Efficient storage utilization using erasure codes in openstack cloud B Kulkarni, V Bhosale 2016 International Conference on Inventive Computation Technologies (ICICT …, 2016 | 12 | 2016 |
Comparative analysis of various distributed file systems & performance evaluation using map reduce implementation M Vaidya, S Deshpande 2016 International Conference on Recent Advances and Innovations in …, 2016 | 5 | 2016 |
Implementation of Location based Steganography on mobile Smartphone using Android Platform K Pandit, V Bhosale International Journal of Computer Science and Information Technologies 6 (3 …, 2015 | 5 | 2015 |
Super resolution of astronomical objects using back propagation algorithm H Mhatre, V Bhosale 2016 International Conference on Inventive Computation Technologies (ICICT …, 2016 | 3 | 2016 |
IoT Based Biometric School Bus Attendance and Tracking System K More, V Bhosale Jetir. org, 2019 | 2 | 2019 |
Invisible touch screen based PIN authentication to prevent shoulder surfing SA Vaidya, V Bhosale 2016 International Conference on Inventive Computation Technologies (ICICT …, 2016 | 2 | 2016 |
Data Extraction from dynamic web pages based on visual features S Bojewar, V Bhosale, S Chanchlani International Journal of Advanced Engineering Research and Studies 1 (1), 91-94, 2012 | 2 | 2012 |
Search over encrypted data SA Vaidya, V Bhosale 2016 International Conference on Inventive Computation Technologies (ICICT …, 2016 | 1 | 2016 |
Generating Honeywords from Real Passwords with Decoy Mechanism MK Naik, V Bhosale, VD Shinde International Journal for Research in Engineering Application & Management 2 …, 2016 | 1 | 2016 |
Ostentatious Adoption of Hand Gestures for Intelligent HCI SM Ashfaque, V Bhosale 2015 International Conference on Computational Intelligence and …, 2015 | 1 | 2015 |
Malicious user detection using honeyword and IP tracking MK Naik, V Bhosale, VD Shinde International Conference On Emanations in Modern Technology and Engineering …, 0 | 1 | |
Preventing shoulder surfing attack using touch screen based PIN authentication method in invisible form S Vaidya, S Kadam, V Bhosale 2017 International Conference on Trends in Electronics and Informatics (ICEI …, 2017 | | 2017 |
IoT security cryptographic solutions for trustworthy wireless sensor networks D Motwani, V Chitre, V Bhosale, M Israni, S Sonawane, A Nerurkar | | |
Applied Nonlinear Analysis and Machine Learning Transforming the Horizons of Communication Technology D Motwani, V Chitre, V Bhosale, S Borkar, DK Chitre | | |
Real-Time Sensing with IoT and Environmental Monitoring Using Raspberry Pi NT Salunke, V Bhosale | | |
Role of Predictive Analytics using Divergent Sources for Customer Segmentation S Bamne, V Bhosale | | |
Honeyword Generation Approach Using ASCII Values for Security Enhancement M KomalNaik, VD Shinde International Conference On Emanations in Modern Technology and Engineering …, 0 | | |
Detection of Intruder using Honeywords and IP Blocking MK Naik, V Bhosale, VD Shinde | | |
Mining gene expression data V Bhosale | | |