Spear phishing: diagnosing attack paradigm DN Pande, PS Voditel 2017 international conference on wireless communications, signal processing …, 2017 | 15 | 2017 |
Security of outsourced data in cloud using Dynamic Auditing VV Jog, D Pande International Journal of Science, Engineering and Computer Technology 4 (12 …, 2014 | 6 | 2014 |
Intention mining for introspective behavior modelling in business intelligence DN Pande, KR Roy, SS Uparkar | 1 | 2019 |
Generic Algorithm for Image Tampering Detection Based on Claimant Suspect Decision Rule DN Pande, ARB Patil, AS Bhattacharya International Journal of Science, Engineering and Computer Technology 4 (4 …, 2014 | 1 | 2014 |
Study of Security Problem in Cloud D Pande, V Jog International Journal of Engineering Trends & Technology, 34-36, 2014 | 1 | 2014 |
Detection of Image Tampering over Diverse information Security Schemata: A State-of-the-Art DN Pande, ARB Patil, AS Bhattacharya International Journal of Computer Applications 89 (2), 2014 | 1 | 2014 |
Fast Imputation: An Algorithmic Formalism DA Tiwari Principles of Data Science, 125-153, 2020 | | 2020 |
Calibrating Point Spread Function for Motion Occlusion and Turbidity Removal in Underwater Imaging DN Pande, S Uparkar, K Roy | | 2017 |