


default search action
Deepak Dahiya
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j18]Deepak Dahiya:
Cyber attack detection and mitigation process in cloud via deep hybrid model with selected feature set. Multim. Tools Appl. 83(28): 70749-70775 (2024) - 2023
- [j17]Deepak Dahiya:
DDoS Attacks Detection in 5G Networks: Hybrid Model with Statistical and Higher-Order Statistical Features. Cybern. Syst. 54(6): 888-913 (2023) - [j16]Deepak Dahiya
:
Hybrid classifier strategy with tuned training weights for distributed denial of service attack detection. Concurr. Comput. Pract. Exp. 35(4) (2023) - [j15]Usama Abdur Rahman
, C. Jayakumar, Deepak Dahiya, Chinnanadar Ramachandran Rene Robin:
Genetics Based Compact Fuzzy System for Visual Sensor Network. Comput. Syst. Sci. Eng. 45(1): 409-426 (2023) - [j14]Deepak Dahiya:
COVID-19 Disease Prediction Utilizing Dilated Convolution Neural Network Based Levy Flight Tunicate Swarm Optimization. Wirel. Pers. Commun. 131(3): 1515-1528 (2023) - [j13]Bader Hamad AlOwaimer, Deepak Dahiya:
Performance Investigation of Phishing Website Detection by Improved Deep Learning Techniques. Wirel. Pers. Commun. 132(4): 2625-2644 (2023) - 2022
- [j12]Ravish, Rahul Katarya
, Deepak Dahiya
, Saksham Checker
:
Fake News Detection System Using Featured-Based Optimized MSVM Classification. IEEE Access 10: 113184-113199 (2022) - 2021
- [j11]Rashmi Sharma
, Nitin, Mohammed Abdul Rahman AlShehri, Deepak Dahiya
:
Priority-based joint EDF-RM scheduling algorithm for individual real-time task on distributed systems. J. Supercomput. 77(1): 890-908 (2021)
2010 – 2019
- 2014
- [c19]Komal Mahajan, Deepak Dahiya
:
A cloud based deployment framework for load balancing policies. IC3 2014: 565-570 - 2013
- [j10]Rajni Mohana, Deepak Dahiya
:
Specifying Access Policies for Secure Content Dissemination of XML: A Technique Inspired by DNA Cryptography. J. Comput. Inf. Technol. 21(2): 71-84 (2013) - [j9]Pooja Jain, Deepak Dahiya:
Knowledgeable Multi-Agent System for E-Commerce (KMASE) using Fuzzy C-Means Clustering and Case Based Reasoning. Int. J. Comput. Their Appl. 20(2): 111-126 (2013) - [j8]Komal Mahajan, Ansuyia Makroo, Deepak Dahiya
:
Round Robin with Server Affinity: A VM Load Balancing Algorithm for Cloud Based Infrastructure. J. Inf. Process. Syst. 9(3): 379-394 (2013) - 2012
- [j7]Rajni Mohana, Deepak Dahiya:
Approach and impact of a protocol for selection of service in web service platform. ACM SIGSOFT Softw. Eng. Notes 37(1): 1-6 (2012) - [c18]Atul Saurabh
, Deepak Dahiya
, Rajni Mohana:
Maximizing Automatic Code Generation: Using XML Based MDA. IC3 2012: 283-293 - [c17]Pooja Jain, Deepak Dahiya
:
An Intelligent Multi Agent Framework for E-commerce Using Case Based Reasoning and Argumentation for Negotiation. ICISTM 2012: 164-175 - [c16]Deepak Dahiya
, Mohit Gupta, Pooja Jain:
Enterprise Knowledge Management System: A Multi Agent Perspective. ICISTM 2012: 271-281 - 2011
- [j6]Rachit Mohan Garg, Deepak Dahiya
:
An Aspect Oriented Component Based Archetype Driven Development. J. Inf. Technol. Res. 4(3): 29-49 (2011) - [c15]Rajni Mohana, Deepak Dahiya
:
Optimized Service Discovery Using QoS Based Ranking: A Fuzzy Clustering and Particle Swarm Optimization Approach. COMPSAC Workshops 2011: 452-457 - [c14]Rachit Mohan Garg, Deepak Dahiya
, Ankit Tyagi, Pranav Hundoo, Raghvi Behl:
Aspect Oriented and Component Based Model Driven Architecture. DICTAP (2) 2011: 55-64 - [c13]Rajni Mohana, Deepak Dahiya
:
Designing QoS Based Service Discovery as a Fuzzy Expert System. IC3 2011: 533-534 - [c12]Rachit Mohan Garg, Deepak Dahiya
:
Integrating Aspects and Reusable Components: An Archetype Driven Methodology. IC3 2011: 543-545 - [c11]Pooja Jain, Deepak Dahiya
:
Architecture of a Library Management System Using Gaia Extended for Multi Agent Systems. ICISTM 2011: 340-349 - [c10]Rachit Mohan Garg, Deepak Dahiya
:
An Aspect Oriented Component Based Model Driven Development. ICSECS (3) 2011: 502-517 - 2010
- [j5]Deepak Dahiya, Pooja Jain:
Enterprise Systems Development: Impact of Various Software Development Methodologies. Int. J. Adv. Comp. Techn. 2(4): 77-87 (2010) - [j4]Deepak Dahiya:
Delivering a Course in Software Engineering: A Hands On Approach. J. Convergence Inf. Technol. 5(5): 92-98 (2010) - [j3]Deepak Dahiya:
Teaching software engineering: a practical approach. ACM SIGSOFT Softw. Eng. Notes 35(2): 1-5 (2010) - [c9]Pawan Kumar Verma
, Deepak Dahiya
, Pooja Jain:
Using aspect oriented software architecture for enterprise systems development. ICDIM 2010: 448-453 - [c8]Pawan Kumar Verma, Deepak Dahiya:
Enterprise Systems Development: Impact of Aspect Oriented Software Architecture. SEKE 2010: 176-179
2000 – 2009
- 2009
- [j2]Deepak Dahiya, Usha Batra
:
Distributed middleware framework using aspects. ACM SIGSOFT Softw. Eng. Notes 34(4): 1-6 (2009) - [c7]Deepak Dahiya
, Usha Batra
:
Enterprise Knowledge Management Systems: Role of Aspects and Distributed Middleware Framework. NCM 2009: 864-869 - [c6]Deepak Dahiya
, Usha Batra
:
Improving Software Design Using Aspects in Distributed Computing. NCM 2009: 882-887 - 2008
- [c5]Deepak Dahiya
, Sudha Dahiya:
Software Reuse in Design and Development of Aspects. COMPSAC 2008: 745-750 - [c4]Deepak Dahiya, Usha Batra, Sudha Dahiya:
Validating Requirements and Design Parameters for Aspects. Software Engineering Research and Practice 2008: 362-368 - 2006
- [j1]Deepak Dahiya, Rajinder K. Sachdeva:
Approaches to aspect oriented design: a study. ACM SIGSOFT Softw. Eng. Notes 31(5): 1-4 (2006) - [c3]Deepak Dahiya
, Rajinder K. Sachdeva:
Understanding Requirements: Aspect Oriented Software Development. COMPSAC (2) 2006: 303-308 - [c2]Deepak Dahiya
, Rajinder K. Sachdeva, Sudha Dahiya:
A Prototype Implementation using Aspect Oriented Software Development. ICDIM 2006: 6-12 - [c1]Deepak Dahiya
, Rajinder K. Sachdeva, Sudha Dahiya:
Dealing With Software Concerns In Aspects. ICDIM 2006: 29-35
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:05 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint