Urmăriți
narendra shekokar
narendra shekokar
Dawarkadas J Sanghvi College of Engineering
Adresă de e-mail confirmată pe djsce.ac.in
Titlu
Citat de
Citat de
Anul
Insider threat detection using log analysis and event correlation
A Ambre, N Shekokar
Procedia Computer Science 45, 436-445, 2015
942015
A framework for cyberbullying detection in social network
KB Kansara, NM Shekokar
International Journal of Current Engineering and Technology 5 (1), 494-498, 2015
702015
An ideal approach for detection and prevention of phishing attacks
NM Shekokar, C Shah, M Mahajan, S Rachh
Procedia Computer Science 49, 82-91, 2015
612015
Toward smart and secure IoT based healthcare system
SS Ambarkar, N Shekokar
Internet of things, smart computing and technology: A roadmap ahead, 283-303, 2020
452020
Conservation of energy in wireless sensor network by preventing denial of sleep attack
S Naik, N Shekokar
Procedia Computer Science 45, 370-379, 2015
382015
Implementation of fuzzy keyword search over encrypted data in cloud computing
N Shekokar, K Sampat, C Chandawalla, J Shah
Procedia Computer Science 45, 499-505, 2015
272015
Lightweight authentication protocol used in wireless sensor network
MD Shah, SN Gala, NM Shekokar
2014 International Conference on Circuits, Systems, Communication and …, 2014
272014
Machine learning based risk-adaptive access control system to identify genuineness of the requester
K Srivastava, N Shekokar
Modern Approaches in Machine Learning and Cognitive Science: A Walkthrough …, 2020
242020
Implementation of pattern matching algorithm to defend SQLIA
N Patel, N Shekokar
Procedia Computer Science 45, 453-459, 2015
212015
Virtual keyboard using shadow analysis
Y Adajania, J Gosalia, A Kanade, H Mehta, N Shekokar
2010 3rd International Conference on Emerging Trends in Engineering and …, 2010
212010
Identification of potential cyber bullying tweets using hybrid approach in sentiment analysis
A Mody, S Shah, R Pimple, N Shekokar
2018 International Conference on Electrical, Electronics, Communication …, 2018
172018
A survey on anti-phishing techniques in mobile phones
SP Chorghe, N Shekokar
2016 International Conference on Inventive Computation Technologies (ICICT …, 2016
172016
Cloud computing security in multi-clouds using Shamir's secret sharing scheme
SN Pundkar, N Shekokar
2016 International Conference on Electrical, Electronics, and Optimization …, 2016
162016
A Polyglot Persistence approach for E-Commerce business model
K Srivastava, N Shekokar
2016 International Conference on Information Science (ICIS), 7-11, 2016
152016
Performance evaluation of OLSR protocol in MANET under the influence of routing attack
V Desai, N Shekokar
2014 IEEE Global Conference on Wireless Computing & Networking (GCWCN), 138-143, 2014
152014
Data mining techniques for real time intrusion detection systems
M Shetty, NM Shekokar
International Journal of Scientific & Engineering Research 3 (4), 1-7, 2012
142012
Security against sybil attack in social network
NM Shekokar, KB Kansara
2016 International Conference on Information Communication and Embedded …, 2016
132016
Critical and comparative analysis of DoS and version number attack in healthcare IoT system
SS Ambarkar, N Shekokar
Proceeding of First Doctoral Symposium on Natural Computing Research: DSNCR …, 2021
122021
A comprehensive dual-layer architecture for phishing and spam email detection
J Doshi, K Parmar, R Sanghavi, N Shekokar
Computers & Security 133, 103378, 2023
112023
Fundamental models in machine learning and deep learning
TP Nagarhalli, AM Save, NM Shekokar
Design of Intelligent Applications using Machine Learning and Deep Learning …, 2021
112021
Sistemul nu poate realiza operația în acest moment. Încercați din nou mai târziu.
Articole 1–20