A framework for database forensic analysis HK Khanuja, DS Adane Computer Science & Engineering: An International Journal (CSEIJ) 2 (3), 27-41, 2012 | 60 | 2012 |
Database security threats and challenges in database forensic: A survey HK Khanuja, DS Adane Proceedings of 2011 International Conference on Advancements in Information …, 2011 | 43 | 2011 |
Forensic analysis for monitoring database transactions HK Khanuja, DS Adane Security in Computing and Communications: Second International Symposium …, 2014 | 34 | 2014 |
Forensic analysis of databases by combining multiple evidences HK Khanuja, D Adane Int. J. Comput. Technol 7 (3), 654-663, 2013 | 26 | 2013 |
Hybrid Approach for Routing in Vehicular Ad-hoc Network (VANET) Using Clustering Approach DDSA Siddhant Jaiswal International Journal of Innovative Research in Computer and Communication …, 2013 | 16* | 2013 |
Comparative Study of MAC Layer Protocols in Wireless Sensor Networks: A Survey DSA Rahul R Lanjewar International Journal of Engineering Trends and Technology (IJETT) 12 (1), 2014 | 9* | 2014 |
Detection of suspicious transactions with database forensics and theory of evidence HK Khanuja, D Adane Security in Computing and Communications: 6th International Symposium, SSCC …, 2019 | 8 | 2019 |
Models and issues in data stream mining LS Agrawal, DS Adane International Journal Of Computer Science And Applications 9 (1), 6-10, 2016 | 8 | 2016 |
Maximizing range of signal strength by homemade Wi-Fi booster antenna VV Kadil, DS Adane 2012 World Congress on Information and Communication Technologies, 389-393, 2012 | 8 | 2012 |
Hardware implementation of efficient elliptic curve scalar multiplication using vedic multiplier RK Kadu, DS Adane International Journal of Communication Networks and Information Security 11 …, 2019 | 6 | 2019 |
To Monitor and Detect Suspicious Transactions in a Financial Transaction System Through Database Forensic Audit and Rule-Based Outlier Detection Model HK Khanuja, D Adane Organizational Auditing and Assurance in the Digital Age, 224-255, 2019 | 6 | 2019 |
Monitor and detect suspicious transactions with database forensic analysis HK Khanuja, D Adane Journal of Database Management (JDM) 29 (4), 28-50, 2018 | 6 | 2018 |
A Novel Efficient Hardware Implementation of Elliptic Curve Cryptography Scalar Multiplication using Vedic Multiplier DSA Rakesh K. Kadu International Journal of Simulation Systems, Science & Technology 19 (6), 2, 2018 | 5* | 2018 |
Graphical Knowledge Based Authentication Mechanism PC Golhar, DDS Adane International Journal of Advanced Research in Computer Science and Software …, 2012 | 5 | 2012 |
Critical analysis of 2-dimensional graphical authentication systems PC Golar, DS Adane 2016 International Conference on Computing, Analytics and Security Trends …, 2016 | 4 | 2016 |
A Survey on Context Aware Middleware DSA Chitra G. Sahu International Journal of Advanced Research in Computer and Communication …, 2015 | 4 | 2015 |
A security model for data storing and data collecting agents DS Adane, SR Sathe Int. J. Comput. Sci. Netw. Secur.(IJCSNS) 9 (4), 265-271, 2009 | 4 | 2009 |
Improved decision tree model for prediction in equity market using heterogeneous data L Agrawal, D Adane IETE Journal of Research 69 (9), 6065-6074, 2023 | 3 | 2023 |
Reduction in routing overhead in MANET using 2-ACK scheme and Novel routing Algorithm S Gaikwad, DS Adane Int. J. Eng. Trends Technol 4 (8), 3677-3681, 2013 | 3 | 2013 |
Ensembled Approach to Heterogeneous Data Streams. L Agrawal, D Adane International Journal of Next-Generation Computing 13 (5), 2022 | 2 | 2022 |