Mitigating denial of service attack using CAPTCHA mechanism M Mehra, M Agarwal, R Pawar, D Shah Proceedings of the International Conference & Workshop on Emerging Trends in …, 2011 | 39 | 2011 |
Secure authentication using dynamic virtual keyboard layout M Agarwal, M Mehra, R Pawar, D Shah Proceedings of the International Conference & Workshop on Emerging Trends in …, 2011 | 29 | 2011 |
A Survey: Securing Cloud Infrastructure Against EDoS Attack S Bhingarkar, D Shah In the Proceedings of the International Conference on Grid & Cloud Computing …, 2015 | 16 | 2015 |
Understanding perception of cache-based side-channel attack on cloud environment BS Ainapure, D Shah, AA Rao Progress in intelligent computing techniques: Theory, practice, and …, 2018 | 13 | 2018 |
Cloud Computing Black Book D Shah Wiley India, 2014 | 13* | 2014 |
FLNL: Fuzzy entropy and lion neural learner for EDoS attack mitigation in cloud computing S Bhingarkar, D Shah International Journal of Modeling, Simulation, and Scientific Computing 9 …, 2018 | 9 | 2018 |
Brain tumor detection based on bilateral symmetry information N Sachin, D Shah, V Khairnar, S Kadu arXiv preprint arXiv:1412.3009, 2014 | 9 | 2014 |
A Complete Guide To Internet And Web Programming DN Shah Dreamtech Press, 2009 | 9 | 2009 |
Dynamic and ubiquitous security architecture for global SOA D Shah, D Patel 2008 The Second International Conference on Mobile Ubiquitous Computing …, 2008 | 9 | 2008 |
architecture framework proposal for dynamic and ubiquitous security in global SOA D Shah | 7 | 2009 |
Performance analysis of virtual machine introspection tools in cloud environment B Ainapure, D Shah, AA Rao Proceedings of the International Conference on Informatics and Analytics, 1-6, 2016 | 6 | 2016 |
Global soa: Rss-based web services repository and ranking D Shah, M Agarwal, M Mehra, A Mangal 2010 Fifth International Conference on Internet and Web Applications and …, 2010 | 5 | 2010 |
Fuzzy entropy based feature selection for website user classification in edos defense S Bhingarkar, D Shah International Conference on Next Generation Computing Technologies, 440-449, 2017 | 4 | 2017 |
MARK STAMP'S INFORMATION SECURITY: PRINCIPLES AND PRACTICE DN Shah Wiley India Pvt. Limited, 2001 | 4* | 2001 |
A survey of potential security threats and counter-measures in SDN: an IoT enabling technology T Lotlikar, D Shah OSR Journal of Computer Engineering, 67-74, 2017 | 3 | 2017 |
Security in Computing,“User Authentication” P Pfleeger Charles, PS Lacorence, N Shah Deven IVth Edition, Pearson Publication, 257-258, 2009 | 3 | 2009 |
IoT based water parameter testing in linear topology B Nemade, D Shah 2020 10th International Conference on Cloud Computing, Data Science …, 2020 | 2 | 2020 |
A Defense Mechanism for DoS Attacks in SDN (Software Defined Network) T Lotlikar, D Shah 2019 International Conference on Nascent Technologies in Engineering (ICNTE …, 2019 | 2 | 2019 |
A survey: cloud hosted website protection using soft computing techniques S Bhingarkar, D Shah 2017 7th International Conference on Cloud Computing, Data Science …, 2017 | 2 | 2017 |
A novel architecture style: Diffused cloud for virtual computing lab D Shah, S Bhingarkar, B Ainapure International Journal of Computer Applications 39 (6), 1-5, 2012 | 2 | 2012 |