Active warden for TCP sequence number base covert channel DM Dakhane, PR Deshmukh 2015 International Conference on Pervasive Computing (ICPC), 1-5, 2015 | 21 | 2015 |
Mobile malware detection techniques VB Mohata, DM Dakhane, RL Pardhi Int J Comput Sci Eng Technol (IJCSET) 4 (04), 2229-3345, 2013 | 17 | 2013 |
Indicators for detecting Sinkhole Attack in MANET SR Jathe, DM Dakhane International Journal of Emerging Technology and Advanced Engineering 2 …, 2012 | 9 | 2012 |
Data secuity in cloud computing for biometric application DM Dakhane, AA Arokar International Journal of Scientific & Engineering Research 3 (6), 1, 2012 | 9 | 2012 |
Cloud based testing: need of testing in cloud platforms VB Mohata, DM Dakhane, RL Pardhi Int. J. Appl. Innov. Eng. Manage 2, 369-373, 2013 | 8 | 2013 |
Fuzzy clustering: An approach for mining usage profiles from Web AN Boob, DM Dakhane International Journal of Computer Technology and Applications 3 (1), 329-331, 2012 | 7 | 2012 |
Machine learning approach for detection of malicious URLs and spam in social network RK Chaudhari, DM Dakhane International Research Journal of Engineering and Technology (IRJET) 3 (5 …, 2016 | 6 | 2016 |
Network Security Enhancement in Hadoop Clusters RL Gaikwad, DM Dakhane, RL Pardhi Int. J. Appl. Innov. Eng. Manage.(IJAIEM) 2 (3), 2013 | 5 | 2013 |
A Review Paper on Black Hole Attack and Comparison of Different Black Hole Attack Techniques SR Jathe, DM Dakhane International Journal of Cryptography and Security ISSN, 2249-7013, 2012 | 5 | 2012 |
Detection and elimination of covert communication in transport and internet layer-A Survey DM Dakhane, S Patil, M Patil IJCA Proceedings on International Conference on Recent Trends in Information …, 2012 | 5 | 2012 |
Comparative study of clustering and association method for large database in time domain MSM Raut, D Dakhane International Journal of Advanced Research in Computer Science and Software …, 2012 | 4 | 2012 |
Mining usage profiles using fuzzy clustering and its applications N Boob, DM Dakhane Int J Emerging Technol Adv Eng 2 (2), 120-123, 2012 | 3 | 2012 |
Reference Model Storage Covert Channel for Secure Communications DM Dakhane, VE Narawade Advanced Computing Technologies and Applications: Proceedings of 2nd …, 2020 | 2 | 2020 |
Image Denoising Using Non Linear Filters AV Gautam, DM Dakhane, VR Tripathi International Journal of Information Technology 2 (2), 573-577, 2010 | 2 | 2010 |
A Review on Network Covert Channel Construction and Attack Detection MA Khadse, DM Dakhane Concurrency and Computation: Practice and Experience 37 (1), e8316, 2025 | 1 | 2025 |
AES Encryption for Secure Storage and Transfer of Patient Health Records using Blockchain Technology F Hasan, D Dakhane, A Vidhate 2023 International Conference on Computing, Communication, and Intelligent …, 2023 | 1 | 2023 |
A Review on Enhanced Machine Learning Approach for Detection of Malicious Urls and Spam in Social Network MRK Chaudhari, DM Dakhane International Journal of Advanced Research in Computer Engineering …, 2016 | 1 | 2016 |
A System for Image Conversion Using Mapreduce in Cloud Computing Environment V Mohata, DM Dakhane, RL Pardhi International Journal of Emerging Research in Management &Technology ISSN …, 2016 | 1 | 2016 |
A Review on Image Conversion using MapReduce in Cloud Computing Environment VB Mohata, DM Dakhane, RL Pardhi International Journal of Application or Innovation in Engineering …, 2014 | 1 | 2014 |
A Combined Utilization of Machine Learning and Pre-Attack Analysis to Provide a Protection Framework for Ransomware Attack S Bhattacharjee, D Dakhane 2024 14th International Conference on Cloud Computing, Data Science …, 2024 | | 2024 |