VM management for cross-cloud computing environment D Theng, KN Hande 2012 International Conference on Communication Systems and Network …, 2012 | 23 | 2012 |
Driver fatigue detection using sensor network SV Deshmukh, DP Radake, KN Hande Int. J. Eng. Sci. Technol, 89-92, 2011 | 15 | 2011 |
Approaches towards mitigating wormhole attack in wireless ad-hoc network MNS Raote, MKN Hande (IJAEST) International Journal of Advanced Engineering Sciences and …, 2011 | 14 | 2011 |
A Survey on Clustering Algorithms for web Applications. S Nirkhi, K Hande SWWS, 124-129, 2008 | 6 | 2008 |
Detection and Prevention of Gray Hole and Black Hole Attack in MANET D Raut, K Hande Journal: INTERNATION JOURNAL OF COMPUTERS AND TECHNOLOGY 13 (9), 2014 | 5 | 2014 |
Survey on security architecutre based on ECC S Nigam, KN Hande International Journal of Computer Science and mobile Application 3, 17-23, 2015 | 4 | 2015 |
A Review of Malicious Node Detection in Mobile Adhoc Networks DD Punwatkar, KN Hande International Journal of Computer Sciences and Engineering 2 (2), 65-69, 2014 | 4 | 2014 |
Performance improvement of IEEE 802.16/WiMAX using elliptic curve cryptography PK Gandhewar, KN Hande International Journal of Computer Science and Information Technologies 2 …, 2011 | 4 | 2011 |
Context Disambiguation in Web Search Results Using Clustering Algorithm J Bhagwani, K Hande International Journal of Computer Science and Communication 2 (1), 119-123, 2011 | 4 | 2011 |
Implementing authentication mechanism using extended public key cryptography in wireless network SA Kahate, KN Hande Int J Adv Res Comput Sci Software Eng 2 (5), 35-40, 2012 | 3 | 2012 |
Optimization of Context Disambiguation in Web Wearch Results S Nirkhi, K Hande 2008 International Conference on Computer Science and Information Technology …, 2008 | 3 | 2008 |
Role of Machine Learning and Deep Learning Approaches in Designing Network Intrusion Detection System K Hande, U Shrawankar Proceedings of Integrated Intelligence Enable Networks and Computing: IIENC …, 2021 | 2 | 2021 |
Analysis of Implementing Network Intrusion Detection (NIDS) Algorithms Using Machine Learning RL Naukarkar, KN Hande International Journal of All Research Writings 1, 2582-1008, 2020 | 2 | 2020 |
Survey on efficient technique for annonymized microdata preservation MS Mirashe, KN Hande Int J Emerg Dev 2 (5), 97-103, 2015 | 2 | 2015 |
A Survey on Secure Handover Optimization in Mobile WiMAX Network BM Nikhar, KN Hande International Journal of Computer Sciences and Engineering 2 (2), 21-27, 2014 | 2 | 2014 |
Performance analysis of timing attack on elliptic curve cryptosystem MPV Barekar, K Hande Editorial Board, 740, 2012 | 2 | 2012 |
Role of Blockchain Technology and Machine Learning in Design of Smart and Secure Warehouse Management System: A Survey. KN Hande, MB Chandak International Journal of Next-Generation Computing 13 (5), 2022 | 1 | 2022 |
Real-Time Markerless Facial Landmark Detection Using Deep Learning S Agarkar, K Hande ICT Systems and Sustainability: Proceedings of ICT4SD 2021, Volume 1, 785-795, 2022 | 1 | 2022 |
Improving Kerberos Security Using Dynamic Password Based Authentication V Thakur, KN Hande International Journal of Emerging Trends in Engineering and Development …, 0 | 1 | |
Efficient Thread Mapping in Multicore Architecture with Laxity Based Algorithms PB Jaipurkar, KN Hande International Journal, 0 | 1 | |