Big data analytics P Kulkarni, S Joshi, MS Brown PHI Learning Pvt. Ltd., 2016 | 17 | 2016 |
DEDA: An algorithm for early detection of topology attacks in the internet of things J Karande, S Joshi International Journal of Electrical and Computer Engineering 11 (2), 1761, 2021 | 12 | 2021 |
Real-time detection of cyber attacks on the IoT devices J Karande, S Joshi 2020 11th International Conference on Computing, Communication and …, 2020 | 10 | 2020 |
Comprehensive assessment of security attack detection algorithms in internet of things JB Karande, SA Joshi 2018 Fourth International Conference on Computing Communication Control and …, 2018 | 9 | 2018 |
Kernel interpolation-based technique for privacy protection of pluggable data in cloud computing ML Bangare, SA Joshi International Journal of Cloud Computing 9 (2-3), 355-374, 2020 | 8 | 2020 |
Personification and Safety during pandemic of COVID19 using Machine Learning SJ Prema Gawade 4th International Conference on Electronics, Communication and Aerospace …, 2020 | 7* | 2020 |
Data classification algorithm using k-nearest neighbour method applied to ECG data AR Chitupe, SA Joshi IOSR Journal of Computer Engineering 14 (4), 13-21, 2013 | 6 | 2013 |
Classification of ECG data for predictive analysis to assist in medical decisions AR Chitupe, SA Joshi International Journal of Computer Science and Network Security (IJCSNS) 15 …, 2015 | 4 | 2015 |
User intended context sensitive mining algorithm for search string composition U Gajendragadkar, S Joshi 2015 IEEE/WIC/ACM International Conference on Web Intelligence and …, 2015 | 3 | 2015 |
Context Sensitive Search String Composition Algorithm using User Intention to Handle Ambiguous Keywords U Gajendragadkar, S Joshi International Journal of Electrical and Computer Engineering (IJECE) 7 (1 …, 2017 | 2 | 2017 |
Survey on relevance calculation methods U Gajendragadkar, S Joshi International Journal of Computer Applications 96 (3), 2014 | 2 | 2014 |
PRIVACY PRESERVATION ALGORITHM USING EFFECTIVE DATA LOOKUP ORGANIZATION FOR STORAGE CLOUDS A More, S Joshi | 2 | 2012 |
Algorithm for Safety Decisions in Social Media Feeds Using Personification Patterns SAJ Prema Pandurang Gawade Journal of Advances in Information Technology 14 (1), 145-152, 2023 | 1 | 2023 |
Persona Identification based on Social Media Profile Images for Personification and Safety SJ Prema Gawade Webology 19 (1), 2022 | 1 | 2022 |
EADA: An Algorithm for Early Detection of Attacks on IoT Resources SJ Jalindar Karande International Journal of Advanced Trends in Computer Science and Engineering …, 2021 | 1* | 2021 |
Anatomy of building Marathi n-grams U Gajendragadkar, S Joshi 2016 International Conference on Computing, Analytics and Security Trends …, 2016 | 1 | 2016 |
Embedded Media Data Analytic for Safety SJ Prema Gawade IN Patent L-130678/2,023, 2023 | | 2023 |
A METHOD OF DETECTING DISTRIBUTED DENIAL-OF-SERVICE (DDOS) ATTACKS ON AN IOT DEVICE USING TRANSITIVE PROCESSING OF COMMUNICATION GRAPH SAJ Jalindar Baban Karande IN Patent App. 202121035213 A, 2021 | | 2021 |
Feature Selection for Embedded Media in the Context of Personification SJ Prema Gawade Second International Conference on Inventive Research in Computing …, 2020 | | 2020 |
NSL-KDD IN AVRO FORMAT SJ Jalindar Karande https://ieee-dataport.org/analysis/nsl-kdd-avro-format, 2020 | | 2020 |