Uses of Artificial Intelligent Techniques to Build Accurate Models for Intrusion Detection System A Lamba, S Singh, S Bhardwaj, N Dutta, S Rela International Journal For Technological Research In Engineering 2 (12), 2015 | 60 | 2015 |
Mitigating cyber security threats of industrial control systems (scada & dcs) A Lamba, S Singh, S Balvinder, N Dutta, S Rela 3rd International Conference on Emerging Technologies in Engineering …, 2017 | 54 | 2017 |
Mitigating zero-day attacks in IoT using a strategic framework A Lamba, S Singh, S Balvinder International Journal for Technological Research in Engineering 4 (1), 2016 | 52 | 2016 |
Uses of cluster computing techniques to perform big data analytics for smart grid automation system A Lamba, S Singh, N Dutta, S Rela International Journal for Technological Research in Engineering 1 (7), 2014 | 50 | 2014 |
Uses of different cyber security service to prevent attack on smart home infrastructure A Lamba, S Singh, N Dutta, S Rela International Journal For Technological Research In Engineering 1 (11), 2014 | 46 | 2014 |
Analyzing and fixing cyber security threats for supply chain management A Lamba, S Singh, S Balvinder, N Dutta, S Rela International Journal For Technological Research In Engineering 4 (5), 2017 | 45 | 2017 |
S4: A novel & secure method for enforcing privacy in cloud data warehouses A Lamba, B Singh, S Singh, N Dutta, S Sai, R Muni International Journal for Technological Research in Engineering 3 (8), 5707-5710, 2016 | 45 | 2016 |
Mitigating IoT security and privacy challenges using distributed ledger based blockchain (Dl-BC) technology A Lamba, S Singh, S Balvinder, N Dutta, S Rela International Journal For Technological Research In Engineering 4 (8), 2017 | 37 | 2017 |
A comprehensive survey on security in cloud computing A Lamba, S Singh, N Dutta, S Rela International Conference on Emerging Technologies in Engineering, Biomedical …, 2016 | 28 | 2016 |
A study paper on security related issue before adopting cloud computing service model A Lamba, S Singh, S Balvinder, S Rela International Journal for Technological Research in Engineering 3 (4), 2015 | 28 | 2015 |
Identifying & Mitigating Cyber Security Threats In Vehicular Technologies A Lamba, S Singh, N Dutta, S Rela International Journal for Technological Research in Engineering 3 (7), 2016 | 27 | 2016 |
To Classify Cyber-Security Threats in Automotive Doming Using Different Assessment Methodologies A Lamba, S Singh, S Balvinder, S Rela International Journal For Technological Research In Engineering 3 (3), 2015 | 27 | 2015 |
Alternate bearing in mango. II. Regulation of growth and bearing with some plant regulators. S Singh, B Singh | 21 | 1963 |
Nutritional composition and value added products of beetroot: A review D Mudgal, S Singh, BR Singh Journal of Current Research in Food Science 3 (1), 01-09, 2022 | 17 | 2022 |
Quantum computing technology (QCT)-a data security threat A Lamba, P Pal, S Singh, B Singh, SSR Muni JETIR 5 (4), 2018 | 14 | 2018 |
Dsse: distributed security shielded execution for communicable cyber threats analysis S Singh, A Lamba, S Rela International Journal of Current Research 11, 3274-3282, 2019 | 8 | 2019 |
A Role of Data Mining Analysis to Identify Suspicious Activity Alert System A Lamba, N Dutta, S Rela, S Singh International Journal For Technological Research In Engineering 2 (3), 2014 | 7 | 2014 |
Trace element studies on some alkali and adjoining soils of Uttar Pradesh. III. Profile distribution of boron. S Singh, B Singh | 7 | 1967 |
Deriving intelligent data analytics using anomaly detection framework for IoT network and smart environments A Lamba, S Singh, S Balvinder, N Dutta, S Rela International Journal For Technological Research In Engineering 4 (6), 2017 | 6 | 2017 |
Effect of boron on quality and yield of wheat grains (RR 21). B Singh, SC Singh | 5 | 1976 |