A secure and trust based on-demand multipath routing scheme for self-organized mobile ad-hoc networks GM Borkar, AR Mahajan Wireless Networks 23 (8), 2455-2472, 2017 | 129 | 2017 |
A novel clustering approach and adaptive SVM classifier for intrusion detection in WSN: A data mining concept GM Borkar, LH Patil, D Dalgade, A Hutke Sustainable Computing: Informatics and Systems 23, 120-135, 2019 | 116 | 2019 |
A review on propagation of secure data, prevention of attacks and routing in mobile ad-hoc networks GM Borkar, AR Mahajan International Journal of Communication Networks and Distributed Systems 24 …, 2020 | 17 | 2020 |
Security aware dual authentication-based routing scheme using fuzzy logic with secure data dissemination for mobile ad-hoc networks GM Borkar, AR Mahajan International Journal of Communication Networks and Distributed Systems 21 …, 2018 | 8 | 2018 |
Roadmap of digital forensics investigation process with discovery of tools A Patil, S Banerjee, D Jadhav, G Borkar Cyber Security and Digital Forensics, 241-269, 2022 | 7 | 2022 |
A survey on securing smart gadgets using lightweight cryptography A Patil, S Banerjee, G Borkar Proceedings of International Conference on Wireless Communication: ICWiCOM …, 2020 | 7 | 2020 |
Challenges to Multimedia Privacy and Security Over Social Media DJ Gautam M. Borkar, Pallavi Chavan Handbook of Research on Cyber Crime and Information Privacy 2, 118-131, 2020 | 5* | 2020 |
Confinement forest‐based enhanced min‐min and max‐min technique for secure multicloud task scheduling P Jawade, GM Borkar, S Ramachandram Transactions on Emerging Telecommunications Technologies 33 (9), e4515, 2022 | 4 | 2022 |
An Adaptive RIPng Routing Protocol with Secure Packet Transmission in MANETs LH Patil, GM Borkar Journal of Applied Security Research 13 (4), 545-571, 2018 | 4 | 2018 |
Implementation of round robin policy in DNS for thresholding of distributed web server system GM Borkar, MA Pund, P Jawade Proceedings of the International Conference & Workshop on Emerging Trends in …, 2011 | 4 | 2011 |
Unstructured big data information extraction techniques survey: Privacy preservation perspective PS Jadhav, SS Bodhe, GM Borkar, AV Vidhate 2021 International Conference on Electrical, Computer, Communications and …, 2021 | 3 | 2021 |
A review on propagation of secure data, prevention of attacks and routing in mobile ad-hoc networks (MANETs) GM Borkar, AR Mahajan International Journal of Data Science 3 (4), 353-389, 2018 | 2 | 2018 |
Secure Routing Protocol To Mitigate Attacks By Using Blockchain Technology In Manet N Ghodichor, D Sahu, G Borkar, A Sawarkar arXiv preprint arXiv:2304.04254, 2023 | 1 | 2023 |
Urinary Metabolomics Identified Metabolic Perturbations Associated with Gutka, a Smokeless Form of Tobacco SB Jorvekar, A Jala, A Rai, S Jangili, D Adla, G Borkar, A Das, K Kakati, ... Chemical Research in Toxicology 36 (4), 669-684, 2023 | 1 | 2023 |
The voice and gesture to speech conversion in Indian regional sign language A Bhattatiri, A Chaubal, M Dalal, G Borkar Sentiment Analysis and Deep Learning: Proceedings of ICSADL 2022, 717-736, 2023 | 1 | 2023 |
Trust Management: A Cooperative Approach Using Game Theory U Ravale, A Patil, GM Borkar The Psychology of Trust, 2022 | 1 | 2022 |
Secure routing protocol against internal and external attack in MANET N Ghodichor, V Namdeoe, G Borkar Proceedings of The International Conference on Emerging Trends in Artificial …, 2022 | 1 | 2022 |
Digital forensics as a service: analysis for forensic knowledge S Banerjee, A Patil, D Jadhav, G Borkar Cyber Security and Digital Forensics, 127-162, 2022 | 1 | 2022 |
SMART MIRROR 2.0: A touch-free reflective interaction that unveil user customizable intelligence S Narvekar, S Mate, A Chavan, G Borkar | 1 | 2021 |
Game Theory Approach for Trust Management in the Realm of IoT N Kulkarni, GM Borkar, N Marathe Security Issues and Privacy Threats in Smart Ubiquitous Computing, 145-157, 2021 | 1 | 2021 |