Hemraj Saini
TitleCited byYear
Cyber-crimes and their impacts: A review
H Saini, YS Rao, TC Panda
International Journal of Engineering Research and Applications 2 (2), 202-209, 2012
VAIN: A Stochastic Model for Dynamics of Malicious Objects
DK Saini, H Saini
the ICFAI Journal of Systems Management 6 (1), 14-28, 2008
Proactive cyber defense and reconfigurable framework for cyber security
H Saini, D Saini
strategies 2, 3, 2007
Cyber attack classification using game theoretic weighted metrics approach
BK Mishra, H Saini
World Applied Sciences Journal 7, 206-215, 2009
Malicious Object dynamics in the presence of Anti Malicious Software
H Saini, DK Saini
European Journal of Scientific Research ISSN, 491-499, 2005
Service level agreement assurance in cloud computing: a trust issue
SB Dash, H Saini, TC Panda, A Mishra
International Journal of Computer Science and Information Technologies 5 (3 …, 2014
A recent review on lightweight cryptography in IoT
ER Naru, H Saini, M Sharma
2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics …, 2017
E-Business System Development: review on method, design factors, techniques and tools with an extensive case study for secure online retail selling industry
H Saini, D Saini, N Gupta
Indian Journal of Science and Technology 2 (5), 2009
Vm consolidation for cloud data center using median based threshold approach
O Sharma, H Saini
Procedia Computer Science 89, 27-33, 2016
Various code clone detection techniques and tools: a comprehensive survey
P Gautam, H Saini
International Conference on Smart Trends for Information Technology and …, 2016
Prediction of Malicious Objects in Computer Network and Defense
H Sainia, TC Panda, M Panda
International Journal of Network Security & Its Applications 3 (6), 161, 2011
Taxonomy of cell planning
LK Sharma, H Saini, TC Panda, HN Pratihari
International Journal of Reviews in Computing 3, 66-74, 2010
Security concerns with open research issues of present computer network
G Rathee, H Saini
International Journal of Computer Science and Information Security 14 (4), 406, 2016
Prediction of trustworthiness in the cloud computing environment using predator-prey model
H Saini, SB Dash, TC Panda, A Mishra
International Journal of Cloud Computing and Services Science 2 (5), 2013
Extended Cyber Defense Architecture for a University: A Case Study.
H Saini, TC Panda
IUP Journal of Science & Technology 6 (2), 2010
Cyber defense architecture in campus wide network
H Saini, D Saini
3rd International Conference on Quality, Reliability and INFOCOM Technology …, 2006
A hybrid framework for multimedia data processing in IoT-healthcare using blockchain technology
G Rathee, A Sharma, H Saini, R Kumar, R Iqbal
Multimedia Tools and Applications, 1-23, 2019
Mathematical Model for Cyber Attack in Computer Network
YS Rao, AK Rauta, H Saini, TC Panda
International Journal of Business Data Communications and Networking (IJBDCN …, 2017
Aspects of secure communication during spectrum handoff in cognitive radio networks
G Rathee, P Thakur, G Singh, H Saini
2016 International Conference on Signal Processing and Communication (ICSC …, 2016
Extended Honeypot Framework to Detect old/new cyber attacks
H Saini, BK Mishra, HN Pratihari, TC Panda
International Journal of Engineering Science (IJEST) 3, 2421-2426, 2011
The system can't perform the operation now. Try again later.
Articles 1–20