Security attacks in IoT: A survey J Deogirikar, A Vidhate 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics …, 2017 | 546 | 2017 |
Hybrid model for text classification P Ingole, S Bhoir, AV Vidhate 2018 Second International Conference on Electronics, Communication and …, 2018 | 23 | 2018 |
Data mining approach in security information and event management AR Zope, A Vidhate, N Harale International Journal of Future Computer and Communication 2 (2), 80-84, 2013 | 23 | 2013 |
Survey and analysis of mobility management protocols for handover in wireless network KN Ashraf, A Vidhate, S Devane IEEE 3rd International Advance Computing Conference (IACC), 2013, 413-420, 2013 | 22 | 2013 |
AI based reading system for blind using OCR A Mathur, A Pathare, P Sharma, S Oak 2019 3rd international conference on electronics, communication and …, 2019 | 17 | 2019 |
An agglomerative approach to elect the cluster head in VANET P Bhosale, A Vidhate IEEE 2016 International Conference on Signal Processing, Communication …, 2016 | 16 | 2016 |
Best path finding using location aware AODV for MANET A Raich, A Vidhate International Journal of Advanced Computer Research 3 (3), 336, 2013 | 15 | 2013 |
Improved MAC Protocol for Emergency Handling in WBAN J Kamble, A Vidhate International Conference on Automatic Control and Dynamic Optimization …, 2016 | 11 | 2016 |
An intelligent Crop Price Prediction using suitable Machine Learning Algorithm I Ghutake, R Verma, R Chaudhari, A Vidhate ITM Web of Conferences 40, 03040, 2021 | 10 | 2021 |
Hybrid data-centric routing protocol of wireless body area network S Vetale, AV Vidhate 2017 International Conference on Advances in Computing, Communication and …, 2017 | 10 | 2017 |
Performance analysis of ad-hoc on demand multipath distance vector routing protocol with accessibility and link breakage prediction A Chintawar, M Chatterjee, A Vidhate International Journal of Computer Applications® (IJCA), 1-6, 2011 | 10 | 2011 |
Detection of Phishing Websites Using Ensemble Machine Learning Approach M Dharani, B Soumya, G Kimaya, A Vidhate, D Bhosale ICACC-2021 40 (03012 (2021)), PP 1-5, 2021 | 9 | 2021 |
A survey on Finite Automata based pattern matching techniques for network Intrusion Detection System (NIDS) PM Rathod, N Marathe, AV Vidhate 2014 International Conference on Advances in Electronics Computers and …, 2014 | 9 | 2014 |
Survey and Analysis of Handoff Decision Strategies for Heterogeneous Mobile Wireless Networks PS Jirapure, AV Vidhate International Journal of Advanced Research in Computer Science and …, 2014 | 9 | 2014 |
An improved WBAN MAC protocol S Bhoir, A Vidhate 2014 international conference on computer communication and informatics, 1-6, 2014 | 9 | 2014 |
Improved latency handover in fast MIPv6 for streaming video A Vidhate, S Devane International Conference on Advances in Computing, Communication and Control …, 2013 | 9* | 2013 |
AOMDV-APLP: An Enhanced algorithm with accessibility and link breakage prediction A Chintawar, M Chatterjee, A Vidhate Proceedings of the International Conference & Workshop on Emerging Trends in …, 2011 | 9 | 2011 |
Applying Blockchain Security for Agricultural Supply Chain Management A Vidhate International Journal of Applied Evolutionary Computation 11 (4), 28-37, 2020 | 7 | 2020 |
Integrity and Authenticity of Academic Documents Using Blockchain Approach M Rane, S Singh, R Singh, A Vidhate ITM Web of Conferences 32 (03038 (2020)), PP 1-6, 2020 | 7 | 2020 |
Issues and future trends in IoT security using blockchain: a review S Kumar, A Vidhate 2023 International Conference on Intelligent Data Communication Technologies …, 2023 | 6 | 2023 |