Insider threat detection using log analysis and event correlation A Ambre, N Shekokar Procedia Computer Science 45, 436-445, 2015 | 100 | 2015 |
A framework for cyberbullying detection in social network KB Kansara, NM Shekokar International Journal of Current Engineering and Technology 5 (1), 494-498, 2015 | 72 | 2015 |
An ideal approach for detection and prevention of phishing attacks NM Shekokar, C Shah, M Mahajan, S Rachh Procedia Computer Science 49, 82-91, 2015 | 60 | 2015 |
Toward smart and secure IoT based healthcare system SS Ambarkar, N Shekokar Internet of things, smart computing and technology: A roadmap ahead, 283-303, 2020 | 49 | 2020 |
Conservation of energy in wireless sensor network by preventing denial of sleep attack S Naik, N Shekokar Procedia Computer Science 45, 370-379, 2015 | 38 | 2015 |
Implementation of fuzzy keyword search over encrypted data in cloud computing N Shekokar, K Sampat, C Chandawalla, J Shah Procedia Computer Science 45, 499-505, 2015 | 28 | 2015 |
Lightweight authentication protocol used in wireless sensor network MD Shah, SN Gala, NM Shekokar 2014 International Conference on Circuits, Systems, Communication and …, 2014 | 27 | 2014 |
Machine learning based risk-adaptive access control system to identify genuineness of the requester K Srivastava, N Shekokar Modern Approaches in Machine Learning and Cognitive Science: A Walkthrough …, 2020 | 25 | 2020 |
A comprehensive dual-layer architecture for phishing and spam email detection J Doshi, K Parmar, R Sanghavi, N Shekokar Computers & Security 133, 103378, 2023 | 24 | 2023 |
Implementation of pattern matching algorithm to defend SQLIA N Patel, N Shekokar Procedia Computer Science 45, 453-459, 2015 | 23 | 2015 |
Virtual keyboard using shadow analysis Y Adajania, J Gosalia, A Kanade, H Mehta, N Shekokar 2010 3rd International Conference on Emerging Trends in Engineering and …, 2010 | 21 | 2010 |
Cloud computing security in multi-clouds using Shamir's secret sharing scheme SN Pundkar, N Shekokar 2016 International Conference on Electrical, Electronics, and Optimization …, 2016 | 19 | 2016 |
Identification of potential cyber bullying tweets using hybrid approach in sentiment analysis A Mody, S Shah, R Pimple, N Shekokar 2018 International Conference on Electrical, Electronics, Communication …, 2018 | 18 | 2018 |
A survey on anti-phishing techniques in mobile phones SP Chorghe, N Shekokar 2016 International Conference on Inventive Computation Technologies (ICICT …, 2016 | 18 | 2016 |
A Polyglot Persistence approach for E-Commerce business model K Srivastava, N Shekokar 2016 International Conference on Information Science (ICIS), 7-11, 2016 | 15 | 2016 |
Performance evaluation of OLSR protocol in MANET under the influence of routing attack V Desai, N Shekokar 2014 IEEE Global Conference on Wireless Computing & Networking (GCWCN), 138-143, 2014 | 15 | 2014 |
Shop and Go: An innovative approach towards shopping using Deep Learning and Computer Vision N Shekokar, A Kasat, S Jain, P Naringrekar, M Shah 2020 Third International Conference on Smart Systems and Inventive …, 2020 | 14 | 2020 |
Security against sybil attack in social network NM Shekokar, KB Kansara 2016 International Conference on Information Communication and Embedded …, 2016 | 14 | 2016 |
Data mining techniques for real time intrusion detection systems M Shetty, NM Shekokar International Journal of Scientific & Engineering Research 3 (4), 1-7, 2012 | 14 | 2012 |
Lightweight secure RPL: a need in IoT AU Gawade, NM Shekokar 2017 International Conference on Information Technology (ICIT), 214-219, 2017 | 13 | 2017 |