default search action
Maninder Singh
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j52]Mohit, Sanmeet Kaur, Maninder Singh:
Design and implementation of blockchain-based supply chain framework with improved traceability, privacy, and ownership. Clust. Comput. 27(3): 2345-2363 (2024) - [j51]Hani Al-Balasmeh, Maninder Singh, Raman Singh:
Hilbert curves-based location privacy technique for vehicular cloud networks. Clust. Comput. 27(3): 2489-2504 (2024) - [j50]Aashima Sharma, Sanmeet Kaur, Maninder Singh:
Enhancing healthcare security: Time-based authentication for privacy-preserving IoMT sensor monitoring framework leveraging blockchain technology. Concurr. Comput. Pract. Exp. 36(22) (2024) - [j49]Aashima Sharma, Sanmeet Kaur, Maninder Singh:
A secure blockchain framework for the internet of medical things. Trans. Emerg. Telecommun. Technol. 35(1) (2024) - [c30]John Knudson, Adriano Cavalcanti, Maninder Singh:
Neuro-Haptic BCI Spark for TensorFlow Flying Avatars. EIT 2024: 657-662 - 2023
- [j48]Manmeet Singh, Maninder Singh, Sanmeet Kaur:
TI-16 DNS Labeled Dataset for Detecting Botnets. IEEE Access 11: 62616-62629 (2023) - [j47]Hani Al-Balasmeh, Maninder Singh, Raman Singh:
Framework of Geofence Service using Dummy Location Privacy Preservation in Vehicular Cloud Network. Int. Arab J. Inf. Technol. 20(1): 66-77 (2023) - [j46]Ramesh Kumar Verma, Bandana Priya, Maninder Singh, Pramod Singh, Ashok Yadav, Vinod Kumar Singh:
Equivalent circuit model-based design and analysis of microstrip line fed electrically small patch antenna for sub-6 GHz 5G applications. Int. J. Commun. Syst. 36(17) (2023) - [j45]Manmeet Singh, Maninder Singh, Sanmeet Kaur:
Identifying bot infection using neural networks on DNS traffic. J. Comput. Virol. Hacking Tech. 19(4): 549-563 (2023) - [j44]Ajay Kakkar, Maninder Singh:
Performance Analysis of a Lightweight Robust Chaotic Image Re-encryption Scheme for 5G Heterogeneous Networks. Wirel. Pers. Commun. 129(4): 2607-2631 (2023) - [j43]Rajeev Kumar, Manish Sharma, Lovish Matta, Preet Kaur, N. Saluja, S. Malhotra, Maninder Singh, Gurpreet Singh Saini, Sajjan Singh:
Mutual Coupling Reduction Techniques for UWB - MIMO Antenna for Band Notch Characteristics: A Comprehensive Review. Wirel. Pers. Commun. 131(2): 1207-1247 (2023) - [c29]Rupinder Kaur, Muhammad Zubair Malik, Maninder Singh:
Improving Delivery of UML Class Diagrams Concepts in Computer Science Education Through Collaborative Learning. FIE 2023: 1-5 - [c28]Maninder Singh, Rajeev Gupta, Basant Kumar, Deepak Agrawal:
Development and Validation of Artery-Vein Ratio Measurement Based on Deep Learning Architectures. TENCON 2023: 1-6 - 2022
- [j42]Mohit Mohit, Sanmeet Kaur, Maninder Singh:
Design and implementation of transaction privacy by virtue of ownership and traceability in blockchain based supply chain. Clust. Comput. 25(3): 2223-2240 (2022) - [j41]Swati Kumari, Maninder Singh, Raman Singh, Hitesh Tewari:
A post-quantum lattice based lightweight authentication and code-based hybrid encryption scheme for IoT devices. Comput. Networks 217: 109327 (2022) - [j40]Hani Al-Balasmeh, Maninder Singh, Raman Singh:
Framework of data privacy preservation and location obfuscation in vehicular cloud networks. Concurr. Comput. Pract. Exp. 34(5) (2022) - [j39]Swati Kumari, Maninder Singh, Raman Singh, Hitesh Tewari:
Signature based Merkle Hash Multiplication algorithm to secure the communication in IoT devices. Knowl. Based Syst. 253: 109543 (2022) - [j38]Maninder Singh, Basant Kumar, Deepak Agrawal:
Good view frames from ultrasonography (USG) video containing ONS diameter using state-of-the-art deep learning architectures. Medical Biol. Eng. Comput. 60(12): 3397-3417 (2022) - [j37]Swati Kumari, Maninder Singh, Raman Singh, Hitesh Tewari:
