A review on intrusion detection techniques for cloud computing and security challenges SG Kene, DP Theng 2015 2nd International Conference on Electronics and Communication Systems …, 2015 | 97 | 2015 |
A survey on different scheduling algorithms in cloud computing A Wadhonkar, D Theng 2016 2nd International Conference on Advances in Electrical, Electronics …, 2016 | 30 | 2016 |
Machine learning techniques for the classification of fake news S Patil, S Vairagade, D Theng 2021 International Conference on Computational Intelligence and Computing …, 2021 | 27 | 2021 |
VM management for cross-cloud computing environment D Theng, KN Hande 2012 International Conference on Communication Systems and Network …, 2012 | 24 | 2012 |
Analysing security and privacy management for cloud computing environment MH Gourkhede, DP Theng 2014 Fourth International Conference on Communication Systems and Network …, 2014 | 19 | 2014 |
Crop classification with multi-temporal satellite image data N Bhuyar, S Acharya, D Theng Int. J. Eng. Res 9, 2020 | 14 | 2020 |
Stock Prediction and analysis Using Supervised Machine Learning Algorithms A Yelne, D Theng 2021 International Conference on Computational Intelligence and Computing …, 2021 | 13 | 2021 |
Comparison of biometric and non-biometric security techniques in mobile cloud computing NR Darve, DP Theng 2015 2nd International Conference on Electronics and Communication Systems …, 2015 | 12 | 2015 |
Feature selection techniques for machine learning: a survey of more than two decades of research D Theng, KK Bhoyar Knowledge and Information Systems 66 (3), 1575-1637, 2024 | 11 | 2024 |
Preserving privacy and illegal content distribution for cloud environment MH Gourkhede, DP Theng International Journal of Computing and Technology (IJCT) 1 (1), 3, 2014 | 10 | 2014 |
A survey for secure communication of cloud third party authenticator SV Baghel, DP Theng 2015 2nd International Conference on Electronics and Communication Systems …, 2015 | 9 | 2015 |
Efficient heterogeneous computational strategy for cross-cloud computing environment D Theng Emerging Research in Computing, Information, Communication and Applications …, 2014 | 8 | 2014 |
Inspecting the ways of source anonymity in wireless sensor network RD Shinganjude, DP Theng 2014 Fourth International Conference on Communication Systems and Network …, 2014 | 8 | 2014 |
A task scheduling algorithm based on task length and deadline in cloud computing A Wadhonkar, D Theng International Journal of Scientific & Engineering Research 7 (4), 1905-1909, 2016 | 7 | 2016 |
Machine Learning Algorithms for Predictive Analytics: A Review and New Perspectives D Theng, M Theng | 6 | 2020 |
An analysis of priority length and deadline based task scheduling algorithms in cloud computing A Wadhonkar, T Deepti IJCSN 5, 360-364, 2016 | 6 | 2016 |
Trusted third party for data security in cloud environment N Katre, D Theng 2016 2nd International Conference on Advances in Electrical, Electronics …, 2016 | 6 | 2016 |
Algorithmic trading strategy using technical indicators P Kumbhare, L Kolhe, S Dani, P Fandade, D Theng 2023 11th International Conference on Emerging Trends in Engineering …, 2023 | 5 | 2023 |
Image processing on eye image using SURF feature extraction NR Darve, DP Theng Image 3 (4), 2015 | 4 | 2015 |
Issues and challenges in content-based media retargeting RY Fule, DP Theng 2014 Fourth International Conference on Communication Systems and Network …, 2014 | 4 | 2014 |