Follow
Sugandh Shah
Title
Cited by
Cited by
Year
An overview of vulnerability assessment and penetration testing techniques
S Shah, BM Mehtre
Journal of Computer Virology and Hacking Techniques 11, 27-49, 2015
1312015
Projectile penetration into ballistic gelatin
MV Swain, DC Kieser, S Shah, JA Kieser
Journal of the mechanical behavior of biomedical materials 29, 385-392, 2014
572014
A modern approach to cyber security analysis using vulnerability assessment and penetration testing
S Shah, BM Mehtre
International Journal of electronics communication and computer engineering …, 2013
372013
An automated approach to vulnerability assessment and penetration testing using net-nirikshak 1.0
S Shah, BM Mehtre
2014 IEEE International Conference on Advanced Communications, Control and …, 2014
282014
A Reliable Strategy for Proactive self-Defence in Cyber Space using VAPT Tools and Techniques
S Shah, BM Mehtre
Computational Intelligence and Computing Research (ICCIC), 2013 IEEE …, 2013
202013
Evaluation of seedling growth rate using image processing
PP Belsare, SK Shah
2013 IEEE International Conference on Computational Intelligence and …, 2013
92013
Vulnerability assessment and penetration testing (VAPT) techniques for cyber defence
S Shah
Nat. Conf. Adv. Comput., Netw. Secur.(IET-NCACNS), 2013
72013
Penetration of topical formulation into a skin model measured by stimulated raman spectroscopy
NL Garrett, H Mahalingam, J Moger, S Shah, J Veltri, M Donaldson
JOURNAL OF INVESTIGATIVE DERMATOLOGY 134, S69-S69, 2014
2014
A Simulation of the Fundamental Attributes of Autonomous Computing
S Shah, H Zeeshan
The system can't perform the operation now. Try again later.
Articles 1–9