A secure and trust based on-demand multipath routing scheme for self-organized mobile ad-hoc networks GM Borkar, AR Mahajan Wireless Networks 23 (8), 2455-2472, 2017 | 128 | 2017 |
A novel clustering approach and adaptive SVM classifier for intrusion detection in WSN: A data mining concept GM Borkar, LH Patil, D Dalgade, A Hutke Sustainable Computing: Informatics and Systems 23, 120-135, 2019 | 122 | 2019 |
A review on propagation of secure data, prevention of attacks and routing in mobile ad-hoc networks GM Borkar, AR Mahajan International Journal of Communication Networks and Distributed Systems 24 …, 2020 | 17 | 2020 |
Security aware dual authentication-based routing scheme using fuzzy logic with secure data dissemination for mobile ad-hoc networks GM Borkar, AR Mahajan International Journal of Communication Networks and Distributed Systems 21 …, 2018 | 8 | 2018 |
Roadmap of digital forensics investigation process with discovery of tools A Patil, S Banerjee, D Jadhav, G Borkar Cyber Security and Digital Forensics, 241-269, 2022 | 7 | 2022 |
A survey on securing smart gadgets using lightweight cryptography A Patil, S Banerjee, G Borkar Proceedings of International Conference on Wireless Communication: ICWiCOM …, 2020 | 7 | 2020 |
Confinement forest‐based enhanced min‐min and max‐min technique for secure multicloud task scheduling P Jawade, GM Borkar, S Ramachandram Transactions on Emerging Telecommunications Technologies 33 (9), e4515, 2022 | 6 | 2022 |
Challenges to Multimedia Privacy and Security Over Social Media DJ Gautam M. Borkar, Pallavi Chavan Handbook of Research on Cyber Crime and Information Privacy 2, 118-131, 2020 | 5* | 2020 |
An Adaptive RIPng Routing Protocol with Secure Packet Transmission in MANETs LH Patil, GM Borkar Journal of Applied Security Research 13 (4), 545-571, 2018 | 5 | 2018 |
Trust management: a cooperative approach using game theory U Ravale, A Patil, GM Borkar The Psychology of Trust, 2022 | 4 | 2022 |
Implementation of round robin policy in DNS for thresholding of distributed web server system GM Borkar, MA Pund, P Jawade Proceedings of the International Conference & Workshop on Emerging Trends in …, 2011 | 4 | 2011 |
Optimal key generation for privacy preservation in big data applications based on the marine predator whale optimization algorithm PS Jadhav, GM Borkar Annals of Data Science, 1-31, 2024 | 3 | 2024 |
Secure Routing Protocol To Mitigate Attacks By Using Blockchain Technology In Manet N Ghodichor, D Sahu, G Borkar, A Sawarkar arXiv preprint arXiv:2304.04254, 2023 | 3 | 2023 |
Unstructured big data information extraction techniques survey: Privacy preservation perspective PS Jadhav, SS Bodhe, GM Borkar, AV Vidhate 2021 International Conference on Electrical, Computer, Communications and …, 2021 | 3 | 2021 |
A review on propagation of secure data, prevention of attacks and routing in mobile ad-hoc networks (MANETs) GM Borkar, AR Mahajan International Journal of Data Science 3 (4), 353-389, 2018 | 3 | 2018 |
Node authentication and encrypted data transmission in mobile ad hoc network using the swarm intelligence‐based secure ad‐hoc on‐demand distance vector algorithm AR Patil, GM Borkar IET Wireless Sensor Systems 13 (6), 201-215, 2023 | 2 | 2023 |
Urinary Metabolomics Identified Metabolic Perturbations Associated with Gutka, a Smokeless Form of Tobacco SB Jorvekar, A Jala, A Rai, S Jangili, D Adla, G Borkar, A Das, K Kakati, ... Chemical Research in Toxicology 36 (4), 669-684, 2023 | 2 | 2023 |
Route optimization in MANET using swarm intelligence algorithm AR Patil, GM Borkar Comprehensive Metaheuristics, 313-324, 2023 | 1 | 2023 |
The voice and gesture to speech conversion in Indian regional sign language A Bhattatiri, A Chaubal, M Dalal, G Borkar Sentiment Analysis and Deep Learning: Proceedings of ICSADL 2022, 717-736, 2023 | 1 | 2023 |
Secure routing protocol against internal and external attack in MANET N Ghodichor, V Namdeoe, G Borkar Proceedings of The International Conference on Emerging Trends in Artificial …, 2022 | 1 | 2022 |