Maninder Singh

Orcid: 0000-0001-8489-8759

Affiliations:
  • Thapar University, Patiala, Punjab, India


According to our database1, Maninder Singh authored at least 41 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Enhancing healthcare security: Time-based authentication for privacy-preserving IoMT sensor monitoring framework leveraging blockchain technology.
Concurr. Comput. Pract. Exp., October, 2024

Design and implementation of blockchain-based supply chain framework with improved traceability, privacy, and ownership.
Clust. Comput., June, 2024

A secure blockchain framework for the internet of medical things.
Trans. Emerg. Telecommun. Technol., January, 2024

2023
Identifying bot infection using neural networks on DNS traffic.
J. Comput. Virol. Hacking Tech., November, 2023

TI-16 DNS Labeled Dataset for Detecting Botnets.
IEEE Access, 2023

2022
Design and implementation of transaction privacy by virtue of ownership and traceability in blockchain based supply chain.
Clust. Comput., 2022

2021
TI-2016 DNS dataset.
Dataset, September, 2021

A comprehensive review on blockchain and Internet of Things in healthcare.
Trans. Emerg. Telecommun. Technol., 2021

2020
Hybrid intrusion detection and signature generation using Deep Recurrent Neural Networks.
Neural Comput. Appl., 2020

Cyber forensics framework for big data analytics in IoT environment using machine learning.
Multim. Tools Appl., 2020

Orientation-based Ant colony algorithm for synthesizing the test scenarios in UML activity diagram.
Inf. Softw. Technol., 2020

2019
Detecting bot-infected machines using DNS fingerprinting.
Digit. Investig., 2019

RADAR: Self-configuring and self-healing in resource management for enhancing quality of cloud services.
Concurr. Comput. Pract. Exp., 2019

Issues and challenges in DNS based botnet detection: A survey.
Comput. Secur., 2019

2018
Semantic code clone detection for Internet of Things applications using reaching definition and liveness analysis.
J. Supercomput., 2018

BULLET: Particle Swarm Optimization Based Scheduling Technique for Provisioned Cloud Resources.
J. Netw. Syst. Manag., 2018

An empirical study of clone detection in MATLAB/Simulink models.
Int. J. Inf. Commun. Technol., 2018

Hadoop-based analytic framework for cyber forensics.
Int. J. Commun. Syst., 2018

CHOPPER: an intelligent QoS-aware autonomic resource management approach for cloud computing.
Clust. Comput., 2018

Fuzzy String Matching Algorithm for Spam Detection in Twitter.
Proceedings of the Security and Privacy - Second ISEA International Conference, 2018

2017
The Journey of QoS-Aware Autonomic Cloud Computing.
IT Prof., 2017

Synthesizing test scenarios in UML activity diagram using a bio-inspired approach.
Comput. Lang. Syst. Struct., 2017

Code clone genealogy detection on e-health system using Hadoop.
Comput. Electr. Eng., 2017

2016
Fuzzy reliability analysis of integrated network traffic visualization system.
J. Intell. Fuzzy Syst., 2016

A systematic review of approaches for testing concurrent programs.
Concurr. Comput. Pract. Exp., 2016

SOCCER: Self-Optimization of Energy-efficient Cloud Resources.
Clust. Comput., 2016

2015
Data mining-based integrated network traffic visualization framework for threat detection.
Neural Comput. Appl., 2015

Mobile applications: Analyzing private data leakage using third party connections.
Proceedings of the 2015 International Conference on Advances in Computing, 2015

Behavior analysis of malware using machine learning.
Proceedings of the Eighth International Conference on Contemporary Computing, 2015

2014
SHAPE - an approach for self-healing and self-protection in complex distributed networks.
J. Supercomput., 2014

A Survey on Zero-Day Polymorphic Worm Detection Techniques.
IEEE Commun. Surv. Tutorials, 2014

Automatic Evaluation and Signature Generation Technique for Thwarting Zero-Day Attacks.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2014

Pattern matching algorithms for intrusion detection and prevention system: A comparative analysis.
Proceedings of the 2014 International Conference on Advances in Computing, 2014

Two-Level Automated Approach for Defending Against Obfuscated Zero-Day Attacks.
Proceedings of the Risks and Security of Internet and Systems, 2014

2013
Software clone detection: A systematic review.
Inf. Softw. Technol., 2013

Automatic Attack Signature Generation Systems: A Review.
IEEE Secur. Priv., 2013

2012
A Review of Coupling and Cohesion Measurement in OO Systems Using Program Slicing.
Proceedings of the Information Systems, Technology and Management, 2012

2011
SASM- An Approach towards Self-protection in Grid Computing.
Proceedings of the Information Intelligence, Systems, Technology and Management, 2011

2010
Implementing Self-Protection in Distributed Grid Environment.
Scalable Comput. Pract. Exp., 2010

Agent based self-healing system for grid computing.
Proceedings of the ICWET '10 International Conference & Workshop on Emerging Trends in Technology, Mumbai, Maharashtra, India, February 26, 2010

2009
A Powerful Easy-to-Use Packet Control API for Linux.
Proceedings of the ARTCom 2009, 2009


  Loading...