Showing results 48 to 67 of 81
< previous
next >
Issue Date | Title | Author(s) |
29-Sep-2017 | Implement Software Access Point using Linux Hotspot | Singh, Maninder; Singh, V. P.; Singh, Hargovind |
20-Aug-2014 | Implementation of Secure, Fast and Efficient RSA Algorithm on GPU | Singh, Maninder; Mahajan, Sonam |
11-Jan-2019 | Improved Data Structures for Dynamic and Massive Data | Garg, Deepak; Singh, Maninder; Sunita |
5-Aug-2016 | Improved File System Security through Restrictive Access | Singh, Maninder; Kaur, Navneet |
31-Jul-2013 | Improved IPv6 Trace-Back technique to uncover Denial of Service (DoS) attacks | Singh, Maninder; Jain, Abhishek |
6-Aug-2018 | Improving Oracle Retail Merchandising System and Oracle Retail Sales Audit using Functional and Software Security Assurance Testing | Singh, Maninder; Gupta, Bhawna |
29-Jul-2015 | Integrated Network Traffic Visualization for Threat Detection, Analysis and Reporting | Singh, Maninder; Kumar, Amit |
24-Jul-2008 | Intrusion Prevention Scripts to Detect Malicious Traffic using Bro | Singh, Maninder; Singh, Navdeep |
19-Jun-2007 | JGSnap: A Graphical Analyzer for Honeysnap | Singh, Maninder; Vershney, Abhishek |
9-Jul-2009 | Load Flow Solution of Radial Distribution Systems Using Two Port Parameters | Singh, Yaduvir; Patnaik, N.; Ghosh, S.; Singh, Maninder |
12-Aug-2009 | Log Visualization to track Compromised Host on
the Network | Singh, Maninder; Goyal, Sheenam |
23-Jul-2015 | Machine Learning Approach to Malware Analysis and Reporting | Singh, Maninder; Dhammi, Arshi |
14-Sep-2016 | Malware Detection Based on Opcode Frequency | Singh, Maninder; Yewale, Abhijit |
20-Aug-2012 | Mobile Application for Transliteration of Roman Script to Gurmukhi Script | Kumar, Parteek; Kaur, Rupinderdeep; Singh, Maninder |
8-Jun-2015 | Network Security Model for Attack Signature Generation, Tracking and Analysis | Singh, Maninder; Kaur, Sanmeet |
5-Aug-2010 | Network Vulnerability Detection Using Ant Colony Optimization | Singh, Maninder; Kumar, Yogesh |
8-Jul-2011 | Parametric Evaluation of IAPP using Software Access Point and Hardware Access Point | Singh, Maninder; Singh, Sukhvinder |
11-Nov-2022 | Post-Quantum Cryptography based Improved Security Mechanism for Resource-Constrained IoT Devices | Singh, Maninder; Singh, Raman; Tewari, Hitesh; Kumari, Swati |
23-Jul-2007 | Proactive Network Surveillance Framework | Bawa, Seema; Saxena, S. C.; Singh, Maninder |
27-Jul-2011 | Profiling Campus Network using Network Penetration Testing | Singh, Maninder; Kaushal, V. P. S.; Singh, Gurpreet |