Follow
Sarbjeet Singh
Sarbjeet Singh
Verified email at pu.ac.in
Title
Cited by
Cited by
Year
A review of metaheuristic scheduling techniques in cloud computing
M Kalra, S Singh
Egyptian informatics journal 16 (3), 275-295, 2015
4692015
A survey of data mining and social network analysis based anomaly detection techniques
R Kaur, S Singh
Egyptian informatics journal 17 (2), 199-216, 2016
1602016
Compliance-based multi-dimensional trust evaluation system for determining trustworthiness of cloud service providers
S Singh, J Sidhu
Future Generation Computer Systems 67, 109-132, 2017
1122017
A dynamic, cost-aware, optimized data replication strategy for heterogeneous cloud data centers
NK Gill, S Singh
Future Generation Computer Systems 65, 10-32, 2016
992016
Improved topsis method based trust evaluation framework for determining trustworthiness of cloud service providers
J Sidhu, S Singh
Journal of Grid Computing 15 (1), 81-105, 2017
882017
A privacy, trust and policy based authorization framework for services in distributed environments
S Singh, S Bawa
International Journal of Computer Science 2 (2), 85-92, 2007
802007
Deadline and cost based workflow scheduling in hybrid cloud
N Chopra, S Singh
2013 international conference on advances in computing, communications and …, 2013
762013
HEFT based workflow scheduling algorithm for cost optimization within deadline in hybrid clouds
N Chopra, S Singh
2013 Fourth International Conference on Computing, Communications and …, 2013
762013
HEFT based workflow scheduling algorithm for cost optimization within deadline in hybrid clouds
N Chopra, S Singh
2013 Fourth International Conference on Computing, Communications and …, 2013
762013
Rise of spam and compromised accounts in online social networks: A state-of-the-art review of different combating approaches
R Kaur, S Singh, H Kumar
Journal of Network and Computer Applications 112, 53-88, 2018
722018
A survey of workflow scheduling algorithms and research issues
L Singh, S Singh
International Journal of Computer Applications 74 (15), 2013
722013
A comprehensive review of object detection with deep learning
R Kaur, S Singh
Digital Signal Processing, 103812, 2022
622022
Design and implementation of multi-tier authentication scheme in cloud
M Singh, S Singh
International Journal of Computer Science Issues (IJCSI) 9 (5), 181, 2012
542012
AuthCom: Authorship verification and compromised account detection in online social networks using AHP-TOPSIS embedded profiling based technique
R Kaur, S Singh, H Kumar
Expert Systems with Applications 113, 397-414, 2018
502018
A budget-constrained time and reliability optimization bat algorithm for scheduling workflow applications in clouds
N Kaur, S Singh
Procedia Computer Science 98, 199-204, 2016
492016
A genetic algorithm for scheduling workflow applications in unreliable cloud environment
L Singh, S Singh
International Conference on Security in Computer Networks and Distributed …, 2014
402014
A comparative analysis of structural graph metrics to identify anomalies in online social networks
R Kaur, S Singh
Computers & Electrical Engineering 57, 294-310, 2017
392017
Trust evaluation in cloud based on friends and third party's recommendations
S Singh, D Chand
2014 Recent Advances in Engineering and Computational Sciences (RAECS), 1-6, 2014
362014
Design and comparative analysis of MCDM-based multi-dimensional trust evaluation schemes for determining trustworthiness of cloud service providers
J Sidhu, S Singh
Journal of Grid Computing 15 (2), 197-218, 2017
352017
Analyzing negative ties in social networks: A survey
M Kaur, S Singh
Egyptian Informatics Journal 17 (1), 21-43, 2016
322016
The system can't perform the operation now. Try again later.
Articles 1–20