Blind image steganography algorithm development which resistant against JPEG compression attack D Mehta, D Bhatti Multimedia Tools and Applications 81 (1), 459-479, 2022 | 12 | 2022 |
Conceptual framework for soft computing based intrusion detection to reduce false positive rate DG Bhatti, PV Virparia, B Patel International Journal of Computer Applications 44 (13), 1-3, 2012 | 10 | 2012 |
Data preprocessing for reducing false positive rate in intrusion detection DG Bhatti, PV Virparia International Journal of Computer Applications 57 (5), 2012 | 8 | 2012 |
Soft computing‐based intrusion detection system with reduced false positive rate DG Bhatti, PV Virparia Design and Analysis of Security Protocol for Communication, 109-139, 2020 | 6 | 2020 |
Homomorphic encryption: privacy preserving amicable E-voting system B Patel, D Bhatti Int. J. Comput. Sci. Eng 7, 12, 2019 | 6 | 2019 |
An automated approach for electroencephalography-based seizure detection using machine learning algorithms V Patel, D Bhatti, A Ganatra, J Tailor International Journal of Intelligent Engineering Informatics 10 (4), 332-358, 2022 | 4 | 2022 |
Research review on digital image steganography which resists against compression DM Mehta, DG Bhatti Emerging Trends in Expert Applications and Security: Proceedings of ICETEAS …, 2019 | 4 | 2019 |
Master course selection prediction model using modify hybrid neuro-fuzzy inference system PS Patel, J Undavia, D Bhatti Proceedings of International Joint Conference on Advances in Computational …, 2022 | 3 | 2022 |
Problems and challenges in wireless network intrusion detection A Desai, H Prajapati, D Bhatti National Journal of System and Information Technology 4 (2), 175, 2011 | 3 | 2011 |
Novel semantic discretization technique for type-2 diabetes classification model O Chandrakar, JR Saini, DG Bhatti Innovations in Computer Science and Engineering: Proceedings of the Sixth …, 2019 | 2 | 2019 |
Towards a Static and Dynamic Features-Based Framework for Android Vulnerabilities Detection J Rathod, D Bhatti Proceedings of International Joint Conference on Advances in Computational …, 2022 | 1 | 2022 |
Vulnerability detection in the android application based on dynamic analysis J Rathod, D Bhatti Proceedings of Third International Conference on Intelligent Computing …, 2022 | 1 | 2022 |
An e-Voting Model to Preserve Vote Integrity Employing SHA3 Algorithm B Patel, D Bhatti Sustainable Communication Networks and Application: Proceedings of ICSCN …, 2021 | 1 | 2021 |
A review on several vulnerabilities detection techniques in Android Mobile MJ Solanky, D Bhatti | 1 | 2019 |
An Analysis of Qualitative Parameters to Enrich Student Performance for Imminent Post Graduate Course Selection PS Patel, D Bhatti, SG Desai Indian Journal of Computer Science and Engineering 9 (2), 67-78, 2018 | 1 | 2018 |
Soft computing based intelligent intrusion detection algorithm development for reduction of false positive rate DG Bhatti Gandhinagar, 2015 | 1 | 2015 |
EEG-based epileptic seizure state detection using deep learning V Patel, D Bhatti, A Ganatra, J Tailor International Journal of Modelling, Identification and Control 44 (1), 57-66, 2024 | | 2024 |
An Approach to Conceal Honeypot from Attacker. DG Bhatti, S Bhakta, A Shah International Journal of Advanced Research in Computer Science 3 (6), 2012 | | 2012 |
Analyzing Soft Computing based Intrusion Detection Systems DG Bhatti International Journal of Advanced Research in Computer Science 2 (2), 2011 | | 2011 |
Challenges in Genetic Algorithm Based Intrusion Detection DG Bhatti, PV Virparia, B Patel National Journal of System and Information Technology 4 (1), 109, 2011 | | 2011 |