header

Publications@Thapar

Thapar University
Patiala, Punjab - 147004

Publication@Thapar

Publications of Computer Science and Engineering

2017 (8) 2016 (61) 2015 (64) 2014 (56) 2013 (43) 2012 (28)
2011 (36) 2010 (10) 2009 (10) 2008 (8) 2007 (9) 2006 (6)
2005 (1) 2004 (1) 2002 (1) 1999 (1) All

Book Chapter(s) :

  1. Pritpal Singh (2015). Big data time series forecasting model: A fuzzy-neuro hybridize approach. In , Computational Intelligence for Big Data Analysis (pp. 55-72). Netherlands: Springer. [ISBN : 978-3-319-16597-4] . Google Search

Journal(s) :

  1. Vishal Sharma, Rajesh Kumar, P. Rana (2015). Self-Healing Neural Model for Stabilization Against Failures Over Networked UAVs. IEEE Communications Letters, 19 (11), 2013-2016. [IF(2015) : 1.988] . Google Citation
  2. Lohit Kapoor, Seema Bawa, Ankit Gupta (2015). Peer Clouds: A P2P-Based Resource Discovery Mechanism for the Intercloud. International Journal of Next Generation Computing, 6 (3), 153-164. Google Citation
  3. Kaur K., Dua A., Jindal A., Neeraj Kumar, Mukesh Singh, Vinel A. (2015). A novel resource reservation scheme for mobile PHEVs in V2G environment using game theoretical approach. IEEE Transactions on Vehicular Technology, 64 (12), 5653-5666. Google Citation
  4. Anju Bala, Inderveer Chana (2015). Autonomic Fault tolerant Scheduling for Scientific Workflows in Cloud Computing. Concurrent Engineering: Research and Applications, (), -. [IF(2015) : 1.0] . Google Citation
  5. Sharma G., Bala S., Anil Kumar Verma (2015). Pairing-Free Certificateless Ring Signcryption (PF-CLRSC) Scheme for Wireless Sensor Networks. Wireless Personal Communications, 84 (2), 1469-1485. [IF(2015) : 0.951] . Google Citation
  6. Singh S., Inderveer Chana (2015). QoS-aware autonomic resource management in cloud computing: A systematic review. ACM Computing Surveys, 48 (3), -. [IF(2015) : 6.748] . Google Citation
  7. Ranga V., Dave M., Anil Kumar Verma (2015). Relay node placement to heal partitioned wireless sensor networks. Computers & Electrical Engineering, 48 (), 371-388. [IF(2015) : 1.57] . Google Citation
  8. Verma S., Deepak Garg (2015). Improvement in rebalanced CRT RSA. International Arab Journal of Information Technology, 12 (6), 524-531. [IF(2015) : 0.724] . Google Citation
  9. Karamjeet Kaur, Rinkle Rani (2015). Managing Data in Healthcare Information Systems: Many Models, One Solution. IEEE Computer, 48 (3), 52-59. Google Citation
  10. Anjali Anand, Rinkle Rani, Himanshu Aggarwal (2015). A security model based on reputation and collaboration through route-request in mobile ad hoc networks. KSII Transactions on Internet and Information Systems, 9 (11), 4701-4719. [IF(2015) : 0.452] . Google Citation
  11. Vandana Jindal , A. K. Verma, Seema Bawa (2015). Quantitative Reduction in Communication Load for Energy Efficiency in WSN. Wireless Personal Communications, 85 (4), 2795-2810. [IF(2015) : 0.951] . Google Citation
  12. Neeraj Kumar, Zeadally S., Rodrigues J.J.P.C. (2015). QoS-Aware Hierarchical Web Caching Scheme for Online Video Streaming Applications in Internet-Based Vehicular Ad Hoc Networks. IEEE Transactions on Industrial Electronics, 62 (12), 7892-7900. [IF(2015) : 7.168] . Google Citation
  13. Kaur T., Inderveer Chana (2015). Energy efficiency techniques in cloud computing: A survey and taxonomy. ACM Computing Surveys, 48 (2), -. [IF(2015) : 6.748] . Google Citation
  14. Sourav Chhabra, Rasmeet Singh Bali, Neeraj Kumar (2015). Dynamic Vehicle Ontology Based Routing for VANETs. Procedia Computer Science, 57 (), 789-797. Google Citation
  15. Kumar M., Sharma A., Rajesh Kumar (2015). An empirical evaluation of a three-tier conduit framework for multifaceted test case classification and selection using fuzzy-ant colony optimisation approach. Software - Practice and Experience, 45 (7), 949-971. [IF(2015) : 0.652] . Google Citation
  16. Avleen Kaur Malhi, Shalini Batra (2015). An efficient certificateless aggregate signature scheme for vehicular ad-hoc networks. Discrete Mathematics and Theoretical Computer Science, 17 (1), 317-338. [IF(2015) : 0.723 ] . Google Citation