Post-quantum cryptography techniques for secure communication in resource-constrained Internet of Things devices: A comprehensive survey. Softw. Pract. Exp. 52(10): 2047-2076 (2022) - [c27]Vishal Gupta, Maninder Singh, Rajeev Gupta, Basant Kumar, Deepak Agarwal:
Development of an Automated Algorithm to Quantify Optic Nerve Diameter Using Ultrasound Measures: Implications for Optic Neuropathies. CVMI 2022: 283-295 - [c26]Hani Al-Balasmeh, Maninder Singh, Raman Singh:
Data and Location Privacy of Smart Devices over Vehicular Cloud Computing. FRUCT 2022: 30-37 - 2021
- [j36]Aashima Sharma, Sanmeet Kaur, Maninder Singh:
A comprehensive review on blockchain and Internet of Things in healthcare. Trans. Emerg. Telecommun. Technol. 32(10) (2021) - [j35]Yun Ji, Rajeev Kumar, Daljeet Singh, Maninder Singh:
Performance Analysis of Target Information Recognition System for Agricultural Robots. Int. J. Agric. Environ. Inf. Syst. 12(2): 49-60 (2021) - [j34]Dhawan Singh, Aditi Thakur, Maninder Singh, Amanpreet Sandhu:
IoT implementation strategies amid COVID-19 pandemic. Int. J. Comput. Appl. Technol. 65(4): 389-398 (2021) - [j33]Raman Singh, Maninder Singh, Sheetal Garg, Ivan Perl, Olga Kalyonova, Aleksandr Penskoi:
Multicriteria decision making based optimum virtual machine selection technique for smart cloud environment. J. Ambient Intell. Smart Environ. 13(3): 185-199 (2021) - [j32]Junhong Meng, Maninder Singh, Manish Sharma, Daljeet Singh, Preet Kaur, Rajeev Kumar:
Online Monitoring Technology of Power Transformer based on Vibration Analysis. J. Intell. Syst. 30(1): 554-563 (2021) - [j31]Sunil Kumar, Maninder Singh:
Breast Cancer Detection Based on Feature Selection Using Enhanced Grey Wolf Optimizer and Support Vector Machine Algorithms. Vietnam. J. Comput. Sci. 8(2): 177-197 (2021) - [c25]Ishan Mani Subedi, Maninder Singh, Vijayalakshmi Ramasamy, Gursimran Singh Walia:
Application of back-translation: a transfer learning approach to identify ambiguous software requirements. ACM Southeast Conference 2021: 130-137 - [c24]Maninder Singh, Gursimran S. Walia:
Automated mapping of fault logs to SRS requirements using key-phrase extraction. ACM Southeast Conference 2021: 138-145 - [c23]Maninder Singh, Gursimran Singh Walia:
Automating Key Phrase Extraction from Fault Logs to Support Post-Inspection Repair of Software Requirements. ISEC 2021: 3:1-3:12 - [c22]Ishan Mani Subedi, Maninder Singh, Vijayalakshmi Ramasamy, Gursimran Singh Walia:
Classification of Testable and Valuable User Stories by using Supervised Machine Learning Classifiers. ISSRE Workshops 2021: 409-414 - [d1]Manmeet Singh, Maninder Singh, Sanmeet Kaur:
TI-2016 DNS dataset. IEEE DataPort, 2021 - 2020
- [j30]Vinay Arora, Maninder Singh, Rajesh Kumar Bhatia:
Orientation-based Ant colony algorithm for synthesizing the test scenarios in UML activity diagram. Inf. Softw. Technol. 123: 106292 (2020) - [j29]Maninder Singh, Vikash Kumar, Kamakshi Sikka, Ravi Thakur, Munesh Kumar Harioudh, Durga Prasad Mishra, Jimut Kanti Ghosh, Mohammad Imran Siddiqi:
Computational Design of Biologically Active Anticancer Peptides and Their Interactions with Heterogeneous POPC/POPS Lipid Membranes. J. Chem. Inf. Model. 60(1): 332-341 (2020) - [j28]Gurpal Singh Chhabra, Varinder Pal Singh, Maninder Singh:
Cyber forensics framework for big data analytics in IoT environment using machine learning. Multim. Tools Appl. 79(23-24): 15881-15900 (2020) - [j27]Sanmeet Kaur, Maninder Singh:
Hybrid intrusion detection and signature generation using Deep Recurrent Neural Networks. Neural Comput. Appl. 32(12): 7859-7877 (2020) - [c21]Maninder Singh, Vaibhav K. Anu:
Graph Based CIA in Requirements Engineering. IEEE BigData 2020: 5828-5830 - [c20]Maninder Singh, Gursimran S. Walia:
Using Semantic Analysis and Graph Mining Approaches to Support Software Fault Fixation. ISSRE Workshops 2020: 43-48
2010 – 2019
- 2019
- [j26]Sunil Kumar, Maninder Singh:
