Upasna Singh

According to our database1, Upasna Singh authored at least 17 papers between 2009 and 2020.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Resident Data Pattern Analysis Using Sector Clustering for Storage Drive Forensics.
Proceedings of the Advances in Digital Forensics XVI, 2020

2019
An intelligent approach for examining and detecting target data fragments in suspected large storage drives.
Secur. Priv., 2019

A Novel Authentication Scheme for Wireless Body Area Networks with Anonymity.
Proceedings of the Progress in Advanced Computing and Intelligent Engineering, 2019

2018
Significant data region identification and analysis using k -means in large storage drive forensics.
Secur. Priv., 2018

Efficiently searching target data traces in storage devices with region based random sector sampling approach.
Digit. Investig., 2018

Program execution analysis in Windows: A study of data sources, their format and comparison of forensic capability.
Comput. Secur., 2018

Recovery of Forensic Artifacts from Deleted Jump Lists.
Proceedings of the Advances in Digital Forensics XIV, 2018

2017
Differential Evolution Based Significant Data Region Identification on Large Storage Drives.
Proceedings of the Intelligent Decision Support Systems for Sustainable Computing, 2017

A forensic insight into Windows 10 Cortana search.
Comput. Secur., 2017

Program Execution Analysis using UserAssist Key in Modern Windows.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017

2016
Leveraging the Windows Amcache.hve File in Forensic Investigations.
J. Digit. Forensics Secur. Law, 2016

A forensic insight into Windows 10 Jump Lists.
Digit. Investig., 2016

2015
Android Users Security via Permission Based Analysis.
Proceedings of the Security in Computing and Communications, 2015

Framework for Live Forensics of a System by Extraction of Clipboard Data and Other Forensic Artefacts from RAM Image.
Proceedings of the Security in Computing and Communications, 2015

2013
A novel classification model for data theft detection using advanced pattern mining.
Digit. Investig., 2013

2010
Efficient temporal pattern mining for humanoid robot.
Proceedings of the 1st Amrita ACM-W Celebration on Women in Computing in India, 2010

2009
Mining Temporal Patterns for Humanoid Robot Using Pattern Growth Method.
Proceedings of the Rough Sets, 2009


  Loading...