• Publications
  • Influence
Software clone detection: A systematic review
Abstract Context Reusing software by means of copy and paste is a frequent activity in software development. The duplicated code is known as a software clone and the activity is known as code cloningExpand
  • 273
  • 19
Efficient hybrid technique for detecting zero-day polymorphic worms
This paper presents an efficient technique for detecting zero-day polymorphic worms with almost zero false positives. Zero-day polymorphic worms not only exploit unknown vulnerabilities but alsoExpand
  • 26
  • 9
A Survey on Zero-Day Polymorphic Worm Detection Techniques
Zero-day polymorphic worms pose a serious threat to the Internet security. With their ability to rapidly propagate, these worms increasingly threaten the Internet hosts and services. Not only canExpand
  • 44
  • 4
Deficiency of beta1 integrins results in increased myocardial dysfunction after myocardial infarction.
OBJECTIVE To study the role of beta1 integrins in left ventricular (LV) remodelling after myocardial infarction (MI). METHODS AND RESULTS LV structural and functional alterations were determined inExpand
  • 31
  • 3
SOCCER: Self-Optimization of Energy-efficient Cloud Resources
Cloud data centers often schedule heterogeneous workloads without considering energy consumption and carbon emission aspects. Tremendous amount of energy consumption leads to high operational costsExpand
  • 34
  • 3
Behavior analysis of malware using machine learning
  • Arshi Dhammi, M. Singh
  • Computer Science
  • Eighth International Conference on Contemporary…
  • 20 August 2015
In today's scenario, cyber security is one of the major concerns in network security and malware pose a serious threat to cyber security. The foremost step to guard the cyber system is to have anExpand
  • 15
  • 2
Utilization Patterns of Single‐Photon Emission Cardiac Tomography Myocardial Perfusion Imaging Studies in a Rural Tertiary Care Setting
Appropriate use criteria (AUC) for single‐photon emission computed tomographic myocardial perfusion imaging (SPECT MPI) were revised in 2009 to include 15 new clinical scenarios. We assessedExpand
  • 6
  • 2
PythonHoneyMonkey: Detecting malicious web URLs on client side honeypot systems
  • Rohit Shukla, M. Singh
  • Computer Science
  • Proceedings of 3rd International Conference on…
  • 1 October 2014
With increase in the awareness of security programming, the number of vulnerabilities for software on a machine have subsequently decreased. Exploiting these few vulnerabilities if present, requireExpand
  • 11
  • 2
Analysis of RSA algorithm using GPU programming
Modern-day computer security relies heavily on cryptography as a means to protect the data that we have become increasingly reliant on. The main research in computer security domain is how to enhanceExpand
  • 18
  • 2
Validating Requirements Reviews by Introducing Fault-Type Level Granularity: A Machine Learning Approach
Inspections are a proven approach for improving software requirements quality. Owing to the fact that inspectors report both faults and non-faults (i.e., false-positives) in their inspection reports,Expand
  • 5
  • 2