RETRACTED: Detection of attacks in IoT sensors networks using machine learning algorithm P Bedi, S Mewada, RA Vatti, C Singh, KS Dhindsa, M Ponnusamy, ... Microprocessors and Microsystems 82, 103814, 2021 | 38 | 2021 |
T-CAD: A threshold based collaborative DDoS attack detection in multiple autonomous systems K Singh, KS Dhindsa, D Nehra Journal of Information Security and Applications 51, 102457, 2020 | 29 | 2020 |
Effect of embedding watermark on compression of the digital images D Aggarwal, KS Dhindsa arXiv preprint arXiv:1002.3984, 2010 | 20 | 2010 |
Comparative Study of OpenERP and its Technologies N Jindal, KS Dhindsa International Journal of Computer Applications 73 (20), 42-47, 2013 | 19 | 2013 |
Numeric to Numeric Encryption of Databases: Using 3Kdec Algorithm K Kaur, KS Dhindsa, G Singh Advance Computing Conference, 2009. IACC 2009. IEEE International, 1501-1505, 2009 | 18 | 2009 |
Distributed Defense: An Edge over Centralized Defense against DDos Attacks. K Singh, KS Dhindsa, B Bhushan International Journal of Computer Network & Information Security (ISSN: 2074 …, 2017 | 17 | 2017 |
Comparative study of citation and reference management tools: Mendeley, Zotero and ReadCube S Kaur, KS Dhindsa 2016 International Conference on ICT in Business Industry & Government …, 2016 | 17 | 2016 |
Performance-aware approach for software risk management using random forest algorithm A Aggarwal, KS Dhindsa, PK Suri International Journal of Software Innovation (IJSI) 9 (1), 12-19, 2021 | 16 | 2021 |
Efficient task scheduling using load balancing in cloud computing R Kaur, KS Dhindsa International Journal of Advanced Networking and Applications 10 (3), 3888-3892, 2018 | 15 | 2018 |
Reengineering framework for open source software using decision tree approach J Singh, KS Dhindsa, J Singh International Journal of Electrical and Computer Engineering (ISSN: 2088 …, 2019 | 14 | 2019 |
Performance analysis of agent based distributed defense mechanisms against DDOS attacks K Singh, KS Dhindsa, B Bhushan International Journal of Computing 17 (1), 15-24, 2018 | 13 | 2018 |
Comparative study and performance analysis of clustering algorithms KK Jassar, KS Dhindsa International Journal of Computer Applications 975, 8887, 2015 | 13 | 2015 |
Threshold-based distributed DDoS attack detection in ISP networks K Singh, KS Dhindsa, B Bhushan Turkish Journal of Electrical Engineering and Computer Sciences 26 (4), 1796 …, 2018 | 12 | 2018 |
Comparative study of android-based M-Apps for farmers S Kaur, KS Dhindsa International Conference on Intelligent Computing and Applications: ICICA …, 2018 | 10 | 2018 |
Design and development of android based mobile application for specially abled people S Kaur, KS Dhindsa Wireless Personal Communications 111 (4), 2353-2367, 2020 | 9 | 2020 |
Critical Factors in Consumers Perception towards Mobile Commerce in E-Governance Implementation: An Indian Perspective KS Dhindsa, H Aggarwal International Journal of Engineering and Advanced Technology 2 (3), 513-520, 2013 | 9* | 2013 |
Design for software risk management using soft computing and simulated biological approach A Aggarwal, KS Dhindsa, PK Suri International Journal of Security and Privacy in Pervasive Computing (IJSPPC …, 2020 | 8 | 2020 |
A Security Model to Make Communication Secure in Cluster-Based MANETs D Nehra, KS Dhindsa, B Bhushan Data Engineering and Communication Technology 1079, 183-193, 2020 | 8 | 2020 |
A pragmatic assessment of approaches and paradigms in software risk management frameworks A Aggarwal, KS Dhindsa, PK Suri International Journal of Natural Computing Research (IJNCR) 9 (1), 13-26, 2020 | 8 | 2020 |
Intelligent Systems and Applications: Proceedings of the 2019 Intelligent Systems Conference (IntelliSys) Volume 1 Y Bi, R Bhatia, S Kapoor Springer Nature, 2019 | 8 | 2019 |