Hemraj Saini
Title
Cited by
Cited by
Year
Cyber-crimes and their impacts: A review
H Saini, YS Rao, TC Panda
International Journal of Engineering Research and Applications 2 (2), 202-209, 2012
1262012
Workload characterization of elliptic curve cryptography and other network security algorithms for constrained environments
M Fiskiran
2002 IEEE International Workshop on Workload Characterization, 127-137, 2002
642002
A hybrid framework for multimedia data processing in IoT-healthcare using blockchain technology
G Rathee, A Sharma, H Saini, R Kumar, R Iqbal
Multimedia Tools and Applications 79 (15), 9711-9733, 2020
632020
A recent review on lightweight cryptography in IoT
ER Naru, H Saini, M Sharma
2017 international conference on I-SMAC (IoT in social, mobile, analytics …, 2017
392017
Service level agreement assurance in cloud computing: a trust issue
SB Dash, H Saini, TC Panda, A Mishra
222014
Various code clone detection techniques and tools: a comprehensive survey
P Gautam, H Saini
International Conference on Smart Trends for Information Technology and …, 2016
212016
A secure, energy-and SLA-efficient (SESE) E-healthcare framework for quickest data transmission using cyber-physical system
A Sharma, G Rathee, R Kumar, H Saini, V Varadarajan, Y Nam, ...
Sensors 19 (9), 2119, 2019
202019
Cyber attack classification using game theoretic weighted metrics approach
BK Mishra, H Saini
World Applied Sciences Journal 7, 206-215, 2009
202009
Vm consolidation for cloud data center using median based threshold approach
O Sharma, H Saini
Procedia Computer Science 89, 27-33, 2016
192016
A novel four-tier architecture for delay aware scheduling and load balancing in fog environment
S Sharma, H Saini
Sustainable Computing: Informatics and Systems 24, 100355, 2019
182019
VAIN: A Stochastic Model for Dynamics of Malicious Objects
DK Saini, H Saini
the ICFAI Journal of Systems Management 6 (1), 14-28, 2008
182008
Proactive cyber defense and reconfigurable framework for cyber security
H Saini, D Saini
strategies 2, 3, 2007
182007
Malicious Object dynamics in the presence of Anti Malicious Software
H Saini, DK Saini
European Journal of Scientific Research ISSN, 491-499, 2005
162005
A trust computed framework for IoT devices and fog computing environment
G Rathee, R Sandhu, H Saini, M Sivaram, V Dhasarathan
Wireless Networks 26 (4), 2339-2351, 2020
142020
E-Business System Development: review on method, design factors, techniques and tools with an extensive case study for secure online retail selling industry
H Saini, D Saini, N Gupta
Indian Journal of Science and Technology 2 (5), 2009
132009
Fog assisted task allocation and secure deduplication using 2FBO2 and MoWo in cluster-based industrial IoT (IIoT)
S Sharma, H Saini
Computer Communications 152, 187-199, 2020
112020
Novel noncommutative cryptography scheme using extra special group
G Kumar, H Saini
Security and communication networks 2017, 2017
102017
Novel Noncommutative Cryptography Scheme Using Extra Special Group, Security and Communication Networks, Volume 2017, Article ID 9036382, 21 pages
G Kumar, H Saini
10
Security concerns with open research issues of present computer network
G Rathee, H Saini
International Journal of Computer Science and Information Security 14 (4), 406, 2016
92016
Efficient hybrid watermarking approach by using SVD, DWT, and Back Propagation Neural Network
H Saini
2014 IEEE International Advance Computing Conference (IACC), 985-990, 2014
92014
The system can't perform the operation now. Try again later.
Articles 1–20