Archana Singhal

Orcid: 0000-0003-2702-5518

According to our database1, Archana Singhal authored at least 17 papers between 2009 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
A feedback-based combinatorial fair economical double auction resource allocation model for cloud computing.
Future Gener. Comput. Syst., 2021

2019
A Combinatorial Fair Economical Double Auction Resource Allocation Model.
Proceedings of the Advances in Computing and Data Sciences, 2019

Role of Lexical and Syntactic Fixedness in Acquisition of Hindi MWEs.
Proceedings of the Advances in Computing and Data Sciences, 2019

An Efficient Knowledge-Based Text Pre-processing Approach for Twitter and Google+.
Proceedings of the Advances in Computing and Data Sciences, 2019

2016
Towards a generic E-Cloud Architecture for Universities.
Int. J. Web Appl., 2016

2015
A system for compound adverbs MWEs extraction in Hindi.
Proceedings of the Eighth International Conference on Contemporary Computing, 2015

2014
FISA-XP: an agile-based integration of security activities with extreme programming.
ACM SIGSOFT Softw. Eng. Notes, 2014

Selection of Security Activities for Integration with Agile Methods after Combining their Agility and Effectiveness.
Int. J. Web Appl., 2014

2013
Threat-oriented security framework in risk management using multiagent system.
Softw. Pract. Exp., 2013

Mitigating multi-threats optimally in proactive threat management.
ACM SIGSOFT Softw. Eng. Notes, 2013

Fuzzy Logic Approach for Threat Prioritization in Agile Security Framework using DREAD Model.
CoRR, 2013

2012
Classification of RSS feed news items using ontology.
Proceedings of the 12th International Conference on Intelligent Systems Design and Applications, 2012

2011
Layered security architecture for threat management using multi-agent system.
ACM SIGSOFT Softw. Eng. Notes, 2011

MASPTA-O: Multiagent System Planning to Avoid Threats Optimally.
Inf. Secur. J. A Glob. Perspect., 2011

2009
Identifying Security Requirements Hybrid Technique.
Proceedings of the Fourth International Conference on Software Engineering Advances, 2009

Avoiding Threats Using Multi Agent System Planning for Web Based Systems.
Proceedings of the Computational Collective Intelligence. Semantic Web, 2009

Threat Mitigation, Monitoring and Management Plan - A New Approach in Risk Management.
Proceedings of the ARTCom 2009, 2009


  Loading...