default search action
Ashutosh Kumar Singh 0002
Person information
- affiliation: Motilal Nehru National Institute of Technology Allahabad, Department of Computer Science and Engineering, Prayagraj, India
Other persons with the same name
- Ashutosh Kumar Singh — disambiguation page
- Ashutosh Kumar Singh 0001 — National Institute of Technology, NIT, Department of Computer Applications, Kurukshetra, India (and 3 more)
- Ashutosh Kumar Singh 0003 — Power Grid Corporation of India Ltd., Gurgaon, India
- Ashutosh Kumar Singh 0004 — National Institute of Technology Patna, Department of Electrical Engineering, Bihar, India (and 1 more)
- Ashutosh Kumar Singh 0005 — Thapar Institute of Engineering and Technology, Department of Communication Engineering, Patiala, India (and 1 more)
- Ashutosh Kumar Singh 0006 — Indian Institute of Information Technology Allahabad, Electronics and Communication Engineering Department, Prayagraj, Uttar Pradesh, India
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j10]Chhaya Dubey, Dharmendra Kumar, Ashutosh Kumar Singh, Vijay Kumar Dwivedi:
Applying machine learning models on blockchain platform selection. Int. J. Syst. Assur. Eng. Manag. 15(8): 3643-3656 (2024) - [j9]Devanshi Dwivedi, Aditya Bhushan, Ashutosh Kumar Singh, Snehlata:
Improving Network Security with Gradient Boosting from KDD Cup Dataset. SN Comput. Sci. 5(7): 877 (2024) - 2023
- [j8]Ashutosh Kumar Singh, Shashank Srivastava, Shashwati Banerjea:
Evaluating heuristic techniques as a solution of controller placement problem in SDN. J. Ambient Intell. Humaniz. Comput. 14(9): 11729-11746 (2023) - [j7]Snehlata, Pallavi Shukla, Ashutosh Kumar Singh, Saloni Tiwari, Rishabh, Vijay Kumar Dwivedi:
An Intelligent Blockchain-Oriented Digital Voting System Using NEAR Protocol. SN Comput. Sci. 4(5): 643 (2023) - 2020
- [j6]Ashutosh Kumar Singh, Saurabh Maurya, Naveen Kumar, Shashank Srivastava:
Heuristic approaches for the reliable SDN controller placement problem. Trans. Emerg. Telecommun. Technol. 31(2) (2020) - [j5]Ashutosh Kumar Singh, Saurabh Maurya, Shashank Srivastava:
Varna-based optimization: a novel method for capacitated controller placement problem in SDN. Frontiers Comput. Sci. 14(3): 143402 (2020)
2010 – 2019
- 2019
- [j4]Naveen Kumar, Ashutosh Kumar Singh, Abdul Aleem, Shashank Srivastava:
Security Attacks in Named Data Networking: A Review and Research Directions. J. Comput. Sci. Technol. 34(6): 1319-1350 (2019) - [j3]Naveen Kumar, Abdul Aleem, Ashutosh Kumar Singh, Shashank Srivastava:
NBP: Namespace-based privacy to counter timing-based attack in named data networking. J. Netw. Comput. Appl. 144: 155-170 (2019) - 2018
- [j2]Naveen Kumar, Ashutosh Kumar Singh, Shashank Srivastava:
A Triggered Delay-based Approach against Cache Privacy Attack in NDN. Int. J. Networked Distributed Comput. 6(3): 174-184 (2018) - [j1]Ashutosh Kumar Singh, Shashank Srivastava:
A survey and classification of controller placement problem in SDN. Int. J. Netw. Manag. 28(3) (2018) - 2017
- [c2]Nivindar Kaur, Ashutosh Kumar Singh, Naveen Kumar, Shashank Srivastava:
Performance impact of topology poisoning attack in SDN and its countermeasure. SIN 2017: 179-184 - [c1]Naveen Kumar, Ashutosh Kumar Singh, Shashank Srivastava:
Evaluating machine learning algorithms for detection of interest flooding attack in named data networking. SIN 2017: 299-302
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-13 02:01 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint