Deven Shah
Deven Shah
Professor at Thakur college of engineering and technology
Verified email at thakureducation.org - Homepage
TitleCited byYear
Mitigating denial of service attack using CAPTCHA mechanism
M Mehra, M Agarwal, R Pawar, D Shah
Proceedings of the International Conference & Workshop on Emerging Trends in …, 2011
272011
Secure authentication using dynamic virtual keyboard layout
M Agarwal, M Mehra, R Pawar, D Shah
Proceedings of the International Conference & Workshop on Emerging Trends in …, 2011
212011
Cloud Computing Black Book
D Shah
Wiley India, 2014
10*2014
A Survey: Securing Cloud Infrastructure Against EDoS Attack
S Bhingarkar, D Shah
In the Proceedings of the International Conference on Grid & Cloud Computing …, 2015
92015
Dynamic and ubiquitous security architecture for global SOA
D Shah, D Patel
2008 The Second International Conference on Mobile Ubiquitous Computing …, 2008
82008
A Complete Guide To Internet And Web Programming
DN Shah
Dreamtech Press, 2009
72009
architecture framework proposal for dynamic and ubiquitous security in global SOA
D Shah
72009
Understanding perception of cache-based side-channel attack on cloud environment
BS Ainapure, D Shah, AA Rao
Progress in intelligent computing techniques: Theory, practice, and …, 2018
62018
Brain tumor detection based on bilateral symmetry information
N Sachin, D Shah, V Khairnar, S Kadu
arXiv preprint arXiv:1412.3009, 2014
42014
Performance analysis of virtual machine introspection tools in cloud environment
B Ainapure, D Shah, AA Rao
Proceedings of the International Conference on Informatics and Analytics, 27, 2016
32016
Global soa: Rss-based web services repository and ranking
D Shah, M Agarwal, M Mehra, A Mangal
2010 Fifth International Conference on Internet and Web Applications and …, 2010
32010
MARK STAMP'S INFORMATION SECURITY: PRINCIPLES AND PRACTICE
DN Shah
Wiley India Pvt. Limited, 2001
3*2001
Prediction of weld strength of resistance spot welding using artificial neural network
D Shah, DP Patel
Journal of Engineering Research and Application 3 (5), 1486-1491, 2013
22013
A novel architecture style: Diffused cloud for virtual computing lab
D Shah, S Bhingarkar, B Ainapure
International Journal of Computer Applications 39 (6), 1-5, 2012
22012
ADVANCE COMPUTING TECHNOLOGY
DD Shah
Wiley India Pvt. Limited, 2011
22011
Security in Computing,“User Authentication”
P Pfleeger Charles, PS Lacorence, N Shah Deven
IVth Edition, Pearson Publication, 257-258, 2009
22009
Global SOA Architectural Style–SOA for the user
D Shah, D Patel
SEEC 2008, 172-175, 2008
22008
Grid-based vehicle locating system
D Shah, D Patel, S Chaudhary
International Workshop on Innovative Internet Community Systems, 53-67, 2005
22005
Adaptive multilevel fuzzy-based authentication framework to mitigate Cache side channel attack in cloud computing
B Ainapure, D Shah, A Ananda Rao
International Journal of Modeling, Simulation, and Scientific Computing 9 …, 2018
12018
Fuzzy Entropy Based Feature Selection for Website User Classification in EDoS Defense
S Bhingarkar, D Shah
International Conference on Next Generation Computing Technologies, 440-449, 2017
12017
The system can't perform the operation now. Try again later.
Articles 1–20