Hemraj Saini
TitleCited byYear
Cyber-crimes and their impacts: A review
H Saini, YS Rao, TC Panda
International Journal of Engineering Research and Applications 2 (2), 202-209, 2012
Service level agreement assurance in cloud computing: a trust issue
SB Dash, H Saini, TC Panda, A Mishra
International Journal of Computer Science and Information Technologies 5 (3 …, 2014
VAIN: A Stochastic Model for Dynamics of Malicious Objects
DK Saini, H Saini
the ICFAI Journal of Systems Management 6 (1), 14-28, 2008
Proactive cyber defense and reconfigurable framework for cyber security
H Saini, D Saini
strategies 2, 3, 2007
Cyber attack classification using game theoretic weighted metrics approach
BK Mishra, H Saini
World Applied Sciences Journal 7, 206-215, 2009
Malicious Object dynamics in the presence of Anti Malicious Software
H Saini, DK Saini
European Journal of Scientific Research ISSN, 491-499, 2005
A recent review on lightweight cryptography in IoT
ER Naru, H Saini, M Sharma
2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics …, 2017
E-Business System Development: review on method, design factors, techniques and tools with an extensive case study for secure online retail selling industry
H Saini, D Saini, N Gupta
Indian Journal of Science and Technology 2 (5), 2009
Vm consolidation for cloud data center using median based threshold approach
O Sharma, H Saini
Procedia Computer Science 89, 27-33, 2016
Prediction of trustworthiness in the cloud computing environment using predator-prey model
H Saini, SB Dash, TC Panda, A Mishra
International Journal of Cloud Computing and Services Science 2 (5), 2013
Various code clone detection techniques and tools: a comprehensive survey
P Gautam, H Saini
International Conference on Smart Trends for Information Technology and …, 2016
Efficient hybrid watermarking approach by using SVD, DWT, and Back Propagation Neural Network
H Saini
2014 IEEE International Advance Computing Conference (IACC), 985-990, 2014
A theoretical aspect of cloud computing service models and its security issues: A paradigm
SB Dash, H Saini, TC Panda, A Mishra
Journal of Engineering Research and Applications, ISSN, 2248-9622, 2014
Prediction of Malicious Objects in Computer Network and Defense
H Sainia, TC Panda, M Panda
International Journal of Network Security & Its Applications 3 (6), 161, 2011
Taxonomy of cell planning
LK Sharma, H Saini, TC Panda, HN Pratihari
International Journal of Reviews in Computing 3, 66-74, 2010
Security concerns with open research issues of present computer network
G Rathee, H Saini
International Journal of Computer Science and Information Security 14 (4), 406, 2016
Extended Cyber Defense Architecture for a University: A Case Study.
H Saini, TC Panda
IUP Journal of Science & Technology 6 (2), 2010
A hybrid framework for multimedia data processing in IoT-healthcare using blockchain technology
G Rathee, A Sharma, H Saini, R Kumar, R Iqbal
Multimedia Tools and Applications, 1-23, 2019
Novel Noncommutative Cryptography Scheme Using Extra Special Group
G Kumar, H Saini
Security and Communication Networks 2017, 2017
A Fast Handoff Technique in Wireless Mesh Network (FHT for WMN)
G Rathee, H Saini
Procedia Computer Science 79, 722-728, 2016
The system can't perform the operation now. Try again later.
Articles 1–20