Potential use of artificial neural network in data mining S Nirkhi Computer and Automation Engineering (ICCAE), 2010 The 2nd International …, 2010 | 45 | 2010 |
Comparative study of authorship identification techniques for cyber forensics analysis S Nirkhi, RV Dharaskar arXiv preprint arXiv:1401.6118, 2013 | 34 | 2013 |
Data mining: A prospective approach for digital forensics SM Nirkhi, RV Dharaskar, VM Thakre International Journal of Data Mining & Knowledge Management Process 2 (6), 41, 2012 | 20 | 2012 |
Feature extraction of product from customer feedback through blog SV Vinchurkar, SM Nirkhi International Journal of Emerging Technology and Advanced Engineering 2 (1 …, 2012 | 20 | 2012 |
Analysis of online messages for identity tracing in cybercrime investigation SM Nirkhi, RV Dharaskar, VM Thakre Proceedings Title: 2012 International Conference on Cyber Security, Cyber …, 2012 | 18 | 2012 |
Authorship verification of online messages for forensic investigation S Nirkhi, RV Dharaskar, VM Thakare Procedia Computer Science 78, 640-645, 2016 | 17 | 2016 |
Detecting Intrusion on AODV based Mobile Ad Hoc Networks by k-means Clustering method of Data Mining‖ PK Karmore, MN Smita International Journal of Computer Science and Information Technologies 2 (4), 2011 | 16 | 2011 |
A survey on intrusion in ad hoc networks and its detection measures PK Karmore, ST Bodkhe International Journal on Computer Science and Engineering 3 (5), 1896-1903, 2011 | 12 | 2011 |
A Fuzzy approach for forensic analysis of DDoS attack in manet S Ahmed, SM Nirkhi International Conference on Computer Science and Information Technology 10, 1-5, 2013 | 11 | 2013 |
A survey paper on cross-domain sentiment analysis P Jambhulkar, S Nirkhi International Journal of Advanced Research in Computer and Communication …, 2014 | 10 | 2014 |
Author identification for E-mail forensic SR Khan, SM Nirkhi, RV Dharaskar National Conference on Recent Trends in Computing NCRTC, 29-32, 2012 | 10 | 2012 |
Authorship identification using generalized features and analysis of computational method SM Nirkhi, RV Dharaskar, VM Thakare Transactions on Machine Learning and Artificial Intelligence 3 (2), 41, 2015 | 9 | 2015 |
E-mail data analysis for application to cyber forensic investigation using data mining SR Khan, SM Nirkhi, RV Dharaskar Proceedings of the 2nd National Conference on Innovative Paradigms in …, 2013 | 9 | 2013 |
Visualization Techniques for Digital forensics: A Survey MS Chavhan, MSM Nirkhi International Journal 2, 2012 | 8 | 2012 |
Brain computer interface using eeg signals A Bhattacharya, DNG Bawane, SM Nirkhi GHRCE, Nagpur 17 (11), 2015 | 7 | 2015 |
Department of Computer Science & Engineering ML Gagan, SU Narayan, JR Wamanrao, NS Madhukar, GV Avinash, ... | 7* | |
Stylometric approach for author identification of online messages MS Nirkhi Int. J. Comput. Sci. Inf. Technol 5 (5), 6158-6159, 2014 | 6 | 2014 |
A Survey on Clustering Algorithms for web Applications. S Nirkhi, K Hande SWWS, 124-129, 2008 | 5 | 2008 |
Authorship identification in digital forensics using machine learning approach S Nirkhi, RV Dharaskar, VM Thakare Int. J. Latest Trends Eng. Technol.(IJLTET) 5 (1), 2015 | 4 | 2015 |
E-mail Mining for Cyber Crime Investigation SR Khan, SM Nirkhi, RV Dharaskar Proceedings of International Conference on Advances in Computer and …, 2012 | 4 | 2012 |