Construction Productivity Analysis in Construction Industry: An Indian Perspective P Katyare, S Joshi Proceeding of International Conference on Computational Science and …, 2022 | 5 | 2022 |
A comprehensive literature review of artificial intelligent practices in the field of penetration testing DN Railkar, S Joshi Intelligent Systems and Applications: Select Proceedings of ICISA 2022, 75-85, 2023 | 4 | 2023 |
Raid 5 for Secured Storage Virtualisation S Joshi, U Patwardhan, P Deshpande 2010 International Conference on Data Storage and Data Engineering, 278-282, 2010 | 4 | 2010 |
Real time data modeling for forecasting fuel consumption of Construction Equipment using integral approach of IoT and ML techniques P Katyare, SS Joshi, S Rajapurkar J. Inf. Optim. Sci 44 (3), 427-437, 2023 | 3 | 2023 |
Business informatics a key driver for successful strategic planning S Joshi, N Kulkarni, R Athavale 2013 4th International Conference on Intelligent Systems, Modelling and …, 2013 | 3 | 2013 |
Pragmatic analysis of ECC based security models from an empirical perspective N Purohit, S Joshi, M Pande, S Lincke Journal of Discrete Mathematical Sciences and Cryptography 26 (3), 739-758, 2023 | 2 | 2023 |
Electricity anomalies detection and automation in smart meter system P Katyare, SS Joshi IOT with Smart Systems: Proceedings of ICTIS 2021, Volume 2, 453-462, 2022 | 1 | 2022 |
Computer fundamentals and RDBMS S Vaze, S Joshi Himalaya Publishing House, 2010 | 1 | 2010 |
A study of information security policies in selected it companies in Pune city SS Joshi Pune, 2010 | 1 | 2010 |
Sciendo D Railkar, S Joshi Cybernetics and Information Technologies 24 (3), 182-196, 2024 | | 2024 |
Comprehensive Analysis on Various Cryptographic Algorithm for Constrained Devices N Purohit, S Joshi 2024 International Conference on Innovations and Challenges in Emerging …, 2024 | | 2024 |
Utilizing Machine Learning Approach to Forecast Fuel Consumption of Backhoe Loader Equipment. P Katyare, S Joshi, M Kulkarni International Journal of Advanced Computer Science & Applications 15 (5), 2024 | | 2024 |
Penetration Testing Framework using the Q Learning Ensemble Deep CNN Discriminator Framework. DN Railkar, S Joshi International Journal of Advanced Computer Science & Applications 15 (3), 2024 | | 2024 |
Meta Analysis of Yoga Benefits for Individuals with Visual Impairment and Disabilities Using Python H Parihar, A Choudhary, S Joshi Vidhyayana-An International Multidisciplinary Peer-Reviewed E-Journal-ISSN …, 2023 | | 2023 |
Comparative Study of Security Architecture of 5G with 4G V Bande, S Dhavle, S Joshi Vidhyayana-An International Multidisciplinary Peer-Reviewed E-Journal-ISSN …, 2023 | | 2023 |
Extensive Analysis of Intrusion Detection System Using Deep Learning Techniques NB Patil, S Joshi Intelligent Systems and Applications: Select Proceedings of ICISA 2022, 191-205, 2023 | | 2023 |
Information Security Policies of The IT Companies Are Based on ISO 27001/17799, BS7799 Standards DS Joshi GE-International Journal of Management Research, 4, 2016 | | 2016 |
Role of Administrative Information Security Policies over Technical Policies in Information Security Management A Narnaware, S Joshi KHOJ: Journal of Indian Management Research and Practices, 17-20, 2015 | | 2015 |
Role of BI in Cloud Computing SS Joshi, A Kherdikar, A Kulkarni KHOJ: Journal of Indian Management Research and Practices, 130-137, 2015 | | 2015 |
The Information Security Policy Frameworks of the IT Companies Differ with the Domains of IT Companies VE Kokare, SS Joshi KHOJ: Journal of Indian Management Research and Practices, 412-415, 2015 | | 2015 |