Security challenges, issues and their solutions for VANET RS Raw, M Kumar, N Singh International journal of network security & its applications 5 (5), 95, 2013 | 293 | 2013 |
Survey on machine learning and deep learning applications in breast cancer diagnosis G Chugh, S Kumar, N Singh Cognitive Computation 13 (6), 1451-1470, 2021 | 128 | 2021 |
Water quality assessment of a river using deep learning Bi-LSTM methodology: forecasting and validation S Khullar, N Singh Environmental Science and Pollution Research 29 (9), 12875-12889, 2022 | 119 | 2022 |
SQL injection: Types, methodology, attack queries and prevention N Singh, M Dayal, RS Raw, S Kumar 2016 3rd International Conference on Computing for Sustainable Global …, 2016 | 45 | 2016 |
Short term load forecasting using artificial neural network: a comparison with genetic algorithm implementation PK Sarangi, N Singh, RK Chauhan, R Singh Journal of Engineering and Applied Sciences 4 (9), 88-93, 2009 | 44 | 2009 |
A survey on the detection of SQL injection attacks and their countermeasures B Nagpal, N Chauhan, N Singh Journal of Information Processing Systems 13 (4), 689-702, 2017 | 41 | 2017 |
Machine learning techniques in river water quality modelling: a research travelogue S Khullar, N Singh Water Supply 21 (1), 1-13, 2021 | 39 | 2021 |
A probabilistic analysis of path duration using routing protocol in VANETs RS Rao, SK Soni, N Singh, O Kaiwartya International Journal of Vehicular Technology 2014 (1), 495036, 2014 | 30 | 2014 |
Comparison analysis of web usage mining using pattern recognition techniques N Singh, A Jain, RS Raw International Journal of Data Mining & Knowledge Management Process 3 (4), 137, 2013 | 28 | 2013 |
Feasibility evaluation of VANET using directional-location aided routing (D-LAR) protocol RS Raw, S Das, N Singh, S Kumar, S Kumar arXiv preprint arXiv:1212.3216, 2012 | 28 | 2012 |
A comprehensive inspection of cross site scripting attack MD Ambedkar, NS Ambedkar, RS Raw 2016 international conference on computing, communication and automation …, 2016 | 27 | 2016 |
Ensemble approach for twitter sentiment analysis D Tiwari, N Singh IJ Information Technology and Computer Science 8, 20-26, 2019 | 26 | 2019 |
SECSIX: security engine for CSRF, SQL injection and XSS attacks B Nagpal, N Chauhan, N Singh International Journal of System Assurance Engineering and Management 8, 631-644, 2017 | 26 | 2017 |
Indian health care analysis using big data programming tool M Dayal, N Singh Procedia Computer Science 89, 521-527, 2016 | 26 | 2016 |
Tool based implementation of SQL injection for penetration testing B Nagpal, N Singh, N Chauhan, A Panesar International Conference on Computing, Communication & Automation, 746-749, 2015 | 26 | 2015 |
Adomian decomposition method for solving higher order boundary value problems N Singh, M Kumar Mathematical Theory and modeling 2 (1), 11-22, 2011 | 25 | 2011 |
Enhancing the performance of web proxy server through cluster based prefetching techniques N Singh, A Panwar, RS Raw 2013 International Conference on Advances in Computing, Communications and …, 2013 | 23 | 2013 |
Intrusion detection and security system for blackhole attack I Kaushik, N Sharma, N Singh 2019 2nd International Conference on Signal Processing and Communication …, 2019 | 22 | 2019 |
Catch: Comparison and analysis of tools covering honeypots B Nagpal, N Singh, N Chauhan, P Sharma 2015 International Conference on Advances in Computer Engineering and …, 2015 | 21 | 2015 |
Short term load forecasting using neuro genetic hybrid approach: Results analysis with different network architectures PK Sarangi, N Singh, D Swain, RK Chauhan, R Singh Journal of Theoretical and Applied Information Technology 5 (8), 109-116, 2009 | 21 | 2009 |