Rajni Ranjan Singh
Rajni Ranjan Singh
MITS Gwalior
Verified email at mitsgwalior.in - Homepage
TitleCited byYear
Network forensics: detection and analysis of stealth port scanning attack
RR Singh, DS Tomar
scanning 4, 8, 2015
92015
Approaches for user profile investigation in orkut social network
RR Singh, DS Tomar
arXiv preprint arXiv:0912.1008, 2009
82009
A review of cyber attack classification technique based on data mining and neural network approach
B Dharamkar, RR Singh
Int J Comput Trends Technol 7 (2), 100-105, 2014
62014
Dynamic Surface Control Based TS-Fuzzy Model for a Class of Uncertain Nonlinear Systems.
UP Singh, S Jain, RK Singh, M Parmar, RRS Makwana, JS Kumare
International Journal of Control Theory and Applications 9 (2), 1333-1345, 2016
52016
Cyber-attack classification using improved ensemble technique based on support vector machine and neural network
B Dharamkar, RR Singh
Int. J. Comput. Appl 103 (11), 1-7, 2014
42014
Comparative Analysis based Classification of KDD'99 Intrusion Dataset
S Upadhyay, RR Singh
International Journal of Computer Science and Information Security 13 (3), 14, 2015
22015
Herpetic keratitis causing lacrimal hyposecretion and xerosis
D Singh, M Singh, R Singh
Herpetische Augenerkrankungen, 211-214, 1981
21981
Cross site scripting (XSS) attack detection using intrustion detection system
K Gupta, RR Singh, M Dixit
Intelligent Computing and Control Systems (ICICCS), 2017 International …, 2017
12017
Deadlock Avoidance: A Dynamic Programming Approach
RR Singh, DK Singh
2010 International Conference on Computational Intelligence and …, 2010
12010
Fertilizer prescription based on specific yield of barley (Hordeum vulgare)
M Singh, R Singh, ML Dixit
Annals of Biology (India), 2004
12004
Computer-Assisted Valuation of Descriptive Answers Using Weka with RandomForest Classification
R Dubey, RRS Makwana
Proceeding of the Second International Conference on Microelectronics …, 2019
2019
A SURVEY ON WEB APPLICATION ATTACK DETECTION METHODS
K Gupta, RR Singh
International Journal of Advanced Research in Computer Science 8 (7), 2017
2017
Comparative Analysis of Computer Assisted Valuation of Descriptive Answers using WEKA with different classification algorithms
RRSM Ruhi Dubey
SSRG International Journal of Computer Science and Engineering (SSRG-IJCSE …, 2017
2017
Enhancing Provider's Profit on Cloud Market Infrastructure.
G Mishra, RR Singh
International Journal of Advanced Research in Computer Science 8 (5), 2017
2017
Storage Efficient Capturing of Port Scanning Attack Traffic
RR Singh, DS Tomar
International Journal of Applied Engineering Research 12 (22), 12652-12658, 2017
2017
Port Scanning Attack Analysis with Dempster-Shafer Evidence Theory
RR Singh, DS Tomar
International Journal of Applied Engineering Research 12 (16), 5900-5904, 2017
2017
A Survey on IDS Alerts Classification Techniques
S Upadhyay, RR Singh
International Journal of Computer Applications 105 (12), 2014
2014
Hybridized Combinational Feature Selection Framework for Network Intrusion Detection System (HCFSF)
S Seth, RRS Makwana, M Dixit
Probe 11656, 2421, 0
The system can't perform the operation now. Try again later.
Articles 1–18