  17. Neeraj Kumar, Iqbal R., Misra S., Rodrigues J.J.P.C. (2015). An intelligent approach for building a secure decentralized public key infrastructure in VANET. Journal of Computer and System Sciences, 81 (6), 1042-1058. [IF(2015) : 1.678] . Google Citation
  18. He D., Khan M.K., Neeraj Kumar (2015). A new handover authentication protocol based on bilinear pairing functions for wireless networks. International Journal of Ad Hoc and Ubiquitous Computing, 18 (1-Feb), 67-74. [IF(2015) : 0.705] . Google Citation
  19. Kansal N.J., Inderveer Chana (2015). Artificial bee colony based energy-aware resource utilization technique for cloud computing. Concurrency and Computation: Practice and Experience , 27 (5), 1207-1225. [IF(2015) : 0.942] . Google Citation
  20. Neeraj Kumar, Chilamkurti N., Misra S. (2015). Bayesian coalition game for the internet of things: An ambient intelligence-based evaluation. IEEE Press, 53 (1), 48-55. [IF(2015) : 5.125] . Google Citation
  21. Jaskaran Preet Singha, Rasmeet S. Bali (2015). A hybrid backbone based clustering algorithm for vehicular ad-hoc networks. Procedia Computer Science, 46 (), 1005-1013. Google Citation
  22. Karamjeet Kaur, Hardeep Singh (2015). An algorithm of impairment aware routing for wavelength division multiplexed optical networks. Microwave and Optical Technology Letters, 57 (7), 1632-1636. [IF(2015) : 0.731] . Google Citation
  23. Neeraj Kumar, Sudip Misra, Joel J. P. C. Rodrigues, Mohammad S. Obaidat (2015). Coalition Games for Spatio-Temporal Big Data in Internet of Vehicles Environment: A Comparative Analysis. IEEE Internet of Things Journal, 2 (4), 310-320. Google Citation
  24. Chawla P., Inderveer Chana, Rana A. (2015). A novel strategy for automatic test data generation using soft computing technique. Frontiers of Computer Science, 9 (3), 346-363. [IF(2015) : 1.039] . Google Citation
  25. Rajni Aron, Inderveer Chana, Ajith Abraham (2015). A hyper-heuristic approach for resource provisioning-based scheduling in grid environment. Journal of Supercomputing, 71 (4), 1427-1450. [IF(2015) : 1.326 ] . Google Citation
  26. Dua A., Neeraj Kumar, Seema Bawa, Rodrigues J.J.P.C. (2015). An Intelligent Context-aware Congestion Resolution Protocol for Data Dissemination in Vehicular Ad Hoc Networks. Mobile Networks and Applications, 20 (2), 181-200. [IF(2015) : 3.259 ] . Google Citation
  27. Neeraj Kumar, Rodrigues J.J.P.C., Lloret J., Dua, A. (2015). Replication-Aware Data Dissemination for Vehicular Ad Hoc Networks using Location Determination. Mobile Networks and Applications, 20 (2), 251-267. [IF(2015) : 3.259 ] . Google Citation
  28. Tyagi S., Tanwar S., Gupta S.K., Neeraj Kumar, Rodrigues J.J.P.C. (2015). A lifetime extended multi-levels heterogeneous routing protocol for wireless sensor networks. Telecommunication Systems, 59 (1), 43-62. [IF(2015) : 1.542] . Google Citation
  29. Neeraj Kumar, Bali R.S., Iqbal R., Chilamkurti N., Rho S. (2015). Optimized clustering for data dissemination using stochastic coalition game in vehicular cyber-physical systems. Journal of Supercomputing, 71 (9), 3258-3287. [IF(2015) : 1.326 ] . Google Citation
  30. Neeraj Kumar, Lee J.-H., Rodrigues J.J.P.C. (2015). Intelligent mobile video surveillance system as a Bayesian coalition game in vehicular sensor networks: Learning automata approach. IEEE Transactions on Intelligent Transportation Systems, 16 (3), 1148-1161. [IF(2015) : 3.724] . Google Citation
  31. Amin R., Islam S.K.H., Biswas G.P., Khan M.K., Neeraj Kumar (2015). An Efficient and Practical Smart Card Based Anonymity Preserving User Authentication Scheme for TMIS using Elliptic Curve Cryptography. Journal of Medical Systems, 39 (11), -. [IF(2015) : 2.456] . Google Citation
  32. Manoj Manuja, Deepak Garg (2015). Intelligent text classification system based on self-administered ontology. Turkish Journal of Electrical Engineering and Computer Sciences, 23 (2015), 1393-1404. [IF(2015) : 0.578] . Google Citation
  33. Sudhanshu Gupta, Deepak Garg (2015). Selectivity Estimation of range queries in Data Streams using Micro-clustering. International Arab Journal of Information Technology, 13 (5), -. [IF(2015) : 0.724] . Google Citation
  34. Seema Verma, Deepak Garg (2015). Improvement in Rebalanced CRT RSA. International Arab Journal of Information Technology, 12 (6), -. [IF(2015) : 0.724] . Google Citation
