Developing secure cloud storage system by applying AES and RSA cryptography algorithms with role based access control model D Bokefode Jayant, A Ubale Swapnaja, V Pingale Subhash, ... International Journal of Computer Applications 975, 8887, 2015 | 24 | 2015 |
Remora whale optimization-based hybrid deep learning for network intrusion detection using CNN features SV Pingale, SR Sutar Expert Systems with Applications 210, 118476, 2022 | 23 | 2022 |
Denial of service attack and classification techniques for attack detection P Solankar, S Pingale, R Parihar Int. J. Comput. Sci. Inf. Technol 6 (2), 1096-1099, 2015 | 17 | 2015 |
Augmented reality in e-learning review of prototype designs for usability evaluation T Satpute, S Pingale, V Chavan 2015 International Conference on Communication, Information & Computing …, 2015 | 16 | 2015 |
Remora based Deep Maxout Network model for network intrusion detection using Convolutional Neural Network features SV Pingale, SR Sutar Computers and Electrical Engineering 110, 108831, 2023 | 5 | 2023 |
Analysis of web application firewalls, challenges, and research opportunities SV Pingale, SR Sutar ICDSMLA 2020: Proceedings of the 2nd International Conference on Data …, 2022 | 5 | 2022 |
D, Ubale Swapnaja A, Pingale Subhash V., Karane Kailash J., Apate Sulabha S.,” Developing Secure Cloud Storage System by Applying AES and RSA Cryptography Algorithms with Role … B Jayant International Journal of Computer Applications 118 (12), 0 | 5 | |
Automated network intrusion detection using multimodal networks SV Pingale, SR Sutar International Journal of Computational Science and Engineering 25 (3), 339-352, 2022 | 2 | 2022 |
IOT Based Interactive Motion Detection Security System Using Raspberry Pi G Khare, S Pingale, A Bhise, S Kawale Techno-Societal 2020: Proceedings of the 3rd International Conference on …, 2021 | 1 | 2021 |
Secure Role Based Cloud System By Integrating Trust and Role Based Encryption Scheme D Bokefode Jayant, A Ubale Swapnaja, V Pingale Subhash, ... International Journal of Engineering and Computer Science 4 (05), 2015 | | 2015 |
Detecting and Resolving Privacy Conflicts in Online Social Networks SV Pingale, SS Shirgave | | 2015 |
Rigorouspublic Auditing Supporton Shared Data Stored In The Cloud By Privacy-preserving Mechanism D Bamane, V Pottigar, S Pingale International Journal of Innovations in Engineering Research and Technology, 1-5, 0 | | |
A Literature Survey on Efficient Software Bug Triaging Using Software Data Reduction Techniques S Pingale, RA Taklikar, A Godse | | |
SMARTPHONE BASED SYSTEM FOR CLINICAL ASSESSMENT OF A PERSON'S PATTERN OF WALKING BY USING IoT DD Bile, S Pingale | | |
To implement an Analyzer for evaluation of the performance of Recent Web Development Frameworks G Phule Vidya, SV Pingale International Journal on Recent and Innovation Trends in Computing and …, 0 | | |
Literature Survey on “Interactive motion detection security system using Raspberry Pi in IOT” S Pingale, G Khare, S Thigale | | |
Dynamic Query Form for Database Queries SV Pingale | | |
Dynamic Query Form for Database Queries Pingale | | |
Customizable Content Based Filtering Method to Filter Texts and Images from Social Network User Wall M Jadhav, S Pingale, R Takalikar | | |
Developing System to Filter Unwanted Texts and Images from Social Network User Wall R Takalikar, M Jadhav, S Pingale | | |