Mitigating denial of service attack using CAPTCHA mechanism M Mehra, M Agarwal, R Pawar, D Shah Proceedings of the International Conference & Workshop on Emerging Trends in …, 2011 | 41 | 2011 |
Secure authentication using dynamic virtual keyboard layout M Agarwal, M Mehra, R Pawar, D Shah Proceedings of the International Conference & Workshop on Emerging Trends in …, 2011 | 33 | 2011 |
An efficient IoT based prediction system for classification of water using novel adaptive incremental learning framework B Nemade, D Shah Journal of King Saud University-Computer and Information Sciences 34 (8 …, 2022 | 22 | 2022 |
A Survey: Securing Cloud Infrastructure Against EDoS Attack S Bhingarkar, D Shah In the Proceedings of the International Conference on Grid & Cloud Computing …, 2015 | 17 | 2015 |
Cloud Computing Black Book D Shah Wiley India, 2014 | 17* | 2014 |
An IoT based efficient Air pollution prediction system using DLMNN classifier B Nemade, D Shah Physics and Chemistry of the Earth, Parts A/B/C 128, 103242, 2022 | 14 | 2022 |
Understanding perception of cache-based side-channel attack on cloud environment BS Ainapure, D Shah, AA Rao Progress in Intelligent Computing Techniques: Theory, Practice, and …, 2018 | 14 | 2018 |
FLNL: Fuzzy entropy and lion neural learner for EDoS attack mitigation in cloud computing S Bhingarkar, D Shah International Journal of Modeling, Simulation, and Scientific Computing 9 …, 2018 | 11 | 2018 |
Brain tumor detection based on bilateral symmetry information N Sachin, D Shah, V Khairnar, S Kadu arXiv preprint arXiv:1412.3009, 2014 | 11 | 2014 |
A Complete Guide To Internet And Web Programming DN Shah Dreamtech Press, 2009 | 10 | 2009 |
Blockchain based framework for Software Development using DevOps S Bankar, D Shah 2021 4th Biennial International Conference on Nascent Technologies in …, 2021 | 9 | 2021 |
Architecture Framework Proposal for Dynamic and Ubiquitous Security in Global SOA. D Shah, DR Patel Int. J. Comput. Sci. Appl. 6 (1), 40-52, 2009 | 9 | 2009 |
Dynamic and ubiquitous security architecture for global SOA D Shah, D Patel 2008 The Second International Conference on Mobile Ubiquitous Computing …, 2008 | 9 | 2008 |
Performance analysis of virtual machine introspection tools in cloud environment B Ainapure, D Shah, AA Rao Proceedings of the International Conference on Informatics and Analytics, 1-6, 2016 | 6 | 2016 |
Refactoring faces under bounding box using instance segmentation algorithms in deep learning for replacement of editing tools RM Joshi, D Shah Intelligent Computing and Networking: Proceedings of IC-ICN 2021, 236-247, 2022 | 5 | 2022 |
News summarization using text mining S Yadav, D Shah International Research Journal of Engineering and Technology 5 (11), 202-206, 2018 | 5 | 2018 |
An IoT-Based Efficient Water Quality Prediction System for Aquaponics Farming B Nemade, D Shah Computational Intelligence: Select Proceedings of InCITe 2022, 311-323, 2023 | 4 | 2023 |
Health Insurance Management Process in Hospitals Using Blockchain Secured Framework OA Mangaonkar, D Shah International Journal of Research in Engineering, Science and Management 4 …, 2021 | 4 | 2021 |
Fuzzy entropy based feature selection for website user classification in edos defense S Bhingarkar, D Shah Smart and Innovative Trends in Next Generation Computing Technologies: Third …, 2018 | 4 | 2018 |
Global soa: Rss-based web services repository and ranking D Shah, M Agarwal, M Mehra, A Mangal 2010 Fifth International Conference on Internet and Web Applications and …, 2010 | 4 | 2010 |