  35. He D., Neeraj Kumar, Chilamkurti N. (2015). A secure temporal-credential-based mutual authentication and key agreement scheme with pseudo identity for wireless sensor networks. Information Sciences, (), -. [IF(2015) : 4.832] . Google Citation
  36. Singh S., Inderveer Chana (2015). Q-aware: Quality of service based cloud resource provisioning. Computers & Electrical Engineering, (), -. [IF(2015) : 1.57] . Google Citation
  37. Ruan O., Neeraj Kumar, He D., Lee J.-H. (2015). Efficient provably secure password-based explicit authenticated key agreement. Pervasive and Mobile Computing, (), -. [IF(2015) : 2.349 ] . Google Citation
  38. Tyagi S., Tanwar S., Neeraj Kumar, Rodrigues J.J.P.C. (2015). Cognitive radio-based clustering for opportunistic shared spectrum access to enhance lifetime of wireless sensor network. Pervasive and Mobile Computing, (), -. [IF(2015) : 2.349 ] . Google Citation
  39. Bali R.S., Neeraj Kumar, Rodrigues J.J. (2015). An efficient energy-aware predictive clustering approach for vehicular ad hoc networks. International Journal of Communication Systems, (), -. [IF(2015) : 1.066] . Google Citation
  40. Neeraj Kumar, Kaur K., Misra S.C., Iqbal R. (2015). An intelligent RFID-enabled authentication scheme for healthcare applications in vehicular mobile cloud. Peer-to-Peer Networking and Applications, (), -. [IF(2015) : 1.262 ] . Google Citation
  41. Tu H., Neeraj Kumar, Kim J., Seo J. (2015). A strongly secure pairing-free certificateless authenticated key agreement protocol suitable for smart media and mobile environments. Multimedia Tools and Applications, (), -. [IF(2015) : 1.53 ] . Google Citation
  42. Tiwari R., Neeraj Kumar (2015). An adaptive cache invalidation technique for wireless environments. Telecommunication Systems, (), -. [IF(2015) : 1.542] . Google Citation
  43. He D., Neeraj Kumar, Lee J.-H. (2015). Privacy-preserving data aggregation scheme against internal attackers in smart grids. Wireless Networks, (), -. [IF(2015) : 1.584 ] . Google Citation
  44. Neeraj Kumar, Singh J.P., Bali R.S., Misra S., Ullah S. (2015). An intelligent clustering scheme for distributed intrusion detection in vehicular cloud computing. Cluster Computing-The Journal of Networks Software Tools and Applications, (), -. [IF(2015) : 1.514] . Google Citation
  45. Zhang Z., Qi Q., Neeraj Kumar, Chilamkurti N., Jeong H.-Y. (2015). A secure authentication scheme with anonymity for session initiation protocol using elliptic curve cryptography. Multimedia Tools and Applications, 74 (10), 3477-3488. [IF(2015) : 1.53 ] . Google Citation
  46. Rathore N., Inderveer Chana (2015). Variable threshold-based hierarchical load balancing technique in Grid. Engineering with Computers, 31 (3), 597-615. [IF(2015) : 0.765 ] . Google Citation
  47. Kaur S., Maninder Singh (2015). A proactive framework for automatic detection of zero-day HTTP attacks on educational institutions. Computer Fraud and Security, 2015 (2), 10-16. Google Citation
  48. Ajay Batish, Anirban Bhattacharya, Neeraj Kumar (2015). Powder mixed dielectric: An approach for improved process performance in EDM. Particulate Science and Technology, 33 (2), 150-158. [IF(2015) : 0.784] . Google Citation
  49. Sharma S., Seema Bawa, Lomash H. (2015). Web Presence of Indian Digital Culture. Preservation, Digital Technology and Culture, 44 (2), 62-68. Google Citation
  50. Neeraj Kumar, Zeadally S., Chilamkurti N., Vinel A. (2015). Performance analysis of Bayesian coalition game-based energy-aware virtual machine migration in vehicular mobile cloud. IEEE Network, 29 (2), 62-69. [IF(2015) : 7.23 ] . Google Citation
  51. Neeraj Kumar, Misra S., Obaidat M.S. (2015). Collaborative Learning Automata-Based Routing for Rescue Operations in Dense Urban Regions Using Vehicular Sensor Networks. IEEE Systems Journal, 9 (3), 1081-1090. [IF(2015) : 3.882 ] . Google Citation
  52. Neeraj Kumar, Lee J.-H. (2015). Collaborative-Learning-Automata-Based Channel Assignment with Topology Preservation for Wireless Mesh Networks under QoS Constraints. IEEE Systems Journal, 9 (3), 675-685. [IF(2015) : 3.882 ] . Google Citation

