关注
Priteshkumar Prajapati
Priteshkumar Prajapati
在 charusat.ac.in 的电子邮件经过验证
标题
引用次数
引用次数
年份
A Review on Secure Data Deduplication: Cloud Storage Security Issue
P Prajapati, P Shah
Journal of King Saud University-Computer and Information Sciences 34 (7 …, 2022
882022
A Review of Various Challenges in Cybersecurity using Artificial Intelligence
H Chaudhary, A Detroja, P Prajapati, P Shah
2020 3rd International Conference on Intelligent Sustainable Systems (ICISS …, 2020
222020
Efficient Cross User Client Side Data Deduplication in Hadoop
P Prajapati, P Shah, A Ganatra, S Patel
2nd International Conference on Bioinformatics and Computer Engineering …, 2016
162016
Efficient cross user Data Deduplication in Remote Data Storage
P Prajapati, P Shah
International Conference for Convergence for Technology-2014, 1-5, 2014
162014
Provable Data Possession using Additive Homomorphic Encryption
P Shah, P Prajapati
Journal of King Saud University-Computer and Information Sciences 34 (6 …, 2022
122022
Provable Data Possession Using Identity Based Encryption
S Kadvani, A Patel, M Tilala, P Prajapati, P Shah
3rd International Conference on ICT for Intelligent Systems (ICTIS 2018 …, 2018
112018
A Review on Recent Intrusion Detection Systems and Intrusion Prevention Systems in IoT
P Prajapati, B Bhatt, G Zalavadiya, M Ajwalia, P Shah
2021 11th International Conference on Cloud Computing, Data Science …, 2021
102021
A Review of Recent Detection Methods For HTTP DDoS Attacks
P Prajapati, N Patel, P Shah
International Journal of Scientific and Technology Research 8 (12), 1693-1696, 2019
92019
A Review of Recent Blockchain Applications
P Prajapati, K Dave, P Shah
International Journal of Scientific and Technology Research 9 (1), 897-903, 2020
82020
A Review of Recent Trends on DNA Based Cryptography
G Bhoi, R Bhavsar, P Prajapati, P Shah
2020 3rd International Conference on Intelligent Sustainable Systems (ICISS …, 2020
32020
A Review on Different Techniques used to detect the Malicious Applications for Securing the Android Operating System
P Prajapati, D Bhagat, P Shah
International Journal of Scientific and Technology Research 9 (2), 5255-5258, 2020
32020
Casper: Modification of Bitcoin using Proof of Stake
N Sheth, P Prajapati, A Shaikh, P Shah
3rd International Conference on ICT for Intelligent Systems (ICTIS 2018 …, 2018
22018
Smishing: A SMS Phishing Detection Using Various Machine Learning Algorithms
P Prajapati, H Nandani, D Shah, S Shah, R Shah, M Ajwalia, P Shah
Communication and Intelligent Systems, 5th International Conference on …, 2024
2024
Enhancing Security in a University Network using Snort and Wireshark
P Prajapati, P Shah, D Shah, S Shah, R Shah, M Ajwalia
8th International Conference on Information and Communication Technology for …, 2024
2024
Phishing E-mail Detection using Machine Learning
P Prajapati, Y Bhadania, A Joshi, Y Jani, H Nandani, M Ajwalia, P Shah
4th International Conference on Smart Systems: Innovations in Computing …, 2024
2024
Identity-Based Encryption (IBE) based Improved Data Possession Techniques
P Shah, P Prajapati
ICT Systems and Sustainability, 8th International Conference on ICT …, 2023
2023
Privacy Challenges and Solutions in Implementing Searchable Encryption for Cloud Storage
A Patel, P Prajapati, P Shah, V Sangani, M Ajwalia, T Upadhyaya
ICT with Intelligent Applications, 7th International Conference on …, 2023
2023
Code Buddy: A Machine Learning-Based Automatic Source Code Quality Reviewing System
N Patel, A Mehta, P Prajapati, J Biskitwala
Congress on Intelligent Systems (CIS 2020) 1334, 453-462, 2021
2021
系统目前无法执行此操作,请稍后再试。
文章 1–18