A brief review on multi-objective software refactoring and a new method for its recommendation S Kaur, LK Awasthi, AL Sangal Archives of Computational Methods in Engineering 28, 3087-3111, 2021 | 13 | 2021 |
A persistent structured hierarchical overlay network to counter intentional churn attack R Kaur, AL Sangal, K Kumar Journal of Computer Networks and Communications 2016 (1), 5191405, 2016 | 6 | 2016 |
A review on software refactoring opportunity identification and sequencing in object-oriented software S Kaur, LK Awasthi, AL Sangal Recent Advances in Electrical & Electronic Engineering (Formerly Recent …, 2021 | 8 | 2021 |
A study on modeling techniques in software fault prediction K Bhandari, K Kumar, AL Sangal 2021 2nd International Conference on Secure Cyber Computing and …, 2021 | 6 | 2021 |
Accident Risk Rating of Streets Using Ensemble Techniques of Machine Learning A Rastogi, AL Sangal Innovations in Computer Science and Engineering: Proceedings of 8th ICICSE …, 2021 | 1 | 2021 |
Alleviating Class Imbalance Issue in Software Fault Prediction Using DBSCAN-Based Induced Graph Under-Sampling Method K Bhandari, K Kumar, AL Sangal Arabian Journal for Science and Engineering, 1-39, 2024 | 1 | 2024 |
An anomaly based distributed detection system for DDoS attacks in Tier-2 ISP networks A Bhandari, K Kumar, AL Sangal, S Behal Journal of Ambient Intelligence and Humanized Computing 12 (1), 1387-1406, 2021 | 7 | 2021 |
Analysis and removal of vulnerabilities in masquerading attack in wireless sensor networks S Gupta, HK Verma, AL Sangal Int. J. Comput. Technol. Electron. Eng.(IJCTEE) 2 (3), 2012 | 4 | 2012 |
Analysis of cloudlet completion time during attack on smart grid cloud S Mehmi, HK Verma, AL Sangal International Journal of Cloud Computing 4 (4), 353-376, 2015 | 2 | 2015 |
Analysis of different churn models in chord based overlay networks R Kaur, AL Sangal, K Kumar 2014 Recent Advances in Engineering and Computational Sciences (RAECS), 1-6, 2014 | 6 | 2014 |
Analysis of security issues in cloud based smart grid S Mehmi, HK Verma, AL Sangal Intl. J. Science and Emerging Technologies with Latest Trends 18 (1), 12-21, 2014 | 4 | 2014 |
Analyzing buffer occupancy of the nodes under acknowledged delay tolerant network’s routing protocols HS Bindra, AL Sangal International Conference on Advances in Information Technology and Mobile …, 2012 | 5 | 2012 |
Anna Mariya Thomson M, 854 Anoop K, 610 Ansamma John, 429 A Singh, A Dhar, A Roy, A Bajpai, A George, A Maulekhi, A Ghatak, ... | | |
Artificial Intelligence in Software Engineering: Perspectives and Challenges K Bhandari, K Kumar, AL Sangal 2023 Third International Conference on Secure Cyber Computing and …, 2023 | 3 | 2023 |
Artificial Neural Network Based Model for Detecting Attacks in Smart Grid Cloud S Mehmi, H Verma, AL Sangal | | 2017 |
Authentication protocol for wireless sensor networks S Gupta, HK Verma, AL Sangal International Journal of Electronics and Communication Engineering 4 (6 …, 2010 | 19 | 2010 |
Blockchain-based chit fund system: a financial inclusion tool P Kumar, AL Sangal 2020 International Conference on Smart Electronics and Communication (ICOSEC …, 2020 | 5 | 2020 |
Building a hierarchical structure model of enablers that affect the software process improvement in software SMEs—A mixed method approach P Sharma, AL Sangal Computer Standards & Interfaces 66, 103350, 2019 | 29 | 2019 |
Building and testing a fuzzy linguistic assessment framework for defect prediction in asd environment using process-based software metrics P Sharma, AL Sangal Arabian Journal for Science and Engineering 45 (12), 10327-10351, 2020 | 12 | 2020 |
Characterizing flash events and distributed denial‐of‐service attacks: an empirical investigation A Bhandari, AL Sangal, K Kumar Security and Communication Networks 9 (13), 2222-2239, 2016 | 77 | 2016 |