93 results on '"Gohil, Bhavesh N."'
Search Results
2. Forensics Analysis of TOR Browser
3. Predicting Traffic Flow with Deep Learning
4. Stock Market Prediction and Analysis Using Different Machine Learning Algorithms
5. A survey on Persistent Memory indexes: Recent advances, challenges and opportunities
6. Forensics Analysis of TOR Browser
7. Stock Market Prediction and Analysis Using Different Machine Learning Algorithms
8. A Review of Machine Learning-Based Intrusion Detection Systems on the Cloud
9. Fair Fit—A Load Balance Aware VM Placement Algorithm in Cloud Data Centers
10. A Review of Machine Learning-Based Intrusion Detection Systems on the Cloud
11. A Secure Online Voting System Using Blockchain
12. Secure Electronic Health Records (EHR) Management Using Blockchain
13. An improved Grey Wolf Optimizer (iGWO) for Load Balancing in Cloud Computing Environment
14. Fair Fit—A Load Balance Aware VM Placement Algorithm in Cloud Data Centers
15. A review on cloud security issues and solutions
16. Task Scheduling in Cloud Computing using Mean Ant Colony Optimization
17. Load balancing in Cloud Computing Environment using Modified Genetic Algorithm
18. XGBoost-based dynamic ride-sharing model for New York City.
19. An improved Grey Wolf Optimizer (iGWO) for Load Balancing in Cloud Computing Environment
20. A New Data Integrity Checking Protocol with Public Verifiability in Cloud Storage
21. Load balancing in cloud using improved gray wolf optimizer
22. An Improved Grey Wolf Optimizer (iGWO) for Global Engineering Optimization
23. Research Challenges in Query Processing and Data Analytics on the Edge
24. A hybrid GWO-PSO Algorithm for Load Balancing in Cloud Computing Environment
25. Load management model for cloud computing
26. Cell identity assignment techniques in cellular network: A review
27. A Comparative Study of NoSQL Databases.
28. A Comparative Study of Pre-Copy based Live Virtual Machine Migration Techniques.
29. A Review of Face Detection Anti Spoofing Techniques on Varied Data Sets
30. Digital Forensic Investigation on Ponzi Schemes
31. Cyber Security Attack Detection Framework for DODAG Control Message Flooding in an IoT Network
32. Modelling Identity-Based Authentication and Key Exchange Protocol Using the Tamarin Prover
33. CERT-In New Directives for VPN: A Growing Focus on Mass Surveillance and Data Privacy
34. Study and Analysis of Key-Predistribution Schemes Based on Hash Chain for WSN
35. Resilient Risk-Based Adaptive Authentication and Authorization (RAD-AA) Framework
36. Addressing DIO Suppression Attack in RPL based IoT Networks
37. Memory Forensics for Artefacts Recovery from Ether Transactions
38. A Lightweight Intrusion Detection and Electricity Theft Detection System for Smart Grid
39. Survey on Blockchain Scalability Addressing Techniques
40. Anti-money Laundering Analytics on the Bitcoin Transactions
41. Fog Forensics: A Comprehensive Review of Forensic Models for Fog Computing Environment
42. Vehicle Theft Detection and Tracking Using Surveillance Video for the Modern Traffic Security Management System
43. Re-examining Laws Pertaining to Admissibility of Digital Evidence in Investigations
44. Phishing Classification Based on Text Content of an Email Body Using Transformers
45. Cybersecurity Resiliency for Airports as a Critical Infrastructure
46. An Intelligent Analysis of Mobile Evidence Using Sentimental Analysis
47. A Mini Review on—Physically Unclonable Functions: The Hardware Security Primitives
48. Machine Learning Algorithms for Attack and Anomaly Detection in IoT
49. Ethereum Blockchain-Based Medicine Supply Chain
50. Application of Digital Forensic Evidence in Hit and Run: A Comparative Study with Special Reference to § 304 Part II of IPC
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.