Sugandh Shah
Title
Cited by
Cited by
Year
An overview of vulnerability assessment and penetration testing techniques
S Shah, BM Mehtre
Journal of Computer Virology and Hacking Techniques 11 (1), 27-49, 2015
472015
Projectile penetration into ballistic gelatin
MV Swain, DC Kieser, S Shah, JA Kieser
Journal of the mechanical behavior of biomedical materials 29, 385-392, 2014
282014
A modern approach to cyber security analysis using vulnerability assessment and penetration testing
S Shah, BM Mehtre
Int J Electron Commun Comput Eng 4 (6), 47-52, 2013
162013
A Reliable Strategy for Proactive self-Defence in Cyber Space using VAPT Tools and Techniques
S Shah, BM Mehtre
Computational Intelligence and Computing Research (ICCIC), 2013 IEEE …, 2013
122013
An automated approach to vulnerability assessment and penetration testing using net-nirikshak 1.0
S Shah, BM Mehtre
2014 IEEE International Conference on Advanced Communications, Control and …, 2014
112014
Evaluation of seedling growth rate using image processing
PP Belsare, SK Shah
2013 IEEE International Conference on Computational Intelligence and …, 2013
62013
Vulnerability assessment and penetration testing (VAPT) techniques for cyber defence
S Shah
Nat. Conf. Adv. Comput., Netw. Secur.(IET-NCACNS), 2013
32013
Penetration of topical formulation into a skin model measured by stimulated raman spectroscopy
NL Garrett, H Mahalingam, J Moger, S Shah, J Veltri, M Donaldson
JOURNAL OF INVESTIGATIVE DERMATOLOGY 134, S69-S69, 2014
2014
A Simulation of the Fundamental Attributes of Autonomous Computing
S Shah, H Zeeshan
The system can't perform the operation now. Try again later.
Articles 1–9