Deven Shah
Deven Shah
Professor at Thakur college of engineering and technology
Verified email at thakureducation.org - Homepage
Title
Cited by
Cited by
Year
Mitigating denial of service attack using CAPTCHA mechanism
M Mehra, M Agarwal, R Pawar, D Shah
Proceedings of the International Conference & Workshop on Emerging Trends in …, 2011
372011
Secure authentication using dynamic virtual keyboard layout
M Agarwal, M Mehra, R Pawar, D Shah
Proceedings of the International Conference & Workshop on Emerging Trends in …, 2011
292011
A Survey: Securing Cloud Infrastructure Against EDoS Attack
S Bhingarkar, D Shah
In the Proceedings of the International Conference on Grid & Cloud Computing …, 2015
142015
Cloud Computing Black Book
D Shah
Wiley India, 2014
13*2014
Understanding perception of cache-based side-channel attack on cloud environment
BS Ainapure, D Shah, AA Rao
Progress in intelligent computing techniques: Theory, practice, and …, 2018
122018
Dynamic and ubiquitous security architecture for global SOA
D Shah, D Patel
2008 The Second International Conference on Mobile Ubiquitous Computing …, 2008
92008
A Complete Guide To Internet And Web Programming
DN Shah
Dreamtech Press, 2009
82009
architecture framework proposal for dynamic and ubiquitous security in global SOA
D Shah
72009
Brain tumor detection based on bilateral symmetry information
N Sachin, D Shah, V Khairnar, S Kadu
arXiv preprint arXiv:1412.3009, 2014
62014
Prediction of weld strength of resistance spot welding using artificial neural network
D Shah, DP Patel
Journal of Engineering Research and Application 3 (5), 1486-1491, 2013
62013
FLNL: Fuzzy entropy and lion neural learner for EDoS attack mitigation in cloud computing
S Bhingarkar, D Shah
International Journal of Modeling, Simulation, and Scientific Computing 9 …, 2018
52018
Performance analysis of virtual machine introspection tools in cloud environment
B Ainapure, D Shah, AA Rao
Proceedings of the International Conference on Informatics and Analytics, 1-6, 2016
52016
Global soa: Rss-based web services repository and ranking
D Shah, M Agarwal, M Mehra, A Mangal
2010 Fifth International Conference on Internet and Web Applications and …, 2010
52010
MARK STAMP'S INFORMATION SECURITY: PRINCIPLES AND PRACTICE
DN Shah
Wiley India Pvt. Limited, 2001
5*2001
Security in Computing,“User Authentication”
P Pfleeger Charles, PS Lacorence, N Shah Deven
IVth Edition, Pearson Publication, 257-258, 2009
32009
A Defense Mechanism for DoS Attacks in SDN (Software Defined Network)
T Lotlikar, D Shah
2019 International Conference on Nascent Technologies in Engineering (ICNTE …, 2019
22019
Fuzzy entropy based feature selection for website user classification in edos defense
S Bhingarkar, D Shah
International Conference on Next Generation Computing Technologies, 440-449, 2017
22017
A survey: cloud hosted website protection using soft computing techniques
S Bhingarkar, D Shah
2017 7th International Conference on Cloud Computing, Data Science …, 2017
22017
A novel architecture style: Diffused cloud for virtual computing lab
D Shah, S Bhingarkar, B Ainapure
International Journal of Computer Applications 39 (6), 1-5, 2012
22012
ADVANCE COMPUTING TECHNOLOGY
DD Shah
Wiley India Pvt. Limited, 2011
22011
The system can't perform the operation now. Try again later.
Articles 1–20