Maninder Singh

Orcid: 0000-0001-8489-8759

According to our database1, Maninder Singh authored at least 79 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A secure blockchain framework for the internet of medical things.
Trans. Emerg. Telecommun. Technol., January, 2024

2023
Identifying bot infection using neural networks on DNS traffic.
J. Comput. Virol. Hacking Tech., November, 2023

Performance Analysis of a Lightweight Robust Chaotic Image Re-encryption Scheme for 5G Heterogeneous Networks.
Wirel. Pers. Commun., April, 2023

Mutual Coupling Reduction Techniques for UWB - MIMO Antenna for Band Notch Characteristics: A Comprehensive Review.
Wirel. Pers. Commun., 2023

Framework of Geofence Service using Dummy Location Privacy Preservation in Vehicular Cloud Network.
Int. Arab J. Inf. Technol., 2023

TI-16 DNS Labeled Dataset for Detecting Botnets.
IEEE Access, 2023

Development and Validation of Artery-Vein Ratio Measurement Based on Deep Learning Architectures.
Proceedings of the IEEE Region 10 Conference, 2023

Improving Delivery of UML Class Diagrams Concepts in Computer Science Education Through Collaborative Learning.
Proceedings of the IEEE Frontiers in Education Conference, 2023

2022
Post-quantum cryptography techniques for secure communication in resource-constrained Internet of Things devices: A comprehensive survey.
Softw. Pract. Exp., 2022

Good view frames from ultrasonography (USG) video containing ONS diameter using state-of-the-art deep learning architectures.
Medical Biol. Eng. Comput., 2022

Signature based Merkle Hash Multiplication algorithm to secure the communication in IoT devices.
Knowl. Based Syst., 2022

Framework of data privacy preservation and location obfuscation in vehicular cloud networks.
Concurr. Comput. Pract. Exp., 2022

A post-quantum lattice based lightweight authentication and code-based hybrid encryption scheme for IoT devices.
Comput. Networks, 2022

Design and implementation of transaction privacy by virtue of ownership and traceability in blockchain based supply chain.
Clust. Comput., 2022

Data and Location Privacy of Smart Devices over Vehicular Cloud Computing.
Proceedings of the 32nd Conference of Open Innovations Association, 2022

Development of an Automated Algorithm to Quantify Optic Nerve Diameter Using Ultrasound Measures: Implications for Optic Neuropathies.
Proceedings of the Computer Vision and Machine Intelligence, 2022

2021
TI-2016 DNS dataset.
Dataset, September, 2021

Breast Cancer Detection Based on Feature Selection Using Enhanced Grey Wolf Optimizer and Support Vector Machine Algorithms.
Vietnam. J. Comput. Sci., 2021

Online Monitoring Technology of Power Transformer based on Vibration Analysis.
J. Intell. Syst., 2021

Multicriteria decision making based optimum virtual machine selection technique for smart cloud environment.
J. Ambient Intell. Smart Environ., 2021

IoT implementation strategies amid COVID-19 pandemic.
Int. J. Comput. Appl. Technol., 2021

Performance Analysis of Target Information Recognition System for Agricultural Robots.
Int. J. Agric. Environ. Inf. Syst., 2021

A comprehensive review on blockchain and Internet of Things in healthcare.
Trans. Emerg. Telecommun. Technol., 2021

Classification of Testable and Valuable User Stories by using Supervised Machine Learning Classifiers.
Proceedings of the IEEE International Symposium on Software Reliability Engineering, 2021

Automating Key Phrase Extraction from Fault Logs to Support Post-Inspection Repair of Software Requirements.
Proceedings of the ISEC 2021: 14th Innovations in Software Engineering Conference, 2021

Application of back-translation: a transfer learning approach to identify ambiguous software requirements.
Proceedings of the ACM SE '21: 2021 ACM Southeast Conference, 2021

Automated mapping of fault logs to SRS requirements using key-phrase extraction.
Proceedings of the ACM SE '21: 2021 ACM Southeast Conference, 2021

2020
Hybrid intrusion detection and signature generation using Deep Recurrent Neural Networks.
Neural Comput. Appl., 2020

Cyber forensics framework for big data analytics in IoT environment using machine learning.
Multim. Tools Appl., 2020

Computational Design of Biologically Active Anticancer Peptides and Their Interactions with Heterogeneous POPC/POPS Lipid Membranes.
J. Chem. Inf. Model., 2020

Orientation-based Ant colony algorithm for synthesizing the test scenarios in UML activity diagram.
Inf. Softw. Technol., 2020

Using Semantic Analysis and Graph Mining Approaches to Support Software Fault Fixation.
Proceedings of the 2020 IEEE International Symposium on Software Reliability Engineering Workshops, 2020

Graph Based CIA in Requirements Engineering.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

2019
Using Natural Language Processing and Graph Mining to Explore Inter- Related Requirements in Software Artefacts.
ACM SIGSOFT Softw. Eng. Notes, 2019

Detecting bot-infected machines using DNS fingerprinting.
Digit. Investig., 2019

RADAR: Self-configuring and self-healing in resource management for enhancing quality of cloud services.
Concurr. Comput. Pract. Exp., 2019

Issues and challenges in DNS based botnet detection: A survey.
Comput. Secur., 2019

A novel clustering technique for efficient clustering of big data in Hadoop Ecosystem.
Big Data Min. Anal., 2019

