Search

Your search keyword '"Gohil, Bhavesh N."' showing total 84 results

Search Constraints

Start Over You searched for: Author "Gohil, Bhavesh N." Remove constraint Author: "Gohil, Bhavesh N."
84 results on '"Gohil, Bhavesh N."'

Search Results

51. Holistic Cyber Threat Hunting Using Network Traffic Intrusion Detection Analysis for Ransomware Attacks

52. A Forensic Video Upscaling Colorizing and Denoising Framework for Crime Scene Investigation

53. Cyber Security Issues and Challenges on Non-fungible Tokens

54. Lightweight Malicious Packet Classifier for IoT Networks

55. The Rise of Public Wi-Fi and Threats

56. Sensor Fusion and Pontryagin Duality

57. A New BERT-Inspired Knowledge Distillation Approach Toward Compressed AI Models for Edge Devices

58. Secured Workflow Scheduling Techniques in Cloud: A Survey

59. AuthBlock: Authentication Framework Using Ethereum Blockchain

60. Recent Advancements on Energy-Saving LEACH Protocol in Wireless Sensor Network—Review

61. Personality-Based Friends Recommendation System for Social Networks

62. A Secured Framework for Emergency Care in the E-Healthcare System

63. Analysis of Different Sampling Techniques for Software Fault Prediction

64. An Overview on Security and Privacy Concerns in IoT-Based Smart Environments

65. Slow TCP Port Scan Detection Using Flow Data

66. Mitigation of Trust-Related Issues in Cryptocurrency Payments Using Machine Learning: A Review

67. Intelligent Hotspot Detection in Layout Patterns

68. An Exploration of Digital Image Forensic Techniques: A Brief Survey

69. A Critical Analysis of Learning Approaches for Image Annotation Based on Semantic Correlation

70. A Clustering-Based Approach for Effective Prevention of SQL Injections

71. Lithography Hotspot Detection

72. Mitigation of Distributed Denial of Service (DDoS) Attack Using Network Function Virtualization (NFV)—A Survey

73. Neuroimaging Data Analysis of an Artificially Intelligent Human Mind

74. Bidirectional Certificateless Searchable Authenticated Encryption for Encrypted Email Application in IoT

75. A Motive Towards Enforcement of Attribute-Based Access Control Models in Dynamic Environments

76. Machine Learning-Based Malware Detection and Classification in Encrypted TLS Traffic

77. A Novel Fake Job Posting Detection: An Empirical Study and Performance Evaluation Using ML and Ensemble Techniques

78. A Conceptual Model for Click Fraud Detection and Prevention in Online Advertising Using Blockchain

79. Malicious Sensor Node Extraction from Infested Acoustic Signals in Underwater Wireless Sensor Networks

80. Enhancing Security and Performance of Software Defect Prediction Models: A Literature Review

81. Public Data Auditing Scheme Using RSA and Blockchain for Cloud Storage

82. Vision-Based Driver Assistance System to Detect Mountainous Roads Using GLCM and Haralick Texture Features

83. Vision-Based Weather Condition Recognition for Driver Assistance

84. Vision-Based Distracted Driver Detection Using a Fusion of SIFT and ORB Feature Extraction

Catalog

Books, media, physical & digital resources