Comparative study of symmetric and asymmetric cryptography techniques R Tripathi, S Agrawal International Journal of Advance Foundation and Research in Computer (IJAFRC …, 2014 | 150 | 2014 |
FormCalc 7 S Agrawal, T Hahn, E Mirabella Journal of Physics: Conference Series 368 (1), 012054, 2012 | 48 | 2012 |
An experimental approach towards big data for analyzing memory utilization on a hadoop cluster using HDFS and MapReduce A Pal, S Agrawal 2014 First International Conference on Networks & Soft Computing (ICNSC2014 …, 2014 | 42 | 2014 |
Knowledge management framework for improving curriculum development processes in technical education S Agrawal, PB Sharma, M Kumar 2008 Third International Conference on Convergence and Hybrid Information …, 2008 | 34 | 2008 |
A performance analysis of mapreduce task with large number of files dataset in big data using hadoop A Pal, K Jain, P Agrawal, S Agrawal 2014 Fourth International Conference on Communication Systems and Network …, 2014 | 31 | 2014 |
An intrusion detection system for detecting denial-of-service attack in cloud using artificial bee colony S Sharma, A Gupta, S Agrawal Proceedings of the International Congress on Information and Communication …, 2016 | 21 | 2016 |
A review of research on MapReduce scheduling algorithms in Hadoop N Singh, S Agrawal International Conference on Computing, Communication & Automation, 637-642, 2015 | 17 | 2015 |
A hybrid partial fingerprint matching algorithm for estimation of equal error rate P Agrawal, R Kapoor, S Agrawal 2014 IEEE International Conference on Advanced Communications, Control and …, 2014 | 15 | 2014 |
A Comprehensive study of the image enhancement techniques P Agrawal, V Chourasia, R Kapoor, S Agrawal International Journal of Advance Foundation and Research in Computer (IJAFRC …, 2014 | 15 | 2014 |
Improved support vector machine for cyber attack detection S Singh, S Agrawal, MA Rizvi, RS Thakur Proceedings of the World Congress on Engineering and Computer Science 1, 2011 | 15 | 2011 |
An efficient and effective lossless symmetric key cryptography algorithm for an image N Kumar, S Agrawal 2014 International Conference on Advances in Engineering & Technology …, 2014 | 14 | 2014 |
A hybrid approach for spam filtering using support vector machine and artificial immune system K Jain, S Agrawal 2014 First International Conference on Networks & Soft Computing (ICNSC2014 …, 2014 | 9 | 2014 |
Methods to ensure quality of service in cloud computing environment S Dubey, S Agrawal International Journal of Advanced Research in Computer Science and Software …, 2013 | 9 | 2013 |
A hybrid approach for spam filtering using local concentration based K-means clustering K Jain, S Agrawal 2014 5th International Conference-Confluence The Next Generation Information …, 2014 | 7 | 2014 |
Critical Analysis of RSA Public Key Cryptosystem R Tripathi, S Agrawal International Journal of Advanced Research in Computer Science and Software …, 2014 | 7 | 2014 |
Partial fingerprint matching: Fusion of level 2 and level 3 features P Agrawal, R Kapoor, S Agrawal 2014 5th International Conference-Confluence The Next Generation Information …, 2014 | 6 | 2014 |
Sentiment Classification using Machine Learning: A Survey KP Singh, S Agrawal International Journal on Recent and Innovation Trends in Computing and …, 2017 | 5* | 2017 |
IT based knowledge management framework for improving research and development process in technical education S Agrawal, PB Sharma, M Kumar, A Kumar Journal of Engineering, Science and Management Education 2, 17-22, 2010 | 4 | 2010 |
A survey of intrusion detection system for denial of service attack in cloud S Sharma, A Gupta, S Agrawal International Journal of Computer Applications 120 (19), 2015 | 3 | 2015 |
Impact of Spam on the Environment & its Prevention K Jain, A Pal, M Sharma, S Agrawal IEEE Inter National Conference on Convergys of Technology, 2014 | 3 | 2014 |