Follow
Pratiksha Gautam
Pratiksha Gautam
Verified email at mail.juit.ac.in
Title
Cited by
Cited by
Year
An efficient method to factorize the RSA public key encryption
BR Ambedkar, A Gupta, P Gautam, SS Bedi
2011 International Conference on Communication Systems and Network …, 2011
522011
Enhanced security for electronic health care information using obfuscation and RSA algorithm in cloud computing
P Gautam, MD Ansari, SK Sharma
International Journal of Information Security and Privacy (IJISP) 13 (1), 59-69, 2019
412019
Various code clone detection techniques and tools: a comprehensive survey
P Gautam, H Saini
Smart Trends in Information Technology and Computer Communications: First …, 2016
272016
A novel software protection approach for code obfuscation to enhance software security
P Gautam, H Saini
International Journal of Mobile Computing and Multimedia Communications …, 2017
82017
A review of computational model for bipedal robot walking using gait analysis
M Kumar, P Gautam, VB Semwal
2020 International Conference on Emerging Smart Computing and Informatics …, 2020
52020
Dimensionality reduction-based discriminatory classification of human activity recognition using machine learning
M Kumar, P Gautam, VB Semwal
Proceedings of Third International Conference on Computing, Communications …, 2022
42022
Non-trivial software clone detection using program dependency graph
P Gautam, H Saini
International Journal of Open Source Software and Processes 8 (2), 1-24, 2017
32017
Mutation testing-based evaluation framework for evaluating software clone detection tools
P Gautam, H Saini
Reliability and Risk Assessment in Engineering: Proceedings of INCRS 2018, 21-35, 2020
22020
Intrusion Detection in Health Care System: A logistic Regression Approach
A Tuteja, P Matta, S Sharma, K Nandan, P Gautam
2022 5th International Conference on Contemporary Computing and Informatics …, 2022
12022
A Mutation Operator-Based Scenario for Evaluating Software Clone Detection Tools and Techniques
P Gautam, H Saini
International Journal of Information Security and Privacy (IJISP) 13 (1), 30-45, 2019
12019
Correlation and Performance Estimation of Clone Detection Tools
P Gautam, H Saini
International Journal of Open Source Software and Processes (IJOSSP) 9 (2 …, 2018
12018
Type-2 software cone detection using directed acyclic graph
P Gautam, H Saini
2017 Fourth International Conference on Image Information Processing (ICIIP …, 2017
12017
A hybrid approach for detection of Type-1 software clones
P Gautam, H Saini
2017 4th International Conference on Signal Processing, Computing and …, 2017
12017
LSTM Approach for Efficient Stock Market Prediction
S Kumar, U Aggarwal, P Gautam, A Tuteja, P Matta, S Maurya
2023 3rd International Conference on Intelligent Technologies (CONIT), 1-5, 2023
2023
DDoS Detection and Prediction Techniques-A Survey
A Goyal, P Matta, P Gautam
2023 International Conference on Computational Intelligence and Sustainable …, 2023
2023
An Introspective Approach to Fathom Human-Inspired Bipedal Walk Using Gait Analysis for the Matrix of Cyber-Physical System
M Kumar, P Gautam, VB Semwal
Artificial Intelligence in Cyber-Physical Systems, 213-223, 2023
2023
In Cloud Computing Detection of DDoS Attack Using AI-Based Ensembled Techniques
A Shrivastava, P Gautam
International Conference on Communications and Cyber Physical Engineering …, 2023
2023
Intensification of Software Security using Secure Obfuscation with Injecting and Detecting Code Clones
P Gautam, H Saini
Jaypee University of Information Technology, Solan, HP, 2019
2019
A Survey in Recent Trends and Techniques in Image Segmentation
RK Sah, P Gautam, S Ahsan
The system can't perform the operation now. Try again later.
Articles 1–19