Software clone detection: A systematic review MS Dhavleesh Rattan, Rajesh Bhatia Information and Software Technology 55, 1165-1199, 2013 | 525* | 2013 |
A survey on zero-day polymorphic worm detection techniques R Kaur, M Singh IEEE Communications Surveys & Tutorials 16 (3), 1520-1549, 2014 | 100 | 2014 |
Automatic attack signature generation systems: A review S Kaur, M Singh IEEE Security & Privacy 11 (6), 54-61, 2013 | 47 | 2013 |
Efficient hybrid technique for detecting zero-day polymorphic worms R Kaur, M Singh 2014 IEEE International Advance Computing Conference (IACC), 95-100, 2014 | 32 | 2014 |
Model clone detection based on tree comparison D Rattan, R Bhatia, M Singh India Conference (INDICON), 2012 Annual IEEE, 1041-1046, 2012 | 25 | 2012 |
SHAPE—an approach for self-healing and self-protection in complex distributed networks I Chopra, M Singh The Journal of Supercomputing 67, 585-613, 2014 | 19 | 2014 |
Evaluation of Flow Graph and Dependence Graphs for Program Representation V Arora, RK Bhatia, M Singh International Journal of Computer Applications 56 (14), 2012 | 18 | 2012 |
Masking approach to secure systems from Operating system Fingerprinting S Kalia, M Singh TENCON 2005 2005 IEEE Region 10, 1-6, 2005 | 13 | 2005 |
Analysing the need for autonomic behaviour in grid computing I Chopra, M Singh 2010 The 2nd International Conference on Computer and Automation Engineering …, 2010 | 10 | 2010 |
Hardening OS identity by customised masking techniques R Kaur, M Singh Proceedings of 2009 Indo US Workshop and Conference on Cyber Security, Cyber …, 2009 | 5 | 2009 |
Comparison and evaluation of clone detection tools: An experimental approach M Kaur, D Rattan, R Bhatia, M Singh CSI Journal of computing 1 (4), 44-54, 2012 | 4 | 2012 |
Agent based self-healing system for grid computing I Chopra, M Singh Proceedings of the International Conference and Workshop on Emerging Trends …, 2010 | 4 | 2010 |
Z language based an algorithm for event detection, analysis and classification in machine vision S Singh, I Chana, M Singh 2013 International Conference on Human Computer Interactions (ICHCI), 1-7, 2013 | 3 | 2013 |
SASM-an approach towards self-protection in grid computing I Chopra, M Singh International Conference on Information Intelligence, Systems, Technology …, 2011 | 3 | 2011 |
Implementing Self-Protection in distributed grid environment I Chopra, M Singh Scalable Computing: Practice and Experience 11 (4), 373-384, 2010 | 2 | 2010 |
A Powerful Easy-to-Use Packet Control API for Linux M Singh 2009 International Conference on Advances in Recent Technologies in …, 2009 | 2 | 2009 |
A review of coupling and cohesion measurement in OO systems using program slicing SK Khalsa, RK Bhatia, JK Chhabra, M Singh Information Systems, Technology and Management: 6th International Conference …, 2012 | 1 | 2012 |
Automating the fault tolerance process in Grid Environment I Chopra, M Singh International Journal of Computer Science and Information Security 8 (7), 224-30, 2010 | 1 | 2010 |
Designing Masking Ruleset for Hiding Operating System Identity M Singh, M Singh THAPAR UNIVERSITY PATIALA, 2007 | 1 | 2007 |
Automatic Attack Signature Generation Systems: A Review MS Sanmeet Kaur IEEE Security and Privacy, 12, 2013 | | 2013 |