​
Login / Signup
Deepak Kumar
ORCID
Publication Activity (10 Years)
Years Active: 2011-2024
Publications (10 Years): 14
Top Topics
Intrusion Detection
Ddos Attacks
Utility Theory
Cloud Computing
Top Venues
Int. J. Syst. Assur. Eng. Manag.
Inf. Softw. Technol.
J. Inf. Technol. Res.
ICTCS
</>
Publications
</>
Shobhit Kumar Saurabh
,
Deepak Kumar
Model to reduce DevOps pipeline execution time using SAST.
Int. J. Syst. Assur. Eng. Manag.
15 (5) (2024)
Sarika Sharma
,
Deepak Kumar
Product backlog optimization technique in agile software development using clustering algorithm.
Multim. Tools Appl.
82 (30) (2023)
Priti Narwal
,
Deepak Kumar
,
Shailendra Narayan Singh
,
Peeyush Tewari
Stochastic Intrusion Detection Game-Based Arrangement Using Controlled Markov Chain for Prevention of DoS and DDoS Attacks in Cloud.
J. Inf. Technol. Res.
14 (4) (2021)
Nitin Chawla
,
Deepak Kumar
,
Dinesh Kumar Sharma
Improving Cost for Data Migration in Cloud Computing Using Genetic Algorithm.
Int. J. Softw. Innov.
8 (3) (2020)
Priti Narwal
,
Deepak Kumar
,
Shailendra Narayan Singh
A Hidden Markov Model Combined With Markov Games for Intrusion Detection in Cloud.
J. Cases Inf. Technol.
21 (4) (2019)
Viral Gupta
,
Parmod Kumar Kapur
,
Deepak Kumar
Prioritizing and Optimizing Disaster Recovery Solution using Analytic Network Process and Multi Attribute Utility Theory.
Int. J. Inf. Technol. Decis. Mak.
18 (1) (2019)
Siddharth Bhalerao
,
Irshad Ahmad Ansari
,
Anil Kumar
,
Deepak Kumar
A reversible and multipurpose ECG data hiding technique for telemedicine applications.
Pattern Recognit. Lett.
125 (2019)
Yogita Kansal
,
Parmod Kumar Kapur
,
Uday Kumar
,
Deepak Kumar
Prioritising vulnerabilities using ANP and evaluating their optimal discovery and patch release time.
Int. J. Math. Oper. Res.
14 (2) (2019)
Ila Sharma
,
Anil Kumar
,
Deepak Kumar
,
Girish Kumar Singh
Performance of CSE Techniques for Designing Multiplier-Less FIR Filter Using Evolutionary Algorithms.
Circuits Syst. Signal Process.
37 (6) (2018)
Nitin Chawla
,
Deepak Kumar
Modelling of Cloud Computing Enablers Using MICMAC Analysis and TISM.
Int. J. Ambient Comput. Intell.
9 (3) (2018)
Saru Dhir
,
Deepak Kumar
,
V. B. Singh
Requirement Paradigms to Implement the Software Projects in Agile Development Using Analytical Hierarchy Process.
Int. J. Decis. Support Syst. Technol.
9 (3) (2017)
Viral Gupta
,
Parmod Kumar Kapur
,
Deepak Kumar
Modeling and measuring attributes influencing DevOps implementation in an enterprise using structural equation modeling.
Inf. Softw. Technol.
92 (2017)
Priti Narwal
,
Deepak Kumar
,
Mayank Sharma
A Review of Game-Theoretic Approaches for Secure Virtual Machine Resource Allocation in Cloud.
ICTCS
(2016)
Viral Gupta
,
Parmod Kumar Kapur
,
Deepak Kumar
Modelling and measuring code smells in enterprise applications using TISM and two-way assessment.
Int. J. Syst. Assur. Eng. Manag.
7 (3) (2016)
Deepak Kumar
,
Anita Bhatia
Role of IT in Business Process Reengineering.
ReTIS
(2011)