A review of metaheuristic scheduling techniques in cloud computing M Kalra, S Singh Egyptian informatics journal 16 (3), 275-295, 2015 | 502 | 2015 |
A comprehensive review of object detection with deep learning R Kaur, S Singh Digital Signal Processing, 103812, 2022 | 247 | 2022 |
A survey of data mining and social network analysis based anomaly detection techniques R Kaur, S Singh Egyptian informatics journal 17 (2), 199-216, 2016 | 176 | 2016 |
Compliance-based multi-dimensional trust evaluation system for determining trustworthiness of cloud service providers S Singh, J Sidhu Future Generation Computer Systems 67, 109-132, 2017 | 123 | 2017 |
A dynamic, cost-aware, optimized data replication strategy for heterogeneous cloud data centers NK Gill, S Singh Future Generation Computer Systems 65, 10-32, 2016 | 98 | 2016 |
Improved topsis method based trust evaluation framework for determining trustworthiness of cloud service providers J Sidhu, S Singh Journal of Grid Computing 15 (1), 81-105, 2017 | 96 | 2017 |
A privacy, trust and policy based authorization framework for services in distributed environments S Singh, S Bawa International Journal of Computer Science 2 (2), 85-92, 2007 | 84 | 2007 |
Rise of spam and compromised accounts in online social networks: A state-of-the-art review of different combating approaches R Kaur, S Singh, H Kumar Journal of Network and Computer Applications 112, 53-88, 2018 | 82 | 2018 |
HEFT based workflow scheduling algorithm for cost optimization within deadline in hybrid clouds N Chopra, S Singh 2013 Fourth International Conference on Computing, Communications and …, 2013 | 78 | 2013 |
HEFT based workflow scheduling algorithm for cost optimization within deadline in hybrid clouds N Chopra, S Singh 2013 Fourth International Conference on Computing, Communications and …, 2013 | 78 | 2013 |
Deadline and cost based workflow scheduling in hybrid cloud N Chopra, S Singh 2013 international conference on advances in computing, communications and …, 2013 | 77 | 2013 |
A survey of workflow scheduling algorithms and research issues L Singh, S Singh International Journal of Computer Applications 74 (15), 2013 | 73 | 2013 |
AuthCom: Authorship verification and compromised account detection in online social networks using AHP-TOPSIS embedded profiling based technique R Kaur, S Singh, H Kumar Expert Systems with Applications 113, 397-414, 2018 | 55 | 2018 |
Design and implementation of multi-tier authentication scheme in cloud M Singh, S Singh International Journal of Computer Science Issues (IJCSI) 9 (5), 181, 2012 | 55 | 2012 |
A budget-constrained time and reliability optimization bat algorithm for scheduling workflow applications in clouds N Kaur, S Singh Procedia Computer Science 98, 199-204, 2016 | 52 | 2016 |
Abusive Content Detection in Online User-Generated Data: A survey S Kaur, S Singh, S Kaushal Procedia Computer Science 189, 274-281, 2021 | 47 | 2021 |
A comparative analysis of structural graph metrics to identify anomalies in online social networks R Kaur, S Singh Computers & Electrical Engineering 57, 294-310, 2017 | 43 | 2017 |
Design and comparative analysis of MCDM-based multi-dimensional trust evaluation schemes for determining trustworthiness of cloud service providers J Sidhu, S Singh Journal of Grid Computing 15 (2), 197-218, 2017 | 42 | 2017 |
A genetic algorithm for scheduling workflow applications in unreliable cloud environment L Singh, S Singh International Conference on Security in Computer Networks and Distributed …, 2014 | 40 | 2014 |
Analyzing negative ties in social networks: A survey M Kaur, S Singh Egyptian Informatics Journal 17 (1), 21-43, 2016 | 39 | 2016 |