Login / Signup
Bijeta Seth
Publication Activity (10 Years)
Years Active: 2018-2023
Publications (10 Years): 6
Top Topics
Cyber Security
Intrusion Detection
Ad Hoc Networks
Cloud Computing
Top Venues
J. Cloud Comput.
Soft Comput.
Trans. Emerg. Telecommun. Technol.
J. Cyber Secur. Mobil.
</>
Publications
</>
Surjeet Dalal
,
Poongodi Manoharan
,
Umesh Kumar Lilhore
,
Bijeta Seth
,
Deema Mohammed alsekait
,
Sarita Simaiya
,
Mounir Hamdi
,
Kaamran Raahemifar
Correction: Extremely boosted neural network for more accurate multi-stage Cyber attack prediction in cloud computing environment.
J. Cloud Comput.
12 (1) (2023)
Surjeet Dalal
,
Poongodi Manoharan
,
Umesh Kumar Lilhore
,
Bijeta Seth
,
Deema Mohammed alsekait
,
Sarita Simaiya
,
Mounir Hamdi
,
Kaamran Raahemifar
Extremely boosted neural network for more accurate multi-stage Cyber attack prediction in cloud computing environment.
J. Cloud Comput.
12 (1) (2023)
Bijeta Seth
,
Surjeet Dalal
,
Vivek Jaglan
,
Dac-Nhuong Le
,
Senthilkumar Mohan
,
Gautam Srivastava
Integrating encryption techniques for secure data storage in the cloud.
Trans. Emerg. Telecommun. Technol.
33 (4) (2022)
Surjeet Dalal
,
Bijeta Seth
,
Vivek Jaglan
,
Meenakshi Malik
,
Surbhi
,
Neeraj Dahiya
,
Uma Rani
,
Dac-Nhuong Le
,
Yu-Chen Hu
An adaptive traffic routing approach toward load balancing and congestion control in Cloud-MANET ad hoc networks.
Soft Comput.
26 (11) (2022)
Edeh Michael Onyema
,
Surjeet Dalal
,
Carlos Andrés Tavera Romero
,
Bijeta Seth
,
Praise Young
,
Mohd Anas Wajid
Design of Intrusion Detection System based on Cyborg intelligence for security of Cloud Network Traffic of Smart Cities.
J. Cloud Comput.
11 (2022)
Dac-Nhuong Le
,
Bijeta Seth
,
Surjeet Dalal
A Hybrid Approach of Secret Sharingwith Fragmentation and Encryptionin Cloud Environment for SecuringOutsourced Medical Database: A Revolutionary Approach.
J. Cyber Secur. Mobil.
7 (4) (2018)