singh, A Sharma
Image and Vision computing 104, 104046, 2020
2272020
Network augmentation by dynamically splitting the switching function in SDN
BS Rawal, G Manogaran, R Singh, M Poongodi, M Hamdi
2021 IEEE International Conference on Communications Workshops (ICC …, 2021
1602021
Implementation analysis of IoT-based offloading frameworks on cloud/edge computing for sensor generated big data
K Bajaj, B Sharma, R Singh
Complex & Intelligent Systems 8 (5), 3641-3658, 2022
1042022
Internet attacks and intrusion detection system: A review of the literature
R Singh, H Kumar, RK Singla, RR Ketti
Online Information Review 41 (2), 171-184, 2017
942017
Integration of WSN with IoT applications: a vision, architecture, and future challenges
K Bajaj, B Sharma, R Singh
Integration of WSN and IoT for Smart Cities, 79-102, 2020
792020
Statistical vertical reduction‐based data abridging technique for big network traffic dataset
S Garg, R Singh, MS Obaidat, VK Bhalla, B Sharma
International Journal of Communication Systems 33 (4), e4249, 2020
672020
Heart sound classification using machine learning and phonocardiogram
V Arora, R Leekha, R Singh, I Chana
Modern Physics Letters B 33 (26), 1950321, 2019
652019
TOPSIS Based Multi-Criteria Decision Making of Feature Selection Techniques for Network Traffic Dataset
R Singh, H Kumar, RK Singla
International Journal of Engineering and Technology 5 (6), 4598-4604, 2013
312013
Dilated convolution based RCNN using feature fusion for Low-Altitude aerial objects
P Mittal, A Sharma, R Singh, V Dhull
Expert Systems with Applications 199, 117106, 2022
282022
A Reference Dataset for Network Traffic Activity Based Intrusion Detection System
R Singh, H Kumar, RK Singla
International Journal of Computers, Communications & Control 10 (3), 390-402, 2015
222015
Analysis of Feature Selection Techniques for Network Traffic Dataset
R Singh, H Kumar, RK Singla
International Conference on Machine Intelligence and Research Advancement …, 2013
222013
Securing fog computing with a decentralised user authentication approach based on blockchain
O Umoren, R Singh, Z Pervez, K Dahal
Sensors 22 (10), 3956, 2022
212022
Blockchain-enabled end-to-end encryption for instant messaging applications
R Singh, ANS Chauhan, H Tewari
2022 IEEE 23rd International Symposium on a World of Wireless, Mobile and …, 2022
202022
Review of Soft Computing in Malware Detection
R Singh, H Kumar, RK Singla
Special issues on IP Multimedia Communications 1, 55-60, 2011
192011
A post-quantum lattice based lightweight authentication and code-based hybrid encryption scheme for IoT devices
S Kumari, M Singh, R Singh, H Tewari
Computer Networks 217, 109327, 2022
172022
Post‐quantum cryptography techniques for secure communication in resource‐constrained Internet of Things devices: A comprehensive survey
S Kumari, M Singh, R Singh, H Tewari
Software: Practice and Experience, 2022
172022
Framework of data privacy preservation and location obfuscation in vehicular cloud networks
H Al‐Balasmeh, M Singh, R Singh
Concurrency and Computation: Practice and Experience 34 (5), e6682, 2022
142022
Key management using Chebyshev polynomials for mobile ad hoc networks
KR Ramkumar, R Singh
China Communications 14 (11), 237-246, 2017
122017
Signature based Merkle Hash Multiplication algorithm to secure the communication in IoT devices
S Kumari, M Singh, R Singh, H Tewari
Knowledge-Based Systems 253, 109543, 2022
112022
系统目前无法执行此操作,请稍后再试。
文章 1–20