Data mining: Prediction for performance improvement of graduate students using classification K Bunkar, UK Singh, B Pandya, R Bunkar 2012 Ninth International Conference on Wireless and Optical Communications …, 2012 | 600 | 2012 |
Information security risks management framework–A step towards mitigating security risks in university network C Joshi, UK Singh Journal of Information Security and Applications 35, 128-137, 2017 | 145 | 2017 |
Intrusion detection using machine learning for risk mitigation in IoT-enabled smart irrigation in smart farming A Raghuvanshi, UK Singh, GS Sajja, H Pallathadka, E Asenso, M Kamal, ... Journal of Food Quality 2022, 1-8, 2022 | 122 | 2022 |
A review of various security and privacy innovations for IoT applications in healthcare A Raghuvanshi, UK Singh, C Joshi Advanced healthcare systems: empowering physicians with IoT‐enabled …, 2022 | 62 | 2022 |
A framework for zero-day vulnerabilities detection and prioritization UK Singh, C Joshi, D Kanellopoulos Journal of Information Security and Applications 46, 164-172, 2019 | 54 | 2019 |
Quantitative security risk evaluation using CVSS metrics by estimation of frequency and maturity of exploit UK Singh, C Joshi Proceedings of the World Congress on Engineering and Computer Science 1, 19-21, 2016 | 49 | 2016 |
A review on taxonomies of attacks and vulnerability in computer and network system C Joshi, UK Singh, K Tarey International Journal 5 (1), 742-747, 2015 | 45 | 2015 |
An overview and study of security issues & challenges in cloud computing R Piplode, UK Singh International Journal of Advanced Research in Computer Science and Software …, 2012 | 41 | 2012 |
A comparative study of traditional estimation methods and maximum product spacings method in generalized inverted exponential distribution U Singh, SK Singh, RK Singh Journal of Statistics Applications & Probability 3 (2), 153, 2014 | 37 | 2014 |
On prioritization of vulnerability categories based on CVSS scores A Tripathi, UK Singh 2011 6th International Conference on Computer Sciences and Convergence …, 2011 | 37 | 2011 |
Security testing and assessment of vulnerability scanners in quest of current information security landscape C Joshi, UK Singh International Journal of Computer Applications 145 (2), 1-7, 2016 | 36 | 2016 |
WITHDRAWN: An investigation of various applications and related security challenges of Internet of things A Raghuvanshi, UK Singh, M Shuaib, S Alam Materials Today: Proceedings, 2021 | 35 | 2021 |
Information security assessment by quantifying risk level of network vulnerabilities UK Singh, C Joshi, N Gaud International Journal of Computer Applications 156 (2), 37-44, 2016 | 34 | 2016 |
Performance evaluation of web application security scanners for more effective defense C Joshi, UK Singh International Journal of Scientific and Research Publications (IJSRP) 6 (6 …, 2016 | 33 | 2016 |
Reliability estimation for inverse Lomax distribution under type Π censored data using Markov chain Monte Carlo method SK Singh, U Singh, AS Yadav International Journal of Mathematics and Statistics 17 (1), 128-146, 2016 | 32 | 2016 |
Information Security Risk Management Framework for University Computing Environment. UK Singh, C Joshi Int. J. Netw. Secur. 19 (5), 742-751, 2017 | 27 | 2017 |
Admit-A five dimensional approach towards standardization of network and computer attack taxonomies C Joshi, UK Singh International Journal of Computer Applications 100 (5), 30-36, 2014 | 27 | 2014 |
Internet of Things: Taxonomy of various attacks A Raghuvanshi, DUK Singh, P Panse, M Saxena, RK Veluri European Journal of Molecular & Clinical Medicine 7 (10), 3853-3864, 2020 | 26 | 2020 |
An Overview and Study of Security Issues & Challenges in Mobile Ad-hoc Networks(MANET) UK Singh, S Mewada, L Iaddhani, K Bunkar International Journal of Computer Science and Information Security 9 (4 …, 2011 | 26 | 2011 |
Taxonomic analysis of classification schemes in vulnerability databases A Tripathi, UK Singh 2011 6th International Conference on Computer Sciences and Convergence …, 2011 | 25 | 2011 |