Migrating process and virtual machine in the cloud: Load balancing and security perspectives VP Patil, GA Patil International Journal of Advanced Computer Science and Information …, 2012 | 27 | 2012 |
Efficient keyword search over encrypted cloud data A Meharwade, GA Patil Procedia Computer Science 78, 139-145, 2016 | 15 | 2016 |
Natural language database interface for selection of data using grammar and parsing ND Karande, GA Patil World Acad Sci Eng Tech 3, 11-26, 2009 | 14 | 2009 |
Anomaly detection system by mining frequent pattern using data mining algorithm from network flow AR Jakhale, GA Patil International Journal of Engineering Research and Technology 3 (1), 2278-0181, 2014 | 11 | 2014 |
Web document clustering using hybrid approach in data mining PS Gamare, GA Patil International Journal of Advent Technology 3 (7), 92-97, 2015 | 9 | 2015 |
A novel approach for social network analysis & web mining for counter terrorism GA Patil, KB Manwade, PS Landge International Journal on Computer Science and Engineering 4 (11), 1816, 2012 | 9 | 2012 |
Three diamentional object used for data security V Mhaske-Dhamdhere, GA Patil 2010 International Conference on Computational Intelligence and …, 2010 | 9 | 2010 |
Privacy preserving auditing for shared data in cloud KB Ghutugade, GA Patil 2016 International Conference on Computing, Analytics and Security Trends …, 2016 | 8 | 2016 |
Privacy Management in Cloud by making use of Homomorphic Functions S Sutar, G Patil International Journal of Computer Applications 37 (2), 13-16, 2012 | 6 | 2012 |
A Novel Approach for Recognized & Overcrowding of Terrorist Websites GA Patil, KB Manwade, MPS Landge International Journal of Engineering Trends and Technology 4 (3), 2013 | 4 | 2013 |
Extracting brief note from Internet Newspaper SB Karale, GA Patil 2016 3rd International Conference on Computing for Sustainable Global …, 2016 | 3 | 2016 |
Data Security Mechanism for Cloud GA Patil, SB Patil International Conference on Emerging Technology Trends (ICETT), Proceedings …, 2011 | 3 | 2011 |
Performance Analysis of Parallel Client-Server Model Versus Parallel Mobile Agent Model KB Manwade, GA Patil International Journal of Computer and Information Engineering 2 (2), 389-392, 2008 | 3 | 2008 |
Mitigating spam emails menace using hybrid spam filtering approach S Nagaroor, GA Patil Emerging Research in Computing, Information, Communication and Applications …, 2018 | 2 | 2018 |
Efficient clustering of web documents using hybrid approach in data mining PS Gamare, GA Patil International Research Journal of Engineering and Technology (IRJET) 2 (05 …, 2015 | 2 | 2015 |
Trusted Third Party Service For Secure Cloud Data RS Nejkar, GA Patil International Journal of Research in 2 (6), 203-211, 2014 | 2 | 2014 |
Implementation & Analysis of EFRS Technique for Intrusion Tolerance in Distributed Systems AB Chougule, GA Patil International Journal of Computer Science Issues (IJCSI) 8 (4), 616, 2011 | 2 | 2011 |
Secure and Efficient Data Retrieval in Cloud Computing NM Anuradha, GA Patil International Journal of Engineering Research & Technology 4 (4), 2278-0181, 2015 | 1 | 2015 |
Near duplicate detection in relational database BA Kelkar, KB Manwade, GA Patil Int. J. Eng. Res. Technol 2 (3), 2013 | 1 | 2013 |
Secure Control of Remote Electrical Devices Using Mobile SMS Services KT Mane, GA Patil IJCES International Journal of Computer Engineering Science 1 (3), 2011 | 1 | 2011 |