default search action
Jagpreet Sidhu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j18]Arvinder Kaur, Yugal Kumar, Jagpreet Sidhu:
Exploring meta-heuristics for partitional clustering: methods, metrics, datasets, and challenges. Artif. Intell. Rev. 57(10): 287 (2024) - [j17]Laxmanika Singh, Pradeep Kumar Singh, Jagpreet Sidhu:
Robust and secure watermarking method through BEMD, SVD and Arnold transform in wavelet domain. Int. J. Syst. Assur. Eng. Manag. 15(4): 1361-1373 (2024) - 2023
- [j16]Victor Chang, Jagpreet Sidhu, Sarbjeet Singh, Rajinder Sandhu:
SLA-based Multi-dimensional Trust Model for Fog Computing Environments. J. Grid Comput. 21(1): 4 (2023) - 2022
- [j15]Gaurav Deep, Jagpreet Sidhu, Rajni Mohana:
Insider threat prevention in distributed database as a service cloud environment. Comput. Ind. Eng. 169: 108278 (2022) - [j14]Nagma Khattar, Jaiteg Singh, Jagpreet Sidhu:
A correlation-based investigation of VM consolidation for cloud computing. Int. J. Cloud Comput. 11(3): 234-267 (2022) - [j13]Mandeep Singh Ramdev, Rohit Bajaj, Jagpreet Sidhu:
Remote Radio Head Scheduling in LTE-Advanced Networks. Wirel. Pers. Commun. 122(1): 621-644 (2022) - 2020
- [j12]Deepak Garg, Jagpreet Sidhu, Shalli Rani:
A note on cloud computing security. Int. J. Ad Hoc Ubiquitous Comput. 33(3): 133-154 (2020) - [j11]Gaurav Deep, Jagpreet Sidhu, Rajni Mohana:
Access Management of User and Cyber-Physical Device in DBaaS according to Indian IT Laws using Blockchain. Scalable Comput. Pract. Exp. 21(3): 407-424 (2020) - [j10]Nagma Khattar, Jaiteg Singh, Jagpreet Sidhu:
An Energy Efficient and Adaptive Threshold VM Consolidation Framework for Cloud Environment. Wirel. Pers. Commun. 113(1): 349-367 (2020)
2010 – 2019
- 2019
- [j9]Deepak Garg, Jagpreet Sidhu, Shalli Rani:
Improved TOPSIS: A multi-criteria decision making for research productivity in cloud security. Comput. Stand. Interfaces 65: 61-78 (2019) - [j8]Jagpreet Sidhu, Sarbjeet Singh:
Using the improved PROMETHEE for selection of trustworthy cloud database servers. Int. Arab J. Inf. Technol. 16(2): 194-202 (2019) - [j7]Deepak Garg, Jagpreet Sidhu, Shalli Rani:
Emerging trends in cloud computing security: a bibliometric analyses. IET Softw. 13(3): 223-231 (2019) - [j6]Nagma Khattar, Jagpreet Sidhu, Jaiteg Singh:
Toward energy-efficient cloud computing: a survey of dynamic power management and heuristics-based optimization techniques. J. Supercomput. 75(8): 4750-4810 (2019) - 2018
- [j5]Sonia Singh, Ankita Bansal, Rajinder Sandhu, Jagpreet Sidhu:
Fog computing and IoT based healthcare support service for dengue fever. Int. J. Pervasive Comput. Commun. 14(2): 197-207 (2018) - 2017
- [j4]Sarbjeet Singh, Jagpreet Sidhu:
Compliance-based Multi-dimensional Trust Evaluation System for determining trustworthiness of Cloud Service Providers. Future Gener. Comput. Syst. 67: 109-132 (2017) - [j3]Jagpreet Sidhu, Sarbjeet Singh:
Improved TOPSIS Method Based Trust Evaluation Framework for Determining Trustworthiness of Cloud Service Providers. J. Grid Comput. 15(1): 81-105 (2017) - [j2]Jagpreet Sidhu, Sarbjeet Singh:
Design and Comparative Analysis of MCDM-based Multi-dimensional Trust Evaluation Schemes for Determining Trustworthiness of Cloud Service Providers. J. Grid Comput. 15(2): 197-218 (2017) - 2016
- [j1]Jagpreet Sidhu, Sarbjeet Singh:
A novel cloud auditor based trust management framework for cloud computing. Int. J. Grid Util. Comput. 7(3): 219-235 (2016) - 2014
- [c2]Jagpreet Sidhu, Sarbjeet Singh:
Compliance based Trustworthiness Calculation Mechanism in Cloud Environment. EUSPN/ICTH 2014: 439-446 - [c1]Jagpreet Sidhu, Sarbjeet Singh:
Peers Feedback and Compliance Based Trust Computation for Cloud Computing. SSCC 2014: 68-80
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:06 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint