Follow
Dr Dhananjay Dakhane
Dr Dhananjay Dakhane
Ramrao Adik Institute of Technology
Verified email at rait.ac.in
Title
Cited by
Cited by
Year
Active warden for TCP sequence number base covert channel
DM Dakhane, PR Deshmukh
2015 International Conference on Pervasive Computing (ICPC), 1-5, 2015
212015
Mobile malware detection techniques
VB Mohata, DM Dakhane, RL Pardhi
Int J Comput Sci Eng Technol (IJCSET) 4 (04), 2229-3345, 2013
172013
Indicators for detecting Sinkhole Attack in MANET
SR Jathe, DM Dakhane
International Journal of Emerging Technology and Advanced Engineering 2 …, 2012
92012
Data secuity in cloud computing for biometric application
DM Dakhane, AA Arokar
International Journal of Scientific & Engineering Research 3 (6), 1, 2012
92012
Cloud based testing: need of testing in cloud platforms
VB Mohata, DM Dakhane, RL Pardhi
Int. J. Appl. Innov. Eng. Manage 2, 369-373, 2013
82013
Fuzzy clustering: An approach for mining usage profiles from Web
AN Boob, DM Dakhane
International Journal of Computer Technology and Applications 3 (1), 329-331, 2012
72012
Machine learning approach for detection of malicious URLs and spam in social network
RK Chaudhari, DM Dakhane
International Research Journal of Engineering and Technology (IRJET) 3 (5 …, 2016
62016
Network Security Enhancement in Hadoop Clusters
RL Gaikwad, DM Dakhane, RL Pardhi
Int. J. Appl. Innov. Eng. Manage.(IJAIEM) 2 (3), 2013
52013
A Review Paper on Black Hole Attack and Comparison of Different Black Hole Attack Techniques
SR Jathe, DM Dakhane
International Journal of Cryptography and Security ISSN, 2249-7013, 2012
52012
Detection and elimination of covert communication in transport and internet layer-A Survey
DM Dakhane, S Patil, M Patil
IJCA Proceedings on International Conference on Recent Trends in Information …, 2012
52012
Comparative study of clustering and association method for large database in time domain
MSM Raut, D Dakhane
International Journal of Advanced Research in Computer Science and Software …, 2012
42012
Mining usage profiles using fuzzy clustering and its applications
N Boob, DM Dakhane
Int J Emerging Technol Adv Eng 2 (2), 120-123, 2012
32012
Reference Model Storage Covert Channel for Secure Communications
DM Dakhane, VE Narawade
Advanced Computing Technologies and Applications: Proceedings of 2nd …, 2020
22020
Image Denoising Using Non Linear Filters
AV Gautam, DM Dakhane, VR Tripathi
International Journal of Information Technology 2 (2), 573-577, 2010
22010
A Review on Network Covert Channel Construction and Attack Detection
MA Khadse, DM Dakhane
Concurrency and Computation: Practice and Experience 37 (1), e8316, 2025
12025
AES Encryption for Secure Storage and Transfer of Patient Health Records using Blockchain Technology
F Hasan, D Dakhane, A Vidhate
2023 International Conference on Computing, Communication, and Intelligent …, 2023
12023
A Review on Enhanced Machine Learning Approach for Detection of Malicious Urls and Spam in Social Network
MRK Chaudhari, DM Dakhane
International Journal of Advanced Research in Computer Engineering …, 2016
12016
A System for Image Conversion Using Mapreduce in Cloud Computing Environment
V Mohata, DM Dakhane, RL Pardhi
International Journal of Emerging Research in Management &Technology ISSN …, 2016
12016
A Review on Image Conversion using MapReduce in Cloud Computing Environment
VB Mohata, DM Dakhane, RL Pardhi
International Journal of Application or Innovation in Engineering …, 2014
12014
A Combined Utilization of Machine Learning and Pre-Attack Analysis to Provide a Protection Framework for Ransomware Attack
S Bhattacharjee, D Dakhane
2024 14th International Conference on Cloud Computing, Data Science …, 2024
2024
The system can't perform the operation now. Try again later.
Articles 1–20