A comparative study of cloud security ontologies V Singh, SK Pandey Proceedings of 3rd International Conference on Reliability, Infocom …, 2014 | 112 | 2014 |
Revisiting security ontologies V Singh, SK Pandey International Journal of Computer Science Issues (IJCSI) 11 (6), 150, 2014 | 24 | 2014 |
Revisiting cloud security issues and challenges V Singh, SK Pandey International Journal of Advanced Research in Computer Science and Software …, 2013 | 20 | 2013 |
Research in cloud security: problems and prospects V Singh, SK Pandey International Journal of Computer Science Engineering and Information …, 2013 | 18 | 2013 |
Cloud security related threats V Singh, SK Pandey International Journal of Scientific & Engineering Research 4 (9), 2571, 2013 | 16 | 2013 |
Cloud Security Ontology (CSO) vaishali singh Studies in Big Data Series, Cloud Computing for Geospatial Big Data …, 2019 | 14 | 2019 |
Cloud computing: vulnerability and threat indications V Singh, SK Pandey Performance Management of Integrated Systems and its Applications in …, 2020 | 13 | 2020 |
Revisiting cloud security threats: replay attack V Singh, SK Pandey 2018 4th International Conference on Computing Communication and Automation …, 2018 | 11 | 2018 |
India towards digital revolution (security and sustainability) L Sharma, V Singh 2018 Second World Conference on Smart Trends in Systems, Security and …, 2018 | 7 | 2018 |
Revisiting cloud security threats: IP spoofing V Singh, SK Pandey Soft Computing: Theories and Applications: Proceedings of SoCTA 2018, 225-236, 2020 | 4 | 2020 |
Revisiting Cloud Security Threats: Elevation of Privilege V Singh, SK Pandey International Journal of Advanced Studies of Scientific Research 4 (2), 2019 | 4 | 2019 |
Revisiting cloud security threat: Dictionary attack V Singh, SK Pandey Proceedings of International Conference on Advancements in Computing …, 2019 | 3 | 2019 |
Agro-tech ontology: A solution for accelerating agricultural productivity in the state of Rajasthan, India S Newar, GK Saini, V Singh International Journal of Agricultural Resources, Governance and Ecology 16 …, 2020 | 2 | 2020 |
Revisiting Cloud Security Attacks: Credential Attack V Singh, SK Pandey Rising Threats in Expert Applications and Solutions, 339-350, 2020 | 1 | 2020 |
Revisiting Cloud Security Threats: Man-in-the-Middle Attack V SINGH International Journal of Computer Sciences and Engineering 7 (2), 342-348, 2019 | 1 | 2019 |
Effective Test Case Prioritization Framework Using Fuzzy Logic for Cloud-Based Applications P Saini, A Jain, V Singh, R Kaur Proceedings of Seventh International Congress on Information and …, 2022 | | 2022 |
Cloud Security Assurance: ‘Elevation of Privilege’ Perspective V Singh, SK Pandey, O Pal International Journal of Advanced Science and Technology 29 (1), 1523-1531, 2020 | | 2020 |
ICT and Sustainability Development in India S Gaur, L Sharma, V Singh, P Saini ICT Analysis and Applications: Proceedings of ICT4SD 2019, Volume 2, 577-584, 2020 | | 2020 |
Revisiting Cloud Security Threats: Repudiation Attack vaishali singh, SK Pandey International Journal of Recent Technology and Engineering (IJRTE) 8 (5 …, 2020 | | 2020 |
Overview of Business Intelligence on the cloud platform V Singh 5th National Conference on A road Map of India Head, St. Xavier's College Jaipur, 2016 | | 2016 |