default search action
Amrit Lal Sangal
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j25]Kirti Bhandari, Kuldeep Kumar, Amrit Lal Sangal:
DBOS_US: a density-based graph under-sampling method to handle class imbalance and class overlap issues in software fault prediction. J. Supercomput. 80(15): 22682-22725 (2024) - 2023
- [j24]Kirti Bhandari, Kuldeep Kumar, Amrit Lal Sangal:
Data quality issues in software fault prediction: a systematic literature review. Artif. Intell. Rev. 56(8): 7839-7908 (2023) - 2022
- [j23]Neha Thakur, Avtar Singh, Amrit Lal Sangal:
Cloud services selection: A systematic review and future research directions. Comput. Sci. Rev. 46: 100514 (2022) - [j22]Himansu Sekhar Pattanayak, Harsh Kumar Verma, Amrit Lal Sangal:
Gravitational community detection by predicting diameter. Discret. Math. Algorithms Appl. 14(4): 2150145:1-2150145:29 (2022) - [j21]Pooja Sharma, Amrit Lal Sangal:
Examining the Predictive Capability of Advanced Software Fault Prediction Models - An Experimental Investigation Using Combination Metrics. e Informatica Softw. Eng. J. 16(1) (2022) - [j20]Arvind Mahindru, Amrit Lal Sangal:
SOMDROID: android malware detection by artificial neural network trained using unsupervised learning. Evol. Intell. 15(1): 407-437 (2022) - [j19]Himansu Sekhar Pattanayak, Harsh Kumar Verma, Amrit Lal Sangal:
Lengthening of average path length in social networks due to the effect of community structure. J. King Saud Univ. Comput. Inf. Sci. 34(10 Part A): 8401-8421 (2022) - 2021
- [j18]Satnam Kaur, Lalit Kumar Awasthi, Amrit Lal Sangal:
HMOSHSSA: a hybrid meta-heuristic approach for solving constrained optimization problems. Eng. Comput. 37(4): 3167-3203 (2021) - [j17]Abhinav Bhandari, Krishan Kumar, Amrit Lal Sangal, Sunny Behal:
An anomaly based distributed detection system for DDoS attacks in Tier-2 ISP networks. J. Ambient Intell. Humaniz. Comput. 12(1): 1387-1406 (2021) - [j16]Arvind Mahindru, Amrit Lal Sangal:
SemiDroid: a behavioral malware detector based on unsupervised machine learning techniques using feature selection approaches. Int. J. Mach. Learn. Cybern. 12(5): 1369-1411 (2021) - [j15]Arvind Mahindru, Amrit Lal Sangal:
FSDroid: - A feature selection technique to detect malware from Android using Machine Learning Techniques. Multim. Tools Appl. 80(9): 13271-13323 (2021) - [j14]Arvind Mahindru, Amrit Lal Sangal:
MLDroid - framework for Android malware detection using machine learning techniques. Neural Comput. Appl. 33(10): 5183-5240 (2021) - [j13]Arvind Mahindru, Amrit Lal Sangal:
HybriDroid: an empirical analysis on effective malware detection model developed using ensemble methods. J. Supercomput. 77(8): 8209-8251 (2021) - 2020
- [j12]Satnam Kaur, Lalit Kumar Awasthi, Amrit Lal Sangal, Gaurav Dhiman:
Tunicate Swarm Algorithm: A new bio-inspired based metaheuristic paradigm for global optimization. Eng. Appl. Artif. Intell. 90: 103541 (2020) - 2019
- [j11]Pooja Sharma, Amrit Lal Sangal:
Building a hierarchical structure model of enablers that affect the software process improvement in software SMEs - A mixed method approach. Comput. Stand. Interfaces 66 (2019) - [j10]Pooja Sharma, Amrit Lal Sangal:
