Systems and methods for securely and transparently proxying SAAS applications through a cloud-hosted or on-premise network gateway for enhanced security and visibility P Gupta, S Singh, VR Ganesh, J Kann US Patent 10,778,684, 2020 | 106 | 2020 |
Key classification: a new approach in free text keystroke authentication system S Singh, KV Arya 2011 Third Pacific-Asia Conference on Circuits, Communications and System …, 2011 | 40 | 2011 |
Hiding image to video: A new approach of LSB replacement S Singh, G Agarwal International Journal of Engineering Science and Technology 2 (12), 6999-7003, 2010 | 38 | 2010 |
Use of image to secure text message with the help of LSB replacement S Singh, G Agarwal International journal of applied engineering research 1 (2), 200, 2010 | 35 | 2010 |
Improved hash based approach for secure color image steganography using canny edge detection method S Singh, A Datar International Journal of Computer Science and Network Security (IJCSNS) 15 …, 2015 | 29 | 2015 |
Some efficient classes of estimators under stratified sampling S Bhushan, A Kumar, S Singh Communications in Statistics-Theory and Methods 52 (6), 1767-1796, 2023 | 27 | 2023 |
Predicting order lead time for just in time production system using various machine learning algorithms: A case study S Singh, U Soni 2019 9th International Conference on Cloud Computing, Data Science …, 2019 | 25 | 2019 |
Use of Chinese Remainder Theorem to generate random numbers for Cryptography S Singh, G Agarwal International Journal of Applied Engineering Research 1 (2), 168, 2010 | 20 | 2010 |
Intelligent chatbot for prediction and management of stress T Sharma, J Parihar, S Singh 2021 11th International Conference on Cloud Computing, Data Science …, 2021 | 14 | 2021 |
A comparative study of mouse and keystroke based authentication J Handa, S Singh, S Saraswat 2019 9th International Conference on Cloud Computing, Data Science …, 2019 | 14 | 2019 |
In-Ho Ra, Weizhi Meng, Maninder Kaur, and Gi Hwan Cho." SH-BlockCC: A secure and efficient Internet of things smart home architecture based on cloud computing and blockchain … S Singh International Journal of Distributed Sensor Networks 15 (4), 1550147719844159, 2019 | 14 | 2019 |
Mouse interaction based authentication system by classifying the distance travelled by the mouse S Singh, DKV Arya International Journal of Computer Applications 17 (1), 45-48, 2011 | 14 | 2011 |
Systems and methods for secured web application data traffic K Khristi, M Agarwal, VR Ganesh, S Singh, V Prateek US Patent 10,574,444, 2020 | 13 | 2020 |
Affect of emotional intelligence on adversity quotient of Indian managers S Singh, T Sharma AIP Conference Proceedings 2016 (1), 2018 | 12 | 2018 |
Keyboard invariant biometric authentication P Smriti, S Srivastava, S Singh 2018 4th International Conference on Computational Intelligence …, 2018 | 12 | 2018 |
Integration of sound signature in graphical password authentication system S Singh, G Agarwal International Journal of Computer Applications 12 (9), 11-13, 2011 | 12 | 2011 |
Keystroke dynamics for continuous authentication S Singh 2018 8th International Conference on Cloud Computing, Data Science …, 2018 | 11 | 2018 |
Designing a Blockchain-Enabled Methodology for Secure Online Voting System S Singh, A Singh, S Verma, RK Dwivedi 2023 International Conference on Intelligent Data Communication Technologies …, 2023 | 10 | 2023 |
INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) V SRIKANTH Journal Impact Factor 3 (2), 238-255, 2012 | 10* | 2012 |
A modified class of log type estimators for population mean using auxiliary information on variables S Bhushan, R Gupta, S Singh, A Kumar International Journal of Applied Engineering Research 15 (6), 612-627, 2020 | 9 | 2020 |