Follow
Dr. Umesh Kumar Singh
Dr. Umesh Kumar Singh
Vikram University, Ujjain, India
No verified email - Homepage
Title
Cited by
Cited by
Year
Data mining: Prediction for performance improvement of graduate students using classification
K Bunkar, UK Singh, B Pandya, R Bunkar
2012 Ninth International Conference on Wireless and Optical Communications …, 2012
6002012
Information security risks management framework–A step towards mitigating security risks in university network
C Joshi, UK Singh
Journal of Information Security and Applications 35, 128-137, 2017
1452017
Intrusion detection using machine learning for risk mitigation in IoT-enabled smart irrigation in smart farming
A Raghuvanshi, UK Singh, GS Sajja, H Pallathadka, E Asenso, M Kamal, ...
Journal of Food Quality 2022, 1-8, 2022
1222022
A review of various security and privacy innovations for IoT applications in healthcare
A Raghuvanshi, UK Singh, C Joshi
Advanced healthcare systems: empowering physicians with IoT‐enabled …, 2022
622022
A framework for zero-day vulnerabilities detection and prioritization
UK Singh, C Joshi, D Kanellopoulos
Journal of Information Security and Applications 46, 164-172, 2019
542019
Quantitative security risk evaluation using CVSS metrics by estimation of frequency and maturity of exploit
UK Singh, C Joshi
Proceedings of the World Congress on Engineering and Computer Science 1, 19-21, 2016
492016
A review on taxonomies of attacks and vulnerability in computer and network system
C Joshi, UK Singh, K Tarey
International Journal 5 (1), 742-747, 2015
452015
An overview and study of security issues & challenges in cloud computing
R Piplode, UK Singh
International Journal of Advanced Research in Computer Science and Software …, 2012
412012
A comparative study of traditional estimation methods and maximum product spacings method in generalized inverted exponential distribution
U Singh, SK Singh, RK Singh
Journal of Statistics Applications & Probability 3 (2), 153, 2014
372014
On prioritization of vulnerability categories based on CVSS scores
A Tripathi, UK Singh
2011 6th International Conference on Computer Sciences and Convergence …, 2011
372011
Security testing and assessment of vulnerability scanners in quest of current information security landscape
C Joshi, UK Singh
International Journal of Computer Applications 145 (2), 1-7, 2016
362016
WITHDRAWN: An investigation of various applications and related security challenges of Internet of things
A Raghuvanshi, UK Singh, M Shuaib, S Alam
Materials Today: Proceedings, 2021
352021
Information security assessment by quantifying risk level of network vulnerabilities
UK Singh, C Joshi, N Gaud
International Journal of Computer Applications 156 (2), 37-44, 2016
342016
Performance evaluation of web application security scanners for more effective defense
C Joshi, UK Singh
International Journal of Scientific and Research Publications (IJSRP) 6 (6 …, 2016
332016
Reliability estimation for inverse Lomax distribution under type Π censored data using Markov chain Monte Carlo method
SK Singh, U Singh, AS Yadav
International Journal of Mathematics and Statistics 17 (1), 128-146, 2016
322016
Information Security Risk Management Framework for University Computing Environment.
UK Singh, C Joshi
Int. J. Netw. Secur. 19 (5), 742-751, 2017
272017
Admit-A five dimensional approach towards standardization of network and computer attack taxonomies
C Joshi, UK Singh
International Journal of Computer Applications 100 (5), 30-36, 2014
272014
Internet of Things: Taxonomy of various attacks
A Raghuvanshi, DUK Singh, P Panse, M Saxena, RK Veluri
European Journal of Molecular & Clinical Medicine 7 (10), 3853-3864, 2020
262020
An Overview and Study of Security Issues & Challenges in Mobile Ad-hoc Networks(MANET)
UK Singh, S Mewada, L Iaddhani, K Bunkar
International Journal of Computer Science and Information Security 9 (4 …, 2011
262011
Taxonomic analysis of classification schemes in vulnerability databases
A Tripathi, UK Singh
2011 6th International Conference on Computer Sciences and Convergence …, 2011
252011
The system can't perform the operation now. Try again later.
Articles 1–20