Follow
Harshil Joshi
Harshil Joshi
Lecturer in Computer Science (Cyber Security), St Mary's University, Twickenham, London, UK
Verified email at stmarys.ac.uk
Title
Cited by
Cited by
Year
Threats that deep web possess to modern world
I Pandya, H Joshi, B Patel, H Joshi
International Journal for Innovative Research in Science & Technology, 140-148, 2017
52017
Threat Prediction using Ensemble Learning Algorithm to provide End-Point Security
S Mehta, M Darji, H Joshi
2022 International Conference on Electronics and Renewable Systems (ICEARS …, 2022
32022
Internet of Things (IoT)-Based Distributed Denial of Service (DDoS) Attack Using COOJA Network Simulator
H Joshi, D Rathod
IOT with Smart Systems: Proceedings of ICTIS 2021, Volume 2, 671-677, 2022
32022
Privacy and security issues in social online networks
R Patel, R Bhagat, P Modi, H Joshi
National Conference on Latest Trends in Networking and Cyber Security …, 2017
32017
A Novel Approach for PE Malware Detection using Random Forest Algorithm and Prevention
D Soni, D Shah, S Ramolia, H Joshi, S Mehta
2023 Second International Conference on Electronics and Renewable Systems …, 2023
12023
Subterranean Insect based Data Reduction in Web Usage Mining using K-implies Clustering Algorithm
HJ Dushyantsinh B. Rathod, Ramesh T. Prajapati
International Journal of Engineering and Advanced Technology (IJEAT) 9 …, 2020
1*2020
A Novel Intrusion Detection System based on Machine Learning for Internet of Things (IoT) Devices
D Chauhan, M Shah, H Joshi
2023 3rd International Conference on Smart Data Intelligence (ICSMDI), 427-434, 2023
2023
A Footstep to Image Deconvolution Technique for the Both Known and Unknown Blur Parameter
R Chokshi, H Joshi, M Darji
Information Systems for Intelligent Systems: Proceedings of ISBM 2022, 37-45, 2023
2023
Anomaly Detection to Prevent Sensitive Data Exposure Using GMM Clustering Model
S Mehta, LJ Gadhavi, H Joshi
International Conference on Worldwide Computing and Its Applications, 439-450, 2023
2023
A Survey Paper on Generic Restaurant Recommendation System through NLP Using Web Scrapping
H Joshi
act 2019 6 (4), 78-81, 2019
2019
Survey Paper on vulnerability in Relation to Phishing-Based Social Engineering Attacks
KAMAN Bandhaniya, RJH Joshi
2017
Threats that Deep Web Possess to Modern World
IPHJM Biren, PMH Joshi
2017
Ideal Modelling of Data Mining
KP Harshil Joshi
IJSRD 2 (5), 530-533, 2014
2014
Biometric Systems Authentication & Multi-Modal Biometric System
HJC Pandya
Signature 4, 5, 2014
2014
The system can't perform the operation now. Try again later.
Articles 1–14