Conference(s) :

  1. Puneet Garg, Rinkle Rani, Sumit Miglani (2015). Analysis and Visualization of Professional’s LinkedIn Data. Proceedings of the Emerging Research in Computing, Information, Communication and Applications [ : ], pp.1-9.. Google Citation
  2. Kumar P., Maninder Singh (2015). Mobile applications: Analyzing private data leakage using third party connections. Proceedings of the 2015 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2015 [ : 10 August 2015 through 13 August 2015], pp.57-62.. Google Citation
  3. Dhammi A., Maninder Singh (2015). Behavior analysis of malware using machine learning. Proceedings of the 2015 8th International Conference on Contemporary Computing, IC3 2015 [ : 20 August 2015 through 22 August 2015], pp.481-486.. Google Citation
  4. Gill H.K., Maninder Singh (2015). Analyze university network traffic to explore usage behaviour and to detect malicious activities. Proceedings of the Proceedings on 2015 1st International Conference on Next Generation Computing Technologies, NGCT 2015 [ : ], pp.686-691.. Google Citation
  5. Dua A., Kumar N., Seema Bawa (2015). An Energy Efficient Data Dissemination and Information Retrieval Scheme for VANET. Proceedings of the Proceedings - 2015 IEEE International Conference on Data Science and Data Intensive Systems; 8th IEEE International Conference Cyber, Physical and Social Computing; 11th IEEE International Conference on Green Computing and Communications and 8th IEEE International Conference on Internet of Things, DSDIS/CPSCom/GreenCom/iThings 2015 [ : ], pp.427-434.. Google Citation
  6. Suman Jain, Inderveer Chana (2015). Modernization of Legacy Systems: A Generalised Roadmap. Proceedings of the ICCCT '15 Proceedings of the Sixth International Conference on Computer and Communication Technology 2015 [ : ], pp.62-67.. Google Citation
  7. Chawla C., Inderveer Chana (2015). Optimal time dependent pricing model for smart cloud with cost based scheduling. Proceedings of the ACM International Conference Proceeding Series?? [ : ], pp.522-526.. Google Citation
  8. Anshu Singla, Swarnajyoti Patra (2015). A context sensitive thresholding technique for automatic image segmentation. Proceedings of the Computational Intelligence in Data Mining [ : ], pp.19-25.. Google Citation
  9. Shukla R., Maninder Singh (2015). PythonHoneyMonkey: Detecting malicious web URLs on client side honeypot systems. Proceedings of the Proceedings - 2014 3rd International Conference on Reliability, Infocom Technologies and Optimization: Trends and Future Directions, ICRITO 2014 [ : 8 October 2014 through 10 October 2014], pp.-.. Google Citation
  10. Kaur R., Maninder Singh (2015). Two-level automated approach for defending against obfuscated zero-day attacks. Proceedings of the Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) [ : 27 August 2014 through 29 August 2014], pp.164-179.. Google Citation
  11. Goyal S., Seema Bawa, Singh B. (2015). Experimental comparison of three scheduling algorithms for energy efficiency in cloud computing. Proceedings of the 2014 IEEE International Conference on Cloud Computing in Emerging Markets, CCEM 2014 [ : 15 October 2014 through 17 October 2014], pp.-.. Google Citation