A survey of intrusion detection techniques in cloud C Modi, D Patel, B Borisaniya, H Patel, A Patel, M Rajarajan Journal of network and computer applications 36 (1), 42-57, 2013 | 1211 | 2013 |
A survey on security issues and solutions at different layers of Cloud computing C Modi, D Patel, B Borisaniya, A Patel, M Rajarajan The journal of supercomputing 63, 561-592, 2013 | 587 | 2013 |
A survey on internet of things: Security and privacy issues JS Kumar, DR Patel International Journal of Computer Applications 90 (11), 2014 | 567 | 2014 |
Integrating signature apriori based network intrusion detection system (NIDS) in cloud computing CN Modi, DR Patel, A Patel, M Rajarajan Procedia Technology 6, 905-912, 2012 | 120 | 2012 |
Bayesian classifier and snort based network intrusion detection system in cloud computing CN Modi, DR Patel, A Patel, R Muttukrishnan 2012 Third international conference on computing, communication and …, 2012 | 117 | 2012 |
Approaches for sentiment analysis on twitter: A state-of-art study H Thakkar, D Patel arXiv preprint arXiv:1512.01043, 2015 | 102 | 2015 |
Preventing sybil attack in blockchain using distributed behavior monitoring of miners P Swathi, C Modi, D Patel 2019 10th international conference on computing, communication and …, 2019 | 85 | 2019 |
Maintaining privacy and data quality in privacy preserving association rule mining CN Modi, UP Rao, DR Patel 2010 Second International conference on Computing, Communication and …, 2010 | 84 | 2010 |
Secured energy trading using byzantine-based blockchain consensus A Sheikh, V Kamuni, A Urooj, S Wagh, N Singh, D Patel IEEE Access 8, 8554-8571, 2019 | 80 | 2019 |
A novel framework for intrusion detection in cloud MR Chirag Modi, Dhiren Patel, Bhavesh Borisanya, Avi Patel Proceedings of the Fifth International Conference on Security of Information …, 2012 | 76* | 2012 |
Android vs iOS security: A comparative study I Mohamed, D Patel 2015 12th international conference on information technology-new generations …, 2015 | 75 | 2015 |
Tokenization of real estate using blockchain technology A Gupta, J Rathod, D Patel, J Bothra, S Shanbhag, T Bhalerao Applied Cryptography and Network Security Workshops: ACNS 2020 Satellite …, 2020 | 72 | 2020 |
Information Security Theory & Practice D Patel | 69 | 2008 |
Dissecting bitcoin blockchain: Empirical analysis of bitcoin network (2009–2020) P Nerurkar, D Patel, Y Busnel, R Ludinard, S Kumari, MK Khan Journal of Network and Computer Applications 177, 102940, 2021 | 67 | 2021 |
Collaborative IDS Framework for Cloud CM D Singh, D Patel, B Borisaniya International Journal of Network Security 18 (4), 699-709, 2016 | 66* | 2016 |
A novel hybrid-network intrusion detection system (H-NIDS) in cloud computing CN Modi, D Patel 2013 IEEE Symposium on Computational Intelligence in Cyber Security (CICS …, 2013 | 65 | 2013 |
Blockchain exhumed D Patel, J Bothra, V Patel 2017 ISEA Asia Security and Privacy (ISEASP), 1-12, 2017 | 64 | 2017 |
Supervised learning model for identifying illegal activities in Bitcoin P Nerurkar, S Bhirud, D Patel, R Ludinard, Y Busnel, S Kumari Applied Intelligence 51, 3824-3843, 2021 | 54 | 2021 |
Fileshare: A blockchain and ipfs framework for secure file sharing and data provenance S Khatal, J Rane, D Patel, P Patel, Y Busnel Advances in Machine Learning and Computational Intelligence: Proceedings of …, 2021 | 50 | 2021 |
Comparative analysis of formal model checking tools for security protocol verification R Patel, B Borisaniya, A Patel, D Patel, M Rajarajan, A Zisman Recent Trends in Network Security and Applications: Third International …, 2010 | 48 | 2010 |