Big data analytics for healthcare industry: impact, applications, and tools. Big Data Min. Anal. 2(1): 48-57 (2019) - [j25]Sunil Kumar, Maninder Singh:
A novel clustering technique for efficient clustering of big data in Hadoop Ecosystem. Big Data Min. Anal. 2(4): 240-247 (2019) - [j24]Manmeet Singh, Maninder Singh, Sanmeet Kaur:
Issues and challenges in DNS based botnet detection: A survey. Comput. Secur. 86: 28-52 (2019) - [j23]Sukhpal Singh Gill, Inderveer Chana, Maninder Singh, Rajkumar Buyya:
RADAR: Self-configuring and self-healing in resource management for enhancing quality of cloud services. Concurr. Comput. Pract. Exp. 31(1) (2019) - [j22]Manmeet Singh, Maninder Singh, Sanmeet Kaur:
Detecting bot-infected machines using DNS fingerprinting. Digit. Investig. 28(Supplement): 14-33 (2019) - [j21]Maninder Singh:
Using Natural Language Processing and Graph Mining to Explore Inter- Related Requirements in Software Artefacts. ACM SIGSOFT Softw. Eng. Notes 44(1): 37 (2019) - [c19]Tamaike Brown, Mourya Reddy Narasareddygari, Maninder Singh, Gursimran Singh Walia:
Using Peer Code Review to Support Pedagogy in an Introductory Computer Programming Course. FIE 2019: 1-7 - [c18]Rupinder Kaur, Tamaike Brown, Gursimran Singh Walia, Maninder Singh, Mourya Reddy:
Using Association Rule Mining Algorithm to Improve the Order of Content Delivery in CS1 Course. FIE 2019: 1-5 - 2018
- [j20]Sukhpal Singh Gill, Inderveer Chana, Maninder Singh, Rajkumar Buyya:
CHOPPER: an intelligent QoS-aware autonomic resource management approach for cloud computing. Clust. Comput. 21(2): 1203-1241 (2018) - [j19]Gurpal Singh Chhabra, Varinderpal Singh, Maninder Singh:
Hadoop-based analytic framework for cyber forensics. Int. J. Commun. Syst. 31(15) (2018) - [j18]Dhavleesh Rattan, Rajesh Kumar Bhatia, Maninder Singh:
An empirical study of clone detection in MATLAB/Simulink models. Int. J. Inf. Commun. Technol. 13(1): 20-33 (2018) - [j17]Gursimran Singh Walia, Maninder Singh:
Social Media Ambiance Can Make Strong Message for Consumer Brand Purchase Behavior. Int. J. Online Mark. 8(4): 38-48 (2018) - [j16]Sukhpal Singh Gill, Rajkumar Buyya, Inderveer Chana, Maninder Singh, Ajith Abraham:
BULLET: Particle Swarm Optimization Based Scheduling Technique for Provisioned Cloud Resources. J. Netw. Syst. Manag. 26(2): 361-400 (2018) - [j15]Rajkumar Tekchandani, Rajesh Kumar Bhatia, Maninder Singh:
Semantic code clone detection for Internet of Things applications using reaching definition and liveness analysis. J. Supercomput. 74(9): 4199-4226 (2018) - [c17]Maninder Singh, Vaibhav K. Anu, Gursimran S. Walia, Anurag Goswami:
Validating Requirements Reviews by Introducing Fault-Type Level Granularity: A Machine Learning Approach. ISEC 2018: 10:1-10:11 - [c16]Prerna Batta, Maninder Singh, Zhida Li, Qingye Ding, Ljiljana Trajkovic:
Evaluation of Support Vector Machine Kernels for Detecting Network Anomalies. ISCAS 2018: 1-4 - [c15]Alok Kumar, Maninder Singh, Alwyn Roshan Pais:
Fuzzy String Matching Algorithm for Spam Detection in Twitter. ISEA-ISAP 2018: 289-301 - [c14]Maninder Singh, Gursimran Singh Walia, Anurag Goswami:
Using Supervised Learning to Guide the Selection of Software Inspectors in Industry. ISSRE Workshops 2018: 12-17 - [c13]Maninder Singh:
Automated Validation of Requirement Reviews: A Machine Learning Approach. RE 2018: 460-465 - 2017
- [j14]Rajkumar Tekchandani, Rajesh Kumar Bhatia, Maninder Singh:
Code clone genealogy detection on e-health system using Hadoop. Comput. Electr. Eng. 61: 15-30 (2017) - [j13]Vinay Arora, Rajesh Kumar Bhatia, Maninder Singh:
Synthesizing test scenarios in UML activity diagram using a bio-inspired approach. Comput. Lang. Syst. Struct. 50: 1-19 (2017) - [j12]Gurdip Kaur, Renu Dhir, Maninder Singh:
Anatomy of ransomware malware: detection, analysis and reporting. Int. J. Secur. Networks 12(3): 188-197 (2017) - [j11]Sukhpal Singh, Inderveer Chana, Maninder Singh:
The Journey of QoS-Aware Autonomic Cloud Computing. IT Prof. 19(2): 42-49 (2017) - 2016
- [j10]Sukhpal Singh, Inderveer Chana, Maninder Singh, Rajkumar Buyya:
SOCCER: Self-Optimization of Energy-efficient Cloud Resources. Clust. Comput. 19(4): 1787-1800 (2016) - [j9]Vinay Arora, Rajesh Kumar Bhatia, Maninder Singh:
A systematic review of approaches for testing concurrent programs. Concurr. Comput. Pract. Exp. 28(5): 1572-1611 (2016) - [j8]Amit Kumar Bhardwaj, Yuvraj Gajpal, Maninder Singh:
Fuzzy reliability analysis of integrated network traffic visualization system. J. Intell. Fuzzy Syst. 31(3): 1941-1953 (2016) - [c12]Maninder Singh, Maninder Lal Singh:
Integrating 'State of the Network' information into impairment model using binary logic operators. ICNC 2016: 1-5 - [c11]Maninder Singh, Maninder Lal Singh:
Impairment Aware Routing and Wavelength Assignment model employing binary logic operators. ONDM 2016: 1-6 - 2015
- [j7]Amit Kumar Bhardwaj, Maninder Singh:
Data mining-based integrated network traffic visualization framework for threat detection. Neural Comput. Appl. 26(1): 117-130 (2015) - [c10]Arshi Dhammi, Maninder Singh:
Behavior analysis of malware using machine learning. IC3 2015: 481-486 - [c9]Pradeep Kumar, Maninder Singh:
Mobile applications: Analyzing private data leakage using third party connections. ICACCI 2015: 57-62 - 2014
- [j6]Ratinder Kaur, Maninder Singh:
A Survey on Zero-Day Polymorphic Worm Detection Techniques. IEEE Commun. Surv. Tutorials 16(3): 1520-1549 (2014) - [j5]Inderpreet Chopra, Maninder Singh:
SHAPE - an approach for self-healing and self-protection in complex distributed networks. J. Supercomput. 67(2): 585-613 (2014) - [c8]Ratinder Kaur, Maninder Singh:
Two-Level Automated Approach for Defending Against Obfuscated Zero-Day Attacks. CRiSIS 2014: 164-179 - [c7]Maninder Singh, Maninder Lal Singh, Sudarshan Iyengar:
Routing multiple services in Optical Transport Network environment using mixed line rates. ICACCI 2014: 44-49 - [c6]Vibha Gupta, Maninder Singh, Vinod K. Bhalla:
Pattern matching algorithms for intrusion detection and prevention system: A comparative analysis. ICACCI 2014: 50-54 - [c5]Ratinder Kaur, Maninder Singh:
Automatic Evaluation and Signature Generation Technique for Thwarting Zero-Day Attacks. SNDS 2014: 298-309 - [i1]Sonam Mahajan, Maninder Singh:
Analysis of RSA algorithm using GPU programming. CoRR abs/1407.1465 (2014) - 2013
- [j4]Sanmeet Kaur, Maninder Singh:
Automatic Attack Signature Generation Systems: A Review. IEEE Secur. Priv. 11(6): 54-61 (2013) - [j3]Dhavleesh Rattan, Rajesh Kumar Bhatia, Maninder Singh:
Software clone detection: A systematic review. Inf. Softw. Technol. 55(7): 1165-1199 (2013) - 2012
- [c4]Sunint Kaur Khalsa, Rajesh Kumar Bhatia, Jitender Kumar Chhabra, Maninder Singh:
A Review of Coupling and Cohesion Measurement in OO Systems Using Program Slicing. ICISTM 2012: 199-210 - 2011
- [j2]Sandeep Sachdeva, Maninder Singh, U. P. Singh, Ajat Shatru Arora:
Efficient Load Forecasting Optimized by Fuzzy Programming and OFDM Transmission. Adv. Fuzzy Syst. 2011: 326763:1-326763:6 (2011) - [c3]Inderpreet Chopra, Maninder Singh:
SASM- An Approach towards Self-protection in Grid Computing. ICISTM 2011: 149-159 - 2010
- [j1]Inderpreet Chopra, Maninder Singh:
Implementing Self-Protection in Distributed Grid Environment. Scalable Comput. Pract. Exp. 11(4) (2010) - [c2]I. Chopra, Maninder Singh:
Agent based self-healing system for grid computing. ICWET 2010: 31-35
2000 – 2009
- 2009
- [c1]Maninder Singh:
A Powerful Easy-to-Use Packet Control API for Linux. ARTCom 2009: 146-148
Coauthor Index
aka: Gursimran S. Walia
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-26 01:50 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint