Solutions to vulnerabilities and threats in software defined networking (SDN) A Pradhan, R Mathew Procedia Computer Science 171, 2581-2589, 2020 | 61 | 2020 |
Survey of low rate dos attack detection mechanisms R Mathew, V Katkar Proceedings of the International Conference & Workshop on Emerging Trends in …, 2011 | 32 | 2011 |
Security issues in cloud computing S Goyal, R Mathew Proceeding of the International Conference on Computer Networks, Big Data …, 2020 | 13 | 2020 |
Threats faced by mixed reality and countermeasures S Syal, R Mathew Procedia Computer Science 171, 2720-2728, 2020 | 11 | 2020 |
A study on advancement in honeypot based network security model T Sethi, R Mathew 2021 Third International Conference on Intelligent Communication …, 2021 | 10 | 2021 |
Counter-measures to spoofing and jamming of drone signals P Dhomane, R Mathew Available at SSRN 3774955, 2020 | 10 | 2020 |
A survey on attacks of bitcoin J Joshi, R Mathew Proceeding of the International Conference on Computer Networks, Big Data …, 2020 | 10 | 2020 |
Software based low rate dos attack detection mechanism R Mathew, V Katkar International journal of computer applications 20 (6), 14-18, 2011 | 10 | 2011 |
Review of cloud-based natural language processing services and tools for chatbots A Ray, R Mathew Proceeding of the International Conference on Computer Networks, Big Data …, 2020 | 9 | 2020 |
Deep Learning and Natural Language Processing for fake news detection: A Survey A Chokshi, R Mathew Available at SSRN 3769884, 2021 | 8 | 2021 |
Machine learning algorithms for diagnosis of breast cancer R Negi, R Mathew Proceeding of the International Conference on Computer Networks, Big Data …, 2020 | 8 | 2020 |
A review of malware classification methods using machine learning NS Shekhawat, R Mathew ICICNIS, 2020 | 7 | 2020 |
Review on dimensionality reduction techniques D Chauhan, R Mathews Proceeding of the International Conference on Computer Networks, Big Data …, 2020 | 7 | 2020 |
Data storage security issues in cloud computing V Paul, R Mathew Proceeding of the International Conference on Computer Networks, Big Data …, 2020 | 6 | 2020 |
Review of tools for analyzing security vulnerabilities in ethereum based smart contracts A Moona, R Mathew ICICNIS, 2020 | 5 | 2020 |
Performance assessment of color spaces in multimodal biometric identification with Iris and palmprint using Thepade’s sorted ternary block truncation coding R Bhondave International Journal of Integrated Computer Applications and Research …, 2016 | 5 | 2016 |
Study of privilege escalation attack on Android and its countermeasures R Mathew International Journal of Engineering Science and Technology 4 (9), 4078-4082, 2012 | 5 | 2012 |
One pass incremental association rule detection algorithm for network intrusion detection system V Katkar, R Mathew International Journal of Engineering Science and Technology 3 (4), 2011 | 5 | 2011 |
Machine learning algorithms for early prediction of heart disease A Sinha, R Mathew Proceeding of the International Conference on Computer Networks, Big Data …, 2020 | 4 | 2020 |
Machine learning algorithms in stock market prediction J Potdar, R Mathew Proceeding of the International Conference on Computer Networks, Big Data …, 2020 | 4 | 2020 |