Search

Your search keyword '"Gohil, Bhavesh N."' showing total 93 results

Search Constraints

Start Over You searched for: Author "Gohil, Bhavesh N." Remove constraint Author: "Gohil, Bhavesh N."
93 results on '"Gohil, Bhavesh N."'

Search Results

2. Forensics Analysis of TOR Browser

3. Predicting Traffic Flow with Deep Learning

4. Stock Market Prediction and Analysis Using Different Machine Learning Algorithms

6. Forensics Analysis of TOR Browser

8. A Review of Machine Learning-Based Intrusion Detection Systems on the Cloud

9. Fair Fit—A Load Balance Aware VM Placement Algorithm in Cloud Data Centers

13. An improved Grey Wolf Optimizer (iGWO) for Load Balancing in Cloud Computing Environment

23. Research Challenges in Query Processing and Data Analytics on the Edge

27. A Comparative Study of NoSQL Databases.

28. A Comparative Study of Pre-Copy based Live Virtual Machine Migration Techniques.

29. A Review of Face Detection Anti Spoofing Techniques on Varied Data Sets

30. Digital Forensic Investigation on Ponzi Schemes

31. Cyber Security Attack Detection Framework for DODAG Control Message Flooding in an IoT Network

32. Modelling Identity-Based Authentication and Key Exchange Protocol Using the Tamarin Prover

33. CERT-In New Directives for VPN: A Growing Focus on Mass Surveillance and Data Privacy

34. Study and Analysis of Key-Predistribution Schemes Based on Hash Chain for WSN

35. Resilient Risk-Based Adaptive Authentication and Authorization (RAD-AA) Framework

36. Addressing DIO Suppression Attack in RPL based IoT Networks

37. Memory Forensics for Artefacts Recovery from Ether Transactions

38. A Lightweight Intrusion Detection and Electricity Theft Detection System for Smart Grid

39. Survey on Blockchain Scalability Addressing Techniques

40. Anti-money Laundering Analytics on the Bitcoin Transactions

41. Fog Forensics: A Comprehensive Review of Forensic Models for Fog Computing Environment

42. Vehicle Theft Detection and Tracking Using Surveillance Video for the Modern Traffic Security Management System

43. Re-examining Laws Pertaining to Admissibility of Digital Evidence in Investigations

44. Phishing Classification Based on Text Content of an Email Body Using Transformers

45. Cybersecurity Resiliency for Airports as a Critical Infrastructure

46. An Intelligent Analysis of Mobile Evidence Using Sentimental Analysis

47. A Mini Review on—Physically Unclonable Functions: The Hardware Security Primitives

48. Machine Learning Algorithms for Attack and Anomaly Detection in IoT

49. Ethereum Blockchain-Based Medicine Supply Chain

50. Application of Digital Forensic Evidence in Hit and Run: A Comparative Study with Special Reference to § 304 Part II of IPC

Catalog

Books, media, physical & digital resources