Insider threat detection using log analysis and event correlation A Ambre, N Shekokar Procedia Computer Science 45, 436-445, 2015 | 94 | 2015 |
A framework for cyberbullying detection in social network KB Kansara, NM Shekokar International Journal of Current Engineering and Technology 5 (1), 494-498, 2015 | 70 | 2015 |
An ideal approach for detection and prevention of phishing attacks NM Shekokar, C Shah, M Mahajan, S Rachh Procedia Computer Science 49, 82-91, 2015 | 61 | 2015 |
Toward smart and secure IoT based healthcare system SS Ambarkar, N Shekokar Internet of things, smart computing and technology: A roadmap ahead, 283-303, 2020 | 47 | 2020 |
Conservation of energy in wireless sensor network by preventing denial of sleep attack S Naik, N Shekokar Procedia Computer Science 45, 370-379, 2015 | 39 | 2015 |
Implementation of fuzzy keyword search over encrypted data in cloud computing N Shekokar, K Sampat, C Chandawalla, J Shah Procedia Computer Science 45, 499-505, 2015 | 27 | 2015 |
Lightweight authentication protocol used in wireless sensor network MD Shah, SN Gala, NM Shekokar 2014 International Conference on Circuits, Systems, Communication and …, 2014 | 27 | 2014 |
Machine learning based risk-adaptive access control system to identify genuineness of the requester K Srivastava, N Shekokar Modern Approaches in Machine Learning and Cognitive Science: A Walkthrough …, 2020 | 24 | 2020 |
Implementation of pattern matching algorithm to defend SQLIA N Patel, N Shekokar Procedia Computer Science 45, 453-459, 2015 | 21 | 2015 |
Virtual keyboard using shadow analysis Y Adajania, J Gosalia, A Kanade, H Mehta, N Shekokar 2010 3rd International Conference on Emerging Trends in Engineering and …, 2010 | 21 | 2010 |
A survey on anti-phishing techniques in mobile phones SP Chorghe, N Shekokar 2016 International Conference on Inventive Computation Technologies (ICICT …, 2016 | 19 | 2016 |
Identification of potential cyber bullying tweets using hybrid approach in sentiment analysis A Mody, S Shah, R Pimple, N Shekokar 2018 International Conference on Electrical, Electronics, Communication …, 2018 | 17 | 2018 |
Cloud computing security in multi-clouds using Shamir's secret sharing scheme SN Pundkar, N Shekokar 2016 International Conference on Electrical, Electronics, and Optimization …, 2016 | 17 | 2016 |
A Polyglot Persistence approach for E-Commerce business model K Srivastava, N Shekokar 2016 International Conference on Information Science (ICIS), 7-11, 2016 | 15 | 2016 |
Performance evaluation of OLSR protocol in MANET under the influence of routing attack V Desai, N Shekokar 2014 IEEE Global Conference on Wireless Computing & Networking (GCWCN), 138-143, 2014 | 15 | 2014 |
A comprehensive dual-layer architecture for phishing and spam email detection J Doshi, K Parmar, R Sanghavi, N Shekokar Computers & Security 133, 103378, 2023 | 14 | 2023 |
Data mining techniques for real time intrusion detection systems M Shetty, NM Shekokar International Journal of Scientific & Engineering Research 3 (4), 1-7, 2012 | 14 | 2012 |
Security against sybil attack in social network NM Shekokar, KB Kansara 2016 International Conference on Information Communication and Embedded …, 2016 | 13 | 2016 |
Fundamental models in machine learning and deep learning TP Nagarhalli, AM Save, NM Shekokar Design of Intelligent Applications using Machine Learning and Deep Learning …, 2021 | 12 | 2021 |
Critical and comparative analysis of DoS and version number attack in healthcare IoT system SS Ambarkar, N Shekokar Proceeding of First Doctoral Symposium on Natural Computing Research: DSNCR …, 2021 | 12 | 2021 |