A Review on Secure Data Deduplication: Cloud Storage Security Issue P Prajapati, P Shah Journal of King Saud University-Computer and Information Sciences 34 (7 …, 2022 | 111 | 2022 |
A Review of Various Challenges in Cybersecurity using Artificial Intelligence H Chaudhary, A Detroja, P Prajapati, P Shah 2020 3rd International Conference on Intelligent Sustainable Systems (ICISS …, 2020 | 50 | 2020 |
Efficient cross user Data Deduplication in Remote Data Storage P Prajapati, P Shah International Conference for Convergence for Technology-2014, 1-5, 2014 | 18 | 2014 |
A Review on Recent Intrusion Detection Systems and Intrusion Prevention Systems in IoT P Prajapati, B Bhatt, G Zalavadiya, M Ajwalia, P Shah 2021 11th International Conference on Cloud Computing, Data Science …, 2021 | 17 | 2021 |
Efficient Cross User Client Side Data Deduplication in Hadoop P Prajapati, P Shah, A Ganatra, S Patel 2nd International Conference on Bioinformatics and Computer Engineering …, 2016 | 17 | 2016 |
Provable Data Possession using Additive Homomorphic Encryption P Shah, P Prajapati Journal of King Saud University-Computer and Information Sciences 34 (6 …, 2022 | 15 | 2022 |
Provable Data Possession Using Identity Based Encryption S Kadvani, A Patel, M Tilala, P Prajapati, P Shah 3rd International Conference on ICT for Intelligent Systems (ICTIS 2018) 106 …, 2018 | 12 | 2018 |
A Review of Recent Detection Methods For HTTP DDoS Attacks P Prajapati, N Patel, P Shah International Journal of Scientific and Technology Research 8 (12), 1693-1696, 2019 | 11 | 2019 |
A Review of Recent Blockchain Applications P Prajapati, K Dave, P Shah International Journal of Scientific and Technology Research 9 (1), 897-903, 2020 | 10 | 2020 |
A Review on Different Techniques used to detect the Malicious Applications for Securing the Android Operating System P Prajapati, D Bhagat, P Shah International Journal of Scientific and Technology Research 9 (2), 5255-5258, 2020 | 5 | 2020 |
A Review of Recent Trends on DNA Based Cryptography G Bhoi, R Bhavsar, P Prajapati, P Shah 2020 3rd International Conference on Intelligent Sustainable Systems (ICISS …, 2020 | 3 | 2020 |
Casper: Modification of Bitcoin using Proof of Stake N Sheth, P Prajapati, A Shaikh, P Shah 3rd International Conference on ICT for Intelligent Systems (ICTIS 2018) 106 …, 2018 | 3 | 2018 |
Phishing E-mail Detection using Machine Learning P Prajapati, Y Bhadania, A Joshi, Y Jani, H Nandani, M Ajwalia, P Shah 4th International Conference on Smart Systems: Innovations in Computing …, 2024 | 1 | 2024 |
Machine Learning-Driven Permissions Analysis for Android Malware Identification (ML-PAAMI) J Singh, K Zalaria, P Shah, M Ajwalia, P Prajapati 9th International Conference on Information and Communication Technology for …, 2024 | | 2024 |
Lattice-based Post Quantum Cryptography using Variations of Learning with Error (LWE) P Shah, P Prajapati, D Patel 6th International Conference on Soft Computing and its Engineering …, 2024 | | 2024 |
Enhancing Security in a University Network using Snort and Wireshark P Prajapati, P Shah, D Shah, S Shah, R Shah, M Ajwalia 8th International Conference on Information and Communication Technology for …, 2024 | | 2024 |
Comparative Study of Mobile Forensics Tools: Autopsy, Belkasoft X and Magnet Axiom J Mehta, Y Bhadania, P Shah, P Prajapati 2024 5th International Conference on Electronics and Sustainable …, 2024 | | 2024 |
Smishing: A SMS Phishing Detection Using Various Machine Learning Algorithms P Prajapati, H Nandani, D Shah, S Shah, R Shah, M Ajwalia, P Shah 5th International Conference on Communication and Intelligent Systems (ICCIS …, 2024 | | 2024 |
Comparative Study on Hash Algorithms: KECCAK, MD, RIPEMD, and SHA Variants P Prajapati, P Shah, R Shah, D Shah 3rd World Conference on Information System for Business Management (ISBM 2024), 2024 | | 2024 |
Security and Challenges of Blockchain-based IoT Use Cases M Ajwalia, K Mer, R Bhatia, P Prajapati, P Shah 9th International Conference on ICT Sustainable Development (ICT4SD 2024), 2024 | | 2024 |