Investigating the factors which impact SPI implementation initiatives in software SMEs - A systematic map and review. J. Softw. Evol. Process. 31(7) (2019) - [j9]Himansu Sekhar Pattanayak, Amrit Lal Sangal, Harsh Kumar Verma:
Community detection in social networks based on fire propagation. Swarm Evol. Comput. 44: 31-48 (2019) - 2018
- [j8]Pooja Sharma, Amrit Lal Sangal:
Framework for empirical examination and modeling structural dependencies among inhibitors that impact SPI implementation initiatives in software SMEs. J. Softw. Evol. Process. 30(12) (2018) - 2017
- [j7]Ramanpreet Kaur, Amrit Lal Sangal, Krishan Kumar Saluja:
Overlay based defensive architecture to survive DDoS: A comparative study. J. High Speed Networks 23(1): 67-91 (2017) - [j6]Ramanpreet Kaur, Amrit Lal Sangal, Krishan Kumar Saluja:
Churn handling strategies for structured overlay networks: A survey. Multiagent Grid Syst. 13(4): 331-351 (2017) - 2016
- [j5]Ramanpreet Kaur, Amrit Lal Sangal, Krishan Kumar Saluja:
A Persistent Structured Hierarchical Overlay Network to Counter Intentional Churn Attack. J. Comput. Networks Commun. 2016: 5191405:1-5191405:15 (2016) - [j4]Abhinav Bhandari, Amrit Lal Sangal, Krishan Kumar Saluja:
Characterizing flash events and distributed denial-of-service attacks: an empirical investigation. Secur. Commun. Networks 9(13): 2222-2239 (2016) - 2015
- [j3]Sandeep Mehmi, Harsh Kumar Verma, Amrit Lal Sangal:
Analysis of cloudlet completion time during attack on smart grid cloud. Int. J. Cloud Comput. 4(4): 353-376 (2015) - 2013
- [j2]Harminder Singh Bindra, Amrit Lal Sangal:
Extension of Delay Tolerant Network's Routing Protocols for Preventing Excessive Utilization of Resources. Wirel. Pers. Commun. 73(3): 535-553 (2013) - 2010
- [j1]Harminder Singh Bindra, Amrit Lal Sangal:
Considerations and Open Issues in Delay Tolerant Network'S (DTNs) Security. Wirel. Sens. Netw. 2(8): 645-648 (2010)
Conference and Workshop Papers
- 2016
- [c7]Ramanpreet Kaur, Amrit Lal Sangal, Krishan Kumar:
Performance Analysis of Predictive Stabilization for Churn Handling in Structured Overlay Networks. BDAW 2016: 39:1-39:7 - [c6]Sandeep Mehmi, Harsh Kumar Verma, Amrit Lal Sangal:
Comparative Analysis of Cloudlet Completion Time in Time and Space Shared Allocation Policies During Attack on Smart Grid Cloud. FNC/MobiSPC 2016: 435-440 - 2011
- [c5]Abhinav Bhandari, Amrit Lal Sangal, Krishan Kumar Saluja:
Queuing Algorithms Performance against Buffer Size and Attack Intensities in DDOS Attacks. ADCONS 2011: 534-540 - 2010
- [c4]Sunil Kumar Maakar, Harminder Singh Bindra, Amrit Lal Sangal:
Performance Analysis of MANET Routing Protocols Using TCP Traffic for Freeway Mobility Model. ICWN 2010: 58-63 - 2008
- [c3]Moin Uddin, Sheo Kumar, Amrit Lal Sangal:
B-Spline Interpolation Formula for the numerical Solution of Singular Integral Equations with Hilbert Kernal. CSC 2008: 306-309 - [c2]Moin Uddin, Sheo Kumar, Amrit Lal Sangal:
Cubic B-Spline Interpolation Method for Singular Integral Equations with Logarithmic Singularities. CSC 2008: 320-324 - [c1]Moin Uddin, Sheo Kumar, Amrit Lal Sangal:
Quadratic B-Spline Interpolation Method for Cauchy Type Singular Integral Equations with Generalised Kernels. CSC 2008: 334-337
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:14 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint