Deepak Kumar

Orcid: 0000-0003-2409-9706

Affiliations:
  • Amity University Uttar Pradesh, Amity Institute of Information Technology, Noida, India


According to our database1, Deepak Kumar authored at least 14 papers between 2011 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Product backlog optimization technique in agile software development using clustering algorithm.
Multim. Tools Appl., December, 2023

2021
Stochastic Intrusion Detection Game-Based Arrangement Using Controlled Markov Chain for Prevention of DoS and DDoS Attacks in Cloud.
J. Inf. Technol. Res., 2021

2020
Improving Cost for Data Migration in Cloud Computing Using Genetic Algorithm.
Int. J. Softw. Innov., 2020

2019
A reversible and multipurpose ECG data hiding technique for telemedicine applications.
Pattern Recognit. Lett., 2019

A Hidden Markov Model Combined With Markov Games for Intrusion Detection in Cloud.
J. Cases Inf. Technol., 2019

Prioritising vulnerabilities using ANP and evaluating their optimal discovery and patch release time.
Int. J. Math. Oper. Res., 2019

Prioritizing and Optimizing Disaster Recovery Solution using Analytic Network Process and Multi Attribute Utility Theory.
Int. J. Inf. Technol. Decis. Mak., 2019

2018
Modelling of Cloud Computing Enablers Using MICMAC Analysis and TISM.
Int. J. Ambient Comput. Intell., 2018

Performance of CSE Techniques for Designing Multiplier-Less FIR Filter Using Evolutionary Algorithms.
Circuits Syst. Signal Process., 2018

2017
Modeling and measuring attributes influencing DevOps implementation in an enterprise using structural equation modeling.
Inf. Softw. Technol., 2017

Requirement Paradigms to Implement the Software Projects in Agile Development Using Analytical Hierarchy Process.
Int. J. Decis. Support Syst. Technol., 2017

2016
Modelling and measuring code smells in enterprise applications using TISM and two-way assessment.
Int. J. Syst. Assur. Eng. Manag., 2016

A Review of Game-Theoretic Approaches for Secure Virtual Machine Resource Allocation in Cloud.
ICTCS, 2016

2011
Role of IT in Business Process Reengineering.
Proceedings of the International Conference on Recent Trends in Information Systems, 2011


  Loading...