Big data analytics for healthcare industry: impact, applications, and tools.
Big Data Min. Anal., 2019

Using Association Rule Mining Algorithm to Improve the Order of Content Delivery in CS1 Course.
Proceedings of the IEEE Frontiers in Education Conference, 2019

Using Peer Code Review to Support Pedagogy in an Introductory Computer Programming Course.
Proceedings of the IEEE Frontiers in Education Conference, 2019

2018
Semantic code clone detection for Internet of Things applications using reaching definition and liveness analysis.
J. Supercomput., 2018

BULLET: Particle Swarm Optimization Based Scheduling Technique for Provisioned Cloud Resources.
J. Netw. Syst. Manag., 2018

Social Media Ambiance Can Make Strong Message for Consumer Brand Purchase Behavior.
Int. J. Online Mark., 2018

An empirical study of clone detection in MATLAB/Simulink models.
Int. J. Inf. Commun. Technol., 2018

Hadoop-based analytic framework for cyber forensics.
Int. J. Commun. Syst., 2018

CHOPPER: an intelligent QoS-aware autonomic resource management approach for cloud computing.
Clust. Comput., 2018

Automated Validation of Requirement Reviews: A Machine Learning Approach.
Proceedings of the 26th IEEE International Requirements Engineering Conference, 2018

Using Supervised Learning to Guide the Selection of Software Inspectors in Industry.
Proceedings of the 2018 IEEE International Symposium on Software Reliability Engineering Workshops, 2018

Fuzzy String Matching Algorithm for Spam Detection in Twitter.
Proceedings of the Security and Privacy - Second ISEA International Conference, 2018

Evaluation of Support Vector Machine Kernels for Detecting Network Anomalies.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2018

Validating Requirements Reviews by Introducing Fault-Type Level Granularity: A Machine Learning Approach.
Proceedings of the 11th Innovations in Software Engineering Conference, ISEC 2018, Hyderabad, India, February 09, 2018

2017
The Journey of QoS-Aware Autonomic Cloud Computing.
IT Prof., 2017

Anatomy of ransomware malware: detection, analysis and reporting.
Int. J. Secur. Networks, 2017

Synthesizing test scenarios in UML activity diagram using a bio-inspired approach.
Comput. Lang. Syst. Struct., 2017

Code clone genealogy detection on e-health system using Hadoop.
Comput. Electr. Eng., 2017

2016
Fuzzy reliability analysis of integrated network traffic visualization system.
J. Intell. Fuzzy Syst., 2016

A systematic review of approaches for testing concurrent programs.
Concurr. Comput. Pract. Exp., 2016

SOCCER: Self-Optimization of Energy-efficient Cloud Resources.
Clust. Comput., 2016

Impairment Aware Routing and Wavelength Assignment model employing binary logic operators.
Proceedings of the 2016 International Conference on Optical Network Design and Modeling, 2016

Integrating 'State of the Network' information into impairment model using binary logic operators.
Proceedings of the 2016 International Conference on Computing, 2016

2015
Data mining-based integrated network traffic visualization framework for threat detection.
Neural Comput. Appl., 2015

Mobile applications: Analyzing private data leakage using third party connections.
Proceedings of the 2015 International Conference on Advances in Computing, 2015

Behavior analysis of malware using machine learning.
Proceedings of the Eighth International Conference on Contemporary Computing, 2015

2014
SHAPE - an approach for self-healing and self-protection in complex distributed networks.
J. Supercomput., 2014

Analysis of RSA algorithm using GPU programming.
CoRR, 2014

A Survey on Zero-Day Polymorphic Worm Detection Techniques.
IEEE Commun. Surv. Tutorials, 2014

Automatic Evaluation and Signature Generation Technique for Thwarting Zero-Day Attacks.
Proceedings of the Recent Trends in Computer Networks and Distributed Systems Security, 2014

Routing multiple services in Optical Transport Network environment using mixed line rates.
Proceedings of the 2014 International Conference on Advances in Computing, 2014

Pattern matching algorithms for intrusion detection and prevention system: A comparative analysis.
Proceedings of the 2014 International Conference on Advances in Computing, 2014

Two-Level Automated Approach for Defending Against Obfuscated Zero-Day Attacks.
Proceedings of the Risks and Security of Internet and Systems, 2014

2013
Software clone detection: A systematic review.
Inf. Softw. Technol., 2013

Automatic Attack Signature Generation Systems: A Review.
IEEE Secur. Priv., 2013

2012
A Review of Coupling and Cohesion Measurement in OO Systems Using Program Slicing.
Proceedings of the Information Systems, Technology and Management, 2012

2011
Efficient Load Forecasting Optimized by Fuzzy Programming and OFDM Transmission.
Adv. Fuzzy Syst., 2011

SASM- An Approach towards Self-protection in Grid Computing.
Proceedings of the Information Intelligence, Systems, Technology and Management, 2011

2010
Implementing Self-Protection in Distributed Grid Environment.
Scalable Comput. Pract. Exp., 2010

Agent based self-healing system for grid computing.
Proceedings of the ICWET '10 International Conference & Workshop on Emerging Trends in Technology, Mumbai, Maharashtra, India, February 26, 2010

2009
A Powerful Easy-to-Use Packet Control API for Linux.
Proceedings of the ARTCom 2009, 2009


  Loading...