Software clone detection: A systematic review MS Dhavleesh Rattan, Rajesh Bhatia Information and Software Technology 55, 1165-1199, 2013 | 555* | 2013 |
Issues and challenges in DNS based botnet detection: A survey M Singh, M Singh, S Kaur Computers & Security 86, 28-52, 2019 | 113 | 2019 |
A survey on zero-day polymorphic worm detection techniques R Kaur, M Singh IEEE Communications Surveys & Tutorials 16 (3), 1520-1549, 2014 | 109 | 2014 |
Hybrid intrusion detection and signature generation using deep recurrent neural networks S Kaur, M Singh Neural Computing and Applications 32 (12), 7859-7877, 2020 | 102 | 2020 |
CHOPPER: an intelligent QoS-aware autonomic resource management approach for cloud computing SS Gill, I Chana, M Singh, R Buyya Cluster Computing 21, 1203-1241, 2018 | 101 | 2018 |
A comprehensive review on blockchain and Internet of Things in healthcare A Sharma, S Kaur, M Singh Transactions on Emerging Telecommunications Technologies 32 (10), e4333, 2021 | 94 | 2021 |
Malware detection based on opcode frequency A Yewale, M Singh 2016 International Conference on Advanced Communication Control and …, 2016 | 84 | 2016 |
Cyber forensics framework for big data analytics in IoT environment using machine learning GS Chhabra, VP Singh, M Singh Multimedia Tools and Applications 79, 15881-15900, 2020 | 80 | 2020 |
BULLET: particle swarm optimization based scheduling technique for provisioned cloud resources SS Gill, R Buyya, I Chana, M Singh, A Abraham Journal of Network and Systems Management 26, 361-400, 2018 | 78 | 2018 |
SOCCER: self-optimization of energy-efficient cloud resources S Singh, I Chana, M Singh, R Buyya Cluster Computing 19, 1787-1800, 2016 | 69 | 2016 |
RADAR: Self‐configuring and self‐healing in resource management for enhancing quality of cloud services SS Gill, I Chana, M Singh, R Buyya Concurrency and Computation: Practice and Experience 31 (1), e4834, 2019 | 54 | 2019 |
The journey of QoS-aware autonomic cloud computing S Singh, I Chana, M Singh It Professional 19 (2), 42-49, 2017 | 54 | 2017 |
Automatic attack signature generation systems: A review S Kaur, M Singh IEEE Security & Privacy 11 (6), 54-61, 2013 | 48 | 2013 |
Recurrent neural network based intrusion detection system S Nayyar, S Arora, M Singh 2020 international conference on communication and signal processing (iccsp …, 2020 | 46 | 2020 |
Detecting bot-infected machines using DNS fingerprinting M Singh, M Singh, S Kaur Digital investigation 28, 14-33, 2019 | 46 | 2019 |
Efficient hybrid technique for detecting zero-day polymorphic worms R Kaur, M Singh 2014 IEEE International Advance Computing Conference (IACC), 95-100, 2014 | 33 | 2014 |
Botnet and botnet detection techniques in cyber realm N Kaur, M Singh 2016 international conference on inventive computation technologies (ICICT …, 2016 | 32 | 2016 |
A hybrid real-time zero-day attack detection and analysis system R Kaur, M Singh International Journal of Computer Network and Information Security 7 (9), 19-31, 2015 | 28 | 2015 |
Analysis of RSA algorithm using GPU programming S Mahajan, M Singh arXiv preprint arXiv:1407.1465, 2014 | 28 | 2014 |
Post‐quantum cryptography techniques for secure communication in resource‐constrained Internet of Things devices: A comprehensive survey S Kumari, M Singh, R Singh, H Tewari Software: Practice and Experience 52 (10), 2047-2076, 2022 | 27 | 2022 |