Deep learning algorithms are used to automatically detection invasive ducal carcinoma in whole slide images K Mridha, S Kumbhani, S Jha, D Joshi, A Ghosh, RN Shaw 2021 IEEE 6th International Conference on Computing, Communication and …, 2021 | 29 | 2021 |
An enhanced approach for three factor remote user authentication in multi-server environment C Patel, D Joshi, N Doshi, A Veeramuthu, R Jhaveri Journal of Intelligent & Fuzzy Systems 39 (6), 8609-8620, 2020 | 18 | 2020 |
Using honeypots for ICS threats evaluation N Dutta, N Jadav, N Dutiya, D Joshi Recent developments on industrial control systems resilience, 175-196, 2020 | 13 | 2020 |
An enhanced approach for three factor remote user authentication in multi-server environment D Joshi, C Patel, N Doshi, R Jhaveri, X Wang Preprints, 2018 | 2 | 2018 |
A consolidated study on transformation of Traditional Data to Big Data PS Swara Joshi,Aakarsh Garg,Madhu Shukla,Dhara Joshi,Santushti Betgeri Int. J. Advanced Networking and Applications 15 (4), 1-10, 2023 | | 2023 |
A Consolidated Study On Advanced Classification Techniques Used On Stream Data D Joshi, M Shukla 2023 IEEE 11th Region 10 Humanitarian Technology Conference (R10-HTC), 614-619, 2023 | | 2023 |
A Survey on Multi-Server Remote User Authentication Scheme DR Joshi, KS Dalsaniya, CJ Patel, NP Doshi CreateSpace Independent Publishing Platform, 2016 | | 2016 |
Using Honeypots for ICS Threats N Dutta, N Jadav, N Dutiya, D Joshi | | |