A framework for database forensic analysis HK Khanuja, DS Adane Computer Science & Engineering: An International Journal (CSEIJ) 2 (3), 27-41, 2012 | 60 | 2012 |
Database security threats and challenges in database forensic: A survey HK Khanuja, DS Adane Proceedings of 2011 International Conference on Advancements in Information …, 2011 | 43 | 2011 |
Forensic analysis for monitoring database transactions HK Khanuja, DS Adane Security in Computing and Communications: Second International Symposium …, 2014 | 34 | 2014 |
A personalized framework for health care recommendation SB Ahire, HK Khanuja 2015 International Conference on Computing Communication Control and …, 2015 | 26 | 2015 |
Forensic analysis of databases by combining multiple evidences HK Khanuja, D Adane Int. J. Comput. Technol 7 (3), 654-663, 2013 | 26 | 2013 |
Implementation of blockchain technology in education system AS Karale, H Khanuja International Journal of Recent Technology and Engineering 8 (2), 3823-3828, 2019 | 24 | 2019 |
A survey on outlier detection in financial transactions P Kanhere, HK Khanuja International Journal of Computer Applications 108 (17), 23-25, 2014 | 21 | 2014 |
Role of metadata in forensic analysis of database attacks H Khanuja, SS Suratkar 2014 IEEE International Advance Computing Conference (IACC), 457-462, 2014 | 20 | 2014 |
A comparative analysis of blockchain platforms–Bitcoin and Ethereum BP Rankhambe, HK Khanuja 2019 5th international conference on computing, communication, control and …, 2019 | 17 | 2019 |
Analysis of web application security mechanism and attack detection using vulnerability injection technique RV Bhor, HK Khanuja 2016 International Conference on Computing Communication Control and …, 2016 | 17 | 2016 |
Blockchain technology in education system: A review A Karale, H Khanuja International Journal of Computer Applications 178 (38), 19-22, 2019 | 14 | 2019 |
A methodology for outlier detection in audit logs for financial transactions P Kanhere, HK Khanuja 2015 International Conference on Computing Communication Control and …, 2015 | 13 | 2015 |
Detection of suspicious transactions with database forensics and theory of evidence HK Khanuja, D Adane Security in Computing and Communications: 6th International Symposium, SSCC …, 2019 | 8 | 2019 |
Ram forensics: The analysis and extraction of malicious processes from memory image using gui based memory forensic toolkit VR Sali, HK Khanuja 2018 Fourth International Conference on Computing Communication Control and …, 2018 | 8 | 2018 |
HealthCare recommendation for personalized framework SB Ahire, HK Khanuja International Journal of Computer Applications 110 (1), 2015 | 8 | 2015 |
To Monitor and Detect Suspicious Transactions in a Financial Transaction System Through Database Forensic Audit and Rule-Based Outlier Detection Model HK Khanuja, D Adane Organizational Auditing and Assurance in the Digital Age, 224-255, 2019 | 6 | 2019 |
Monitor and detect suspicious transactions with database forensic analysis HK Khanuja, D Adane Journal of Database Management (JDM) 29 (4), 28-50, 2018 | 6 | 2018 |
Literature survey: clustering technique AV Jiman, PHK Khanuja International Journal of Computer Applications Technology and Research 5 (10 …, 2016 | 6 | 2016 |
Automatic segmentation of COVID-19 pneumonia lesions and its classification from CT images: A survey SR Rathod, HK Khanuja 2021 International Conference on Intelligent Technologies (CONIT), 1-8, 2021 | 5 | 2021 |
Hassle-Free and Secure e-KYC System Using Distributed Ledger Technology. BP Rankhambe, HK Khanuja International Journal of Next-Generation Computing 12 (2), 2021 | 5 | 2021 |