Raid 5 for Secured Storage Virtualisation S Joshi, U Patwardhan, P Deshpande 2010 International Conference on Data Storage and Data Engineering, 278-282, 2010 | 4 | 2010 |
Experiences of advocacy in environment and development S Joshi, MK Bhat | 4 | 1997 |
Construction Productivity Analysis in Construction Industry: An Indian Perspective P Katyare, S Joshi Proceeding of International Conference on Computational Science and …, 2022 | 3 | 2022 |
Business informatics a key driver for successful strategic planning S Joshi, N Kulkarni, R Athavale 2013 4th International Conference on Intelligent Systems, Modelling and …, 2013 | 3 | 2013 |
Real time data modeling for forecasting fuel consumption of construction equipment using integral approach of IoT and ML techniques P Katyare, SS Joshi, S Rajapurkar J. Inf. Optim. Sci 44 (3), 427-437, 2023 | 2 | 2023 |
A Comprehensive Literature Review of Artificial Intelligent Practices in the Field of Penetration Testing DN Railkar, S Joshi Intelligent Systems and Applications: Select Proceedings of ICISA 2022, 75-85, 2023 | 1 | 2023 |
Electricity anomalies detection and automation in smart meter system P Katyare, SS Joshi IOT with Smart Systems: Proceedings of ICTIS 2021, Volume 2, 453-462, 2022 | 1 | 2022 |
Computer fundamentals and RDBMS S Vaze, S Joshi Himalaya Publishing House, 2010 | 1 | 2010 |
A study of information security policies in selected it companies in Pune city SS Joshi Pune, 2010 | 1 | 2010 |
Penetration Testing Framework using the Q Learning Ensemble Deep CNN Discriminator Framework. DN Railkar, S Joshi International Journal of Advanced Computer Science & Applications 15 (3), 2024 | | 2024 |
Meta Analysis of Yoga Benefits for Individuals with Visual Impairment and Disabilities Using Python H Parihar, A Choudhary, S Joshi Vidhyayana-An International Multidisciplinary Peer-Reviewed E-Journal-ISSN …, 2023 | | 2023 |
Comparative Study of Security Architecture of 5G with 4G V Bande, S Dhavle, S Joshi Vidhyayana-An International Multidisciplinary Peer-Reviewed E-Journal-ISSN …, 2023 | | 2023 |
Extensive Analysis of Intrusion Detection System Using Deep Learning Techniques NB Patil, S Joshi Intelligent Systems and Applications: Select Proceedings of ICISA 2022, 191-205, 2023 | | 2023 |
Construction Industry Digitization using Internet of Things Technology” PK Shubhalaxmi Joshi International Journal of Scientific Research in Computer Science …, 2022 | | 2022 |
Information Security Policies of The IT Companies Are Based on ISO 27001/17799, BS7799 Standards DS Joshi GE-International Journal of Management Research, 4, 2016 | | 2016 |
Role of Administrative Information Security Policies over Technical Policies in Information Security Management A Narnaware, S Joshi KHOJ: Journal of Indian Management Research and Practices, 17-20, 2015 | | 2015 |
Role of BI in Cloud Computing SS Joshi, A Kherdikar, A Kulkarni KHOJ: Journal of Indian Management Research and Practices, 130-137, 2015 | | 2015 |
The Information Security Policy Frameworks of the IT Companies Differ with the Domains of IT Companies VE Kokare, SS Joshi KHOJ: Journal of Indian Management Research and Practices, 412-415, 2015 | | 2015 |
Overcoming Vulnerabilities in Public Key Infrastructure and Certificate Authorities DSJ Akash Nair, Chinmay Mahajan IJERT 3 (6), 2014 | | 2014 |
Management Information System SV Shubhalaxmi Joshi | | 2010 |