Benchmarking datasets for anomaly-based network intrusion detection: KDD CUP 99 alternatives A Divekar, M Parekh, V Savla, R Mishra, M Shirole 2018 IEEE 3rd international conference on computing, communication and …, 2018 | 210 | 2018 |
Cryptocurrency wallet: A review S Suratkar, M Shirole, S Bhirud 2020 4th international conference on computer, communication and signal …, 2020 | 141 | 2020 |
Performance evaluation of ad hoc routing protocols using NS2 simulation S Shah, A Khandre, M Shirole, G Bhole Conf. of Mobile and Pervasive Computing, 2008 | 130 | 2008 |
UML behavioral model based test case generation: a survey M Shirole, R Kumar ACM SIGSOFT Software Engineering Notes 38 (4), 1-13, 2013 | 107 | 2013 |
Generation of improved test cases from UML state diagram using genetic algorithm M Shirole, A Suthar, R Kumar Proceedings of the 4th India Software Engineering Conference, 125-134, 2011 | 61 | 2011 |
Cryptocurrency token: An overview M Shirole, M Darisi, S Bhirud IC-BCT 2019: Proceedings of the International Conference on Blockchain …, 2020 | 57 | 2020 |
Hybrid SIFT feature extraction approach for Indian sign language recognition system based on CNN A Dudhal, H Mathkar, A Jain, O Kadam, M Shirole Proceedings of the International Conference on ISMAC in Computational Vision …, 2019 | 33 | 2019 |
Comparative analysis of commercial and open source mobile device forensic tools R Padmanabhan, K Lobo, M Ghelani, D Sujan, M Shirole 2016 Ninth International Conference on Contemporary Computing (IC3), 1-6, 2016 | 28 | 2016 |
Testing for concurrency in UML diagrams M Shirole, R Kumar ACM SIGSOFT Software Engineering Notes 37 (5), 1-8, 2012 | 26 | 2012 |
Transition sequence exploration of UML activity diagram using evolutionary algorithm M Shirole, M Kommuri, R Kumar Proceedings of the 5th India software engineering conference, 97-100, 2012 | 24 | 2012 |
A hybrid genetic algorithm based test case generation using sequence diagrams M Shirole, R Kumar International Conference on Contemporary Computing, 53-63, 2010 | 23 | 2010 |
Scaling blockchain by autonomous sidechains A Vispute, S Patel, Y Patil, S Wagh, M Shirole Proceeding of Fifth International Conference on Microelectronics, Computing …, 2021 | 8 | 2021 |
BlockAudit 2.0: PoA blockchain based solution for secure Audit logs A Pawar, D Barthare, N Rawat, M Yadav, M Shirole 2021 5th International Conference on Information Systems and Computer …, 2021 | 7 | 2021 |
Empirical study of virtual disks performance with KVM on DAS G Joshi, ST Shingade, MR Shirole 2014 International Conference on Advances in Engineering & Technology …, 2014 | 7 | 2014 |
Concurrency coverage criteria for activity diagrams M Shirole, R Kumar IET Software 15 (1), 43-54, 2021 | 6 | 2021 |
Blockchain interoperability using hash time locks S Dcunha, S Patel, S Sawant, V Kulkarni, M Shirole Proceeding of Fifth International Conference on Microelectronics, Computing …, 2021 | 6 | 2021 |
STEM: secure token exchange mechanisms M Darisi, J Savla, M Shirole, S Bhirud Advances in Cyber Security: First International Conference, ACeS 2019 …, 2020 | 6 | 2020 |
Test scenario selection for concurrency testing from UML models M Shirole, R Kumar 2015 Eighth International Conference on Contemporary Computing (IC3), 531-536, 2015 | 6 | 2015 |
Perpetual interoperability of legacy ERP and blockchain in supply chain V Bhujade, A Dhaigude, S Zode, M Shirole 2021 5th International Conference on Information Systems and Computer …, 2021 | 5 | 2021 |
Secure Voting for Democratic Elections: A Blockchain-Based Approach H Ruparel, S Hosatti, M Shirole, S Bhirud International Conference on Communication, Computing and Electronics Systems …, 2021 | 5 | 2021 |