Phishing website detection using machine learning algorithms R Mahajan, I Siddavatam International Journal of Computer Applications 181 (23), 45-47, 2018 | 62 | 2018 |
Comprehensive test mechanism to detect attack on Web Services JG Irfan A Siddavatam 2008 16th IEEE International Conference on Networks, 1-6, 2008 | 22 | 2008 |
An ensemble learning for anomaly identification in SCADA system IA Siddavatam, S Satish, W Mahesh, F Kazi 2017 7th International Conference on Power Systems (ICPS), 457-462, 2017 | 19 | 2017 |
Security assessment framework for cyber physical systems: A case-study of DNP3 protocol IA Siddavatam, F Kazi 2015 IEEE Bombay Section Symposium (IBSS), 1-6, 2015 | 16 | 2015 |
Industrial Control Systems Honeypot: A Formal Analysis of Conpot. S Gokhale, A Dalvi, I Siddavatam International Journal of Computer Network & Information Security 12 (6), 2020 | 12 | 2020 |
Reconnaissance of industrial control system by deep packet inspection M Wakchaure, S Sarwade, I Siddavatam 2016 IEEE International Conference on Engineering and Technology (ICETECH …, 2016 | 11 | 2016 |
3D holographic projections using prism and hand gesture recognition AA Dalvi, I Siddavatam, NG Dandekar, AV Patil Proceedings of the 2015 International Conference on Advanced Research in …, 2015 | 11 | 2015 |
Optimization of load balancing algorithm for green it I Siddavatam, E Johri, D Patole Proceedings of the International Conference & Workshop on Emerging Trends in …, 2011 | 11 | 2011 |
A modified framework to detect keyloggers using machine learning algorithm D Pillai, I Siddavatam International Journal of Information Technology 11 (4), 707-712, 2019 | 10 | 2019 |
Testing and validation of Modbus/TCP protocol for secure SCADA communication in CPS using formal methods IA Siddavatam, S Parekh, T Shah, F Kazi Scalable Computing: Practice and Experience 18 (4), 313-330, 2017 | 10 | 2017 |
Securing neural networks using homomorphic encryption A Dalvi, A Jain, S Moradiya, R Nirmal, J Sanghavi, I Siddavatam 2021 International Conference on Intelligent Technologies (CONIT), 1-7, 2021 | 8 | 2021 |
Security analysis of dnp3 using cpn model with state space report representation using lda B Tare, S Waghmare, I Siddavatam, F Kazi, N Singh 2016 Indian Control Conference (ICC), 25-31, 2016 | 8 | 2016 |
Grammatical error correction (GEC): research approaches till now S Ailani, A Dalvi, I Siddavatam International Journal of Computer Application 178 (40), 1-3, 2019 | 7 | 2019 |
Authentication using dynamic question generation I Siddavatam, D Khatri, P Ashar, V Parekh, T Sharma Integrated intelligent computing, communication and security, 293-300, 2019 | 4 | 2019 |
A Perspective of Smart Manufacturing: A Case Study VS Narwane, BE Narkhede, RD Raut, IA Siddavatam, B Ravishankar Industrial Engineering Journal 11 (7), 1-7, 2018 | 4 | 2018 |
Element: Text extraction for the dark web A Dalvi, I Siddavatam, A Jain, S Moradiya, F Kazi, SG Bhirud Advanced Computing and Intelligent Technologies: Proceedings of ICACIT 2021 …, 2022 | 3 | 2022 |
Cowrie honeypot data analysis and predicting the directory traverser pattern during the attack S Mehta, D Pawade, Y Nayyar, I Siddavatam, A Tiwart, A Dalvi 2021 International Conference on Innovative Computing, Intelligent …, 2021 | 3 | 2021 |
Cuisine detection using the convolutional neural network D Pawadea, A Dalvia, I Siddavatamb, M Carvalhoc, P Kotianc, H Georgec Int. J. Educ. Manage. Eng 10 (3), 1, 2020 | 3 | 2020 |
SnoopMe-Interactive task scheduler mobile application for students A Dalvi, I Siddavatam 2019 International Conference on Nascent Technologies in Engineering (ICNTE …, 2019 | 3 | 2019 |
A Novel Secure Remote User Authentication Protocol using Three Factors Y Borse, I Siddavatam International Journal of Computer Applications 87 (17), 1-6, 2014 | 3 | 2014 |