Follow
Dr. Sandeep Kumar Nayak
Dr. Sandeep Kumar Nayak
Associate Professor, Department of Computer Application,Integral University
Verified email at iul.ac.in
Title
Cited by
Cited by
Year
Requirement Defect Identification: An Early Stage Perspective
SK Nayak, RA Khan, MR Beg
International Journal of Computer Science Issues (IJCSI) 9 (5), 237, 2012
82012
Reliable requirement specification: Defect analysis perspective
SK Nayak, RA Khan, MR Beg
Global Trends in Information Systems and Software Applications: 4th …, 2012
72012
Requirement Defect Identification And Their Mitigation Through Severity And Priority
SK Nayak, RA Khan, R Beg
International Conference on Communication and Electronics Information …, 2012
62012
Plastic card circumvention an infirmity of authenticity and authorization
V Khattri, SK Nayak, DK Singh
Journal of Financial Crime 27 (3), 959-975, 2020
42020
Development of integrated distance authentication and fingerprint authorization mechanism to reduce fraudulent online transaction
V Khattri, SK Nayak, DK Singh
Intelligent Communication, Control and Devices: Proceedings of ICICCD 2018 …, 2020
32020
A framework for crime detection and reduction in digital forensics
A Singh
Available at SSRN 4082975, 2022
22022
Critical analysis on data science and big data avenues
MG Baig, SK Nayak
International Journal of Scientific and Technology Research 8 (11), 2019
22019
Evaluation of Requirement Defects: An Implementation of Identification Technique
SK Nayak, RA Khan, MR Beg
International Journal of Information and Education Technology 2 (5), 448, 2012
22012
A comparative template for reliable requirement specification
SK Nayak, RA Khan, MR Beg
International Journal of Computer Applications 14 (2), 27-30, 2011
22011
The Threat Detection Framework for Securing Semantic Web Services Based on XACML
NK Singh, SK Nayak
Advances in Computational Intelligence and Communication Technology …, 2021
12021
Antivirals
W Reis, J Gaio, T Chau, F Ramos, C Reis, W Reis, J Gaio, T Chau, ...
Pharmacology in Clinical Neurosciences: A Quick Guide, 499-678, 2020
12020
An enhanced authentication technique to mitigate the online transaction fraud
V Khattri, SK Nayak, DK Singh
Intelligent Communication, Control and Devices: Proceedings of ICICCD 2018 …, 2020
12020
The Threat Detection Framework for Securing Semantic Web Services
NK Singh, SK Nayak
Journal of Computational and Theoretical Nanoscience 16 (12), 5099-5104, 2019
12019
Reliability Assessment in Functioning of Requirement Defect Mitigation
SK Nayak, RA Khan, MR Beg
International Journal of Information and Education Technology 2 (5), 521, 2012
12012
Requirement Defect Mitigation Technique: An Early Stage Implementation
DSK Nayak
International Journal of Computer Science Issues 9 (5), 381-386, 2012
12012
A decision tree approach for enhancing real-time response in exigent healthcare unit using edge computing
EF Siddiqui, T Ahmed, SK Nayak
Measurement: Sensors 32, 100979, 2024
2024
Latency Management in Task Offloading from IoT to MEC
EF Siddiqui, S Nayak
International Journal of Computing and Digital Systems 14 (1), 1-xx, 2023
2023
Agitating Sustainability using Fog Computing for Smart Cities
EF Siddiqui, SK Nayak
2023 10th International Conference on Computing for Sustainable Global …, 2023
2023
An Algorithm for Crime Detection in Digital Forensics
A Singh, SK Singh, N Singh, SK Nayak
Journal of Survey in Fisheries Sciences 10 (3S), 1281-1290, 2023
2023
Latency Evaluation in an IoT-Fog Model
EF Siddiqui, SK Nayak, M Faisal
Intelligent Sustainable Systems: Selected Papers of WorldS4 2021, Volume 2 …, 2022
2022
The system can't perform the operation now. Try again later.
Articles 1–20