Rajni Ranjan Singh
Rajni Ranjan Singh
MITS Gwalior
Verified email at mitsgwalior.in - Homepage
TitleCited byYear
Network forensics: detection and analysis of stealth port scanning attack
RR Singh, DS Tomar
scanning 4, 8, 2015
82015
Approaches for user profile investigation in orkut social network
RR Singh, DS Tomar
arXiv preprint arXiv:0912.1008, 2009
82009
Dynamic surface control based ts-fuzzy model for a class of uncertain nonlinear systems
UP Singh, S Jain, R Singh, M Parmar, R Makwana, J Kumare
International Journal of Control Theory and Applications 9 (2), 1333-1345, 2016
62016
A review of cyber attack classification technique based on data mining and neural network approach
B Dharamkar, RR Singh
international Journal of computer trends and technology 7 (2), 100-105, 2014
62014
Cyber-attack classification using improved ensemble technique based on support vector machine and neural network
B Dharamkar, RR Singh
Int. J. Comput. Appl 103 (11), 1-7, 2014
42014
Comparative Analysis based Classification of KDD'99 Intrusion Dataset
S Upadhyay, RR Singh
International Journal of Computer Science and Information Security 13 (3), 14, 2015
32015
Radiation intercep⁃ tion and radiation use efficiency in barley
R Singh, D Singh, B Biawas
Journal of Agrometeorology 14, 358-362, 2012
22012
Seroprevalence of brucellosis in cattle and buffalo herds
KP Singh, R Singh, DK Singh
Indian Journal of Veterinary Pathology 29 (1), 48-49, 2005
22005
Cross site scripting (XSS) attack detection using intrustion detection system
K Gupta, RR Singh, M Dixit
2017 International Conference on Intelligent Computing and Control Systems …, 2017
12017
Comparative Analysis of Computer Assisted Valuation of Descriptive Answers using WEKA with different classification algorithms
RRSM Ruhi Dubey
SSRG International Journal of Computer Science and Engineering (SSRG-IJCSE …, 2017
1*2017
Port Scanning Attack Analysis with Dempster-Shafer Evidence Theory
RR Singh, DS Tomar
International Journal of Applied Engineering Research 12 (16), 5900-5904, 2017
12017
Deadlock Avoidance: A Dynamic Programming Approach
RR Singh, DK Singh
2010 International Conference on Computational Intelligence and …, 2010
12010
Computer-Assisted Valuation of Descriptive Answers Using Weka with RandomForest Classification
R Dubey, RRS Makwana
Proceeding of the Second International Conference on Microelectronics …, 2019
2019
Protective effect of Omega-3 fatty acids on blood lipid profile of cigarette smoke exposed rats
A Agarwal, R Singh, P Singh
Journal of Ecophysiology and Occupational Health 10 (1-2), 1-4, 2017
2017
A SURVEY ON WEB APPLICATION ATTACK DETECTION METHODS
K Gupta, RR Singh
International Journal of Advanced Research in Computer Science 8 (7), 2017
2017
Enhancing Provider's Profit on Cloud Market Infrastructure.
G Mishra, RR Singh
International Journal of Advanced Research in Computer Science 8 (5), 2017
2017
Storage Efficient Capturing of Port Scanning Attack Traffic
RR Singh, DS Tomar
International Journal of Applied Engineering Research 12 (22), 12652-12658, 2017
2017
A Survey on IDS Alerts Classification Techniques
S Upadhyay, RR Singh
International Journal of Computer Applications 105 (12), 2014
2014
AMELIORATIVE EFFECT OF ASHWAGANDHA AGAINST SO2 TOXICITY ON SERUM IMMUNOGLOBULINS IN ALBINO RAT
P KUMARI, A AGARWAL, R SINGH
Hybridized Combinational Feature Selection Framework for Network Intrusion Detection System (HCFSF)
S Seth, RRS Makwana, M Dixit
Probe 11656, 2421, 0
The system can't perform the operation now. Try again later.
Articles 1–20