关注
Dhara Joshi
Dhara Joshi
Marwadi University
在 marwadieducation.edu.in 的电子邮件经过验证
标题
引用次数
引用次数
年份
Deep learning algorithms are used to automatically detection invasive ducal carcinoma in whole slide images
K Mridha, S Kumbhani, S Jha, D Joshi, A Ghosh, RN Shaw
2021 IEEE 6th International Conference on Computing, Communication and …, 2021
292021
An enhanced approach for three factor remote user authentication in multi-server environment
C Patel, D Joshi, N Doshi, A Veeramuthu, R Jhaveri
Journal of Intelligent & Fuzzy Systems 39 (6), 8609-8620, 2020
182020
Using honeypots for ICS threats evaluation
N Dutta, N Jadav, N Dutiya, D Joshi
Recent developments on industrial control systems resilience, 175-196, 2020
132020
An enhanced approach for three factor remote user authentication in multi-server environment
D Joshi, C Patel, N Doshi, R Jhaveri, X Wang
Preprints, 2018
22018
A consolidated study on transformation of Traditional Data to Big Data
PS Swara Joshi,Aakarsh Garg,Madhu Shukla,Dhara Joshi,Santushti Betgeri
Int. J. Advanced Networking and Applications 15 (4), 1-10, 2023
2023
A Consolidated Study On Advanced Classification Techniques Used On Stream Data
D Joshi, M Shukla
2023 IEEE 11th Region 10 Humanitarian Technology Conference (R10-HTC), 614-619, 2023
2023
A Survey on Multi-Server Remote User Authentication Scheme
DR Joshi, KS Dalsaniya, CJ Patel, NP Doshi
CreateSpace Independent Publishing Platform, 2016
2016
Using Honeypots for ICS Threats
N Dutta, N Jadav, N Dutiya, D Joshi
系统目前无法执行此操作,请稍后再试。
文章 1–8