关注
narendra shekokar
narendra shekokar
Dawarkadas J Sanghvi College of Engineering
在 djsce.ac.in 的电子邮件经过验证
标题
引用次数
引用次数
年份
Insider threat detection using log analysis and event correlation
A Ambre, N Shekokar
Procedia Computer Science 45, 436-445, 2015
1002015
A framework for cyberbullying detection in social network
KB Kansara, NM Shekokar
International Journal of Current Engineering and Technology 5 (1), 494-498, 2015
722015
An ideal approach for detection and prevention of phishing attacks
NM Shekokar, C Shah, M Mahajan, S Rachh
Procedia Computer Science 49, 82-91, 2015
602015
Toward smart and secure IoT based healthcare system
SS Ambarkar, N Shekokar
Internet of things, smart computing and technology: A roadmap ahead, 283-303, 2020
492020
Conservation of energy in wireless sensor network by preventing denial of sleep attack
S Naik, N Shekokar
Procedia Computer Science 45, 370-379, 2015
382015
Implementation of fuzzy keyword search over encrypted data in cloud computing
N Shekokar, K Sampat, C Chandawalla, J Shah
Procedia Computer Science 45, 499-505, 2015
282015
Lightweight authentication protocol used in wireless sensor network
MD Shah, SN Gala, NM Shekokar
2014 International Conference on Circuits, Systems, Communication and …, 2014
272014
Machine learning based risk-adaptive access control system to identify genuineness of the requester
K Srivastava, N Shekokar
Modern Approaches in Machine Learning and Cognitive Science: A Walkthrough …, 2020
252020
A comprehensive dual-layer architecture for phishing and spam email detection
J Doshi, K Parmar, R Sanghavi, N Shekokar
Computers & Security 133, 103378, 2023
242023
Implementation of pattern matching algorithm to defend SQLIA
N Patel, N Shekokar
Procedia Computer Science 45, 453-459, 2015
232015
Virtual keyboard using shadow analysis
Y Adajania, J Gosalia, A Kanade, H Mehta, N Shekokar
2010 3rd International Conference on Emerging Trends in Engineering and …, 2010
212010
Cloud computing security in multi-clouds using Shamir's secret sharing scheme
SN Pundkar, N Shekokar
2016 International Conference on Electrical, Electronics, and Optimization …, 2016
192016
Identification of potential cyber bullying tweets using hybrid approach in sentiment analysis
A Mody, S Shah, R Pimple, N Shekokar
2018 International Conference on Electrical, Electronics, Communication …, 2018
182018
A survey on anti-phishing techniques in mobile phones
SP Chorghe, N Shekokar
2016 International Conference on Inventive Computation Technologies (ICICT …, 2016
182016
A Polyglot Persistence approach for E-Commerce business model
K Srivastava, N Shekokar
2016 International Conference on Information Science (ICIS), 7-11, 2016
152016
Performance evaluation of OLSR protocol in MANET under the influence of routing attack
V Desai, N Shekokar
2014 IEEE Global Conference on Wireless Computing & Networking (GCWCN), 138-143, 2014
152014
Shop and Go: An innovative approach towards shopping using Deep Learning and Computer Vision
N Shekokar, A Kasat, S Jain, P Naringrekar, M Shah
2020 Third International Conference on Smart Systems and Inventive …, 2020
142020
Security against sybil attack in social network
NM Shekokar, KB Kansara
2016 International Conference on Information Communication and Embedded …, 2016
142016
Data mining techniques for real time intrusion detection systems
M Shetty, NM Shekokar
International Journal of Scientific & Engineering Research 3 (4), 1-7, 2012
142012
Lightweight secure RPL: a need in IoT
AU Gawade, NM Shekokar
2017 International Conference on Information Technology (ICIT), 214-219, 2017
132017
系统目前无法执行此操作,请稍后再试。
文章 1–20