Name
Papers
Collaborators
SAJJAN G. SHIVA
42
37
Citations 
PageRank 
Referers 
116
23.02
364
Referees 
References 
714
308
Search Limit
100714
Title
Citations
PageRank
Year
Ads-Guard - Detecting Scammers in Online Classified Ads.00.342020
Ensemble Classifiers For Network Intrusion Detection Using A Novel Network Attack Dataset10.352020
Taxonomy and Survey of Interpretable Machine Learning Method00.342020
Empirical Evaluation of the Ensemble Framework for Feature Selection in DDoS Attack10.372020
IoMT-SAF: Internet of Medical Things Security Assessment Framework40.472019
Ontology-Based Security Recommendation for the Internet of Medical Things.10.362019
Quantifying security and privacy in Internet of Things solutions.10.342018
Crowdsourcing Multi-Objective Recommendation System.00.342018
On a Generic Security Game Model.00.342018
Security and Privacy in the Internet of Medical Things: Taxonomy and Risk Assessment.30.452017
CSSR: Cloud Services Security Recommender10.372016
Building Trust in Cloud: Service Certification Challenges and Approaches00.342015
Mitigating congestion based DoS attacks with an enhanced AQM technique.50.452015
A Network Security Game Model00.342015
Towards an Effective Crowdsourcing Recommendation System: A Survey of the State-of-the-Art50.412015
A survey of cloud computing taxonomies: Rationale and overview10.372014
Use Of Attack Graphs In Security Systems160.892014
A game inspired defense mechanism against distributed denial of service attacks.40.482014
Runtime Monitors to Detect and Prevent Union Query Based SQL Injection Attacks00.342013
Mitigating congestion-based denial of service attacks with active queue management50.442013
ADAPT: A Game Inspired Attack-Defense and Performance Metric Taxonomy.50.612013
Security in the cloud based systems: Structure and breaches.00.342013
Game theory-based defense mechanisms against DDoS attacks on TCP/TCP-friendly flows181.002011
Knowledge Engineering To Visualize Complexity For Legacy Modernization Planning00.342010
An Approach to Overcoming Knowledge Sharing Challenges in a Corporate IT Environment00.342010
A Novel Approach to Knowledge Sharing in Software Systems Engineering40.532009
Clustering of Defect Reports Using Graph Partitioning Algorithms30.422009
Knowledge Management in Global Software Development10.372009
Using Semantic Wikis to Support Software Reuse50.462008
Automatic Clustering of Defect Reports10.362008
Software Reuse: Research and Practice120.912007
Will earlier projects plus a disciplined process enforce SE principles throughout the CS curriculum?30.652005
Software Practices in Academia00.342004
CMMI Framework in Small Business Environment - A Case Study00.342004
Pipelined and Parallel Computer Architecture93.111998
Interpartition communication with shared active packages00.341996
Design of a knowledge-based simulation environment00.341996
A file integrity checking system to detect and recover from program modification attacks in multi-user computer systems10.381990
An aposteriori computer security system to identify computer viruses.00.341989
On the Description of Multiprocessor Architectures00.341981
Combinational logic synthesis from an HDL description21.051980
Flip-Flops for Multiple-Valued Logic42.001976