An overview of vulnerability assessment and penetration testing techniques S Shah, BM Mehtre Journal of Computer Virology and Hacking Techniques 11, 27-49, 2015 | 168 | 2015 |
Projectile penetration into ballistic gelatin MV Swain, DC Kieser, S Shah, JA Kieser Journal of the mechanical behavior of biomedical materials 29, 385-392, 2014 | 62 | 2014 |
A modern approach to cyber security analysis using vulnerability assessment and penetration testing S Shah, BM Mehtre International Journal of electronics communication and computer engineering …, 2013 | 35 | 2013 |
An automated approach to vulnerability assessment and penetration testing using net-nirikshak 1.0 S Shah, BM Mehtre 2014 IEEE International Conference on Advanced Communications, Control and …, 2014 | 31 | 2014 |
A Reliable Strategy for Proactive self-Defence in Cyber Space using VAPT Tools and Techniques S Shah, BM Mehtre Computational Intelligence and Computing Research (ICCIC), 2013 IEEE …, 2013 | 22 | 2013 |
Evaluation of seedling growth rate using image processing PP Belsare, SK Shah 2013 IEEE International Conference on Computational Intelligence and …, 2013 | 9 | 2013 |
Vulnerability assessment and penetration testing (VAPT) techniques for cyber defence S Shah Nat. Conf. Adv. Comput., Netw. Secur.(IET-NCACNS), 2013 | 6 | 2013 |
Penetration of topical formulation into a skin model measured by stimulated raman spectroscopy NL Garrett, H Mahalingam, J Moger, S Shah, J Veltri, M Donaldson JOURNAL OF INVESTIGATIVE DERMATOLOGY 134, S69-S69, 2014 | | 2014 |
A Simulation of the Fundamental Attributes of Autonomous Computing S Shah, H Zeeshan | | |