Anomaly-based intrusion detection system in RPL by applying stochastic and evolutionary game models over IoT environment DB Gothawal, SV Nagaraj Wireless Personal Communications 110 (3), 1323-1344, 2020 | 29 | 2020 |
Intrusion detection for enhancing RPL security DB Gothawal, SV Nagaraj Procedia Computer Science 165, 565-572, 2019 | 7 | 2019 |
Schemes against Pollution Attack in Network Coding: A Survey NV Mamidwar, D Gothawal Int. J. Comput. Sci. Inf. Technol 6, 5085-5089, 2015 | 7 | 2015 |
Detection and blocking of spammers using SPOT detection algorithm P Bhadre, D Gothawal 2014 First International Conference on Networks & Soft Computing (ICNSC2014 …, 2014 | 6 | 2014 |
An acknowledgement based approach for Routing Misbehavior Detection in MANET with AOMDV SN Chobe, D Gothawal Proceedings of International Joint Conference, 2013 | 5 | 2013 |
An intelligent and lightweight intrusion detection mechanism for RPL routing attacks by applying automata model DB Gothawal, SV Nagaraj Information Security Journal: A Global Perspective 32 (1), 1-20, 2023 | 3 | 2023 |
Cipher text policy attribute based encryption for secure data retrieval in DTNs VI Mete, MDB Gothawal Int. J. Eng. Technol 3, 1740-1745, 2016 | 3 | 2016 |
Improved security for attacks in MANET using AODV D Mane, D Gothwal Int. J. Innovations Eng. Technol.(IJIET) 2 (3), 37-44, 2013 | 3 | 2013 |
FRAPPE: Making Facebook More Secure R Kumari, U Mamidwar, S Kapoor, K Sharma International Journal of Computer Science Trends and Technology (IJCST) 3 (6), 2015 | 2 | 2015 |
Detection of guilty agents by maintaining the confidentiality of the data on the web N Mane, DB Gothawal 2014 International Conference on Advances in Electronics Computers and …, 2014 | 2 | 2014 |
A cross-layer topology control with clustering and routing for energy efficient wireless sensor networks S Patil, DB Gothawal, SJ Wagh 2014 International Conference on Green Computing Communication and …, 2014 | 2 | 2014 |
Cuckoo filter & Remote firewall: a mechanism for mitigation of distributed denial of service attacks VV Mahale, DB Gothawal International Research Journal of Engineering and Technology (IRJET) 3 (6), 2016 | 1 | 2016 |
Metric Aware Flow Assignment with ARS in Wireless Mesh Networks S Deshpande, D Gothawal 2014 Fourth International Conference on Communication Systems and Network …, 2014 | 1 | 2014 |
NTHC: A nested tunnel header compression mechanism for tunneling over IP S Sagar, DB Gothawal International Conference for Convergence for Technology-2014, 1-6, 2014 | 1 | 2014 |
Network Recovery of Dual Link Failure for Multiple Drain Nodes BA Bhandari, DB Gothawal International Journal of Emerging Technology and Advanced Engineering 3 (7 …, 2013 | 1 | 2013 |
Mitigation of Online Public Shaming Using Machine Learning Framework DMG Vaishali Kor International Journal of Current Engineering and Technology 8 (0), 4, 2021 | | 2021 |
A Survey: Secret Sharing Approach with Cheater Prevention on QR Code MDBG Sarika Laiphrakpam International Research Journal of Engineering and Technology 6 (6), 6, 2019 | | 2019 |
Implementation of Security Scheme for QR code based Application with Enhanced (k,n) sharing Approach MDBG Sarika Laiphrakpam Journal of Emerging Technologies and Innovative Research 6 (6), 6, 2019 | | 2019 |
Review on Routing Performance Matrices, Tools, Security Attacks and Defense Mechanisms in Context of Internet of Things DB Gothawal, SV Nagaraj 2018 Fourth International Conference on Computing Communication Control and …, 2018 | | 2018 |
Spam Detection on Collection of Twitter Data Using Naive Bayes Algorithm MA Athawale, MDM Gohil International Journal of Innovative Research in Science, Engineering and …, 2018 | | 2018 |